2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and I 2017
DOI: 10.1109/ithings-greencom-cpscom-smartdata.2017.103
|View full text |Cite
|
Sign up to set email alerts
|

Developing an Adaptive Risk-Based Access Control Model for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 71 publications
(35 citation statements)
references
References 27 publications
0
35
0
Order By: Relevance
“…According to [34], [35] Fig.1, user/agent context, resource sensitivity, action severity and risk history. These inputs/risk factors are used to estimate the security risk associated with each access request.…”
Section: Access Control Requirements In the Iotmentioning
confidence: 99%
See 2 more Smart Citations
“…According to [34], [35] Fig.1, user/agent context, resource sensitivity, action severity and risk history. These inputs/risk factors are used to estimate the security risk associated with each access request.…”
Section: Access Control Requirements In the Iotmentioning
confidence: 99%
“…A risk metric is assigned to each resource in the IoT system depending on how valuable the resource data is to the owner. For instance, the higher the data sensitivity, the higher the risk metric associated with the resource [34].…”
Section: Access Control Requirements In the Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…It has generated technological changes that extend to a wide range of applications. Cisco predicted that by 2020, there will be more than 50 billion of connected things worldwide [25]. The IoT growth brings huge chances to make our lives easier with enhancing efficiency, productivity, and safety of many business applications [25].…”
Section: Iot With Aimentioning
confidence: 99%
“…Therefore, providing a secure IoT system is a compulsory task to continue its successful deployments in our environment [24]. The IoT is intrinsically vulnerable to most of the wireless common attacks because most IoT devices are connected through wireless networks that are hard to protect against different attacks such as man-in-the-middle attack and other attacks [25]. So, with AI, how security and privacy issues can be reduced?…”
Section: Security and Privacymentioning
confidence: 99%