2015 IEEE 8th International Conference on Service-Oriented Computing and Applications (SOCA) 2015
DOI: 10.1109/soca.2015.40
|View full text |Cite
|
Sign up to set email alerts
|

Applying an Unified Access Control for IoT-based Intelligent Agent Systems

Abstract: Abstract-The rise of the Internet of Things (IoT) paradigm has allowed the design and development of new services interconnecting heterogeneous devices. However, the complexity of these new systems hasn't been followed by the increase of intelligence and reasoning of the devices connected. On the other hand, intelligent agent systems have developed precisely these characteristics so the combination of both paradigms by modelling intelligent agents in IoT devices is a very promising approach that will enable a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 12 publications
0
17
0
Order By: Relevance
“…Cabarkapa [53], Rivera et al [54] and Tschofenig et al [55] proposed the use of UMA in the IoT. Cabarkapa proposes to use an UMA-based architecture for controlling authorizations on a Social Web of Things (SWoT) [53].…”
Section: Umamentioning
confidence: 99%
See 1 more Smart Citation
“…Cabarkapa [53], Rivera et al [54] and Tschofenig et al [55] proposed the use of UMA in the IoT. Cabarkapa proposes to use an UMA-based architecture for controlling authorizations on a Social Web of Things (SWoT) [53].…”
Section: Umamentioning
confidence: 99%
“…After choosing UMA for their architecture, they provide a detailed description about all the phases involved in the architecture system interactions. Rivera et al applies UMA to provide a unified access control in a heterogeneous IoT environment composed by IoT low processing power devices (dummy devices) and intelligent agents (powerful devices) [54]. Finally, Tschofenig et al shows how OAuth can be integrated in the UMA and also presents a mapping of their architecture for several use cases [55].…”
Section: Umamentioning
confidence: 99%
“…Maler et al applied OAuth and UMA to the IoT environment for authorization management and access control. Rivera et al presented an access control scheme for IoT Multi‐Agent Systems based on UMA but do not provide a formal description. Varadharajan and Bansal proposed a scenario‐aware access control mechanism by combining OAuth with UMA.…”
Section: Related Workmentioning
confidence: 99%
“…Capability‐based access control can better support user‐driven needs and is suitable for a distributed environment, but it does not take context variables into consideration and does not support the dynamism and scalability of access permissions. (3) To accomplish user‐driven access control in the IoT sensing layer, many studies are based on user management access (UMA) and OAuth . However, a central authority is necessary for these mechanisms, which is a performance bottleneck for an IoT environment.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation