Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions

Author:

Ragothaman Kaushik1ORCID,Wang Yong2ORCID,Rimal Bhaskar2ORCID,Lawrence Mark2ORCID

Affiliation:

1. College of Business and Information Systems, Dakota State University, Madison, SD 57042, USA

2. The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, SD 57042, USA

Abstract

Internet of Things (IoT) provides a wide range of services in domestic and industrial environments. Access control plays a crucial role in granting access rights to users and devices when an IoT device is connected to a network. However, many challenges exist in designing and implementing an ideal access control solution for the IoT due to the characteristics of the IoT including but not limited to the variety of the IoT devices, the resource constraints on the IoT devices, and the heterogeneous nature of the IoT. This paper conducts a comprehensive survey on access control in the IoT, including access control requirements, authorization architecture, access control models, access control policies, access control research challenges, and future directions. It identifies and summarizes key access control requirements in the IoT. The paper further evaluates the existing access control models to fulfill the access control requirements. Access control decisions are governed by access control policies. The existing approaches on dynamic policies’ specification are reviewed. The challenges faced by the existing solutions for policies’ specification are highlighted. Finally, the paper presents the research challenges and future directions of access control in the IoT. Due to the variety of IoT applications, there is no one-size-fits-all solution for access control in the IoT. Despite the challenges encountered in designing and implementing the access control in the IoT, it is desired to have an access control solution to meet all the identified requirements to secure the IoT.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference110 articles.

1. Statista Research Department (2016). Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025, Statista Research Department.

2. The Aftermath of the Dyn DDOS Attack;Shane;Micro,2019

3. Check Point Research (2017). IoTroop Botnet: The Full Investigation, Check Point Research.

4. DDoS in the IoT: Mirai and Other Botnets;Kolias;Computer,2017

5. Macaulay, T. (2017). Chapter 9—Identity and Access Control Requirements in the IoT, Morgan Kaufmann.

Cited by 22 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. An improved smart contract-based bring your own device (BYOD) security control framework;Alexandria Engineering Journal;2024-10

2. GLSBIoT: GWO-based enhancement for lightweight scalable blockchain for IoT with trust based consensus;Future Generation Computer Systems;2024-10

3. Access Control for IoT-based Big Data: a State-of-the-art Review;Proceedings of the 2024 6th International Conference on Big Data Engineering;2024-07-24

4. User Authentication in the IoT and IIoT Environment;Advances in Information Security, Privacy, and Ethics;2024-06-30

5. Authentication and Authorization in Zero Trust IoT: A Survey;2024 35th Irish Signals and Systems Conference (ISSC);2024-06-13

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3