2014
DOI: 10.1007/978-3-662-43826-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Policy-Based Access Control for Body Sensor Networks

Abstract: Sensor nodes and actuators are becoming ubiquitous and research efforts focus on addressing the various issues stemming from resources constraints and other intrinsic characteristics typically associated with such devices and their applications. In the case of wearable nodes, and especially in the context of e-Health applications, the security issues are exacerbated by the direct interaction with the human body and the associated safety and privacy concerns. This work presents a policy-based, unified, cross-pl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…In addition, in the area of constraints environments such as IoT, there are studies trying to tackle the challenge of policy enforcement. In [29], the authors propose an access control framework for a body sensor network, while in [30] the authors present a standardized network security policy enforcement architecture for IoT devices. Respecting the aforementioned studies, in this paper, the proposed model exploits a TOPSIS-based algorithm whose outcome forms the input of a risk-aware security policy enforcement procedure.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, in the area of constraints environments such as IoT, there are studies trying to tackle the challenge of policy enforcement. In [29], the authors propose an access control framework for a body sensor network, while in [30] the authors present a standardized network security policy enforcement architecture for IoT devices. Respecting the aforementioned studies, in this paper, the proposed model exploits a TOPSIS-based algorithm whose outcome forms the input of a risk-aware security policy enforcement procedure.…”
Section: Related Workmentioning
confidence: 99%
“…Such schemes can be found in [3][4][5][6]. Little work has been carried out on policy-based access control (PBAC).…”
Section: Background and Related Workmentioning
confidence: 99%
“…have been involved in the above research efforts, it is evident that, in addition to the researchers' interest, there is also significant industry backing of DPWS and its use in future applications and products. Moreover, the use and benefits of DPWS have been studied extensively in the context of various applications areas, which, other than the ones already mentioned, include automotive and railway systems [52], industrial automation [53], eHealth [54], [55], smart cities [56], smart homes [57] and wireless sensor networks [58]. All of the above are positive indicators for the future of the technology chosen as the underlying implementation and communication mechanism for the presented framework, and its potential for ubiquitous adoption Many access control schemes have been proposed for resource constrained devices, such as wireless sensor networks, yet most of them focus on authentication and authorization schemes and on enhancing basic access control models, such as providing additional features to address privacy matters.…”
Section: Soa-dosmentioning
confidence: 99%