Abstract
Smart home technologies constantly bring significant convenience to our daily lives. Unfortunately, increased security risks accompany this convenience. There can be severe consequences when unauthorized or malicious users gain access to smart home devices. Therefore, dependable and comprehensive access control models are needed to address the security concerns. To this end, the attribute-based access control (ABAC) model is usually considered the most satisfactory access control model for running IoT applications. However, the uncertainty left with the authentication stage should be carried to the authorization policy specification. In this work, we extend the ABAC model by carrying the assurance level of user authentication obtained from biometric authentication systems for authorization. The extended ABAC model quantifies how far the authentication matching score is from the predefined threshold. This quantification serves as a regular attribute like others to define authorization policies. The novelty in this quantification is that it consults false matching rate and hence can easily normalize across wide range of biometric authentication devices and algorithms. As a result, the resulting access control policies are concise and easy to comprehend. Moreover, our model is fine-grained in that different access policies can be specified for each smart device functionality. This work also shows, through case studies, that the extended ABAC model is feasible and implementable in XACML language.















Similar content being viewed by others
Data availability
No datasets were generated or analyzed during the current study.
References
Ravidas, S., Lekidis, A., Paci, F., Zannone, N.: Access control in Internet-of-Things: a survey. J. Netw. Comput. Appl. 144, 79–101 (2019). https://doi.org/10.1016/j.jnca.2019.06.0171610.01065
Naik, S., Maral, V.: Cyber security—IoT. In: RTEICT 2017—2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, Proceedings 2018-January, pp. 764–767 (2018). https://doi.org/10.1109/RTEICT.2017.8256700
Ogonji, M.M., Okeyo, G., Wafula, J.M.: A survey on privacy and security of Internet of Things. Comput. Sci. Rev. 38, 100312 (2020). https://doi.org/10.1016/j.cosrev.2020.100312
Fremantle, P., Scott, P.: A survey of secure middleware for the internet of things. PeerJ Comput. Sci. (2017). https://doi.org/10.7717/peerj-cs.114
Lee, S., Kim, J., Lee, S., Tech, G., Kim, H., Kim, J.: FACT: Functionality-Centric Access Control System for IoT Programming Frameworks. In: SACMAT’17, pp. 43–54 (2017)
He, W., Padhi, R., Ofek, J., Golla, M., Dürmuth, M., Fernandes, E., Ur, B.: Rethinking Access Control and Authentication for the Home Internet of Things (IoT). Usenix Sec (2018). https://www.usenix.org/conference/usenixsecurity18/presentation/he
Borse, Y., Chawathe, A.: A survey on access control in cloud computing. Int. J. Comput. Trends Technol. 59(2), 81–84 (2018). https://doi.org/10.14445/22312803/ijctt-v59p113
Tian, Y., Zhang, N., Lin, Y.H., Wang, X.F., Ur, B., Guo, X.Z., Tague, P.: Smartauth: user-centered authorization for the internet of things. In: Proceedings of the 26th USENIX Security Symposium, pp. 361–378 (2017)
Yu, T., Sekar, V., Seshan, S., Agarwal, Y., Xu, C.: Handling a trillion (unfixable) flaws on a billion devices. In: Proceedings of the 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV 2015, pp. 1–7 (2015). https://doi.org/10.1145/2834050.2834095
Ouaddah, A., Mousannif, H., Abou Elkalam, A., Ait Ouahman, A.: Access control in the Internet of Things: big challenges and new opportunities. Comput. Netw. 112, 237–262 (2017). https://doi.org/10.1016/j.comnet.2016.11.007
Adda, M., Abdelaziz, J., McHeick, H., Saad, R.: Toward an access control model for IOTCollab. Procedia Comput. Sci. 52(1), 428–435 (2015). https://doi.org/10.1016/j.procs.2015.05.009
Ye, N., Zhu, Y., Wang, R.C., Malekian, R., Lin, Q.M.: An efficient authentication and access control scheme for perception layer of internet of things. Appl. Math. Inf. Sci. 8(4), 1617–1624 (2014). https://doi.org/10.12785/amis/080416
Yalcinkaya, E., Maffei, A., Onori, M.: Application of attribute based access control model for industrial control systems. Int. J. Comput. Netw. Inf. Secur. 9(2), 12–21 (2017). https://doi.org/10.5815/ijcnis.2017.02.02
Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication (2014). https://doi.org/10.6028/NIST.SP.800-162
Oasis: eXtensible Access Control Markup Language. OASIS Standard (January):154 (2013)
Rath, A.T., Colin, J.N.: Strengthening access control in case of compromised accounts in smart home. In: International Conference on Wireless and Mobile Computing, Networking and Communications 2017-October, pp. 1–8 (2017). https://doi.org/10.1109/WiMOB.2017.8115827
Rath, T.A., Colin, J.N.: Adaptive risk-aware access control model for Internet of Things. In: Proceedings—2017 International Workshop on Secure Internet of Things, SIoT 2017, pp. 40–49 (2018). https://doi.org/10.1109/SIoT.2017.00010
