Các sơ đồ ủy quyền cho internet vạn vật: yêu cầu, điểm yếu, thách thức và xu hướng tương lai

Abid Khan1, Awais Ahmad2, Mansoor Ahmed3, Jadran Sessa4, Marco Anisetti4
1Department of Computer Science, Aberystwyth University, Aberystwyth SY23 3DB, UK
2Computer Science Department, Air University, Islamabad, Pakistan
3Department of Computer Science, COMSATS University Islamabad, Park Road, Chak Shahzad, Islamabad, Pakistan
4Dipartimento di Informatica (DI), Università degli Studi di Milano, Via Celoria 18, Milan, Italy

Tóm tắt

Tóm tắtViệc ủy quyền có khả năng mở rộng và an toàn cho các thiết bị thông minh là điều cực kỳ cần thiết cho việc triển khai thành công Internet of Things (IoT). Việc truy cập trái phép vào các thiết bị thông minh có thể làm gia tăng các mối lo ngại về an ninh và quyền riêng tư, điều này có thể dẫn đến việc chậm chạp trong việc áp dụng IoT, và cuối cùng tạo ra những mối đe dọa nghiêm trọng. Mặc dù có nhiều giải pháp IoT cho việc ủy quyền an toàn, các sơ đồ ủy quyền trong môi trường phân tán có tính động cao vẫn là một thách thức lớn. Quyền truy cập có thể thay đổi một cách linh hoạt do tính chất đa dạng của các thiết bị IoT được chia sẻ, do đó, việc quản lý danh tính và kiểm soát truy cập trở nên khó khăn. Bài khảo sát này cung cấp một phân tích so sánh toàn diện về các sơ đồ ủy quyền IoT hiện tại để làm nổi bật những điểm mạnh và yếu của chúng. Sau đó, nó xác định các yêu cầu quan trọng nhất và làm rõ các mối đe dọa và điểm yếu ảnh hưởng đến ủy quyền trong IoT. Cuối cùng, khảo sát trình bày các thách thức về ủy quyền đang diễn ra và đưa ra các khuyến nghị cho nghiên cứu trong tương lai.

Từ khóa


Tài liệu tham khảo

Ferraiolo D, Kuhn DR, Chandramouli R (2003) Role-based access control, Artech House,

Yuan E, Tong J (2005) Attributed based access control (abac) for web services, in: IEEE International Conference on Web Services (ICWS’05), IEEE

Seitz L, Selander G, Gehrmann C (2013) Authorization framework for the internet-of-things, in, IEEE 14th International Symposium on A World of Wireless, Mobile and Multimedia Networks(WoWMoM). IEEE 2013:1–6

Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things. Math Comput Model 58(5–6):1189–1205

Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2014) Oscar: Object security architecture for the internet of things. In: Proceeding of IEEE international symposium on a world of wireless, mobile and multimedia networks 2014, IEEE, pp. 1–10

Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2013) Identity authentication and capability based access control (iacac) for the internet of things. J Cyber Secur Mob 1(4):309–348

Skarmeta AF, Hernandez-Ramos JL, Moreno MV (2014) A decentralized approach for security and privacy challenges in the internet of things. In: IEEE world forum on Internet of Things (WF-IoT). IEEE, 67–72

Hernández-Ramos JL, Jara AJ, Marin L, Skarmeta AF (2013) Distributed capability-based access control for the internet of things. J Int Serv Inf Secur (JISIS) 3(3/4):1–16

Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless VITAE 2013, IEEE, pp 1–5

Hummen R, Shafagh H, Raza S, Voig T, Wehrle K (2014) Delegation-based authentication and authorization for the ip-based internet of things. In: eleventh annual IEEE international conference on Sensing, Communication, and Networking (SECON). Ieee, pp 284–292

Garcia-Morchon O, Keoh SL, Kumar S, Moreno-Sanchez P, Vidal-Meca F, Ziegeldorf JH (2013) Securing the ip-based internet of things with hip and dtls. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp 119–124

Su J, Cao D, Zhao B, Wang X, You I (2014) epass: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things. Fut Gen Comput Syst 33:11–18

