TY - GEN
T1 - Identity driven capability based access control (ICAC) scheme for the Internet of Things
AU - Mahalle, Parikshit N.
AU - Anggorojati, Bayu
AU - Prasad, Neeli Rashmi
AU - Prasad, Ramjee
PY - 2012
Y1 - 2012
N2 - Internet of Things (IoT) is becoming integral and mandatory part of everyday life. Scalability and manageability is intimidating due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is important to establish secure communication between multiple devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related to the complexity and dynamics of device identities. ICAC is implemented for Wi-Fi and results shows that ICAC is scalable and performs better compared to other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against man-in-the-middle attack, especially eavesdropping and replay attacks.
AB - Internet of Things (IoT) is becoming integral and mandatory part of everyday life. Scalability and manageability is intimidating due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is important to establish secure communication between multiple devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related to the complexity and dynamics of device identities. ICAC is implemented for Wi-Fi and results shows that ICAC is scalable and performs better compared to other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against man-in-the-middle attack, especially eavesdropping and replay attacks.
KW - Access Control
KW - Capability
KW - Internet of Things
UR - http://www.scopus.com/inward/record.url?scp=84879662694&partnerID=8YFLogxK
U2 - 10.1109/ANTS.2012.6524227
DO - 10.1109/ANTS.2012.6524227
M3 - Conference contribution
AN - SCOPUS:84879662694
SN - 9781467351324
T3 - 2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems, ANTS 2012
SP - 49
EP - 54
BT - 2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems, ANTS 2012
T2 - 2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems, ANTS 2012
Y2 - 16 December 2012 through 19 December 2012
ER -