Open Access   Article Go Back

Access Control Approaches in Internet of Things

Meghana P.Lokhande1 , Dipti Durgesh Patil2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1158-1161, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.11581161

Online published on May 31, 2019

Copyright © Meghana P.Lokhande, Dipti Durgesh Patil . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Meghana P.Lokhande, Dipti Durgesh Patil, “Access Control Approaches in Internet of Things,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1158-1161, 2019.

MLA Style Citation: Meghana P.Lokhande, Dipti Durgesh Patil "Access Control Approaches in Internet of Things." International Journal of Computer Sciences and Engineering 7.5 (2019): 1158-1161.

APA Style Citation: Meghana P.Lokhande, Dipti Durgesh Patil, (2019). Access Control Approaches in Internet of Things. International Journal of Computer Sciences and Engineering, 7(5), 1158-1161.

BibTex Style Citation:
@article{P.Lokhande_2019,
author = {Meghana P.Lokhande, Dipti Durgesh Patil},
title = {Access Control Approaches in Internet of Things},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1158-1161},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4378},
doi = {https://doi.org/10.26438/ijcse/v7i5.11581161}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.11581161}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4378
TI - Access Control Approaches in Internet of Things
T2 - International Journal of Computer Sciences and Engineering
AU - Meghana P.Lokhande, Dipti Durgesh Patil
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1158-1161
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
525 215 downloads 131 downloads
  
  
           

Abstract

The Internet of Things is a rapidly growing concept in recent years. Safety and security have traditionally been distinct problems in engineering and computer science. With a massive amount of devices connected to the Internet and huge data associated in it, there is major concern of security of services. Many traditional security solutions including existing access control mechanisms may not be directly applicable in the IoT environment. Traditional access control approaches are not suitable to the decentralized and dynamic scenario in IoT as well. Various cryptographic algorithms developed which addresses security in Internet, but their use in IOT is questionable as the hardware devices used deal in IOT is not suitable for computationally expensive encryption algorithms. Particularly, the need arises for a dynamic and fine-grained access control algorithm on constrained resources. The paper summaries access control approaches that try to improve security in devices. Paper not only summarizes access control approaches, but also provides an understanding of the limitations and open issues of the existing work.

Key-Words / Index Term

Internet of Things (IoT), Access Control, Attribute-Based Access Control (ABAC), Role-Based Access Control (RBAC), Capability-Based Access Control (CapBAC)

References

[1] Guoping Zhang, Jiazheng Tian, “An Extended Role Based Access Control Model for the Internet of Things”, 978-1-4244-8106-4 IEEE 2010 pp. VI-319-323.
[2] Yunpeng Zhang, Xuqing Wu, “Access Control in Internet of Things: A Survey”, 2017 Asia-Pacific Engineering and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1
[3] Jing Liu and Yang Xiao, C. L. Philip Chen, “Authentication and Access Control in the Internet of Things”, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[4] Yahia Al-Halabi, Nisreen Raeq, Farah Abu-Dabaseh,“Study on Access control approaches in the context of Internet of Things: A survey”, ICET2017, Antalya, Turkey.
[5] Jia Jindou, Qiu Xiaofeng, Cheng Cheng,“Access Control Method for Web of Things based on Role and SNS”,2012 IEEE 12th International Conference on Computer and Information Technology.
[6] Guoping Zhang, Jiazheng Tian, “An Extended Role Based Access Control Model for the Internet of Things”, 2010 International Conference on Information, Networking and Automation (ICINA)
[7] Ning YE, Yan Zhu, Ru-chuan WANG, Reza Malekian, Lin Qiao-min,“An Efficient Authentication and Access Control Scheme
for Perception Layer of Internet of Things”,Appl. Math. Inf. Sci. 8, No. 4, 1-8 (2014)
[8] Sergio Gusmeroli, Salvatore Piccione, Domenico Rotondi,“A capability-based security approach to manage access control in the Internet of Things”,Mathematical and Computer Modelling (2013), http://dx.doi.org/10.1016/j.mcm.2013.02.006
[9] Zhang Guoping, Gong Wentao, “The Research of Access Control Based on UCON
in the Internet of Things”, JOURNAL OF SOFTWARE, VOL. 6, NO. 4, APRIL 2011
[10] Marilyan Wolf, Dimitrios Serpanos, “Safety and Security in Cyber Physical Systems and Internet of Things Systems”, Vol. 106, No. 1, January, IEEE 2018 pp. 9-20.
[11] Nikos Fotiou, Theodore Kotsonis, Giannis F. Marias, George C. Polyzos, “ Access Control for the Internet of Things”,2016 International Workshop on Secure Internet of Things IEEE DOI 10.1109/SioT.2016.10
[12] Inayat Ali, Sonia Sabir, Zahid Ullah, “Internet of Things Security, Device Authentication and Access Control: A Review”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 2016.
[13] Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li, Hongbin Zhao, “ A survey on Security and Privacy Issues in Internet of Things”, 2327-4662 IEEE 2017 pp. 1-10
[14] Parikshit N. Mahalle, Bayu Anggorojati, Neeli Rashmi Prasad, Ramjee Prasad, “ Identity Establishment and Capability Based access Control (IECAC) scheme for Internet of Things”, IEEE 2012 pp. 187-191.
[15] Mousa Alramadhan, Kewei Sha, “An Overview of Access Control Mechanisms for Internet of Things”, 978-1-5090-2991-4/17 IEEE 2017.
[16] M. Dahiya, A.Sangwan, and “A Review Paper on Various Attacks on Wireless Sensor Networks” International Journal of Computer Sciences and Engineering Vol. 7(4), Apr 2019, E-ISSN: 2347-2693
[17] K.Amutha, V.Vallinayagi, “E-security Through RFID”, International Journal of Computer Sciences and Engineering Vol. 7(8), Apr 2019, E-ISSN: 2347-2693
[18] Annie Singla, Kamal Jain, Ajay Gairola, “Delving into Security of Networks – Time’s Need”, Int. J.Sci. Res. in Network Security & Communication, Vol-2, Issue-3, PP(1-8) Oct 2014,E-ISSN: 2321-3256