2018
DOI: 10.1016/j.procs.2018.04.144
|View full text |Cite
|
Sign up to set email alerts
|

Access control in IoT environments: Feasible scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…With the intent to prevent attacks from occurring, it is necessary to build powerful control and verification procedures across the system. A number of feasible verification procedures were delineated by Andaloussi et al [ 73 ]. One was the centralised method wherein entire verifications were completed at the central level, i.e., at the controller, with no resource constraints, though with a single spot of failure.…”
Section: Securitymentioning
confidence: 99%
“…With the intent to prevent attacks from occurring, it is necessary to build powerful control and verification procedures across the system. A number of feasible verification procedures were delineated by Andaloussi et al [ 73 ]. One was the centralised method wherein entire verifications were completed at the central level, i.e., at the controller, with no resource constraints, though with a single spot of failure.…”
Section: Securitymentioning
confidence: 99%
“…In an IoT environment, different industrial wide sensor networks (WSNs) involve complex and diverse sensors. Each sensor has its own requirements for readability, and various services have their own applications that require different types of sensors (Chi et al, 2014), e.g., stream vehicle videos in the IoT environment (Aliyu et al, 2018), extending control of Internet access to the physical world without human intervention (Andaloussi et al, 2018), thermal comfort of the occupants in the building (Park and Rhee, 2018), and more in the manufacturing industry, such as transforming energy production, supply, and consumption to meet high energy demands through intelligent automation of industrial energy producers and consumers (Shahzad et al, 2020). The IoT also acts as an enabling business digitization strategy (Sestino et al, 2020).…”
Section: Business Process Of Iotmentioning
confidence: 99%
“…There have also been studies on IoT access control frameworks [5,22,23,24,25,26]. Sciancalepore et al [5] proposed an IoT access control framework that takes into consideration heterogeneous IoT platforms based on Decentralized Multi-Authority Ciphertext-Policy Attribute-Based Encryption (DMA-CP-ABE) and ABAC.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, they proposed a combination of AES, Cipher Block Chaining (CBC) and Encrypted Salt-Sector Initialization Vector (ESSIV) for strong encryption of data stored in a resource directory. Andaloussi et al [24] implemented Distributed CapBAC (DCapBAC) using JSON-based capability tokens and analyzed the pros and cons of three feasible IoT scenarios (i.e., centralized approach, distributed approach, and hybrid approach). Two other studies [25,26] were based on the ABAC model.…”
Section: Related Workmentioning
confidence: 99%