2019
DOI: 10.1109/access.2019.2912975
|View full text |Cite
|
Sign up to set email alerts
|

Pervasive-Based Access Control Model for IoT Environments

Abstract: The Internet of Things (IoT) has become a global sensory network that links physical and virtual objects by communicating and exploiting data and initiating physical actions. The evolution of this paradigm is already threatened by security issues, which constitute major risk factors that demand efficient solutions adapted to the IoT context. In this paper, we put forward a logical approach and systemic analysis that enables us to present the key aspects of new access control (AC) model for the IoT environments… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 26 publications
0
16
0
1
Order By: Relevance
“…The research discussed in [6] describes a logical approach and a systematic analysis that presents the main aspects of a new Access Control (AC) model for IoT environments called Pervasive-Based Access Control (PerBAC). The work presents a quantitative and qualitative evaluation and a comparison of the proposed approach with two widely used access control models.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The research discussed in [6] describes a logical approach and a systematic analysis that presents the main aspects of a new Access Control (AC) model for IoT environments called Pervasive-Based Access Control (PerBAC). The work presents a quantitative and qualitative evaluation and a comparison of the proposed approach with two widely used access control models.…”
Section: Related Workmentioning
confidence: 99%
“…Several works have presented proposals for identifying users from their devices [1], creating social communities based on the user's context, profile and social networks [3], authentication of users with guaranteed privacy and access control in smart environments [4][5][6][7], and the detection of groups and activities in smart buildings [8], among others. In this context, in [9], the author presented the middleware UbiPri (Ubiquitous Privacy) for the control and management of data privacy based on a generic model.…”
Section: Introductionmentioning
confidence: 99%
“…There is no unique accepted definition for IoT. In this paper, we tried to propose a definition that seems relevant and global, based on literature review [5,11,12,13] we define IoT as a global infrastructure of networked physical and virtual objects. These intelligent electronic devices ("smart things") should have a unique identity as well as the ability to transfer/receive data over networks using interoperable technologies offered by Internet protocols.…”
Section: A the Internet Of Things Paradigmmentioning
confidence: 99%
“…You can refer to our repository in GitHub [28] for the code of this implementation and other technical details.…”
Section: The Organogrammentioning
confidence: 99%
“…In that sense, many researchers [37,38] agree that every IoT platform could be molded into one or more of the following categories: C1: the constrained layer, here is where the constrained devices are located (physical constraints on many characteristics such as size, weight, available power and energy [39] which make them unable to accomplish more than basic tasks); C2: this category includes more powerful nodes, which are capable of executing relatively serious computations. In fact, the vast majority of the everyday smart devices fit into this category (e.g.…”
Section: Introductionmentioning
confidence: 99%