Advertisement

Designing Suitable Access Control for Web-Connected Smart Home Platforms

  • Sebastian WernerEmail author
  • Frank Pallas
  • David Bermbach
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10797)

Abstract

Access control in web-connected smart home platforms exhibits unique characteristics and challenges. In this paper, we therefore discuss suitable access control mechanisms specifically tailored to such platforms. Based on a set of relevant scenarios, we identify requirements and available technologies for fulfilling them. We then present our experiences gained from implementing access control meeting the identified requirements in OpenHAB, a widely used smart home platform.

Keywords

Access control IoT Smart home 

Notes

Acknowledgments

This work partly been supported by the European Commission through the Horizon 2020 Research and Innovation program under contract 731945 (DITAS project).

References

  1. 1.
    Ahn, G.J., Mohan, B.: Secure information sharing using role-based delegation. In: International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004, vol. 2, pp. 810–815 (2004)Google Scholar
  2. 2.
    Andy Greenberg: Hackers Remotely Kill a Jeep on the Highway–With Me in It. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
  3. 3.
    Anggorojati, B., Mahalle, P.N., Prasad, N.R., Prasad, R.: Capability-based access control delegation model on the federated IoT network. In: 2012 15th International Symposium on Wireless Personal Multimedia Communications (WPMC), pp. 604–608 (2012)Google Scholar
  4. 4.
    Aura, T.: Distributed access-rights management with delegation certificates. In: Vitek, J., Jensen, C.D. (eds.) Secure Internet Programming. LNCS, vol. 1603, pp. 211–235. Springer, Heidelberg (1999).  https://doi.org/10.1007/3-540-48749-2_9CrossRefGoogle Scholar
  5. 5.
    Blackstock, M., Lea, R.: Fred: a hosted data flow platform for the IOT built using node-red. In Proceedings of MoTA 2016 (2016)Google Scholar
  6. 6.
    Brucker, A.D., Petritsch, H.: Extending access control models with break-glass. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. pp. 197–206. ACM (2009)Google Scholar
  7. 7.
    Chen, K., Aljarrah, M., Bonnet, P.: Leveraging physical locality to integrate Smart appliances in non-residential buildings with ultrasound and Bluetooth Low energy. In: Proceedings - 2016 IEEE 1st International Conference on Internet-of-Things Design and Implementation, IoTDI 2016 1(iii), pp. 199–209 (2016)Google Scholar
  8. 8.
    Dong, R., Ratliff, L.J.: Privacy in the Internet of Things. Next Wave 21(2), 8–16 (2016)Google Scholar
  9. 9.
    Emerson, S., Choi, Y.K., Hwang, D.Y., Kim, K.S., Kim, K.H.: An oauth based authentication mechanism for IoT networks. In: International Conference on ICT Convergence 2015: Innovations Toward the IoT, 5G, and Smart Media Era, ICTC 2015, pp. 1072–1074 (2015)Google Scholar
  10. 10.
    Gartner: Gartner Says 8.4 Billion Connected “Things” Will Be in Use in 2017, Up 31 Percent From 2016 (2017). http://www.gartner.com/newsroom/id/3598917
  11. 11.
    Grobe, L., Paraskevopoulos, A.: High-speed visible light communication systems. IEEE Commun. Mag. 51(12), 60–66 (2013)CrossRefGoogle Scholar
  12. 12.
    Kaye, J., Whitley, E.A., Lund, D., Morrison, M., Teare, H., Melham, K.: Dynamic consent: a patient interface for twenty-first century research networks. Eur. J. Hum. Genet. 23(2), 141–146 (2015)CrossRefGoogle Scholar
  13. 13.
    Kim, T.H.J., Bauer, L., Newsome, J., Perrig, A., Walker, J.: Access right assignment mechanisms for secure home networks. J. Commun. Netw. 13(2), 175–186 (2011)CrossRefGoogle Scholar
  14. 14.
    Liu, J., Xiao, Y., Chen, C.P.: Authentication and access control in the Internet of Things. In: Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems Workshops 2012, pp. 588–592 (2012)Google Scholar
  15. 15.
    Mayrhofer, R.: A context authentication proxy for IPSec using spatial reference. In: Proceedings of TwUC 2006: 1st International Workshop on Trustworthy Ubiquitous Computing, pp. 449–462. Austrian Computer Society (OCG), December 2006Google Scholar
  16. 16.
    Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRefGoogle Scholar
  17. 17.
    Vallance, C.: Car hack uses digital-radio broadcasts to seize control (2015). http://www.bbc.com/news/technology-33622298
  18. 18.
    Weiser, M.: The computer for the twenty-first century. Sci. Am. 265, 94–100 (1991)CrossRefGoogle Scholar
  19. 19.
    Yuan, E., Tong, J.: Attributed Based Access Control (ABAC) for web services. In: Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005, pp. 561–569 (2005)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Sebastian Werner
    • 1
    Email author
  • Frank Pallas
    • 1
  • David Bermbach
    • 1
  1. 1.Information Systems Engineering Research GroupTechnische Universität BerlinBerlinGermany

Personalised recommendations