Dynamic Access Control In Iot: Monitoring User Behavior Using Smart Contracts

Dynamic Access Control in IoT (Internet of Things) through monitoring user behavior is a procedure that defines access control theory. Usually, an institution provides services to a user who owns a specific role that was issued by another institution. Such access control methods are possible in man-to-man communications only, but not in computer networks, because it is hard to establish security and limit spiteful actions through the users with high-risk values. High-risk values are caused by the users who do the tasks which they are not intended to do. In this paper, we bring forward a technique to limit malicious activities by monitoring user behavior using smart contracts. This proposed technique uses blockchain based technology and smart contracts for trust and the confirmation of user’s possession. We described the substructure, containing two main parts: smart contract and an authentication arrangement protocol.

[1]  Carla Merkle Westphall,et al.  A dynamic risk-based access control architecture for cloud computing , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).

[2]  Krishna M. Sivalingam,et al.  Futuristic Trends in Networks and Computing Technologies: Second International Conference, FTNCT 2019, Chandigarh, India, November 22–23, 2019, Revised Selected Papers , 2020 .

[3]  André Ivanov,et al.  DynPolAC: Dynamic Policy-Based Access Control for IoT Systems , 2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC).

[4]  Hany F. Atlam,et al.  An efficient security risk estimation technique for Risk-based access control model for IoT , 2019, Internet Things.

[5]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[6]  Wolfgang Leister,et al.  Context-Aware Authentication for the Internet of Things , 2015, ICAS 2015.

[7]  Mahmoud Elkhodr,et al.  The Internet of Things: Vision & challenges , 2013, IEEE 2013 Tencon - Spring.

[8]  Xiaokang Yang,et al.  Futuristic Trends in Network and Communication Technologies , 2018, Communications in Computer and Information Science.

[9]  Ru-chuan Wang,et al.  An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .

[10]  Jing Liu,et al.  Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[11]  Antonio F. Gómez-Skarmeta,et al.  TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..

[12]  Gary B. Wills,et al.  Validation of an adaptive risk-based access control model for the Internet of Things , 2018 .

[13]  Yasnitsky Leonid Advances in Intelligent Systems and Computing , 2019 .

[14]  Xiaohong Jiang,et al.  Smart Contract-Based Access Control for the Internet of Things , 2018, IEEE Internet of Things Journal.

[15]  Zhou Cheng,et al.  Overview of the Internet of Things , 2011 .

[16]  Gary B. Wills,et al.  Developing an Adaptive Risk-Based Access Control Model for the Internet of Things , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[17]  Madhusudan Singh,et al.  Blockchain: A game changer for securing IoT data , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).

[18]  Lihua Yin,et al.  Attribute-Role-Based Hybrid Access Control in the Internet of Things , 2014, APWeb Workshophs.

[19]  Jean-Noel Colin,et al.  Adaptive Risk-Aware Access Control Model for Internet of Things , 2017, 2017 International Workshop on Secure Internet of Things (SIoT).

[20]  Ju Wook Jang,et al.  A Blockchain-based Secure IoT Control Scheme , 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE).

[21]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[22]  Elaine Shi,et al.  Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.

[23]  D. Richard Kuhn,et al.  Attribute-Based Access Control , 2017, Computer.

[24]  Mehrdad S. Sharbaf,et al.  Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control , 2017, 2017 International Conference on Computational Science and Computational Intelligence (CSCI).

[25]  Guoping Zhang,et al.  An extended role based access control model for the Internet of Things , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).

[26]  Domenico Rotondi,et al.  IoT Access Control Issues: A Capability Based Approach , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.