Ye N, Zhu Y, Wang R-c, Malekian R, Lin Q-M, An efficient authentication and access control scheme for perception layer of internet of things

Kaiwen S, Lihua Y (2014) Attribute-role-based hybrid access control in the internet of things. In: Asia-Pacific Web Conference, Springer, New York, pp 333–343

Cirani S, Picone M, Gonizzi P, Veltri L, Ferrari G (2014) Iot-oas: An oauth-based authorization service architecture for secure services in iot scenarios. IEEE Sens J 15(2):1224–1234

Fremantle P, Aziz B, Kopeckỳ J, Scott P (2014) Federated identity and access management for the internet of things. In: International Workshop on Secure Internet of Things. IEEE 2014:10–17

Ning H, Liu H, Yang LT (2014) Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans Parallel Distrib Syst 26(3):657–667

Alohali B, Merabti M, Kifayat K (2014) A secure scheme for a smart house based on cloud of things (cot). In: 6th Computer science and electronic engineering conference (CEEC), IEEE 2014:115–120

Bernabe JB, Ramos JLH, Gomez AFS (2016) Taciot: multidimensional trust-aware access control system for the internet of things. Soft Comput 20(5):1763–1779

Moosavi SR, Gia TN, Rahmani A-M, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) Sea: a secure and efficient authentication and authorization architecture for iot-based healthcare using smart gateways. Procedia Comput Sci 52:452–459

Hernandez-Ramos JL, Pawlowski MP, Jara AJ, Skarmeta AF, Ladid L (2015) Toward a lightweight authentication and authorization framework for smart objects. IEEE J Sel Areas Commun 33(4):690–702

Hernández-Ramos JL, Jara AJ, Marín L, Skarmeta Gómez AF (2016) Dcapbac: embedding authorization logic into smart things through ecc optimizations. Int J Comput Math 93(2) 345–366

Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Fut Gen Comput Syst 49:104–112

Thatmann D, Zickau S, Förster A, Küpper A (2015) Applying attribute-based encryption on publish subscribe messaging patterns for the internet of things. In: 2015 IEEE International Conference on Data Science and Data Intensive Systems, IEEE, pp 556–563

Yang J, He S, Lin Y, Lv Z (2017) Multimedia cloud transmission and storage system based on internet of things. Multimed Tools Appl 76(17):17735–17750

Niruntasukrat A, Issariyapat C, Pongpaibool P, Meesublak K, Aiumsupucgul P, Panya A (2016) Authorization mechanism for mqtt-based internet of things. In: 2016 IEEE International Conference on Communications Workshops (ICC), IEEE, pp 290–295

Li F, Han Y, Jin C (2016) Practical access control for sensor networks in the context of the internet of things. Comput Commun 89:154–164

Hosseinzadeh S, Virtanen S, Díaz-Rodríguez N, Lilius J (2016) A semantic security framework and context-aware role-based access control ontology for smart spaces. In: Proceedings of the International Workshop on Semantic Big Data, pp 1–6

Li F, Hong J, Omala AA (2017) Efficient certificateless access control for industrial internet of things. Futur Gen Comput Syst 76:285–292

Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) Fairaccess: a new blockchain-based access control framework for the internet of things. Secur Commun Netw 9(18):5943–5964

Pinno OJA, Gregio ARA, De Bona LCE (2017) Controlchain: Blockchain as a central enabler for access control authorizations in the iot. In: GLOBECOM 2017 - 2017 IEEE Global Communications Conference, pp. 1–6.https://doi.org/10.1109/GLOCOM.2017.8254521

Tapas N, Merlino G, Longo F (2018) Blockchain-based iot-cloud authorization and delegation. In: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), IEEE, pp 411–416

Fayad A, Hammi B, Khatoun R (2018) An adaptive authentication and authorization scheme for iot’s gateways: a blockchain based approach. In: 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), IEEE, pp 1–7

Ali G, Ahmad N, Cao Y, Khan S, Cruickshank H, Qazi EA, Ali A (2020) xdbauth: Blockchain based cross domain authentication and authorization framework for internet of things. IEEE Access 8:58800–58816

Ding S, Cao J, Li C, Fan K, Li H (2019) A novel attribute-based access control scheme using blockchain for iot. IEEE Access 7:38431–38441

