2021
DOI: 10.24251/hicss.2021.853
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Mapping Study of Access Control in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 37 publications
0
4
0
Order By: Relevance
“…The requirements in [ 9 ] are not specific to the IoT and may apply to other devices. Based on the work in [ 9 , 16 ], we further refined these requirements based on the characteristics of the IoT, including but not limited to the variety of the IoT devices, the resource constraints on the IoT devices, and the heterogeneous nature of the IoT. The twelve refined requirements, which are more specific to the IoT, are summarized below.…”
Section: Access Control In the Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…The requirements in [ 9 ] are not specific to the IoT and may apply to other devices. Based on the work in [ 9 , 16 ], we further refined these requirements based on the characteristics of the IoT, including but not limited to the variety of the IoT devices, the resource constraints on the IoT devices, and the heterogeneous nature of the IoT. The twelve refined requirements, which are more specific to the IoT, are summarized below.…”
Section: Access Control In the Iotmentioning
confidence: 99%
“…The security flaws in the access control may occur in many places, including design, protocols, implementations and configurations. Although many access control models have been proposed for IoT, limited research has been conducted on access control process security analysis [ 16 ]. Due to the importance of access control for any network, access control security analysis is desired.…”
Section: Access Control Research Challenges and Future Directionsmentioning
confidence: 99%
“…As a result, device identification is challenging in the IoT. Many critical services, such as access control and intrusion detection, are built on correctly identifying each unique device [3].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, machine learning and deep learning techniques have been applied to enhance ACP recognition; however, current solutions [ 11 ] often suffer from low accuracy and data privacy concerns. This challenge is particularly pronounced in IoT access control [ 12 ], where improving the accuracy of ACP recognition while ensuring the security and privacy of user data is a significant challenge.…”
Section: Introductionmentioning
confidence: 99%