Skip to main content

2022 | OriginalPaper | Buchkapitel

Traffic Reduction for Information Flow Control in the IoT

verfasst von : Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa

Erschienen in: Advances on Broad-Band Wireless Computing, Communication and Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the CBAC (Capability-Based Access Control) model for the IoT (Internet of Things), subjects are issued capability tokens, i.e. a set of access rights on objects in devices, by device owners. Objects are data resource in a device which are used to store sensor data and action data. Through manipulating objects of devices, data are exchanged among subjects and objects. Here, the illegal information flow and the late information flow occur and subjects can get data which the subjects are not allowed to get. In our previous studies, protocols are implemented to interrupt operations implying both illegal and late types of information flows. Here, the request processing time takes longer as the number of capability tokens whose signatures are verified in devices increases. Hence, an MRCTSD (Minimum Required Capability Token Selection for Devices) algorithm to reduce the number of capability tokens used is proposed. However, the more number of capability tokens are sent from subjects, the more complex the capability token selections are. Since the devices support just low processing power and smaller size of memory, it is important to avoid concentrating loads in devices. In this paper, MRCTSS (MRCTS for Subjects) algorithm where subjects selects minimum required capability tokens and sends them to devices is proposed. In the evaluation, it is shown that the size of a UDP datagram in a get access request is made smaller by the MRCTSS algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Date, C.J.: An Introduction to Database Systems, 8th edn. Addison Wesley, Boston, MA, USA (2003)MATH Date, C.J.: An Introduction to Database Systems, 8th edn. Addison Wesley, Boston, MA, USA (2003)MATH
4.
Zurück zum Zitat Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Boston, MA, USA (1982)MATH Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Boston, MA, USA (1982)MATH
5.
Zurück zum Zitat Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., Henry, J.: IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press, Indianapolis, IN, USA (2018) Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., Henry, J.: IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press, Indianapolis, IN, USA (2018)
6.
Zurück zum Zitat Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. 3(3/4), 1–16 (2013) Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. 3(3/4), 1–16 (2013)
7.
Zurück zum Zitat Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ecdsa). Int. J. Inf. Secur. 1(1), 36–63 (2001)CrossRef Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ecdsa). Int. J. Inf. Secur. 1(1), 36–63 (2001)CrossRef
8.
Zurück zum Zitat Nakamura, S., Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Read-write abortion (RWA) based synchronization protocols to prevent illegal information flow. In: Proceedings of the 17th International Conference on Network-Based Information Systems, pp. 120–127 (2014) Nakamura, S., Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Read-write abortion (RWA) based synchronization protocols to prevent illegal information flow. In: Proceedings of the 17th International Conference on Network-Based Information Systems, pp. 120–127 (2014)
9.
Zurück zum Zitat Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int. J. Space-Based Situated Comput. 6(1), 43–53 (2016)CrossRef Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int. J. Space-Based Situated Comput. 6(1), 43–53 (2016)CrossRef
10.
Zurück zum Zitat Nakamura, S., Enokido, T., Takizawa, M.: Causally ordering delivery of event messages in P2PPSO systems. Cogn. Syst. Res. 56, 167–178 (2019)CrossRef Nakamura, S., Enokido, T., Takizawa, M.: Causally ordering delivery of event messages in P2PPSO systems. Cogn. Syst. Res. 56, 167–178 (2019)CrossRef
11.
Zurück zum Zitat Nakamura, S., Enokido, T., Takizawa, M.: Information flow control in object-based peer-to-peer publish/subscribe systems. Concurrency Comput. Pract. Exp. 32(8), e5118 (2020)CrossRef Nakamura, S., Enokido, T., Takizawa, M.: Information flow control in object-based peer-to-peer publish/subscribe systems. Concurrency Comput. Pract. Exp. 32(8), e5118 (2020)CrossRef
12.
Zurück zum Zitat Nakamura, S., Enokido, T., Takizawa, M.: A capability token selection algorithm for lightweight information flow control in the IoT. In: Proceedings of the 24th International Conference on Network-Based Information Systems, pp. 23–34 (2021) Nakamura, S., Enokido, T., Takizawa, M.: A capability token selection algorithm for lightweight information flow control in the IoT. In: Proceedings of the 24th International Conference on Network-Based Information Systems, pp. 23–34 (2021)
15.
Zurück zum Zitat Oma, R., Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: An energy-efficient model for fog computing in the internet of things (IoT). IoT Eng. Cyber Phys. Hum. Syst. 1-2, 14–26 (2018) Oma, R., Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: An energy-efficient model for fog computing in the internet of things (IoT). IoT Eng. Cyber Phys. Hum. Syst. 1-2, 14–26 (2018)
16.
Zurück zum Zitat Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)CrossRef Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)CrossRef
18.
Zurück zum Zitat Tanganelli, G., Vallati, C., Mingozzi, E.: CoAPthon: Easy development of CoAP-based IoT applications with python. In: IEEE 2nd World Forum on Internet of Things (WF-IoT 2015), pp. 63–68 (2015) Tanganelli, G., Vallati, C., Mingozzi, E.: CoAPthon: Easy development of CoAP-based IoT applications with python. In: IEEE 2nd World Forum on Internet of Things (WF-IoT 2015), pp. 63–68 (2015)
19.
Zurück zum Zitat Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS 2005), p. 569 (2005) Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS 2005), p. 569 (2005)
Metadaten
Titel
Traffic Reduction for Information Flow Control in the IoT
verfasst von
Shigenari Nakamura
Tomoya Enokido
Makoto Takizawa
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-90072-4_7

Neuer Inhalt