A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

Preprint English OPEN
Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe;
  • Subject: Computer Science - Networking and Internet Architecture

The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also... View more
  • References (9)

    [1] Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., and Ayyash, M., \Internet of things: A survey on enabling technologies, protocols, and applications," IEEE Communications Surveys & Tutorials 17(4), 2347{2376 (2015).

    [2] Snidaro, L., Garcia-Herrera, J., Llinas, J., and Blasch, E., [Context-Enhanced Information Fusion ], Springer (2016).

    [3] Blasch, E., Kadar, I., Grewe, L. L., Brooks, R., Yu, W., Kwasinski, A., Thomopoulos, S., Salerno, J., and Qi, H., \Panel summary of cyber-physical systems (cps) and internet of things (iot) opportunities with information fusion," in [Signal Processing, Sensor/Information Fusion, and Target Recognition XXVI ], 10200, 102000O, International Society for Optics and Photonics (2017).

    [4] Alaba, F. A., Othman, M., Hashem, I. A. T., and Alotaibi, F., \Internet of things security: A survey," Journal of Network and Computer Applications 88, 10{28 (2017).

    [5] Gusmeroli, S., Piccione, S., and Rotondi, D., \A capability-based security approach to manage access control in the internet of things," Mathematical and Computer Modelling 58(5-6), 1189{1205 (2013).

    [6] Ouaddah, A., Mousannif, H., Elkalam, A. A., and Ouahman, A. A., \Access control in the internet of things: big challenges and new opportunities," Computer Networks 112, 237{262 (2017).

    [7] Gong, L., \A secure identity-based capability system," in [Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on ], 56{63, IEEE (1989).

    [8] Suhendra, V., \A survey on access control deployment," in [International Conference on Security Technology ], 11{20, Springer (2011).

    [9] Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E., \Role-based access control models," Computer 29(2), 38{47 (1996).

  • Similar Research Results (1)
  • Related Organizations (1)
  • Metrics
Share - Bookmark