Siris VA, Dimopoulos D, Fotiou N, Voulgaris S, Polyzos GC (2020) Decentralized authorization in constrained iot environments exploiting interledger mechanisms. Comput Commun 152:243–251

Khalid U, Asim M, Baker T, Hung PC, Tariq MA, Rafferty L (2020) A decentralized lightweight blockchain-based authentication mechanism for iot systems, Cluster Computing 1–21

Putra GD, Dedeoglu V, Kanhere SS, Jurdak R, Ignjatovic A (2021) Trust-based blockchain authorization for iot. IEEE Trans Netw Serv Manag 18(2):1646–1658

Wickström J, Westerlund M, Pulkkis G (2021) Smart contract based distributed iot security: A protocol for autonomous device management. In: IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid). IEEE 2021:776–781

Lohachab A et al (2019) Ecc based inter-device authentication and authorization scheme using mqtt for iot networks. J Inf Secur Appl 46:1–12

Shin S, Kwon T (2020) A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5g-integrated internet of things. IEEE Access 8:67555–67571. https://doi.org/10.1109/ACCESS.2020.2985719

Chifor B-C, Bica I, Patriciu V-V, Pop F (2018) A security authorization scheme for smart home internet of things devices. Fut Gen Comput Syst 86:740–749

Ding S, Li C, Li H (2018) A novel efficient pairing-free cp-abe based on elliptic curve cryptography for iot. IEEE Access 6:27336–27345. https://doi.org/10.1109/ACCESS.2018.2836350

Zemmoudj S, Bermad N, Omar M (2019) Context-aware pseudonymization and authorization model for iot-based smart hospitals. J Ambient Intell Hum Comput 10(11):4473–4490

Su M, Zhou B, Fu A, Yu Y, Zhang G (2020) Prta: A proxy re-encryption based trusted authorization scheme for nodes on cloudiot. Inf Sci 527:533–547

Kumar S, Hu Y, Andersen MP, Popa RA, Culler DE (2019) $$\{$$JEDI$$\}$$: Many-to-many end-to-end encryption and key delegation for iot. In: 28th $$\{$$USENIX$$\}$$ Security Symposium ($$\{$$USENIX$$\}$$ Security 19), pp 1519–1536

Mandal S, Bera B, Sutrala AK, Das AK, Choo K-KR, Park Y (2020) Certificateless-signcryption-based three-factor user access control scheme for iot environment. IEEE Internet Things J 7(4):3184–3197

Ren W, Sun Y, Luo H, Guizani M (2021) Siledger: A blockchain and abe-based access control for applications in sdn-iot networks. IEEE Trans Netw Serv Manag 18(4):4406–4419

Alsahlani AYF, Popa A (2021) Lmaas-iot: Lightweight multi-factor authentication and authorization scheme for real-time data access in iot cloud-based environment. J Netw Comput Appl 192:103177

Xu R, Chen Y, Blasch E, Chen G (2018) Blendcac: A blockchain-enabled decentralized capability-based access control for iots, In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE pp 1027–1034

Bakir F, Wolski R, Krintz C (2021) Caplets: Resource aware capability-based access control for iot. In: 2021 IEEE/ACM Symposium on Edge Computing (SEC), IEEE

Julku J, Suomalainen J, Kylänpää M (2021) Delegated device attestation for iot. In: 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), IEEE, pp. 1–8

Miller VS (1985) Use of elliptic curves in cryptography, in: Conference on the theory and application of cryptographic techniques, Springer, pp. 417–426

Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing, In: Annual international cryptology conference, Springer, pp. 213–229

Sahai A, Waters B (2005) Fuzzy identity-based encryption, In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp. 457–473

Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures, In: Cryptographers’ track at the RSA conference, Springer, pp. 376–392

Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system, Decentralized Business Review 21260

Aleisa N, Renaud K Privacy of the internet of things: a systematic literature review (extended discussion), arXiv preprint arXiv:1611.03340

Ouaddah A, Mousannif H, Abou Elkalam A, Ouahman AA (2017) Access control in the internet of things: Big challenges and new opportunities. Comput Netw 112:237–262

Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5):1250–1258

Trnka M, Cerny T, Stickney N (2018) Survey of authentication and authorization for the internet of things, Security and Communication Networks

Sfar AR, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the internet of things. Digital Communications and Networks 4(2):118–137

Hou J, Qu L, Shi W (2019) A survey on internet of things security from data perspectives. Comput Netw 148:295–306

Verma N, Sangwan S, Sangwan S, Parsad D Iot security challenges and counters measures, International Journal of Recent Technology and Engineering (IJRTE) ISSN 2277–3878

Gonzalez-Manzano L, Fuentes JMD, Ribagorda A (2019) Leveraging user-related internet of things for continuous authentication: A survey. ACM Computing Surveys (CSUR) 52(3):1–38

Celik ZB, Fernandes E, Pauley E, Tan G, McDaniel P (2019) Program analysis of commodity iot applications for security and privacy: Challenges and opportunities. ACM Computing Surveys (CSUR) 52(4):1–30

Ferrag MA, Maglaras L, Derhab A (2019) Authentication and authorization for mobile iot devices using biofeatures: Recent advances and future trends, Security and Communication Networks

Sequeiros JB, Chimuco FT, Samaila MG, Freire MM, Inácio PR (2020) Attack and system modeling applied to iot, cloud, and mobile ecosystems: embedding security by design. ACM Computing Surveys (CSUR) 53(2):1–32

Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B (2020) A survey on access control in the age of internet of things. IEEE Internet Things J 7(6):4682–4696

Sha K, Yang TA, Wei W, Davari S (2020) A survey of edge computing-based designs for iot security. Digital Communications and Networks 6(2):195–202

Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot. J Netw Comput Appl 149:102481

Hathaliya JJ, Tanwar S (2020) An exhaustive survey on security and privacy issues in healthcare 4.0. Comput Commun 153:311–335

Lone AH, Naaz R (2021) Applicability of blockchain smart contracts in securing internet and iot: a systematic literature review. Computer Science Review 39:100360

Mohammad ZN, Farha F, Abuassba AO, Yang S, Zhou F (2021) Access control and authorization in smart homes: A survey. Tsinghua Science and Technology 26(6):906–917

Sudarsan SV, Schelén O, Bodin U Survey on delegated and self-contained authorization techniques in cps and iot, IEEE Access

Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed nist standard for role-based access control. ACM Transactions on Information and System Security (TISSEC) 4(3):224–274

Cirani S, Ferrari G, Veltri L (2013) Enforcing security mechanisms in the ip-based internet of things: An algorithmic overview. Algorithms 6(2):197–226

Alamri A, Bertok P, Thom JA, Fahad A (2016) The mediator authorization-security model for heterogeneous semantic knowledge bases. Futur Gener Comput Syst 55:227–237

Suhail S, Hussain R, Abdellatif M, Pandey SR, Khan A, Hong CS (2020) Provenance-enabled packet path tracing in the rpl-based internet of things. Comput Netw 173:107189

Babar S, Mahalle P, Stango A, Prasad N, Prasad R (2010) Proposed security model and threat taxonomy for the internet of things (iot), in: International Conference on Network Security and Applications, Springer, pp. 420–429

Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660

Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: Vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516

Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279

Díaz M, Martín C, Rubio B (2016) State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing. J Netw Comput Appl 67:99–117

Alcaraz C, Roman R, Najera P, Lopez J (2013) Security of industrial sensor network-based remote substations in the context of the internet of things. Ad Hoc Netw 11(3):1091–1104

Chen J, Liu Y, Chai Y (2015) An identity management framework for internet of things, in: 2015 IEEE 12th International Conference on e-Business Engineering, IEEE, pp. 360–364

Guo B, Zhang D, Wang Z, Yu Z, Zhou X (2013) Opportunistic iot: Exploring the harmonious interaction between human and the internet of things. J Netw Comput Appl 36(6):1531–1539

Gupta U Application of multi factor authentication in internet of things domain, arXiv preprint arXiv:1506.03753

Rose K, Eldridge S, Chapin L (2015) The internet of things: An overview. The internet society (ISOC) 80:1–50