scholarly journals Exploiting Smart Contracts for Capability-Based Access Control in the Internet of Things

Sensors ◽  
2020 ◽  
Vol 20 (6) ◽  
pp. 1793 ◽  
Author(s):  
Yuta Nakamura ◽  
Yuanyu Zhang ◽  
Masahiro Sasabe ◽  
Shoji Kasahara

Due to the rapid penetration of the Internet of Things (IoT) into human life, illegal access to IoT resources (e.g., data and actuators) has greatly threatened our safety. Access control, which specifies who (i.e., subjects) can access what resources (i.e., objects) under what conditions, has been recognized as an effective solution to address this issue. To cope with the distributed and trust-less nature of IoT systems, we propose a decentralized and trustworthy Capability-Based Access Control (CapBAC) scheme by using the Ethereum smart contract technology. In this scheme, a smart contract is created for each object to store and manage the capability tokens (i.e., data structures recording granted access rights) assigned to the related subjects, and also to verify the ownership and validity of the tokens for access control. Different from previous schemes which manage the tokens in units of subjects, i.e., one token per subject, our scheme manages the tokens in units of access rights or actions, i.e., one token per action. Such novel management achieves more fine-grained and flexible capability delegation and also ensures the consistency between the delegation information and the information stored in the tokens. We implemented the proposed CapBAC scheme in a locally constructed Ethereum blockchain network to demonstrate its feasibility. In addition, we measured the monetary cost of our scheme in terms of gas consumption to compare our scheme with the existing Blockchain-Enabled Decentralized Capability-Based Access Control (BlendCAC) scheme proposed by other researchers. The experimental results show that the proposed scheme outperforms the BlendCAC scheme in terms of the flexibility, granularity, and consistency of capability delegation at almost the same monetary cost.

2017 ◽  
pp. 507-526
Author(s):  
Peter J. Hawrylak ◽  
Steven Reed ◽  
Matthew Butler ◽  
John Hale

Access to resources, both physical and cyber, must be controlled to maintain security. The increasingly connected nature of our world makes access control a paramount issue. The expansion of the Internet of Things into everyday life has created numerous opportunities to share information and resources with other people and other devices. The Internet of Things will contain numerous wireless devices. The level of access each user (human or device) is given must be controlled. Most conventional access control schemes are rigid in that they do not account for environmental context. This solution is not sufficient for the Internet of Things. What is needed is a more granular control of access rights and a gradual degradation or expansion of access based on observed facts. This chapter presents an access control system termed the Access of Things, which employs a gradual degradation of privilege philosophy. The Access of Things concept is applicable to the dynamic security environment present in the Internet of Things.


Author(s):  
Shigenari Nakamura ◽  
Tomoya Enokido ◽  
Makoto Takizawa

In the Internet of Things (IoT), not only computers like servers but also devices with sensor and actuator devices are interconnected. It is critical to make the IoT secure, especially devices. In the capability-based access control (CapBAC) model proposed to make IoT devices secure, an owner of each device issues a capability token, i.e. a set of access rights, to a subject. Only a subject holding the capability token is allowed to manipulate the device. However, a subject may get data in a device d1 via another device d2 although the subject holds no capability token to get data from the device d1. Here, the data in the device d1 illegally flow to the subject. In this article, the authors propose the operation interruption (OI) protocol where illegal get operations are interrupted. In the evaluation, the ratio of the number of get operations interrupted to the total number of get operations is kept constant even if the numbers of subjects and access rights granted to each subject increase in the OI protocol.


Author(s):  
Peter J. Hawrylak ◽  
Steven Reed ◽  
Matthew Butler ◽  
John Hale

Access to resources, both physical and cyber, must be controlled to maintain security. The increasingly connected nature of our world makes access control a paramount issue. The expansion of the Internet of Things into everyday life has created numerous opportunities to share information and resources with other people and other devices. The Internet of Things will contain numerous wireless devices. The level of access each user (human or device) is given must be controlled. Most conventional access control schemes are rigid in that they do not account for environmental context. This solution is not sufficient for the Internet of Things. What is needed is a more granular control of access rights and a gradual degradation or expansion of access based on observed facts. This chapter presents an access control system termed the Access of Things, which employs a gradual degradation of privilege philosophy. The Access of Things concept is applicable to the dynamic security environment present in the Internet of Things.


2019 ◽  
Vol 6 (2) ◽  
pp. 1594-1605 ◽  
Author(s):  
Yuanyu Zhang ◽  
Shoji Kasahara ◽  
Yulong Shen ◽  
Xiaohong Jiang ◽  
Jianxiong Wan

2021 ◽  
Vol 34 (02) ◽  
pp. 1032-1038
Author(s):  
Arya Majidi

Population growth and urbanization have led to an increase in the rate of waste production, the lack of timely and proper management of which will have adverse effects on human life and the environment. Since most of the waste management costs are spent on waste collection and transportation, it is necessary to find solutions to control the huge costs of this sector. On the other hand, today, intelligent technologies are used globally as solutions to meet challenges in various fields such as agriculture to improve agro-industrial production, transportation, and waste management, which creates a concept called smart cities. One of the categories that has changed the concept of cities and made them have easier and smarter answers to various events and needs is the "Internet of Things", in which many cases and infrastructures with new hardware technologies and Software are integrated. Waste collection is no exception to this rule and efforts have been made to make it smarter. In this research, some of the latest innovations presented globally in order to make trash smarter have been examined.


2014 ◽  
Vol 998-999 ◽  
pp. 1374-1377
Author(s):  
Da Hui Li

This article introduces the services and development of the Internet of Things, and analyzes the driving forces and obstacles behind such development. Looking at application types and the different development stages of the Internet of Things, this article categorizes its services into four types: identity related services, information aggregation services, collaborative-aware services, and ubiquitous services. For the first two types of services, applications and system framework are discussed; for the last two types, development trends are discussed. Services provided by the Internet of Things will gradually be integrated into human life and society; with the development of the Internet of Things, applications will evolve from relatively simple identity-related and information aggregation-related applications, to collaboratively-aware and finally ubiquitous applications. It will then be possible for the Internet of Things to be fully integrated with Internet and telecommunications networks


Sign in / Sign up

Export Citation Format

Share Document