Online citations, reference lists, and bibliographies.
← Back to Search

Spatiotemporal Access Model Based On Reputation For The Sensing Layer Of The IoT

Y. Guo, Lihua Yin, C. Li, J. Qian
Published 2014 · Computer Science, Medicine

Cite This
Download PDF
Analyze on Scholarcy
Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.
This paper references
Information content security on the Internet: the control model and its evaluation
B. Fang (2010)
Stuxnet, the real start of cyber warfare? [Editor's Note]
T. M. Chen (2010)
The UCONABC usage control model
Jaehong Park (2004)
A generalized temporal role-based access control model
James B. D. Joshi (2005)
Authentication and Access Control in the Internet of Things
Jing Liu (2012)
Capability-based access control delegation model on the federated IoT network
Bayu Anggorojati (2012)
TRBAC: A temporal role-based access control model
E. Bertino (2001)
Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model
Ramadan Abdunabi (2013)
Role Based Access Control with Spatiotemporal Context for Mobile Applications
Subhendu Aich (2009)
Towards Formal Verification of Role-Based Access Control Policies
S. Jha (2008)
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
F. Roesner (2012)
A New Dynamic Access Control in Wireless Sensor Networks
Hui-Feng Huang (2008)
Access control for smarter healthcare using policy spaces
C. Ardagna (2010)
Modeling access control for cyber-physical systems using reputation
D. Chen (2012)
A novel access control protocol for secure sensor networks
Hui-Feng Huang (2009)
A formal model for access control with supporting spatial context
Hong Zhang (2007)
Securing network access in wireless sensor networks
K. Sun (2009)
Enabling User Access Control in Energy-constrained Wireless Smart Environments
Juan Álvaro Muñoz Naranjo (2013)
The future of access control: Attributes, automation and adaptation
R. Sandhu (2013)
On spatio-temporal constraints and inheritance in role-based access control
L. Chen (2008)
Toward Formal Verification of Role-Based Access Control Policies
S. Jha (2008)
Constraints specication in attribute based access control
K. Z. Bijon (2013)
Context-aware Dynamic Access Control for Pervasive Applications
G. Zhang (2004)
On the formalization and analysis of a spatio-temporal role-based access control model
Manachai Toahchoodee (2011)
Specification and analysis of access control policies formobile applications
R. Abdunabi (2013)
A Tutorial on Uppaal
G. Behrmann (2004)
Security policies for downgrading
S. Chong (2004)
Notions of reputation in multi-agents systems: a review
L. Mui (2002)
A formal model for access control with supporting spatial context
Z. Hong (2007)
Reputation-based role assignment for role-based access control in wireless sensor networks
S. Misra (2011)
CA-UCON: a context-aware usage control model
Abulgader Almutairi (2011)

This paper is referenced by
Semantic Scholar Logo Some data provided by SemanticScholar