体育赛事投注记录

体育赛事投注记录advertisement

Lightweight Access Control Algorithm for Internet of Things

  • Aravind Sreekumar
  • Ruthvik Vegunta
  • S. DeepthiEmail author
Conference paper
  • 61 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1141)

Abstract

while internet of things is an upcoming technological breakthrough and a fast-developing field of technology, the access control to restricted resources devices still remains a concern. the conventional solutions require a lot of computational and bandwidth capabilities, which are not available in constrained devices. also, there is very limited interoperability against standard communication protocols for the internet of things. these issues are being solved with the help of oauth-iot, an access control framework. though the oauth-iot solves all the major issues with computational and bandwidth requirements, there are still a few unsolved issues. this contribution presents a flexible and simple method using open-standards to implement access control and authentication in internet of things.

Keywords

Internet of Things Access control Authentication 

References

  1. 1.
    Orange, the future of digital trust a European study on the nature of consumer trust and personal data, Technical Report (2014)
  2. 2.
    Ouaddah, A., Mousannif, H., Elkalam, A.A., Ouahman, A.A.: Access control in The Internet of Things: Big challenges and new opportunities. Comput. Netw. 112.  
  3. 3.
    Sciancalepore, S., Piro, G., Caldarola, D., Boggia, G., Bianchi, G.: OAuth-IoT: an access control framework for the Internet of Things based on open standards. In: IEEE Symposium on Computers and Communications, Italy (2017)
  4. 4.
    Kulkarni, D., Tripathi, A.: Context-aware role-based access control in pervasive computing systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, Colorado State University, USA, pp. 113–122, June 2008
  5. 5.
    Yuan, E., Tong, J.: Attributed based access control (ABAC) for Web services. In: Proceedings IEEE International Conference on Web Service (2005)
  6. 6.
    Mahalle, P.: Identity authentication and capability based access control (IACAC) for the internet of things. J. Cyber Secur. Mobility 1, 309–348 (2013)
  7. 7.
    Gusmeroli, S., Piccione, S., Rotondi, D.: A capability-based security approach to manage access control in the Internet of Things. Math. Comput. Model. 58, 1189–1205 (2013)
  8. 8.
    Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8(4), 351–387 (2005)
  9. 9.
    Park, J., Sandhu, R.: Towards usage control models: beyond traditional access control. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, p. 57. ACM Press, New York, New York, USA (2002)
  10. 10.
    Park, J.: Usage control: a unified framework for next generation access control (2003)
  11. 11.
    Lazouski, A., Martinelli, F., Mori, P.: Usage control in computer security: a survey. Comput. Sci. Rev. 4(2), 81–99 (2010)
  12. 12.
    Kalam, A., Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: Proceedings of POLICY 2003. IEEE 4th International Workshop on Policies for Distributed System Networks, pp. 120–131 (2003)
  13. 13.
    Zhou, X., Tang, X.: Research and implementation of RSA algorithm for encryption and decryption. In: Proceedings of 2011 6th International Forum on Strategic Technology, Harbin, Heilongjiang, 2011, pp. 1118–1121

Copyright information

© Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  • Aravind Sreekumar
    • 1
  • Ruthvik Vegunta
    • 1
  • S. Deepthi
    • 1
    Email author
  1. 1.Department of Computer Science and EngineeringManipal Institute of Technology, Manipal Academy of Higher Education (MAHE)ManipalIndia

Personalised recommendations