2017
DOI: 10.1016/s1353-4858(17)30071-5
|View full text |Cite
|
Sign up to set email alerts
|

An access control management protocol for Internet of Things devices

Abstract: The version presented here may differ from the published version or from the version of the record. Please see the repository URL above for details on accessing the published version and note that access may require a subscription.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…Taylor et al divided the access control mechanisms in IoT into three categories, Role Based Access Control (RBAC), Context Aware Access Control (CWAC) and Policy Based Access Control (PBAC) [104]. Whereas Ouaddah et al extended this classification into more categories that include Attributebased Access Control (ABAC), Usage Control-based Access Control (UCAC), Capability-based Access Control (CAC), and Organizational-based Access Control (OAC) [105].…”
Section: A Authentication and Access Control In Iotmentioning
confidence: 99%
“…Taylor et al divided the access control mechanisms in IoT into three categories, Role Based Access Control (RBAC), Context Aware Access Control (CWAC) and Policy Based Access Control (PBAC) [104]. Whereas Ouaddah et al extended this classification into more categories that include Attributebased Access Control (ABAC), Usage Control-based Access Control (UCAC), Capability-based Access Control (CAC), and Organizational-based Access Control (OAC) [105].…”
Section: A Authentication and Access Control In Iotmentioning
confidence: 99%
“…So far, several many protocols have been proposed to ensure IoT security, e.g. [5], [6], [7], [8], [9], however, most of them have failed in providing their security goals [10], [11], [12], [13] and various attacks, such as the protocol's secret values disclosure, desynchronization, traceability, impersonation were reported against those protocols. For example, Lee et al proposed a new authenticated group key agreement protocol for imbalanced wireless networks [14].…”
Section: A Related Work and Motivationmentioning
confidence: 99%
“…According to [17] "is a technological innovation, based on already consolidated artifacts such as the internet and smart objects". Its objective is to create new applications and improve existing ones, according to [18], enabling the integration of information from the virtual and physical environment, thus extending the network to the real world [19,20].…”
Section: Internet Of Thingsmentioning
confidence: 99%