Access Control for the Internet of Things
As we are moving from networked "Things" towards the Internet of Things (IoT), new security requirements arise. Access control in this new environment is a burgeoning and challenging problem. On the one hand, an access control system should be generic enough to cover the equirements of all...
Saved in:
Published in | 2016 International Workshop on Secure Internet of Things (SIoT) pp. 29 - 38 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | As we are moving from networked "Things" towards the Internet of Things (IoT), new security requirements arise. Access control in this new environment is a burgeoning and challenging problem. On the one hand, an access control system should be generic enough to cover the equirements of all the new exciting applications that become pervasive with the IoT. On the other hand, an access control system should be lightweight and easily implementable, considering at the same time the restrictions that Things impose. In this paper, we develop an access control system which enables offloading of complex access control decisions to third, trusted parties. Our system provides Thing authentication without public keys and establishes a shared symmetric encryption key that can be used to secure the communication between authorized users and Things. Our design imposes minimal overhead and it is based on a simple communication protocol. He resulting system is secure, enhances end-user privacy and the architecture facilitates the creation of new applications. |
---|---|
AbstractList | As we are moving from networked "Things" towards the Internet of Things (IoT), new security requirements arise. Access control in this new environment is a burgeoning and challenging problem. On the one hand, an access control system should be generic enough to cover the equirements of all the new exciting applications that become pervasive with the IoT. On the other hand, an access control system should be lightweight and easily implementable, considering at the same time the restrictions that Things impose. In this paper, we develop an access control system which enables offloading of complex access control decisions to third, trusted parties. Our system provides Thing authentication without public keys and establishes a shared symmetric encryption key that can be used to secure the communication between authorized users and Things. Our design imposes minimal overhead and it is based on a simple communication protocol. He resulting system is secure, enhances end-user privacy and the architecture facilitates the creation of new applications. |
Author | Fotiou, Nikos Marias, Giannis F. Polyzos, George C. Kotsonis, Theodore |
Author_xml | – sequence: 1 givenname: Nikos surname: Fotiou fullname: Fotiou, Nikos email: fotiou@aueb.gr organization: Dept. of Inf. Sch. of Inf. Sci. & Technol., Athens Univ. of Econ. & Bus., Athens, Greece – sequence: 2 givenname: Theodore surname: Kotsonis fullname: Kotsonis, Theodore email: kotsonis@aueb.gr organization: Dept. of Inf. Sch. of Inf. Sci. & Technol., Athens Univ. of Econ. & Bus., Athens, Greece – sequence: 3 givenname: Giannis F. surname: Marias fullname: Marias, Giannis F. email: marias@aueb.gr organization: Dept. of Inf. Sch. of Inf. Sci. & Technol., Athens Univ. of Econ. & Bus., Athens, Greece – sequence: 4 givenname: George C. surname: Polyzos fullname: Polyzos, George C. email: polyzos@aueb.gr organization: Dept. of Inf. Sch. of Inf. Sci. & Technol., Athens Univ. of Econ. & Bus., Athens, Greece |
BookMark | eNotzD1PwzAQgGEj0QFKRyYWrwwJd3Zt58Yq4iNSJYZmr1znTCMVGzle-PcgwfDq2d5bcZ1yYiHuEVpEoKfDkMdWAdoWEK7EhlyHBgh-w-5GPO5C4GWRfU615IuMuch6ZjmkyiVxlTnK8Tynj-VOrKK_LLz5dy3Gl-exf2v2769Dv9s3M0FtnJm0j14pH9haiwGIo9kaJGOZgJzaEiARTi4oY_2JXeBp4nAK1vvO6rV4-NvOzHz8KvOnL99HR6iN1foHpRI9Eg |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/SIoT.2016.010 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781509050918 1509050914 |
EndPage | 38 |
ExternalDocumentID | 7913563 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-75d3afa22ace6661c09ef5451956e909724901991d7c256abe7ceddecbc6aa863 |
IEDL.DBID | RIE |
IngestDate | Wed Jun 26 19:24:06 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-75d3afa22ace6661c09ef5451956e909724901991d7c256abe7ceddecbc6aa863 |
PageCount | 10 |
ParticipantIDs | ieee_primary_7913563 |
PublicationCentury | 2000 |
PublicationDate | 20160000 |
PublicationDateYYYYMMDD | 2016-01-01 |
PublicationDate_xml | – year: 2016 text: 20160000 |
PublicationDecade | 2010 |
PublicationTitle | 2016 International Workshop on Secure Internet of Things (SIoT) |
PublicationTitleAbbrev | SIoT |
PublicationYear | 2016 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.7177341 |
Snippet | As we are moving from networked "Things" towards the Internet of Things (IoT), new security requirements arise. Access control in this new environment is a... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 29 |
SubjectTerms | Access control Authentication Encryption Internet of Things Privacy Protocols |
Title | Access Control for the Internet of Things |
URI | https://ieeexplore.ieee.org/document/7913563 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NSwMxEB3anjyptOI3OXgRzHa7H8nmKMVShYrgCr2VJDsBEboiuxd_vZNNbUU8eAt7SDaTZOftZN4bgCsl84qAruQTG1c8M4nkyhnJabNo5aR2WeHZyItHMX_JHpb5sgc3Wy4MInbJZxj5ZneXX9W29aGysVSTNBdpH_pFnASu1k42c_x8X5c-V0tEsefD_iiW0vmK2T4svkcJKSJvUduYyH7-EmD872scwGjHymNPW39zCD1cD-H6tqt4yKYh5ZwRBmWE6ViI9GHDasdCbc4RlLO7cjrnm_IH_FXFDScjptrpJNEW6R-DbKnQ5Z0ajEDlVXcy8uUE7yppCbdog9IifayssULrQqRHMFjXazwGJnThnBQatbe90yrOMKGDiLG11EF6AkM_y9V7ELhYbSZ4-vfjM9jzVg5xiHMYNB8tXpBnbsxltyRfgyqQVg |
link.rule.ids | 310,311,786,790,795,796,802,4069,4070,27958,55109 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsAEqEV844EFCadpPux6RBVVC22FRJC6VY5zlhBSU6F04ddzjkuLEANblCGOL3Hey_neO4AbJdOCiK7kXRMWPMkjyZXNJaeXRSsrtU16To08mYrha_I4S2cNuNtoYRCxLj7DwB3We_lFaVYuVdaRqhunIt6BXcL5UHm11tY4s_MyKjNXrSWC0Clif7RLqdFicACT73F8kch7sKrywHz-smD8740cQnury2PPG8Q5ggYuWnB7X_c8ZH1fdM6IhTJidczn-rBipWW-O2cbssFD1h_ydQME_qbCilMYY211FGmD9JdB0VRo09oPRqByvjsJoTkRvEIaYi46R2mQPlcmN0LrnoiPobkoF3gCTOietVJo1C76VqswwYiWIobG0AXiU2i5Wc6X3uJivp7g2d-nr2FvmE3G8_Fo-nQO-y7iPitxAc3qY4WXhNNVflU_ni9T55Os |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+International+Workshop+on+Secure+Internet+of+Things+%28SIoT%29&rft.atitle=Access+Control+for+the+Internet+of+Things&rft.au=Fotiou%2C+Nikos&rft.au=Kotsonis%2C+Theodore&rft.au=Marias%2C+Giannis+F.&rft.au=Polyzos%2C+George+C.&rft.date=2016-01-01&rft.pub=IEEE&rft.spage=29&rft.epage=38&rft_id=info:doi/10.1109%2FSIoT.2016.010&rft.externalDocID=7913563 |