skip to main content
10.1145/3018896.3025170acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

An event-based access control for IoT

Published: 22 March 2017 Publication History

Abstract

The Internet of Things (IoT) comes together with the connection between sensors and devices. These smart devices have been upgraded from a standalone device which can only handle a specific task at one time to an interactive device that can handle multiple tasks in time. However, this technology has been exposed to many vulnerabilities especially on the malicious attacks of the devices. With the IoT constraints and low-security mechanisms applied, the malicious attacks could exploit the sensor vulnerability to provide wrong data where it can lead to wrong interpretation and actuation to the users. Due to this problems, this short paper presents an event-based access control framework that considers integrity, privacy and the authenticity in the IoT devices.

References

[1]
R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems New York Wiley Computer Publishing, (2001).
[2]
A.W. Atamli, A. Martin, Threat-based security analysis for the internet of things, Secure Internet of Things (SIoT), 2014 International Workshop on, IEEE, 2014, pp. 35--43.
[3]
S. Kaiwen, Y. Lihua, Attribute-Role-Based Hybrid Access Control in the Internet of Things, Asia-Pacific Web Conference, Springer, 2014, pp. 333--343.
[4]
D. Ferraiolo, D.R. Kuhn, R. Chandramouli, Role-based access control, Artech House 2003.
[5]
E. Yuan, J. Tong, Attributed based access control (ABAC) for web services, IEEE International Conference on Web Services (ICWS'05), IEEE, 2005.
[6]
M. Pistoia, S.J. Fink, R.J. Flynn, E. Yahav, When role models have flaws: Static validation of enterprise security policies, Proceedings of the 29th international conference on Software Engineering, IEEE Computer Society, 2007, pp. 478--488.
[7]
J.H. Saltzer, M.D. Schroeder, The protection of information in computer systems, P Ieee, 63 (1975) 1278--1308.
[8]
P.N. Mahalle, B. Anggorojati, N.R. Prasad, R. Prasad Identity authentication and capability based access control (iacac) for the internet of things, Journal of Cyber Security and Mobility, 1 (2013) 309--348.
[9]
B. Anggorojati, P.N. Mahalle, N.R. Prasad, R. Prasad, Capability-based access control delegation model on the federated IoT network, Wireless Personal Multimedia Communications (WPMC), 2012 15th International Symposium on, IEEE, 2012, pp. 604--608.
[10]
S. Gusmeroli, S. Piccione, D. Rotondi, A capability-based security approach to manage access control in the internet of things, Math Comput Model, 58 (2013) 1189--1205.
[11]
Q. Jing, A.V. Vasilakos, J. Wan, J. Lu, D. Qiu, Security of the internet of things: Perspectives and challenges, Wireless Network, 20 (2014) 2481--2501.
[12]
H. Ashtawy, T. Brown, X. Wang, Y. Zhang, Take A Hike.
[13]
A. Dunkels, O. Schmidt, T. Voigt, M. Ali, Protothreads: simplifying event-driven programming of memory-constrained embedded systems, Proceedings of the 4th international conference on Embedded networked sensor systems, ACM, Boulder, Colorado, USA, 2006, pp. 29--42.
[14]
X. Liu, A.V. Dastjerdi, R. Buyya, Stream processing in IoT: Foundations, state-of-the-art, and future directions. In Internet of Things: Principles and Paradigms, Elsivier 2016 (pp 145--160)

Cited By

View all
  • (2022)Systematic Review of Authentication and Authorization Advancements for the Internet of ThingsSensors10.3390/s2204136122:4(1361)Online publication date: 10-Feb-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing
March 2017
1349 pages
ISBN:9781450347747
DOI:10.1145/3018896
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. internet of things
  3. privacy

Qualifiers

  • Research-article

Conference

ICC '17

Acceptance Rates

ICC '17 Paper Acceptance Rate 213 of 590 submissions, 36%;
Overall Acceptance Rate 213 of 590 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Systematic Review of Authentication and Authorization Advancements for the Internet of ThingsSensors10.3390/s2204136122:4(1361)Online publication date: 10-Feb-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media