2019
DOI: 10.1109/jiot.2019.2941767
|View full text |Cite
|
Sign up to set email alerts
|

SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0
4

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(32 citation statements)
references
References 14 publications
0
28
0
4
Order By: Relevance
“…However, the framework does not use any behavioral features that may efficiently describe SHS user behavior. Ghosh et al [ 15 ] proposed SoftAuthZ, a framework for estimating the confidence associated with a device access request. SoftAuthZ computes the belief of a requester based on his/her historical request patterns using a linear regression model.…”
Section: Background Threat Model and Positioning To The State Of The Artmentioning
confidence: 99%
“…However, the framework does not use any behavioral features that may efficiently describe SHS user behavior. Ghosh et al [ 15 ] proposed SoftAuthZ, a framework for estimating the confidence associated with a device access request. SoftAuthZ computes the belief of a requester based on his/her historical request patterns using a linear regression model.…”
Section: Background Threat Model and Positioning To The State Of The Artmentioning
confidence: 99%
“…Thus, an impersonation attack would gain unrestricted access regardless the exploited user. In [Ghosh et al 2019] it is presented a context-aware behavior-based authorization framework for Smart Homes. Among the work contributions is a modelling of expected belief on device access request based on user's past request patterns and on context of the request.…”
Section: Related Workmentioning
confidence: 99%
“…Prior works on SHS security focus on Access Control (AC), Continuous Authentication (CA) and Intrusion Detection System (IDS). Many of them uses context-based decisions , Ghosh et al 2019, Sikder et al 2019 and behavior-based decisions , Ghosh et al 2019, Amraoui et al 2020. Although few of them are suitable to endure impersonation attacks , Ghosh et al 2019, Sikder et al 2019, they present some issues as dependence of cloud computing and big amount of data to infer information about environment or user activities, leading to privacy breaches.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…User position is also considered when various APs change states. Meanwhile, a framework named SoftAuthZ is presented in [35], which proposed a context-sensitive and behavior-based security framework. It incorporates soft security mechanisms, such as belief and confidence, to support authorization decisions.…”
Section: Security Technologymentioning
confidence: 99%