Wireless VITAE 2013 2013
DOI: 10.1109/vitae.2013.6617083
|View full text |Cite
|
Sign up to set email alerts
|

A fuzzy approach to trust based access control in internet of things

Abstract: In the Internet of things (IoT), the activities of daily life are supported by a multitude of heterogeneous, loosely coupled ubiquitous devices. Traditional access control models are not suitable to the nomadic, decentralized and dynamic scenarios in the IoT where identities are not known in advance. This makes the trust management in IoT more promising to address the access control issues .This paper present a Fuzzy approach to the Trust Based Access Control (FTBAC) with the notion of trust levels for identit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
64
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 123 publications
(66 citation statements)
references
References 16 publications
0
64
0
2
Order By: Relevance
“…Liu combined the dynamic hierarchical fuzzy system with trust evaluation, then introduced a fuzzy multiattribute trust access control scheme for cloud manufacturing system [28]. Mahalle et al [29] developed a trust-extended fuzzy authorization scheme and put forward the concept of trust rating for identity management. Context awareness is a significant precondition for accurately perceiving and properly handling risks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Liu combined the dynamic hierarchical fuzzy system with trust evaluation, then introduced a fuzzy multiattribute trust access control scheme for cloud manufacturing system [28]. Mahalle et al [29] developed a trust-extended fuzzy authorization scheme and put forward the concept of trust rating for identity management. Context awareness is a significant precondition for accurately perceiving and properly handling risks.…”
Section: Related Workmentioning
confidence: 99%
“…By estimating the risk of the certain request based on the specific involving information and comparing the risk with some preset acceptance criteria of risk, these risk-oriented enhanced models have achieved flexible and efficient unattended authorizations for urgent requests which do not comply with the basic access rules in original models. More recently, risk and trust evaluation schemes are increasingly viable in access control when taking more parameters (e.g., environment states) into account, which yields more expressive and flexible solutions [27][28][29][30][31]. Because of these encouraging attempts, we are reasonably confident that the ABAC paradigm will benefit from risk evaluation schemes as well, especially the more flexible and efficient decision-making ability to deal with exceptional urgent access requests in dynamic and complex access environments.…”
Section: Introductionmentioning
confidence: 99%
“…Trust has been accepted as one of the key factors for enhancing user privacy and system security, and for establishing seamless connectivity and reliable services. Recently, many research groups have been intensively working on trust-related areas in various environments from peer to peer (P2P) to IoT, varying in many applications from access control [7] to e-commerce [8] [9].…”
Section: A Trust In Iotmentioning
confidence: 99%
“…In [38] a key management system similar to PANA is proposed, making it redundant. One approach to a fuzzy trust based access control is defined in [40], however, their trust system is a concept tested with only simulations.…”
Section: Analysis Of the State Of The Art On Trustiness For Iotmentioning
confidence: 99%