Online citations, reference lists, and bibliographies.
← Back to Search

Spatiotemporal Access Model Based On Reputation For The Sensing Layer Of The IoT

Y. Guo, Lihua Yin, C. Li, J. Qian
Published 2014 · Computer Science, Medicine

Cite This
Download PDF
Analyze on Scholarcy
Share
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.
This paper references
10.1007/s11432-010-0014-z
Information content security on the Internet: the control model and its evaluation
B. Fang (2010)
10.1109/MNET.2010.5634434
Stuxnet, the real start of cyber warfare? [Editor's Note]
T. M. Chen (2010)
10.1145/984334.984339
The UCONABC usage control model
Jaehong Park (2004)
10.1109/TKDE.2005.1
A generalized temporal role-based access control model
James B. D. Joshi (2005)
10.1109/ICDCSW.2012.23
Authentication and Access Control in the Internet of Things
Jing Liu (2012)
Capability-based access control delegation model on the federated IoT network
Bayu Anggorojati (2012)
10.1145/501978.501979
TRBAC: A temporal role-based access control model
E. Bertino (2001)
10.1109/JSYST.2013.2242751
Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model
Ramadan Abdunabi (2013)
10.1007/978-3-642-01004-0_10
Role Based Access Control with Spatiotemporal Context for Mobile Applications
Subhendu Aich (2009)
10.1109/TDSC.2007.70225
Towards Formal Verification of Role-Based Access Control Policies
S. Jha (2008)
10.1109/SP.2012.24
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
F. Roesner (2012)
10.1109/APSCC.2008.116
A New Dynamic Access Control in Wireless Sensor Networks
Hui-Feng Huang (2008)
10.1016/J.COSE.2010.07.001
Access control for smarter healthcare using policy spaces
C. Ardagna (2010)
10.1016/j.compeleceng.2012.06.002
Modeling access control for cyber-physical systems using reputation
D. Chen (2012)
10.1016/j.csi.2008.05.014
A novel access control protocol for secure sensor networks
Hui-Feng Huang (2009)
10.1007/s11432-007-0033-6
A formal model for access control with supporting spatial context
Hong Zhang (2007)
10.1145/1514274.1514310
Securing network access in wireless sensor networks
K. Sun (2009)
10.3217/jucs-019-17-2490
Enabling User Access Control in Energy-constrained Wireless Smart Environments
Juan Álvaro Muñoz Naranjo (2013)
10.1109/IRI.2013.6642437
The future of access control: Attributes, automation and adaptation
R. Sandhu (2013)
10.1145/1368310.1368341
On spatio-temporal constraints and inheritance in role-based access control
L. Chen (2008)
Toward Formal Verification of Role-Based Access Control Policies
S. Jha (2008)
Constraints specication in attribute based access control
K. Z. Bijon (2013)
Context-aware Dynamic Access Control for Pervasive Applications
G. Zhang (2004)
10.3233/JCS-2010-0418
On the formalization and analysis of a spatio-temporal role-based access control model
Manachai Toahchoodee (2011)
Specification and analysis of access control policies formobile applications
R. Abdunabi (2013)
10.1007/978-3-540-30080-9_7
A Tutorial on Uppaal
G. Behrmann (2004)
10.1145/1030083.1030110
Security policies for downgrading
S. Chong (2004)
10.1145/544741.544807
Notions of reputation in multi-agents systems: a review
L. Mui (2002)
10.1007/S11432-007-0033-6
A formal model for access control with supporting spatial context
Z. Hong (2007)
10.1016/j.comcom.2010.02.013
Reputation-based role assignment for role-based access control in wireless sensor networks
S. Misra (2011)
10.1145/2036146.2036153
CA-UCON: a context-aware usage control model
Abulgader Almutairi (2011)



This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar