Access Control for the Internet of Things

As we are moving from networked "Things" towards the Internet of Things (IoT), new security requirements arise. Access control in this new environment is a burgeoning and challenging problem. On the one hand, an access control system should be generic enough to cover the equirements of all...

Full description

Saved in:
Bibliographic Details
Published in2016 International Workshop on Secure Internet of Things (SIoT) pp. 29 - 38
Main Authors Fotiou, Nikos, Kotsonis, Theodore, Marias, Giannis F., Polyzos, George C.
Format Conference Proceeding
LanguageEnglish
Published IEEE 2016
Subjects
Online AccessGet full text

Cover

Loading…
Abstract As we are moving from networked "Things" towards the Internet of Things (IoT), new security requirements arise. Access control in this new environment is a burgeoning and challenging problem. On the one hand, an access control system should be generic enough to cover the equirements of all the new exciting applications that become pervasive with the IoT. On the other hand, an access control system should be lightweight and easily implementable, considering at the same time the restrictions that Things impose. In this paper, we develop an access control system which enables offloading of complex access control decisions to third, trusted parties. Our system provides Thing authentication without public keys and establishes a shared symmetric encryption key that can be used to secure the communication between authorized users and Things. Our design imposes minimal overhead and it is based on a simple communication protocol. He resulting system is secure, enhances end-user privacy and the architecture facilitates the creation of new applications.
AbstractList As we are moving from networked "Things" towards the Internet of Things (IoT), new security requirements arise. Access control in this new environment is a burgeoning and challenging problem. On the one hand, an access control system should be generic enough to cover the equirements of all the new exciting applications that become pervasive with the IoT. On the other hand, an access control system should be lightweight and easily implementable, considering at the same time the restrictions that Things impose. In this paper, we develop an access control system which enables offloading of complex access control decisions to third, trusted parties. Our system provides Thing authentication without public keys and establishes a shared symmetric encryption key that can be used to secure the communication between authorized users and Things. Our design imposes minimal overhead and it is based on a simple communication protocol. He resulting system is secure, enhances end-user privacy and the architecture facilitates the creation of new applications.
Author Fotiou, Nikos
Marias, Giannis F.
Polyzos, George C.
Kotsonis, Theodore
Author_xml – sequence: 1
  givenname: Nikos
  surname: Fotiou
  fullname: Fotiou, Nikos
  email: fotiou@aueb.gr
  organization: Dept. of Inf. Sch. of Inf. Sci. & Technol., Athens Univ. of Econ. & Bus., Athens, Greece
– sequence: 2
  givenname: Theodore
  surname: Kotsonis
  fullname: Kotsonis, Theodore
  email: kotsonis@aueb.gr
  organization: Dept. of Inf. Sch. of Inf. Sci. & Technol., Athens Univ. of Econ. & Bus., Athens, Greece
– sequence: 3
  givenname: Giannis F.
