scholarly journals A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues

Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2464 ◽  
Author(s):  
A. S. M. Kayes ◽  
Rudri Kalaria ◽  
Iqbal H. Sarker ◽  
Md. Saiful Islam ◽  
Paul A. Watters ◽  
...  

Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an overwhelming flow of data and services, which has shifted the access control paradigm from a fixed desktop environment to dynamic cloud environments. Fog computing is associated with a new access control paradigm to reduce the overhead costs by moving the execution of application logic from the centre of the cloud data sources to the periphery of the IoT-oriented sensor networks. Indeed, accessing information and data resources from a variety of IoT sources has been plagued with inherent problems such as data heterogeneity, privacy, security and computational overheads. This paper presents an extensive survey of security, privacy and access control research, while highlighting several specific concerns in a wide range of contextual conditions (e.g., spatial, temporal and environmental contexts) which are gaining a lot of momentum in the area of industrial sensor and cloud networks. We present different taxonomies, such as contextual conditions and authorization models, based on the key issues in this area and discuss the existing context-sensitive access control approaches to tackle the aforementioned issues. With the aim of reducing administrative and computational overheads in the IoT sensor networks, we propose a new generation of Fog-Based Context-Aware Access Control (FB-CAAC) framework, combining the benefits of the cloud, IoT and context-aware computing; and ensuring proper access control and security at the edge of the end-devices. Our goal is not only to control context-sensitive access to data resources in the cloud, but also to move the execution of an application logic from the cloud-level to an intermediary-level where necessary, through adding computational nodes at the edge of the IoT sensor network. A discussion of some open research issues pertaining to context-sensitive access control to data resources is provided, including several real-world case studies. We conclude the paper with an in-depth analysis of the research challenges that have not been adequately addressed in the literature and highlight directions for future work that has not been well aligned with currently available research.

2016 ◽  
Vol 2016 ◽  
pp. 1-27 ◽  
Author(s):  
Vikas Bhandary ◽  
Amita Malik ◽  
Sanjay Kumar

With the advancement of wireless sensor networks (WSNs) and technology, applicability of WSNs as a system is touching new heights. The development of multimedia nodes has led to the creation of another intelligent distributed system, which can transfer real-time multimedia traffic, ubiquitously. Wireless multimedia sensor networks (WMSNs) are applicable in a wide range of areas including area monitoring and video surveillance. But due to unreliable error-prone communication medium and application specific quality of service (QoS) requirements, routing of real-time multimedia traffic in WMSNs poses a serious problem. The paper discusses various existing routing strategies in WMSNs, with their properties and limitations which lead to open research issues. Further, detailed classification and analytical comparison of discussed protocols are also presented.


Author(s):  
M. Fahim Ferdous Khan ◽  
Ken Sakamura

Context-awareness is a quintessential feature of ubiquitous computing. Contextual information not only facilitates improved applications, but can also become significant security parameters – which in turn can potentially ensure service delivery not to anyone anytime anywhere, but to the right person at the right time and place. Specially, in determining access control to resources, contextual information can play an important role. Access control models, as studied in traditional computing security, however, have no notion of context-awareness; and the recent works in the nascent field of context-aware access control predominantly focus on spatio-temporal contexts, disregarding a host of other pertinent contexts. In this paper, with a view to exploring the relationship of access control and context-awareness in ubiquitous computing, the authors propose a comprehensive context-aware access control model for ubiquitous healthcare services. They explain the design, implementation and evaluation of the proposed model in detail. They chose healthcare as a representative application domain because healthcare systems pose an array of non-trivial context-sensitive access control requirements, many of which are directly or indirectly applicable to other context-aware ubiquitous computing applications.


2005 ◽  
Vol 1 (1) ◽  
pp. 101-122 ◽  
Author(s):  
Neha Jain ◽  
Dharma P. Agrawal

The self-organizing nature of sensor networks, their autonomous operation and potential architectural alternatives make them suitable for different data-centric applications. Their wider acceptance seems to be rising on the horizon. In this article, we present an overview of the current state of the art in the field of wireless sensor networks. We also present various open research issues and provide an insight about the latest developments that need to be explored in greater depth that could possibly make this emerging technological area more useful than ever.


Author(s):  
Al-Salti Faiza A. ◽  
Al-Zeidi Nasser M. ◽  
Day Khaled ◽  
Arafeh Bassel ◽  
Touzene Abderezak

With the recent advances in underwater sensor devices and technologies, underwater wireless sensor networks (UWSNs) enable a variety of applications such as underwater exploration and monitoring, disaster prevention, and military surveillance and reconnaissance. However, these kinds of networks faces a number of challenges induced by the nature of the underwater environment and its influence on the physical media. Therefore, new routing protocols are proposed specifically for such networks to mitigate these challenges. This paper surveys some of the recent routing protocols for UWSNs. Specifically, the idea of each protocol is presented as well as its advantages and disadvantages. Furthermore, the presented protocols are classified into different categories. The paper is concluded with some open research issues.


2018 ◽  
Vol 7 (3) ◽  
pp. 1869
Author(s):  
Zineb Aarab ◽  
Asmae El Ghazi ◽  
Rajaa Saidi ◽  
Moulay Driss Rahmani

Recently, the development of wireless sensor networks (WSNs) is spreading rapidly. WSNs are highly distributed self-organized systems which comprise a large number of resource constrained sensor nodes. Developers of WSNs face many challenges from communication, memory, limited energy… Also, mobility has become a major concern for WSN researchers. Indeed, Mobile WSNs (MWSN) consist of mobile sensor nodes that can move on their own and also interact with the physical environment. Developing applications for MWSN is a complicated process because of the wide variety of WSN applications and low-level implementation details. Integrating context-awareness can improve MWSN applications results. In this paper, some research issues and challenges involved in the design of WSNs are presented. Model-Driven Engineering offers an effective solution to WSN application developers by hiding the details of lower layers and raising the level of abstraction. In this sense, we propose a context-aware WSN architecture and WSN metamodel to ease the work for developers in this field. 


2017 ◽  
Vol 13 (7) ◽  
pp. 155014771772215 ◽  
Author(s):  
Wooguil Pak

Many researchers have analyzed sources of uncertainty in synchronization protocols for wireless sensor networks. However, very few researchers perform this work in depth, and failed to discover comprehensive characteristics since they worked with only one or two measurement intervals. To overcome this problem, extensive measurements were conducted and analyzed to find the characteristics of the sources according to various measurement intervals. Using the characteristics, a new media access control protocol, WideMAC, was designed to support a wide range of duty cycles for various applications. The transmission node in WideMAC calculates the wakeup time of the reception node before transmitting a packet and adaptively estimates the synchronization error size according to the synchronization interval from seconds to hours. To track the reception node’s wakeup time for synchronization, WideMAC uses two estimation algorithms that estimate the wakeup time and the upper bound of the total timing error. Accurate estimation of the wakeup time results in a significant amount of energy saving at the transmission node. Finally, through extensive performance evaluations in a testbed, WideMAC confirmed that it can significantly outperform existing state-of-the-art protocols.


Author(s):  
M. Fahim Ferdous Khan ◽  
Ken Sakamura

Context-awareness is a quintessential feature of ubiquitous computing. Contextual information not only facilitates improved applications, but can also become significant security parameters – which in turn can potentially ensure service delivery not to anyone anytime anywhere, but to the right person at the right time and place. Specially, in determining access control to resources, contextual information can play an important role. Access control models, as studied in traditional computing security, however, have no notion of context-awareness; and the recent works in the nascent field of context-aware access control predominantly focus on spatio-temporal contexts, disregarding a host of other pertinent contexts. In this paper, with a view to exploring the relationship of access control and context-awareness in ubiquitous computing, the authors propose a comprehensive context-aware access control model for ubiquitous healthcare services. They explain the design, implementation and evaluation of the proposed model in detail. They chose healthcare as a representative application domain because healthcare systems pose an array of non-trivial context-sensitive access control requirements, many of which are directly or indirectly applicable to other context-aware ubiquitous computing applications.


2017 ◽  
Vol 2017 ◽  
pp. 1-16 ◽  
Author(s):  
Farruh Ishmanov ◽  
Yousaf Bin Zikria

Routing is one of the most important operations in wireless sensor networks (WSNs) as it deals with data delivery to base stations. Routing attacks can cripple it easily and degrade the operation of WSNs significantly. Traditional security mechanisms such as cryptography and authentication alone cannot cope with some of the routing attacks as they come from compromised nodes mostly. Recently, trust mechanism is introduced to enhance security and improve cooperation among nodes. In routing, trust mechanism avoids/includes nodes in routing operation based on the estimated trust value. Many trust-based routing protocols are proposed to secure routing, in which they consider different routing attacks. In this research work, our goal is to explore the current research state and identify open research issues by surveying proposed schemes. To achieve our goal we extensively analyze and discuss proposed schemes based on the proposed framework. Moreover, we evaluate proposed schemes based on two important factors, which are energy consumption and attack resiliency. We discuss and present open research issues in the proposed schemes and research field.


Sign in / Sign up

Export Citation Format

Share Document