Các sơ đồ ủy quyền cho internet vạn vật: yêu cầu, điểm yếu, thách thức và xu hướng tương lai
Tóm tắt
Từ khóa
Tài liệu tham khảo
Ferraiolo D, Kuhn DR, Chandramouli R (2003) Role-based access control, Artech House,
Yuan E, Tong J (2005) Attributed based access control (abac) for web services, in: IEEE International Conference on Web Services (ICWS’05), IEEE
Seitz L, Selander G, Gehrmann C (2013) Authorization framework for the internet-of-things, in, IEEE 14th International Symposium on A World of Wireless, Mobile and Multimedia Networks(WoWMoM). IEEE 2013:1–6
Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things. Math Comput Model 58(5–6):1189–1205
Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2014) Oscar: Object security architecture for the internet of things. In: Proceeding of IEEE international symposium on a world of wireless, mobile and multimedia networks 2014, IEEE, pp. 1–10
Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2013) Identity authentication and capability based access control (iacac) for the internet of things. J Cyber Secur Mob 1(4):309–348
Skarmeta AF, Hernandez-Ramos JL, Moreno MV (2014) A decentralized approach for security and privacy challenges in the internet of things. In: IEEE world forum on Internet of Things (WF-IoT). IEEE, 67–72
Hernández-Ramos JL, Jara AJ, Marin L, Skarmeta AF (2013) Distributed capability-based access control for the internet of things. J Int Serv Inf Secur (JISIS) 3(3/4):1–16
Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless VITAE 2013, IEEE, pp 1–5
Hummen R, Shafagh H, Raza S, Voig T, Wehrle K (2014) Delegation-based authentication and authorization for the ip-based internet of things. In: eleventh annual IEEE international conference on Sensing, Communication, and Networking (SECON). Ieee, pp 284–292
Garcia-Morchon O, Keoh SL, Kumar S, Moreno-Sanchez P, Vidal-Meca F, Ziegeldorf JH (2013) Securing the ip-based internet of things with hip and dtls. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp 119–124
Su J, Cao D, Zhao B, Wang X, You I (2014) epass: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things. Fut Gen Comput Syst 33:11–18
Ye N, Zhu Y, Wang R-c, Malekian R, Lin Q-M, An efficient authentication and access control scheme for perception layer of internet of things
Kaiwen S, Lihua Y (2014) Attribute-role-based hybrid access control in the internet of things. In: Asia-Pacific Web Conference, Springer, New York, pp 333–343
Cirani S, Picone M, Gonizzi P, Veltri L, Ferrari G (2014) Iot-oas: An oauth-based authorization service architecture for secure services in iot scenarios. IEEE Sens J 15(2):1224–1234
Fremantle P, Aziz B, Kopeckỳ J, Scott P (2014) Federated identity and access management for the internet of things. In: International Workshop on Secure Internet of Things. IEEE 2014:10–17
Ning H, Liu H, Yang LT (2014) Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans Parallel Distrib Syst 26(3):657–667
Alohali B, Merabti M, Kifayat K (2014) A secure scheme for a smart house based on cloud of things (cot). In: 6th Computer science and electronic engineering conference (CEEC), IEEE 2014:115–120
Bernabe JB, Ramos JLH, Gomez AFS (2016) Taciot: multidimensional trust-aware access control system for the internet of things. Soft Comput 20(5):1763–1779
Moosavi SR, Gia TN, Rahmani A-M, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) Sea: a secure and efficient authentication and authorization architecture for iot-based healthcare using smart gateways. Procedia Comput Sci 52:452–459
Hernandez-Ramos JL, Pawlowski MP, Jara AJ, Skarmeta AF, Ladid L (2015) Toward a lightweight authentication and authorization framework for smart objects. IEEE J Sel Areas Commun 33(4):690–702
Hernández-Ramos JL, Jara AJ, Marín L, Skarmeta Gómez AF (2016) Dcapbac: embedding authorization logic into smart things through ecc optimizations. Int J Comput Math 93(2) 345–366
Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Fut Gen Comput Syst 49:104–112
Thatmann D, Zickau S, Förster A, Küpper A (2015) Applying attribute-based encryption on publish subscribe messaging patterns for the internet of things. In: 2015 IEEE International Conference on Data Science and Data Intensive Systems, IEEE, pp 556–563
Yang J, He S, Lin Y, Lv Z (2017) Multimedia cloud transmission and storage system based on internet of things. Multimed Tools Appl 76(17):17735–17750
Niruntasukrat A, Issariyapat C, Pongpaibool P, Meesublak K, Aiumsupucgul P, Panya A (2016) Authorization mechanism for mqtt-based internet of things. In: 2016 IEEE International Conference on Communications Workshops (ICC), IEEE, pp 290–295
Li F, Han Y, Jin C (2016) Practical access control for sensor networks in the context of the internet of things. Comput Commun 89:154–164
Hosseinzadeh S, Virtanen S, Díaz-Rodríguez N, Lilius J (2016) A semantic security framework and context-aware role-based access control ontology for smart spaces. In: Proceedings of the International Workshop on Semantic Big Data, pp 1–6
Li F, Hong J, Omala AA (2017) Efficient certificateless access control for industrial internet of things. Futur Gen Comput Syst 76:285–292
Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) Fairaccess: a new blockchain-based access control framework for the internet of things. Secur Commun Netw 9(18):5943–5964
Pinno OJA, Gregio ARA, De Bona LCE (2017) Controlchain: Blockchain as a central enabler for access control authorizations in the iot. In: GLOBECOM 2017 - 2017 IEEE Global Communications Conference, pp. 1–6.https://doi.org/10.1109/GLOCOM.2017.8254521
Tapas N, Merlino G, Longo F (2018) Blockchain-based iot-cloud authorization and delegation. In: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), IEEE, pp 411–416
Fayad A, Hammi B, Khatoun R (2018) An adaptive authentication and authorization scheme for iot’s gateways: a blockchain based approach. In: 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), IEEE, pp 1–7
Ali G, Ahmad N, Cao Y, Khan S, Cruickshank H, Qazi EA, Ali A (2020) xdbauth: Blockchain based cross domain authentication and authorization framework for internet of things. IEEE Access 8:58800–58816
Ding S, Cao J, Li C, Fan K, Li H (2019) A novel attribute-based access control scheme using blockchain for iot. IEEE Access 7:38431–38441
Siris VA, Dimopoulos D, Fotiou N, Voulgaris S, Polyzos GC (2020) Decentralized authorization in constrained iot environments exploiting interledger mechanisms. Comput Commun 152:243–251
Khalid U, Asim M, Baker T, Hung PC, Tariq MA, Rafferty L (2020) A decentralized lightweight blockchain-based authentication mechanism for iot systems, Cluster Computing 1–21
Putra GD, Dedeoglu V, Kanhere SS, Jurdak R, Ignjatovic A (2021) Trust-based blockchain authorization for iot. IEEE Trans Netw Serv Manag 18(2):1646–1658
Wickström J, Westerlund M, Pulkkis G (2021) Smart contract based distributed iot security: A protocol for autonomous device management. In: IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid). IEEE 2021:776–781
Lohachab A et al (2019) Ecc based inter-device authentication and authorization scheme using mqtt for iot networks. J Inf Secur Appl 46:1–12
Shin S, Kwon T (2020) A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5g-integrated internet of things. IEEE Access 8:67555–67571. https://doi.org/10.1109/ACCESS.2020.2985719
Chifor B-C, Bica I, Patriciu V-V, Pop F (2018) A security authorization scheme for smart home internet of things devices. Fut Gen Comput Syst 86:740–749
Ding S, Li C, Li H (2018) A novel efficient pairing-free cp-abe based on elliptic curve cryptography for iot. IEEE Access 6:27336–27345. https://doi.org/10.1109/ACCESS.2018.2836350
Zemmoudj S, Bermad N, Omar M (2019) Context-aware pseudonymization and authorization model for iot-based smart hospitals. J Ambient Intell Hum Comput 10(11):4473–4490
Su M, Zhou B, Fu A, Yu Y, Zhang G (2020) Prta: A proxy re-encryption based trusted authorization scheme for nodes on cloudiot. Inf Sci 527:533–547
Kumar S, Hu Y, Andersen MP, Popa RA, Culler DE (2019) $$\{$$JEDI$$\}$$: Many-to-many end-to-end encryption and key delegation for iot. In: 28th $$\{$$USENIX$$\}$$ Security Symposium ($$\{$$USENIX$$\}$$ Security 19), pp 1519–1536
Mandal S, Bera B, Sutrala AK, Das AK, Choo K-KR, Park Y (2020) Certificateless-signcryption-based three-factor user access control scheme for iot environment. IEEE Internet Things J 7(4):3184–3197
Ren W, Sun Y, Luo H, Guizani M (2021) Siledger: A blockchain and abe-based access control for applications in sdn-iot networks. IEEE Trans Netw Serv Manag 18(4):4406–4419
Alsahlani AYF, Popa A (2021) Lmaas-iot: Lightweight multi-factor authentication and authorization scheme for real-time data access in iot cloud-based environment. J Netw Comput Appl 192:103177
Xu R, Chen Y, Blasch E, Chen G (2018) Blendcac: A blockchain-enabled decentralized capability-based access control for iots, In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE pp 1027–1034
Bakir F, Wolski R, Krintz C (2021) Caplets: Resource aware capability-based access control for iot. In: 2021 IEEE/ACM Symposium on Edge Computing (SEC), IEEE
Julku J, Suomalainen J, Kylänpää M (2021) Delegated device attestation for iot. In: 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), IEEE, pp. 1–8
Miller VS (1985) Use of elliptic curves in cryptography, in: Conference on the theory and application of cryptographic techniques, Springer, pp. 417–426
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing, In: Annual international cryptology conference, Springer, pp. 213–229
Sahai A, Waters B (2005) Fuzzy identity-based encryption, In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp. 457–473
Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures, In: Cryptographers’ track at the RSA conference, Springer, pp. 376–392
Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system, Decentralized Business Review 21260
Aleisa N, Renaud K Privacy of the internet of things: a systematic literature review (extended discussion), arXiv preprint arXiv:1611.03340
Ouaddah A, Mousannif H, Abou Elkalam A, Ouahman AA (2017) Access control in the internet of things: Big challenges and new opportunities. Comput Netw 112:237–262
Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5):1250–1258
Trnka M, Cerny T, Stickney N (2018) Survey of authentication and authorization for the internet of things, Security and Communication Networks
Sfar AR, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the internet of things. Digital Communications and Networks 4(2):118–137
Hou J, Qu L, Shi W (2019) A survey on internet of things security from data perspectives. Comput Netw 148:295–306
Verma N, Sangwan S, Sangwan S, Parsad D Iot security challenges and counters measures, International Journal of Recent Technology and Engineering (IJRTE) ISSN 2277–3878
Gonzalez-Manzano L, Fuentes JMD, Ribagorda A (2019) Leveraging user-related internet of things for continuous authentication: A survey. ACM Computing Surveys (CSUR) 52(3):1–38
Celik ZB, Fernandes E, Pauley E, Tan G, McDaniel P (2019) Program analysis of commodity iot applications for security and privacy: Challenges and opportunities. ACM Computing Surveys (CSUR) 52(4):1–30
Ferrag MA, Maglaras L, Derhab A (2019) Authentication and authorization for mobile iot devices using biofeatures: Recent advances and future trends, Security and Communication Networks
Sequeiros JB, Chimuco FT, Samaila MG, Freire MM, Inácio PR (2020) Attack and system modeling applied to iot, cloud, and mobile ecosystems: embedding security by design. ACM Computing Surveys (CSUR) 53(2):1–32
Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B (2020) A survey on access control in the age of internet of things. IEEE Internet Things J 7(6):4682–4696
Sha K, Yang TA, Wei W, Davari S (2020) A survey of edge computing-based designs for iot security. Digital Communications and Networks 6(2):195–202
Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot. J Netw Comput Appl 149:102481
Hathaliya JJ, Tanwar S (2020) An exhaustive survey on security and privacy issues in healthcare 4.0. Comput Commun 153:311–335
Lone AH, Naaz R (2021) Applicability of blockchain smart contracts in securing internet and iot: a systematic literature review. Computer Science Review 39:100360
Mohammad ZN, Farha F, Abuassba AO, Yang S, Zhou F (2021) Access control and authorization in smart homes: A survey. Tsinghua Science and Technology 26(6):906–917
Sudarsan SV, Schelén O, Bodin U Survey on delegated and self-contained authorization techniques in cps and iot, IEEE Access
Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed nist standard for role-based access control. ACM Transactions on Information and System Security (TISSEC) 4(3):224–274
Cirani S, Ferrari G, Veltri L (2013) Enforcing security mechanisms in the ip-based internet of things: An algorithmic overview. Algorithms 6(2):197–226
Alamri A, Bertok P, Thom JA, Fahad A (2016) The mediator authorization-security model for heterogeneous semantic knowledge bases. Futur Gener Comput Syst 55:227–237
Suhail S, Hussain R, Abdellatif M, Pandey SR, Khan A, Hong CS (2020) Provenance-enabled packet path tracing in the rpl-based internet of things. Comput Netw 173:107189
Babar S, Mahalle P, Stango A, Prasad N, Prasad R (2010) Proposed security model and threat taxonomy for the internet of things (iot), in: International Conference on Network Security and Applications, Springer, pp. 420–429
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660
Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: Vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279
Díaz M, Martín C, Rubio B (2016) State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing. J Netw Comput Appl 67:99–117
Alcaraz C, Roman R, Najera P, Lopez J (2013) Security of industrial sensor network-based remote substations in the context of the internet of things. Ad Hoc Netw 11(3):1091–1104
Chen J, Liu Y, Chai Y (2015) An identity management framework for internet of things, in: 2015 IEEE 12th International Conference on e-Business Engineering, IEEE, pp. 360–364
Guo B, Zhang D, Wang Z, Yu Z, Zhou X (2013) Opportunistic iot: Exploring the harmonious interaction between human and the internet of things. J Netw Comput Appl 36(6):1531–1539
Gupta U Application of multi factor authentication in internet of things domain, arXiv preprint arXiv:1506.03753
Rose K, Eldridge S, Chapin L (2015) The internet of things: An overview. The internet society (ISOC) 80:1–50
