Skip to main content
Log in

Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

With the recent advances in ubiquitous communications and the growing demand for low-power wireless technology, smart IoT device (SID) to access various Internet of Things (IoT) resources through Internet at any time and place alternately. There are some new requirements for integration IoT servers in which each one is individually gathering its local resources in Internet, which cooperatively supports SID to get some flexibility or temporary contract(s) and privileges in order to access their corresponding desired service(s) in a group of collaboration IoT servers. However, traditional access control schemes designed for a single server are not sufficient to handle such applications across multiple collaboration IoT servers to get rich services in IoT environments. It does not take into account both security and efficiency of IoT servers, which securely share their resources. Therefore, the collaboration IoT-based RBAC (Role-based Access Control) with trust evaluation (TE) algorithm model to reducing internal security threats in intra-server and inter server for the massive IoT integrated application is proposed in this paper. Finally, the three trust evaluation algorithms including a local trust evaluation algorithm, a virtual trust evaluation algorithm and a cooperative trust evaluation algorithm in the proposed collaboration IoT-based RBAC model, which are designed and presented for reducing internal security threats in collaborative IoT servers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Chen H-C (2017) A cooperative RBAC-based IoTs server with hierarchical trust evaluation mechanism. Proceedings of IoTaaS 2017 – 3rd EAI International Conference on IoT as a Service, Sept. 20–22, 2017, Taichung, Taiwan

  2. Chen H-C, Chang C-H, Leu F-Y (2017) Implement of agent with role-based hierarchy access control for secure grouping IoTs. The14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp120–125, Las Vegas, USA, 8–11 Jan. 2017

  3. Zhong S, Zhang L, Chen H-C, Zhao H, Guo L (2017) Study of the patterns of automatic car washing in the era of internet of things. The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017), pp. 82–86, Tamkang University, Taipei, Taiwan, Mar 27–29, 2017

  4. 5G Americas (2017) LTE progress leading to the 5G massive internet of things. 3GPP enhancements up to release 14 [On-line]http://www.5gamericas.org/files/8415/1250/0673/LTE_Progress_Leading_to_the_5G_Massive_Internet_of_Things_Final_12.5.pdf,Retrieved on Mar. 08, 2018

  5. Linko S, Garsbo C, Shi L (2017) Massive IoT: different technologies for different needs-wide area mesh networks can meet the requirements for large-scale IoT. Northstream White Paper, Wirepas & Northstream, Jun. 29, 2017. [Online] https://wirepas.com/download/

  6. Patel M, Shangkuan J, Thomas C (2017) What’s new with the Internet of Things? McKinsey & Company. Retrieved from http://www.mckinsey.com/industries/semiconductors/our-insights/whats-new-with-the-internet-of-things

  7. Cardoza C (2017) Solving the internet of things integration problem. SD Times, Jan. 25, 2017. [Online] https://sdtimes.com/developers/solving-internet-things-integration-problem/, Retrieved on Mar. 08, 2018

  8. Malhan M, Filipovic S (2017) Network services for massive IoT. Ericsson [Online] https://www.ericsson.com/en/networks/offerings/cellular-iot/network-services-massive-iot, Retrieved on Mar. 08, 2018

  9. Akl SG, Taylor PD (1983) Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst 1(3):239–248

    Article  Google Scholar 

  10. Ferraiolo DF, Kuhn DR (1992) Role-based access controls. In: Proceedings of the 15th national computer security conference, pp 554–563, Oct 13–16, 1992

  11. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29:38–47

    Article  Google Scholar 

  12. Balamurugan B, Krishna PV (2015) Enhanced role-based access control for cloud security. Artificial intelligence and evolutionary algorithms in engineering systems. Adv Intell Syst Comput 324:837–852

    Google Scholar 

  13. Chen H-C (2015) A trusted user-to-role and role-to-key access control scheme. Soft Comput 1–13

  14. Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data. Security and Privacy Workshops (SPW), 2015 IEEE CS Security and Privacy Workshops, pp 180–184

  15. Yu Z, Yu T (2012) Mining trust relationships from online social networks. J Comput Sci Technol 27(3):492–505

    Article  Google Scholar 

  16. Mishra D, Soni D (2014) A comprehensive overview on data mining: approaches and applications. Int J of Computer Science and Information Technologies 5(6):7814–7816

    Google Scholar 

  17. Chen H-C, Su H-K( 2014) A cooperative trust bit-map routing protocol using the GA algorithm for reducing the damages from the InTs in WANETs. J of Internet Services and Information Security 4(4):52–70

    Google Scholar 

  18. Chen H-C (2017) TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks. IEEE Syst J 11(2):449–459

    Article  MathSciNet  Google Scholar 

  19. Trifa Z, Khemakhem M (2014) Sybil nodes as a mitigation strategy against Sybil attack. Procedia Computer Science 32:1135–1140

    Article  Google Scholar 

  20. Chen H-C (2017) A negotiation-based cooperative RBAC scheme. Int J Web Grid Serv 13(1):94–111

    Article  Google Scholar 

  21. Chen H-C, Violetta MA, Yang C-Y (2013) Contract RBAC in cloud computing. J Supercomput 66(2):1111–1131

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by Asia University, Taiwan, and China Medical University Hospital, China Medical University, Taiwan, under Grant ASIA-106-CMUH-04. This work was also supported in part by the Ministry of Science and Technology (MOST), Taiwan, Republic of China, under Grant MOST 106-2632-E-468-003.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hsing-Chung Chen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, HC. Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application. Mobile Netw Appl 24, 839–852 (2019). https://doi.org/10.1007/s11036-018-1085-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1085-0

Keywords

Navigation