The Access of Things

2017 ◽  
pp. 507-526
Author(s):  
Peter J. Hawrylak ◽  
Steven Reed ◽  
Matthew Butler ◽  
John Hale

Access to resources, both physical and cyber, must be controlled to maintain security. The increasingly connected nature of our world makes access control a paramount issue. The expansion of the Internet of Things into everyday life has created numerous opportunities to share information and resources with other people and other devices. The Internet of Things will contain numerous wireless devices. The level of access each user (human or device) is given must be controlled. Most conventional access control schemes are rigid in that they do not account for environmental context. This solution is not sufficient for the Internet of Things. What is needed is a more granular control of access rights and a gradual degradation or expansion of access based on observed facts. This chapter presents an access control system termed the Access of Things, which employs a gradual degradation of privilege philosophy. The Access of Things concept is applicable to the dynamic security environment present in the Internet of Things.

Author(s):  
Peter J. Hawrylak ◽  
Steven Reed ◽  
Matthew Butler ◽  
John Hale

Access to resources, both physical and cyber, must be controlled to maintain security. The increasingly connected nature of our world makes access control a paramount issue. The expansion of the Internet of Things into everyday life has created numerous opportunities to share information and resources with other people and other devices. The Internet of Things will contain numerous wireless devices. The level of access each user (human or device) is given must be controlled. Most conventional access control schemes are rigid in that they do not account for environmental context. This solution is not sufficient for the Internet of Things. What is needed is a more granular control of access rights and a gradual degradation or expansion of access based on observed facts. This chapter presents an access control system termed the Access of Things, which employs a gradual degradation of privilege philosophy. The Access of Things concept is applicable to the dynamic security environment present in the Internet of Things.


Sensors ◽  
2020 ◽  
Vol 20 (6) ◽  
pp. 1793 ◽  
Author(s):  
Yuta Nakamura ◽  
Yuanyu Zhang ◽  
Masahiro Sasabe ◽  
Shoji Kasahara

Due to the rapid penetration of the Internet of Things (IoT) into human life, illegal access to IoT resources (e.g., data and actuators) has greatly threatened our safety. Access control, which specifies who (i.e., subjects) can access what resources (i.e., objects) under what conditions, has been recognized as an effective solution to address this issue. To cope with the distributed and trust-less nature of IoT systems, we propose a decentralized and trustworthy Capability-Based Access Control (CapBAC) scheme by using the Ethereum smart contract technology. In this scheme, a smart contract is created for each object to store and manage the capability tokens (i.e., data structures recording granted access rights) assigned to the related subjects, and also to verify the ownership and validity of the tokens for access control. Different from previous schemes which manage the tokens in units of subjects, i.e., one token per subject, our scheme manages the tokens in units of access rights or actions, i.e., one token per action. Such novel management achieves more fine-grained and flexible capability delegation and also ensures the consistency between the delegation information and the information stored in the tokens. We implemented the proposed CapBAC scheme in a locally constructed Ethereum blockchain network to demonstrate its feasibility. In addition, we measured the monetary cost of our scheme in terms of gas consumption to compare our scheme with the existing Blockchain-Enabled Decentralized Capability-Based Access Control (BlendCAC) scheme proposed by other researchers. The experimental results show that the proposed scheme outperforms the BlendCAC scheme in terms of the flexibility, granularity, and consistency of capability delegation at almost the same monetary cost.


Author(s):  
Shigenari Nakamura ◽  
Tomoya Enokido ◽  
Makoto Takizawa

In the Internet of Things (IoT), not only computers like servers but also devices with sensor and actuator devices are interconnected. It is critical to make the IoT secure, especially devices. In the capability-based access control (CapBAC) model proposed to make IoT devices secure, an owner of each device issues a capability token, i.e. a set of access rights, to a subject. Only a subject holding the capability token is allowed to manipulate the device. However, a subject may get data in a device d1 via another device d2 although the subject holds no capability token to get data from the device d1. Here, the data in the device d1 illegally flow to the subject. In this article, the authors propose the operation interruption (OI) protocol where illegal get operations are interrupted. In the evaluation, the ratio of the number of get operations interrupted to the total number of get operations is kept constant even if the numbers of subjects and access rights granted to each subject increase in the OI protocol.


2012 ◽  
Vol 532-533 ◽  
pp. 576-580
Author(s):  
Ke Chao Wang ◽  
Tian Tian Wang ◽  
Zong Fu Jia ◽  
Ming Kui Zong

Traditional access control system is relatively simple, low efficiency, small storage capacity, which can not meet the initiative, timeliness, and flexibility requirements of security technology in the Internet of Things. To solve this problem, this paper researches and designs the intelligent access control system based on Radio Frequency Identification (RFID) technology. The system consists of an access control management system and an access controller. The system can not only be used as the import and export of safety management, but also contribute to the internal order management, achieve effective control and management of access control region.


2015 ◽  
Vol 20 (5) ◽  
pp. 1763-1779 ◽  
Author(s):  
Jorge Bernal Bernabe ◽  
Jose Luis Hernandez Ramos ◽  
Antonio F. Skarmeta Gomez

2014 ◽  
Vol 7 (2) ◽  
pp. 195-203 ◽  
Author(s):  
Richard A. Formato

Variable Z0(VZ0) antenna technology is a new design or optimization methodology applicable to any antenna on any platform designed or optimized with any procedure. It should be particularly useful for wireless devices populating the Internet of Things. VZ0expands the design or decision space by adding another degree of freedom invariably leading to better antennas. A simple design example illustrates its effectiveness.


Sign in / Sign up

Export Citation Format

Share Document