Skip to main content
Top

2017 | OriginalPaper | Chapter

Trust-ABAC Towards an Access Control System for the Internet of Things

Authors : Hamdi Ouechtati, Nadia Ben Azzouna

Published in: Green, Pervasive, and Cloud Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In order to cope with certain challenges posed by device capacity and the nature of IoT networks, a lightweight access control model is needed to resolve security and privacy issues. The use of complex encryption algorithms is infeasible due to the volatile nature of IoT environment and pervasive devices with limited resources. In this paper, we present the Trust-ABAC, an access control model for the Internet of Things, in which a coupling between the access control based on attributes and the trust concept is done. We evaluated the performance of Trust-ABAC through an experiment based on a simulation. We used the OMNeT++ simulator to show the efficiency of our model in terms of power consumption, response time and the average number of messages generated by an access request. The obtained results of simulation prove the good scalability of our Trust-ABAC model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)CrossRefMATH Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)CrossRefMATH
2.
go back to reference Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: Proceedings of the 10th International Conference on Frontiers of Information Technology, pp. 257–260 (2012) Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: Proceedings of the 10th International Conference on Frontiers of Information Technology, pp. 257–260 (2012)
3.
go back to reference Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 2266–2279 (2013)CrossRef Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 2266–2279 (2013)CrossRef
4.
go back to reference Yuan, E., Tong, J.: Attribute based access control, a new access control approach for service oriented architectures (SOA). In: 2005 IEEE International Conference on Web Service, pp. 1628–1633 (2005) Yuan, E., Tong, J.: Attribute based access control, a new access control approach for service oriented architectures (SOA). In: 2005 IEEE International Conference on Web Service, pp. 1628–1633 (2005)
5.
go back to reference Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Sciences and Systems, vol. 8, pp. 18–24 (1974) Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Sciences and Systems, vol. 8, pp. 18–24 (1974)
6.
go back to reference Sandhu, R.S.: Lattice-based access control models. IEEE Comput. 26, 9–19 (1993)CrossRef Sandhu, R.S.: Lattice-based access control models. IEEE Comput. 26, 9–19 (1993)CrossRef
7.
go back to reference Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)CrossRef Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)CrossRef
8.
go back to reference Feng, F., Lin, C., Peng, D., Li, J.: A trust and context based access control model for distributed systems. In: The 10th IEEE International Conference on High Performance Computing and Communications, pp. 629–634 (2008) Feng, F., Lin, C., Peng, D., Li, J.: A trust and context based access control model for distributed systems. In: The 10th IEEE International Conference on High Performance Computing and Communications, pp. 629–634 (2008)
9.
go back to reference Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: Geo-RBAC: a spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10, 1–34 (2006)CrossRef Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: Geo-RBAC: a spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10, 1–34 (2006)CrossRef
10.
go back to reference Thomas, M.V., Chandra Sekaran, K.: Agent-based approach for distributed access control in cloud environments. In: International Conference on High Performance Computing and Communications, pp. 1628–1633 (2013) Thomas, M.V., Chandra Sekaran, K.: Agent-based approach for distributed access control in cloud environments. In: International Conference on High Performance Computing and Communications, pp. 1628–1633 (2013)
11.
go back to reference Smari, W.W., Zhu, J., Clemente, P.: Trust and privacy in attribute based access control for collaboration environments. In: International Conference on Information Integration and Web-based Applications and Services, pp. 49–55 (2009) Smari, W.W., Zhu, J., Clemente, P.: Trust and privacy in attribute based access control for collaboration environments. In: International Conference on Information Integration and Web-based Applications and Services, pp. 49–55 (2009)
12.
go back to reference Skarmeta, A.F., Hernandez-Ramos, J.L., Victoria Moreno, M.: A decentralized approach for security and privacy challenges in the internet of things. In: IEEE World Forum on Internet of Things (WF-IoT), pp. 67–72 (2014) Skarmeta, A.F., Hernandez-Ramos, J.L., Victoria Moreno, M.: A decentralized approach for security and privacy challenges in the internet of things. In: IEEE World Forum on Internet of Things (WF-IoT), pp. 67–72 (2014)
13.
go back to reference Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity authentication and capability based access control (IACAC) for the internet of things. J. Cyber Secur. Mobility 1, 309–348 (2013) Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity authentication and capability based access control (IACAC) for the internet of things. J. Cyber Secur. Mobility 1, 309–348 (2013)
14.
go back to reference Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Huang, X., Castiglione, A.: Supporting dynamic updates in storage clouds with the Akl-Taylor scheme. Inf. Sci. 387, 56–74 (2017)CrossRef Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Huang, X., Castiglione, A.: Supporting dynamic updates in storage clouds with the Akl-Taylor scheme. Inf. Sci. 387, 56–74 (2017)CrossRef
15.
go back to reference Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983)CrossRef Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983)CrossRef
16.
go back to reference Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Huang, X.: Cryptographic hierarchical access control for dynamic structures. IEEE Trans. Inf. Forensics Secur. 11(10), 2349–2364 (2016)CrossRefMATH Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Huang, X.: Cryptographic hierarchical access control for dynamic structures. IEEE Trans. Inf. Forensics Secur. 11(10), 2349–2364 (2016)CrossRefMATH
17.
go back to reference Padekar, H., Park, Y., Hu, H., Chang, S.-Y.: Enabling dynamic access control for controller applications in software-defined networks. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, 5–8 June, 2016, pp. 51–61 (2016) Padekar, H., Park, Y., Hu, H., Chang, S.-Y.: Enabling dynamic access control for controller applications in software-defined networks. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, 5–8 June, 2016, pp. 51–61 (2016)
18.
go back to reference Alam, A., Subbiah, G., Thuraisingam, B., Khan, L.: Reasoning with semantics-aware access control policies for geospatial web services. In: Proceedings of the 3rd ACM Workshop on Secure Web Services, SWS 2006, pp. 69–76. ACM, New York (2006) Alam, A., Subbiah, G., Thuraisingam, B., Khan, L.: Reasoning with semantics-aware access control policies for geospatial web services. In: Proceedings of the 3rd ACM Workshop on Secure Web Services, SWS 2006, pp. 69–76. ACM, New York (2006)
19.
go back to reference Esposito, C., Castiglione, A., Palmieri, F.: Interoperable access control by means of a semantic approach. In: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 280–285 (2016) Esposito, C., Castiglione, A., Palmieri, F.: Interoperable access control by means of a semantic approach. In: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 280–285 (2016)
20.
go back to reference Godik, S., Moses, T.: Extensible access control markup language (xacml) version 1.0. OASIS Standard (2003) Godik, S., Moses, T.: Extensible access control markup language (xacml) version 1.0. OASIS Standard (2003)
21.
go back to reference Lin, K.-J., Lu, H., Yu, T., Tai, C.: A reputation and trust management broker framework for web applications. In: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2005, pp. 262–269 (2005) Lin, K.-J., Lu, H., Yu, T., Tai, C.: A reputation and trust management broker framework for web applications. In: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2005, pp. 262–269 (2005)
22.
go back to reference Varga, A.: Using the OMNet++ discrete event simulation system in education. IEEE Trans. Educ. 42, 1–11 (1999)CrossRef Varga, A.: Using the OMNet++ discrete event simulation system in education. IEEE Trans. Educ. 42, 1–11 (1999)CrossRef
23.
go back to reference Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28 (2007) Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28 (2007)
Metadata
Title
Trust-ABAC Towards an Access Control System for the Internet of Things
Authors
Hamdi Ouechtati
Nadia Ben Azzouna
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-57186-7_7

Premium Partner