2019
DOI: 10.1016/j.iot.2019.100052
|View full text |Cite
|
Sign up to set email alerts
|

An efficient security risk estimation technique for Risk-based access control model for IoT

Abstract: The need to increase information sharing in the Internet of Things (IoT) applications made the risk-based access control model to be the best candidate for both academic and commercial organizations. Risk-based access control model carries out a security risk analysis on the access request by using IoT contextual information to provide access decisions dynamically. Unlike current static access control approaches that are based on predefined policies and give the same result in different situations, this model … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 36 publications
(37 citation statements)
references
References 29 publications
0
36
0
1
Order By: Relevance
“…Also, the IoT arcade is developing dramatically. As indicated by statistically, the assessed income of Internet of Things in 2015 was USD 743 billion [15].…”
Section: Figmentioning
confidence: 98%
“…Also, the IoT arcade is developing dramatically. As indicated by statistically, the assessed income of Internet of Things in 2015 was USD 743 billion [15].…”
Section: Figmentioning
confidence: 98%
“…Based on the recommendations of the literature review, the fuzzy logic system was implemented in [9] to resolve the unavailability of datasets and provide a quantitative and a numeric risk value for each access request to determine the access decision. Although the fuzzy logic system provides accurate and realistic risk values to implement the risk-based access control model, the major issue associated with it was the scalability and inability to learn.…”
Section: Related Workmentioning
confidence: 99%
“…An access control model for the IoT system is intended to serve hundreds or thousands of users. Based on the experimental results discussed in [9], the risk estimation using the fuzzy logic system requires 57.38 s to estimate the security risks of 1000 access requests. This response time is efficient for a small network of devices, but with the IoT system, there are thousands of devices per network.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations