2019
DOI: 10.1002/nem.2084
|View full text |Cite
|
Sign up to set email alerts
|

CASA‐IoT: Scalable and context‐aware IoT access control supporting multiple users

Abstract: Summary The Internet of Things (IoT) supports many users and context‐aware applications controlling heterogeneous IoT devices. This differs from traditional networks, in which a single entity manages each device. Thus, new access control models must be created in order to support more responsive, scalable, secure, and autonomous management. This article presents an attribute‐based access control model, which applies conflict resolution and access delegation in a multiuser and multiapplication environment. With… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 25 publications
0
4
0
1
Order By: Relevance
“…No trabalho de [Castro et al 2019] são apresentadas modificac ¸ões necessárias em uma arquitetura IoT para agilizar a avaliac ¸ão de políticas de controle de acesso. Os autores propõem um sistema de controle de acesso híbrido, que avalia parcialmente as políticas nos dispositivos IoT, além de um mecanismo de cache de políticas.…”
Section: Trabalhos Relacionadosunclassified
“…No trabalho de [Castro et al 2019] são apresentadas modificac ¸ões necessárias em uma arquitetura IoT para agilizar a avaliac ¸ão de políticas de controle de acesso. Os autores propõem um sistema de controle de acesso híbrido, que avalia parcialmente as políticas nos dispositivos IoT, além de um mecanismo de cache de políticas.…”
Section: Trabalhos Relacionadosunclassified
“…Recommendation (R ij ) is the indirect trust of device i about device j, which means that device i builds its trust about device j taking into account the shared opinions from other communities devices about device j. We obtain R ij by Equation (7).…”
Section: Authentication Management Modulementioning
confidence: 99%
“…The data dissemination and sharing in IoT naturally demand an effective service of access control (AC), adaptive to changes in the context, and resilient to non-authorized network access. 7,8 However, a couple of issues inherent to IoT (e.g., heterogeneity, mobility, computing resource, and power) often inhibit the use of such services. 9 At the systemlevel, the maintenance of system operation availability relies on security methods 10 to analyze physical behavior and support the decision making, 11 as the threat of attacks is always a possibility, demanding measures to detect them and mitigate their effects.…”
mentioning
confidence: 99%
“…The Internet of Things (IoT) is an established paradigm, where many things are interconnected providing services to the people [Castro et al 2019]. As things are being connected, many systems assumed social characteristics intrinsic to human problems.…”
Section: Introductionmentioning
confidence: 99%