Limitations and Approaches in Access Control and Identity Management for Constrained IoT Resources

The Internet of Things (IoT), smart sensors and mobile wearable devices are helping to provide services that are more ubiquitous, smarter, faster and easily accessible to users. However, security is a significant concern for the IoT, with access control and identity management are being two major issues. With the growing size and presence of these systems and the resource constrained nature of the IoT devices, an important question is how to manage policies in a manner that is both scalable and flexible. In this research, we aim at proposing a fine-grained and flexible access control architecture, and to examine an identity model for constrained IoT resources. To achieve this, first, we outline some key limitations in the state of the art access control and identity management for IoT. Then we devise our approach to address those limitations in a systematic way.

[1]  Vijay Varadharajan,et al.  Policy-Based Access Control for Constrained Healthcare Resources , 2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[2]  Vijay Varadharajan,et al.  Modeling Identity for the Internet of Things: Survey, Classification and Trends , 2018, 2018 12th International Conference on Sensing Technology (ICST).

[3]  Vijay Varadharajan,et al.  On the design of security mechanisms for the Internet of Things , 2017, 2017 Eleventh International Conference on Sensing Technology (ICST).

[4]  Vijay Varadharajan,et al.  On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems , 2017, MobiQuitous.

[5]  Hajar Mousannif,et al.  Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.