ABSTRACT
The significant rise in the usage of IoT devices and their security issues has created a demand for improved security for these systems. Unfortunately, no standard IoT architecture exists, making the development of security solutions for IoT systems difficult. Towards this end, we leverage an IoT framework to create a generic IoT software architecture and integrate it with an extension of the RBAC model incorporating the time and location of users to determine access to different IoT resources. We provide a prototype implementation of the integrated architecture to show its feasibility.
- Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray, and Robert B France. 2013. Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model. IEEE Systems Journal 7, 3 (2013), 501--515.Google ScholarCross Ref
- Monjur Ahmed and Alan T. Litchfield. 2018. Taxonomy for Identification of Security Issues in Cloud Computing Environments. Journal of Computer Information Systems 58, 1 (2018), 79--88. https://doi.org/10.1080/08874417.2016.1192520 arXiv:https://doi.org/10.1080/08874417.2016.1192520Google ScholarCross Ref
- Asma Alshehri and Ravi Sandhu. 2016. Access control models for cloud-enabled internet of things: A proposed architecture and research agenda. In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC). IEEE, 530--538.Google ScholarCross Ref
- Alessio Botta, Walter De Donato, Valerio Persico, and Antonio Pescapé. 2016. Integration of cloud computing and internet of things: a survey. Future generation computer systems 56 (2016), 684--700.Google Scholar
- Martin Fowler. 2004. UML distilled: a brief guide to the standard object modeling language. Addison-Wesley Professional.Google ScholarDigital Library
- Sergio Gusmeroli, Salvatore Piccione, and Domenico Rotondi. 2013. A capability- based security approach to manage access control in the internet of things. Mathematical and Computer Modelling 58, 5--6 (2013), 1189--1205.Google ScholarCross Ref
- Parikshit N Mahalle, Bayu Anggorojati, Neeli R Prasad, and Ramjee Prasad. 2013. Identity authentication and capability based access control (iacac) for the internet of things. Journal of Cyber Security and Mobility 1, 4 (2013), 309--348.Google Scholar
- Michele Nitti, Virginia Pilloni, Giuseppe Colistra, and Luigi Atzori. 2015. The virtual object as a major element of the internet of things: a survey. IEEE Communications Surveys & Tutorials 18, 2 (2015), 1228--1240.Google ScholarDigital Library
- Chayan Sarkar, Akshay Uttama Nambi SN, R Venkatesha Prasad, Abdur Rahim, Ricardo Neisse, and Gianmarco Baldini. 2014. DIAT: A scalable distributed architecture for IoT. IEEE Internet of Things journal 2, 3 (2014), 230--239.Google ScholarCross Ref
Index Terms
- Poster: Integrating Spatio-temporal Authorization with Generic Cloud-based Software Architecture for Internet of Things Devices
Recommendations
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
A Security Architecture for Networked Internet of Things Devices
GLOBECOM 2017 - 2017 IEEE Global Communications ConferenceThe Internet of Things (IoT) increasingly demonstrates its role in smart services, such as smart home, smart grid, smart transportation, etc. However, due to lack of standards among different vendors, existing networked IoT devices (NoTs) can hardly ...
Security Architecture of Computer Communication System Based on Internet of Things
ICASIT 2020: Proceedings of the 2020 International Conference on Aviation Safety and Information TechnologyIn large-scale service collaboration environment, security and privacy protection are the main factors affecting the development of IoT service applications. The security and privacy requirements of IoT services mainly focus on three aspects: secure ...
Comments