Evaluation of a TBOI (Time-Based Operation Interruption) Protocol to Prevent Late Information Flow in the IoT

In the IoT (Internet of Things), the CapBAC (Capability-Based Access Control) model is proposed to make devices secure. Here, an owner of a device issues a capability token, i.e. a set of access rights to a subject. The subject is allowed to manipulate the device according to the access rights authorized in the capability token. In the CapBAC model, a subject \(sb_i\) can get data of a device \(d_1\) brought to another device \(d_2\) by getting the data from the device \(d_2\) even if the subject \(sb_i\) is not allowed to get data from the device \(d_1\). Here, the data of the device \(d_1\) illegally flow to the subject \(sb_i\). In addition, a subject \(sb_i\) can get data of the device \(d_1\) generated at time \(\tau \) even if the subject \(sb_i\) is not allowed to get the data at time \(\tau \). In this case, the data come to the subject \(sb_i\) later than expected by the subject \(sb_i\) to get the data, i.e. the data flow late to the subject \(sb_i\). In our previous studies, OI (Operation Interruption) and TBOI (Time-Based OI) protocols are proposed. In the OI and TBOI protocols, only illegal operations and both types of illegal and late operations are interrupted, respectively. In this paper, we evaluate the TBOI protocol in terms of the number of operations interrupted. In the evaluation, we show the late information flow is prevented in addition to the illegal information flow in the TBOI protocol differently from the OI protocol.

[1]  Tomoya Enokido,et al.  Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT , 2019, Int. J. Mob. Comput. Multim. Commun..

[2]  Tomoya Enokido,et al.  Protocol to efficiently prevent illegal flow of objects in P2P type of publish/subscribe (PS) systems , 2019, Service Oriented Computing and Applications.

[3]  Dilawaer Duolikun,et al.  An energy-efficient model for fog computing in the Internet of Things (IoT) , 2018, Internet Things.

[4]  Jerome Henry,et al.  IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things , 2017 .

[5]  Jin Tong,et al.  Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).

[6]  Antonio F. Gómez-Skarmeta,et al.  Distributed Capability-based Access Control for the Internet of Things , 2013, J. Internet Serv. Inf. Secur..

[7]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[8]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[9]  Tomoya Enokido,et al.  An information flow control model in a topic-based publish/subscribe system , 2018, J. High Speed Networks.

[10]  Dilawaer Duolikun,et al.  A Flexible Read-Write Abortion Protocol to Prevent Illegal Information Flow , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[11]  Eduardo B. Fernandez,et al.  Database Security and Integrity , 1981 .

[12]  Tomoya Enokido,et al.  A TBOI (Time-Based Operation Interruption) Protocol to Prevent Late Information Flow in the IoT , 2019, BWCCA.

[13]  Tomoya Enokido,et al.  Causally ordering delivery of event messages in P2PPSO systems , 2019, Cognitive Systems Research.

[14]  Domenico Rotondi,et al.  A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..

[15]  Ravi S. Sandhu,et al.  Lattice-based access control models , 1993, Computer.