Reference Hub14
Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT

Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT

Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa
Copyright: © 2019 |Volume: 10 |Issue: 4 |Pages: 13
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781522564850|DOI: 10.4018/IJMCMC.2019100102
Cite Article Cite Article

MLA

Nakamura, Shigenari, et al. "Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT." IJMCMC vol.10, no.4 2019: pp.13-25. http://doi.org/10.4018/IJMCMC.2019100102

APA

Nakamura, S., Enokido, T., & Takizawa, M. (2019). Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 10(4), 13-25. http://doi.org/10.4018/IJMCMC.2019100102

Chicago

Nakamura, Shigenari, Tomoya Enokido, and Makoto Takizawa. "Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 10, no.4: 13-25. http://doi.org/10.4018/IJMCMC.2019100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In the Internet of Things (IoT), not only computers like servers but also devices with sensor and actuator devices are interconnected. It is critical to make the IoT secure, especially devices. In the capability-based access control (CapBAC) model proposed to make IoT devices secure, an owner of each device issues a capability token, i.e. a set of access rights, to a subject. Only a subject holding the capability token is allowed to manipulate the device. However, a subject may get data in a device d1 via another device d2 although the subject holds no capability token to get data from the device d1. Here, the data in the device d1 illegally flow to the subject. In this article, the authors propose the operation interruption (OI) protocol where illegal get operations are interrupted. In the evaluation, the ratio of the number of get operations interrupted to the total number of get operations is kept constant even if the numbers of subjects and access rights granted to each subject increase in the OI protocol.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.