Abstract
In order to cope with certain challenges posed by device capacity and the nature of IoT networks, a lightweight access control model is needed to resolve security and privacy issues. The use of complex encryption algorithms is infeasible due to the volatile nature of IoT environment and pervasive devices with limited resources. In this paper, we present the Trust-ABAC, an access control model for the Internet of Things, in which a coupling between the access control based on attributes and the trust concept is done. We evaluated the performance of Trust-ABAC through an experiment based on a simulation. We used the OMNeT++ simulator to show the efficiency of our model in terms of power consumption, response time and the average number of messages generated by an access request. The obtained results of simulation prove the good scalability of our Trust-ABAC model.
This is a preview of subscription content, log in via an institution.
References
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)
Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: Proceedings of the 10th International Conference on Frontiers of Information Technology, pp. 257–260 (2012)
Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 2266–2279 (2013)
Yuan, E., Tong, J.: Attribute based access control, a new access control approach for service oriented architectures (SOA). In: 2005 IEEE International Conference on Web Service, pp. 1628–1633 (2005)
Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Sciences and Systems, vol. 8, pp. 18–24 (1974)
Sandhu, R.S.: Lattice-based access control models. IEEE Comput. 26, 9–19 (1993)
Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)
Feng, F., Lin, C., Peng, D., Li, J.: A trust and context based access control model for distributed systems. In: The 10th IEEE International Conference on High Performance Computing and Communications, pp. 629–634 (2008)
Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: Geo-RBAC: a spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10, 1–34 (2006)
Thomas, M.V., Chandra Sekaran, K.: Agent-based approach for distributed access control in cloud environments. In: International Conference on High Performance Computing and Communications, pp. 1628–1633 (2013)
Smari, W.W., Zhu, J., Clemente, P.: Trust and privacy in attribute based access control for collaboration environments. In: International Conference on Information Integration and Web-based Applications and Services, pp. 49–55 (2009)
Skarmeta, A.F., Hernandez-Ramos, J.L., Victoria Moreno, M.: A decentralized approach for security and privacy challenges in the internet of things. In: IEEE World Forum on Internet of Things (WF-IoT), pp. 67–72 (2014)
Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity authentication and capability based access control (IACAC) for the internet of things. J. Cyber Secur. Mobility 1, 309–348 (2013)
Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Huang, X., Castiglione, A.: Supporting dynamic updates in storage clouds with the Akl-Taylor scheme. Inf. Sci. 387, 56–74 (2017)
Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983)
Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Huang, X.: Cryptographic hierarchical access control for dynamic structures. IEEE Trans. Inf. Forensics Secur. 11(10), 2349–2364 (2016)
Padekar, H., Park, Y., Hu, H., Chang, S.-Y.: Enabling dynamic access control for controller applications in software-defined networks. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, 5–8 June, 2016, pp. 51–61 (2016)
Alam, A., Subbiah, G., Thuraisingam, B., Khan, L.: Reasoning with semantics-aware access control policies for geospatial web services. In: Proceedings of the 3rd ACM Workshop on Secure Web Services, SWS 2006, pp. 69–76. ACM, New York (2006)
Esposito, C., Castiglione, A., Palmieri, F.: Interoperable access control by means of a semantic approach. In: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 280–285 (2016)
Godik, S., Moses, T.: Extensible access control markup language (xacml) version 1.0. OASIS Standard (2003)
Lin, K.-J., Lu, H., Yu, T., Tai, C.: A reputation and trust management broker framework for web applications. In: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2005, pp. 262–269 (2005)
Varga, A.: Using the OMNet++ discrete event simulation system in education. IEEE Trans. Educ. 42, 1–11 (1999)
Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ouechtati, H., Azzouna, N.B. (2017). Trust-ABAC Towards an Access Control System for the Internet of Things. In: Au, M., Castiglione, A., Choo, KK., Palmieri, F., Li, KC. (eds) Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science(), vol 10232. Springer, Cham. https://doi.org/10.1007/978-3-319-57186-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-57186-7_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57185-0
Online ISBN: 978-3-319-57186-7
eBook Packages: Computer ScienceComputer Science (R0)