2019
DOI: 10.1007/s12243-019-00709-7
|View full text |Cite
|
Sign up to set email alerts
|

Access control in the Internet of Things: a survey of existing approaches and open research questions

Abstract: The Internet of Things operates in a personal-data-rich sector, which makes security and privacy an increasing concern for consumers. Access control is thus a vital issue to ensure trust in the IoT. Several access-control models are today available, each of them coming with various features, making them more or less suitable for the IoT. This article provides a comprehensive survey of these different models, focused both on access control models (e.g., DAC, MAC, RBAC, ABAC) and on access control architectures … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 56 publications
(45 citation statements)
references
References 52 publications
(59 reference statements)
0
40
0
1
Order By: Relevance
“…Existing home security systems that are based on audio and video surveillance set up a possible risk of privacy for residents [ 34 ]. Most indicated authorization mechanisms for a smart home are based on attributes (e.g., actuator request timestamp in an Attribute Based Access Control—ABAC mechanism) [ 52 ]. A contextual-based framework for continuous authentication in smart homes is proposed in the literature as a way to enhance existing static user authentication mechanisms.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing home security systems that are based on audio and video surveillance set up a possible risk of privacy for residents [ 34 ]. Most indicated authorization mechanisms for a smart home are based on attributes (e.g., actuator request timestamp in an Attribute Based Access Control—ABAC mechanism) [ 52 ]. A contextual-based framework for continuous authentication in smart homes is proposed in the literature as a way to enhance existing static user authentication mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…Existing authentication mechanisms, such as passwords, tokens, or two-stage PINs used in bank authentication are invasive and not appropriate to the usability of voice-based interactions. The use of usable security paradigm could help to design an authentication mechanism that is secure and usable in the user’s perspective [ 52 , 78 , 79 ]. Specifically, existing invasive authentication methods hinder the usability by requiring additional user interactions, as described in Definition 1.…”
Section: Autonomous Device Challenge Response Authenticationmentioning
confidence: 99%
“…These smart contracts also provide much improved authorization access rules for cloud users while accessing cloud services and data using Access Control Lists (ACLs) compared to traditional authorization protocols like Role Based Access Management (RBAC), OAuth 2.0, OpenID, OMA DM and LWM2M. A smart contract's business logic has many programming functions, predefined rules, conditions (contractual terms) defined by mutual agreement between the participating peers to read, execute and update the ledger's current state and are initiated through a transaction proposal [84].…”
Section: Blockchain Enabled Authentication and Authorizationmentioning
confidence: 99%
“…Even in this case, it is a verification of the identity of the user of the system and access means the physical entry of a person into a secure area. European technical standards define an access control system as a system that allows or rejects a user's request to enter or exit a secure area in a building [3].…”
Section: Introductionmentioning
confidence: 99%