2022
DOI: 10.1007/s10586-022-03733-w
|View full text |Cite
|
Sign up to set email alerts
|

SUACC-IoT: secure unified authentication and access control system based on capability for IoT

Abstract: With the widespread use of Internet of Things (IoT) in various applications and several security vulnerabilities reported in them, the security requirements have become an integral part of an IoT system. Authentication and access control are the two principal security requirements for ensuring authorized and restricted accesses to limited and essential resources in IoT. The built-in authentication mechanism in IoT devices is not reliable, because several security vulnerabilities are revealed in the firmware im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…SDSM [125] Enforcement of combination of blockchain and ciphertext-based attribute cryptography SUACC-IoT [126] Capability-driven authorization system for IoT devices with limited resources. ule-based [120][121][122] Prioritize sensing and communicating nodes as per their role ACS [123] Authorizing Fog nodes based on caching services, oNet [124] Cluster reachability-distance based utilization of thinning operation to enforce Access validation.…”
Section: Security Access Model/methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…SDSM [125] Enforcement of combination of blockchain and ciphertext-based attribute cryptography SUACC-IoT [126] Capability-driven authorization system for IoT devices with limited resources. ule-based [120][121][122] Prioritize sensing and communicating nodes as per their role ACS [123] Authorizing Fog nodes based on caching services, oNet [124] Cluster reachability-distance based utilization of thinning operation to enforce Access validation.…”
Section: Security Access Model/methodsmentioning
confidence: 99%
“…SDSM [125] Enforcement of combination of blockchain and ciphertext-based attribute cryptography SUACC-IoT [126] Capability-driven authorization system for IoT devices with limited resources.…”
Section: Classification Of Internet Of Things Access Controlmentioning
confidence: 99%
See 3 more Smart Citations