Author:
More Priyanka,Sachin Sakhare
Abstract
With the increasing prevalence of the Internet of Things (IoT), there is a growing need for effective access control methods to secure IoT systems and data. Traditional access control models often prove inadequate when dealing with the specific challenges presented by IoT, characterized by a variety of heterogeneous devices, ever-changing network structures, and diverse contextual elements. Managing IoT devices effectively is a complex task in maintaining network security.This study introduces a context-driven approach for IoT Device Classification and Clustering, aiming to address the unique characteristics of IoT systems and the limitations of existing access control methods. The proposed context-based model utilizes contextual information such as device attributes, location, time, and communication patterns to dynamically establish clusters and cluster leaders. By incorporating contextual factors, the model provides a more accurate and adaptable clustering mechanism that aligns with the dynamic nature of IoT systems. Consequently, network administrators can configure dynamic access policies for these clusters.
Publisher
European Alliance for Innovation n.o.
Subject
Computer Networks and Communications,Computer Science Applications,Information Systems,Control and Systems Engineering
Reference27 articles.
1. Ashton K (2009) That ‘internet of things’ thing. RFID J 22(7):97–114 June 2009, http://www.rfidjournal.com/article/view/4986 (04- 04-2014)J. Clerk Maxwell, A Treatise on electricity and magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
2. Inayat Ali et. al, “Internet of Things Security, device authentication and access control: A review”, international Jour. of comp. sci. and info. secu. (IJCSIS), vol. 14, no. 8, pp. 1-11, 2016., August 2016, https://doi.org/10.48550/arXiv.1901.07309.
3. Hassani et. al., “Efficient execution of complex context queries to enable near real-time smart iot applications”, sensors (Basel). 2019 Dec 11;19(24):5457. doi: 10.3390/s19245457. PMID: 31835743; PMCID: PMC6960719
4. Pal et. al, “Protocol-based and hybrid access control for the IoT: approaches and research opportunities”, sensors (Basel). 2021 Oct 14;21(20):6832. PMID: 34696053; PMCID: PMC8539538, https://doi.org/10.3390/s21206832
5. Abowd et. al, “Towards a better understanding of context and context-awareness”, In: Gellersen, HW. (eds) handheld and ubi. Comp. HUC 1999. Lecture notes in comp. sci., vol 1707. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48157-5_29
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing the Supply Chain;Advances in Information Security, Privacy, and Ethics;2024-02-02
2. Identity-Based Access Control in IoT: Enhancing Security through Mutual Cryptographic Authentication and Context Awareness;2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC);2023-12-04