2018
DOI: 10.5815/ijcnis.2018.01.04
|View full text |Cite
|
Sign up to set email alerts
|

Validation of an Adaptive Risk-based Access Control Model for the Internet of Things

Abstract: Abstract-The Internet of Things (IoT) has spread into multiple dimensions that incorporate different physical and virtual things. These things are connected together using different communication technologies to provide unlimited services. These services help not only to improve the quality of our daily lives, but also to provide a communication platform for increasing object collaboration and information sharing. Like all new technologies, the IoT has many security challenges that stand as a barrier to the su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 37 publications
(22 citation statements)
references
References 31 publications
(46 reference statements)
0
21
0
Order By: Relevance
“…As a result, the blockchain will open a series of IoT scenarios that were difficult, or even impossible to implement without it. For example, by leveraging the blockchain, IoT solutions can enable secure, trustless messaging between devices in an IoT network [27]. In this model, the blockchain will treat message exchanges between devices similar to financial transactions in a bitcoin network.…”
Section: Blockchain With Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, the blockchain will open a series of IoT scenarios that were difficult, or even impossible to implement without it. For example, by leveraging the blockchain, IoT solutions can enable secure, trustless messaging between devices in an IoT network [27]. In this model, the blockchain will treat message exchanges between devices similar to financial transactions in a bitcoin network.…”
Section: Blockchain With Iotmentioning
confidence: 99%
“…The processing power and time needed to achieve encryption for all the objects included in a blockchain system. IoT systems have different types of devices which have very different computing capabilities, and not all of them will be able to run the same encryption algorithms at the required speed [14,27]. 3.…”
Section: Processing Power and Timementioning
confidence: 99%
“…This model uses user attributes related to the surrounding environment such as time and location, sensitivity of data to be accessed by the user, severity of actions that will be performed by the user and user risk history as inputs for the risk estimation algorithm to measure the risk value related to each access request to determine the access decision, as shown in Figure 2. In addition, the proposed model provides an efficient solution for many unexpected circumstances which need policy violations by incorporating real-time information to determine the access [24,25]. Estimating the security risk is a complex operation which needs considering several factors [14].…”
Section: Proposed Risk Estimation Techniquementioning
confidence: 99%
“…The IoT is considered an emerging paradigm which consists of billions of uniquely addressable objects communicating with one another to form a global dynamic network [1]. It represents a promising future technology that shows some common characteristics as follows:…”
Section: Essential Characteristics Of Iotmentioning
confidence: 99%
“…It has the ability to connect and communicate worldwide virtual and physical objects through either wired or wireless networks. It is expected that by 2020, there will be more than 50 billion IoT objects [1].…”
Section: Introductionmentioning
confidence: 99%