Dong, Y., Wan, K., Huang, X., Yue, Y.: Contexts-states-aware access control for Internet of Things. In: Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design, CSCWD 2018, pp. 271–276 (2018). https://doi.org/10.1109/CSCWD.2018.8465364
Bezawada, B., Haefner, K., Ray, I.: Securing home IoT environments with attribute-based access control. In: Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control, Co-located with CODASPY 2018, pp. 43–53 (2018). https://doi.org/10.1145/3180457.3180464
Sun, K., Yin, L.: Attribute-role-based hybrid access control. In: APWeb 2014 Workshops (61100181), pp. 333–343 (2014). https://doi.org/10.1007/978-3-319-11119-3_31
Aghili, S.F., Sedaghat, M., Singelée, D., Gupta, M.: MLS-ABAC: efficient multi-level security attribute-based access control scheme. Future Gener. Comput. Syst. 131(January), 75–90 (2022). https://doi.org/10.1016/j.future.2022.01.003
Song, L., Li, M., Zhu, Z., Yuan, P., He, Y.: Attribute-based access control using smart contracts for the Internet of Things. Procedia Comput. Sci. 174(2019), 231–242 (2020). https://doi.org/10.1016/j.procs.2020.06.079
Cathey, G., Benson, J., Gupta, M., Sandhu, R.: Edge centric secure data sharing with digital twins in smart ecosystems. In: Proceedings—2021 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021, pp. 70–79 (2021). https://doi.org/10.1109/TPSISA52974.2021.00008
Goyal, G., Liu, P., Sural, S.: Securing Smart Home IoT Systems with Attribute-Based Access Control, vol 1. Association for Computing Machinery (2022). https://doi.org/10.1145/3510547.3517920
Gupta, M., Sandhu, R.: Towards activity-centric access control for smart collaborative ecosystems, vol 1. Association for Computing Machinery (2021). https://doi.org/10.1145/3450569.3463559, arXiv:2102.11484
Mawla, T., Gupta, M., Sandhu, R.: BlueSky: Activity Control: A Vision for “active” Security Models for Smart Collaborative Systems, vol 1. Association for Computing Machinery (2022). https://doi.org/10:1145/3532105.3535017
Zeng, E., Roesner, F.: Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study. In: Proceedings of the 28th USENIX Security Symposium, pp. 159–176 (2019)
Burakgazi Bilgen, M., Bicakci, K.: Extending attribute-based access control model with authentication information for Internet of Things. In: 2020 International Conference on Information Security and Cryptology, ISCTURKEY 2020—Proceedings, pp. 48–55 (2020). https://doi.org/10.1109/ISCTURKEY51113.2020.9307964
How biometrics will have a big impact on IoT technology - NEC NZ https://www.nec.co.nz/marketleadership/publications-media/how-biometrics-will-have-a-big-impact-on-iot-technology/
Sugrim, S., Liu, C., McLean, M., Lindqvist, J.: Robust Performance Metrics for Authentication Systems. Network and Distributed Systems Security (NDSS) Symposium 2019 (February) (2019). https://doi.org/10.14722/ndss.2019.23351
Dunstone, T., Yager, N.: Biometric System and Data Analysis Design, Evaluation, and Data Mining. Springer US, (2009). 14:40. https://doi.org/10.1007/978-0-387-77627-92022-12-10
Dhir, V., Singh, A., Kumar, R., Singh, G.: Biometric recognition: a modern era for security. Int. J. Eng. Sci. Technol. 2(8), 3364–3380 (2010)
Https://biolabcsruniboit/FvcOnGoing/UI/Form/PublishedAlgsaspx (2022) FVC-onGoing. https://biolab.csr.unibo.it/FvcOnGoing/UI/Form/PublishedAlgs.aspx# &&opq9kKfNMmetNyGfkPzA5od/P/tuPosw2DR8xqBRrz6hauX5tMGdzgwPF/egYeXkNIbFbE31OxgFjPHfByvIrbTvKn9EiOXZgtaXs7W2HpEj4EOZyEo0fs4RzbQGiqLmPbECcldIg/yR4Jl4iG4mhH2n7Uo37vRKR/RCw8F9HvRLJE+o
Dorizzi, B., Cappelli, R., Ferrara, M., Maio, D., Maltoni, D., Houmani, N., Garcia-Salicetti, S., Mayoue, A.: Fingerprint and on-line signature verification competitions at ICB 2009. In: Proceedings International Conference on Biometrics (ICB) 5558 LNCS, pp. 725–732 (2009). https://doi.org/10.1007/978-3-642-01793-3_74
Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2002: second fingerprint verification competition. In: Proceedings—International Conference on Pattern Recognition, Vol. 16, No. 3, pp. 811–814 (2002). https://doi.org/10.1109/icpr.2002.1048144
Ameer, S., Sandhu, R.: The HABAC model for smart home IoT and comparison to EGRBAC. In: SAT-CPS 2021—Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, pp. 39–48 (2021). https://doi.org/10.1145/3445969.3450428
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no competing financial interests.
Ethical approval
This article does not contain any studies with human participants or animals.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
A sample policy specification with four permit rules (projected on critical functionalities).






Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Burakgazi Bilgen, M., Abul, O. & Bicakci, K. Authentication-enabled attribute-based access control for smart homes. Int. J. Inf. Secur. 22, 479–495 (2023). https://doi.org/10.1007/s10207-022-00639-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-022-00639-x