6 research outputs found

    A Study on Sanctuary and Seclusion Issues in Internet-of-Things

    Get PDF
    Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in hospitals, deployed outside to control and report the changes in environment, prevent fires, and many more beneficial functionality. However, all those benefits can come of huge risks of seclusion loss and sanctuary issues. To secure the IoT devices, many research works have been con-ducted to countermeasure those problems and find a better way to eliminate those risks, or at least minimize their effects on the user�s seclusion and sanctuary requirements. The study consists of four segments. The first segment will explore the most relevant limitations of IoT devices and their solutions. The second one will present the classification of IoT attacks. The next segment will focus on the mechanisms and architectures for authentication and access control. The last segment will analyze the sanctuary issues in different layers

    Desenvolvimento da solução de conectividade para a rede de sensores do projeto Vitasenior

    Get PDF
    A evolução da microeletrónica e dos sistemas de comunicação foram determinantes para o desenvolvimento da Internet of Things (IoT). A IoT tem suscitado o interesse tanto da comunidade académica como da indústria, uma vez que os campos de aplicação são inúmeros. Incorporar em objetos do dia-a-dia sistemas embebidos com a capacidade de comunicar e de interagir com o meio ambiente envolvente é o conceito base da IoT. Os sistemas a embeber são caracterizados por ter baixos recursos de armazenamento e de processamento, baixa capacidade de retenção de energia e transdutores e atuadores que permitem medir e atuar sobre variáveis físicas, tais como a temperatura. Às redes compostas por este tipo de objetos é dado o nome de redes de sensores. As redes de sensores não têm infraestrutura estável e predeterminada e são baseadas em comunicações por rádio frequência de baixa potência e por comunicações multi-hop. A capacidade dos objetos se auto-organizarem tornam simultaneamente a rede mais resiliente e também mais difícil de gerir, uma vez que qualquer dispositivo compatível se pode juntar à rede. Os mecanismos de controlo de acessos podem contribuir para tornar a rede mais gerível e também mais segura. Mais gerível porque apenas os nós conhecidos se podem juntar à rede. Mais segura porque apenas são admitidos os nós cuja postura de segurança é conhecida. As soluções de controlo de acessos são compostas por dois mecanismos base, a identificação (autenticação) e a autorização dos nós. Este trabalho apresenta uma solução de autorização, que fica localizada no border router. Para concretizar o mecanismo de autorização foi necessário alterar o mecanismo de encaminhamento dos pacotes apenas baseado na tabela de encaminhamento. Na solução proposta, o processo de encaminhamento inicia-se com a pesquisa do endereço do nó na tabela de nós autorizados. A pesquisa na tabela de encaminhamento continua ser utilizada, mas apenas para os nós autorizados. A solução de autorização proposta é baseada em protocolos standard, tais como 6LoWPAN, Neighbour Discovery adaptado e RPL e é adequada às redes de sensores. Foi concretizada uma testbed laboratorial recorrendo a dispositivos comerciais e a software aberto e de utilização livre

    Towards SDN-based smart contract solution for IoT access control

    Get PDF
    Access control is essential for the IoT environment to ensure that only approved and trusted parties are able to configure devices, access sensor information, and command actuators to execute activities. The IoT ecosystem is subject to various access control complications due to the limited latency between IoT devices and the Internet, low energy requirements of IoT devices, the distributed framework, ad-hoc networks, and an exceptionally large number of heterogeneous IoT devices that need to be managed. The motivation for this proposed work is to resolve the incurring challenges of IoT associated with management and access control security. Each IoT domain implementation has particular features and needs separate access control policies to be considered in order to design a secure solution. This research work aims to resolve the intricacy of policies management, forged policies, dissemination, tracking of access control policies, automation, and central management of IoT nodes and provides a trackable and auditable access control policy management system that prevents forged policy dissemination by applying Software Defined Network (SDN) and blockchain technology in an IoT environment. Integration of SDN and blockchain provides a robust solution for IoT environment security. Recently, smart contracts have become one of blockchain technology’s most promising applications. The integration of smart contracts with blockchain technology provides the capability of designing tamper-proof and independently verifiable policies. In this paper, we propose a novel, scalable solution for implementing immutable, verifiable, adaptive, and automated access control policies for IoT devices together with a successful proof of concept that demonstrates the scalability of the proposed solution. The performance of the proposed solution is evaluated in terms of throughput and resource access delay between the blockchain component and the controller as well as from node to node. The number of nodes in the IoT network and the number of resource access requests were independently and systematically increased during the evaluations. The results illustrate that the resource access delay and throughput were affected neither linearly nor exponentially; hence, the proposed solution shows no significant degradation in performance with an increase in the number of nodes and/or requests

    From Conventional to State-of-the-Art IoT Access Control Models

    Get PDF
    open access articleThe advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people’s daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user’s access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the sam
    corecore