Access control in the Internet of Things: Big challenges and new opportunities

A Ouaddah, H Mousannif, A Abou Elkalam… - Computer Networks, 2017 - Elsevier
In this paper, an extensive state of the art review of different access control solutions in IoT
within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An …

Security in Internet of Things: A review

NA Khan, A Awang, SAA Karim - IEEE access, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is the paramount virtual network that enables remote users to access
connected multimedia devices. It has dragged the attention of the community because it …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

FairAccess: a new Blockchain‐based access control framework for the Internet of Things

A Ouaddah, A Abou Elkalam… - Security and …, 2016 - Wiley Online Library
Security and privacy are huge challenges in Internet of Things (IoT) environments, but
unfortunately, the harmonization of the IoT‐related standards and protocols is hardly and …

A blockchain-empowered access control framework for smart devices in green internet of things

L Tan, N Shi, K Yu, M Aloqaily, Y Jararweh - ACM Transactions on …, 2021 - dl.acm.org
Green Internet of things (GIoT) generally refers to a new generation of Internet of things
design concept. It can save energy and reduce emissions, reduce environmental pollution …

Security and privacy in the Internet of Things: Current status and open issues

M Abomhara, GM Køien - … conference on privacy and security in …, 2014 - ieeexplore.ieee.org
The Internet of Things at large will foster billions of devices, people and services to
interconnect and exchange information and useful data. As IoT systems will be ubiquitous …

[PDF][PDF] Dynamic access control policy based on blockchain and machine learning for the internet of things

A Outchakoucht, ESS Hamza… - International journal of …, 2017 - pdfs.semanticscholar.org
The Internet of Things (IoT) is now destroying the barriers between the real and digital
worlds. However, one of the huge problems that can slow down the development of this …

The UCONABC usage control model

J Park, R Sandhu - ACM transactions on information and system security …, 2004 - dl.acm.org
In this paper, we introduce the family of UCONABC models for usage control (UCON), which
integrate Authorizations (A), oBligations (B), and Conditions (C). We call these core models …

Apex: extending android permission model and enforcement with user-defined runtime constraints

M Nauman, S Khan, X Zhang - Proceedings of the 5th ACM symposium …, 2010 - dl.acm.org
Android is the first mass-produced consumer-market open source mobile platform that
allows developers to easily create applications and users to readily install them. However …

A survey of the main security issues and solutions for the SDN architecture

MB Jimenez, D Fernandez, JE Rivadeneira… - IEEE …, 2021 - ieeexplore.ieee.org
The software-defined networking (SDN) paradigm proposes the decoupling of control and
data planes and a centralized software-oriented management approach based on a central …