2018
DOI: 10.3390/s18030917
|View full text |Cite
|
Sign up to set email alerts
|

Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

Abstract: Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(25 citation statements)
references
References 34 publications
0
23
0
Order By: Relevance
“…To develop the Alpha Beta filter, we suppose a system sufficiently approximated by a model having two-interval states. First, we do initialization, as shown in (1)(2). (2) We have used (3) to update the position, and (4) to read the sensor data.…”
Section: B Alpha Beta Filtermentioning
confidence: 99%
See 1 more Smart Citation
“…To develop the Alpha Beta filter, we suppose a system sufficiently approximated by a model having two-interval states. First, we do initialization, as shown in (1)(2). (2) We have used (3) to update the position, and (4) to read the sensor data.…”
Section: B Alpha Beta Filtermentioning
confidence: 99%
“…The internet of things (IoT) has changed the living styles of people. The ordinary cities are being converted to smart cities, with facilities like automated parking, smart lights, smart cars, automated trains, and so forth [1,2]. In smart homes, there are security issues regarding the confidentiality and misuse of technology [3].…”
Section: Introductionmentioning
confidence: 99%
“…Also, it is easy to create additional services or applications based on the virtual device approach. For example, a security feature such as access control [39] can be built by adding user permissions information into virtual devices. Meanwhile, an intrusion detection service can be developed by combining time-series data of virtual devices and machine learning techniques [40].…”
Section: Nosql Databasementioning
confidence: 99%
“…Some of the MQTT protocol's main features are shown in different works [43][44][45][46][47][48] which makes it especially suitable for this research. Some of them are:…”
Section: Architecture Designmentioning
confidence: 99%