Skip to main content
Top

2022 | OriginalPaper | Chapter

Traffic Reduction for Information Flow Control in the IoT

Authors : Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa

Published in: Advances on Broad-Band Wireless Computing, Communication and Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the CBAC (Capability-Based Access Control) model for the IoT (Internet of Things), subjects are issued capability tokens, i.e. a set of access rights on objects in devices, by device owners. Objects are data resource in a device which are used to store sensor data and action data. Through manipulating objects of devices, data are exchanged among subjects and objects. Here, the illegal information flow and the late information flow occur and subjects can get data which the subjects are not allowed to get. In our previous studies, protocols are implemented to interrupt operations implying both illegal and late types of information flows. Here, the request processing time takes longer as the number of capability tokens whose signatures are verified in devices increases. Hence, an MRCTSD (Minimum Required Capability Token Selection for Devices) algorithm to reduce the number of capability tokens used is proposed. However, the more number of capability tokens are sent from subjects, the more complex the capability token selections are. Since the devices support just low processing power and smaller size of memory, it is important to avoid concentrating loads in devices. In this paper, MRCTSS (MRCTS for Subjects) algorithm where subjects selects minimum required capability tokens and sends them to devices is proposed. In the evaluation, it is shown that the size of a UDP datagram in a get access request is made smaller by the MRCTSS algorithm.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Date, C.J.: An Introduction to Database Systems, 8th edn. Addison Wesley, Boston, MA, USA (2003)MATH Date, C.J.: An Introduction to Database Systems, 8th edn. Addison Wesley, Boston, MA, USA (2003)MATH
4.
go back to reference Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Boston, MA, USA (1982)MATH Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Boston, MA, USA (1982)MATH
5.
go back to reference Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., Henry, J.: IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press, Indianapolis, IN, USA (2018) Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., Henry, J.: IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press, Indianapolis, IN, USA (2018)
6.
go back to reference Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. 3(3/4), 1–16 (2013) Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. 3(3/4), 1–16 (2013)
7.
go back to reference Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ecdsa). Int. J. Inf. Secur. 1(1), 36–63 (2001)CrossRef Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ecdsa). Int. J. Inf. Secur. 1(1), 36–63 (2001)CrossRef
8.
go back to reference Nakamura, S., Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Read-write abortion (RWA) based synchronization protocols to prevent illegal information flow. In: Proceedings of the 17th International Conference on Network-Based Information Systems, pp. 120–127 (2014) Nakamura, S., Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Read-write abortion (RWA) based synchronization protocols to prevent illegal information flow. In: Proceedings of the 17th International Conference on Network-Based Information Systems, pp. 120–127 (2014)
9.
go back to reference Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int. J. Space-Based Situated Comput. 6(1), 43–53 (2016)CrossRef Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int. J. Space-Based Situated Comput. 6(1), 43–53 (2016)CrossRef
10.
go back to reference Nakamura, S., Enokido, T., Takizawa, M.: Causally ordering delivery of event messages in P2PPSO systems. Cogn. Syst. Res. 56, 167–178 (2019)CrossRef Nakamura, S., Enokido, T., Takizawa, M.: Causally ordering delivery of event messages in P2PPSO systems. Cogn. Syst. Res. 56, 167–178 (2019)CrossRef
11.
go back to reference Nakamura, S., Enokido, T., Takizawa, M.: Information flow control in object-based peer-to-peer publish/subscribe systems. Concurrency Comput. Pract. Exp. 32(8), e5118 (2020)CrossRef Nakamura, S., Enokido, T., Takizawa, M.: Information flow control in object-based peer-to-peer publish/subscribe systems. Concurrency Comput. Pract. Exp. 32(8), e5118 (2020)CrossRef
12.
go back to reference Nakamura, S., Enokido, T., Takizawa, M.: A capability token selection algorithm for lightweight information flow control in the IoT. In: Proceedings of the 24th International Conference on Network-Based Information Systems, pp. 23–34 (2021) Nakamura, S., Enokido, T., Takizawa, M.: A capability token selection algorithm for lightweight information flow control in the IoT. In: Proceedings of the 24th International Conference on Network-Based Information Systems, pp. 23–34 (2021)
15.
go back to reference Oma, R., Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: An energy-efficient model for fog computing in the internet of things (IoT). IoT Eng. Cyber Phys. Hum. Syst. 1-2, 14–26 (2018) Oma, R., Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: An energy-efficient model for fog computing in the internet of things (IoT). IoT Eng. Cyber Phys. Hum. Syst. 1-2, 14–26 (2018)
16.
go back to reference Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)CrossRef Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)CrossRef
18.
go back to reference Tanganelli, G., Vallati, C., Mingozzi, E.: CoAPthon: Easy development of CoAP-based IoT applications with python. In: IEEE 2nd World Forum on Internet of Things (WF-IoT 2015), pp. 63–68 (2015) Tanganelli, G., Vallati, C., Mingozzi, E.: CoAPthon: Easy development of CoAP-based IoT applications with python. In: IEEE 2nd World Forum on Internet of Things (WF-IoT 2015), pp. 63–68 (2015)
19.
go back to reference Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS 2005), p. 569 (2005) Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS 2005), p. 569 (2005)
Metadata
Title
Traffic Reduction for Information Flow Control in the IoT
Authors
Shigenari Nakamura
Tomoya Enokido
Makoto Takizawa
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-90072-4_7