  surname: Marias
  fullname: Marias, Giannis F.
  email: marias@aueb.gr
  organization: Dept. of Inf. Sch. of Inf. Sci. & Technol., Athens Univ. of Econ. & Bus., Athens, Greece
– sequence: 4
  givenname: George C.
  surname: Polyzos
  fullname: Polyzos, George C.
  email: polyzos@aueb.gr
  organization: Dept. of Inf. Sch. of Inf. Sci. & Technol., Athens Univ. of Econ. & Bus., Athens, Greece
BookMark eNotzD1PwzAQgGEj0QFKRyYWrwwJd3Zt58Yq4iNSJYZmr1znTCMVGzle-PcgwfDq2d5bcZ1yYiHuEVpEoKfDkMdWAdoWEK7EhlyHBgh-w-5GPO5C4GWRfU615IuMuch6ZjmkyiVxlTnK8Tynj-VOrKK_LLz5dy3Gl-exf2v2769Dv9s3M0FtnJm0j14pH9haiwGIo9kaJGOZgJzaEiARTi4oY_2JXeBp4nAK1vvO6rV4-NvOzHz8KvOnL99HR6iN1foHpRI9Eg
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/SIoT.2016.010
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781509050918
1509050914
EndPage 38
ExternalDocumentID 7913563
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-75d3afa22ace6661c09ef5451956e909724901991d7c256abe7ceddecbc6aa863
IEDL.DBID RIE
IngestDate Wed Jun 26 19:24:06 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-75d3afa22ace6661c09ef5451956e909724901991d7c256abe7ceddecbc6aa863
PageCount 10
ParticipantIDs ieee_primary_7913563
PublicationCentury 2000
PublicationDate 20160000
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – year: 2016
  text: 20160000
PublicationDecade 2010
PublicationTitle 2016 International Workshop on Secure Internet of Things (SIoT)
PublicationTitleAbbrev SIoT
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7177341
Snippet As we are moving from networked "Things" towards the Internet of Things (IoT), new security requirements arise. Access control in this new environment is a...
SourceID ieee
SourceType Publisher
StartPage 29
SubjectTerms Access control
Authentication
Encryption
Internet of Things
Privacy
Protocols
Title Access Control for the Internet of Things
URI https://ieeexplore.ieee.org/document/7913563
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEB3anjyptOI3OXgRzHa7H8nmKMVShYrgCr2VJDsBEboiuxd_vZNNbUU8eAt7SDaTZOftZN4bgCsl84qAruQTG1c8M4nkyhnJabNo5aR2WeHZyItHMX_JHpb5sgc3Wy4MInbJZxj5ZneXX9W29aGysVSTNBdpH_pFnASu1k42c_x8X5c-V0tEsefD_iiW0vmK2T4svkcJKSJvUduYyH7-EmD872scwGjHymNPW39zCD1cD-H6tqt4yKYh5ZwRBmWE6ViI9GHDasdCbc4RlLO7cjrnm_IH_FXFDScjptrpJNEW6R-DbKnQ5Z0ajEDlVXcy8uUE7yppCbdog9IifayssULrQqRHMFjXazwGJnThnBQatbe90yrOMKGDiLG11EF6AkM_y9V7ELhYbSZ4-vfjM9jzVg5xiHMYNB8tXpBnbsxltyRfgyqQVg
link.rule.ids 310,311,786,790,795,796,802,4069,4070,27958,55109
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsAEqEV844EFCadpPux6RBVVC22FRJC6VY5zlhBSU6F04ddzjkuLEANblCGOL3Hey_neO4AbJdOCiK7kXRMWPMkjyZXNJaeXRSsrtU16To08mYrha_I4S2cNuNtoYRCxLj7DwB3We_lFaVYuVdaRqhunIt6BXcL5UHm11tY4s_MyKjNXrSWC0Clif7RLqdFicACT73F8kch7sKrywHz-smD8740cQnury2PPG8Q5ggYuWnB7X_c8ZH1fdM6IhTJidczn-rBipWW-O2cbssFD1h_ydQME_qbCilMYY211FGmD9JdB0VRo09oPRqByvjsJoTkRvEIaYi46R2mQPlcmN0LrnoiPobkoF3gCTOietVJo1C76VqswwYiWIobG0AXiU2i5Wc6X3uJivp7g2d-nr2FvmE3G8_Fo-nQO-y7iPitxAc3qY4WXhNNVflU_ni9T55Os
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+International+Workshop+on+Secure+Internet+of+Things+%28SIoT%29&rft.atitle=Access+Control+for+the+Internet+of+Things&rft.au=Fotiou%2C+Nikos&rft.au=Kotsonis%2C+Theodore&rft.au=Marias%2C+Giannis+F.&rft.au=Polyzos%2C+George+C.&rft.date=2016-01-01&rft.pub=IEEE&rft.spage=29&rft.epage=38&rft_id=info:doi/10.1109%2FSIoT.2016.010&rft.externalDocID=7913563