Skip to main content

Traditional Versus Decentralized Access Control for Internet of Things (IoT): Survey

  • Conference paper
  • First Online:
  • 1607 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1073))

Abstract

Internet of Things concept has started from the stage of early construction and increased with full speed to become a part of the Internet in the future. In our world, there are billions of an internet device has the technical challenges to manage them. Although Internet access management techniques exist, they are using 3rd party or centralized techniques to offer a set of technical constraints to manage them globally. The Block-Chain (BC), a notebook technology, offers a solution to secure trust in decentralized systems, and combines the trust, consistency and use of the shared Ledger in a public network that could be useful for building confidence in Internet objects. However, the use of BC with Internet things by itself involves a lot of challenges and has become a hot topic. Therefore, a methodical review of literature is necessary to know what is the proposed on this subject. This paper discusses a survey of key issues and design factors in IoT security that need to be considered for Access Control (AC) model designers as the IoT security requirements. In addition, we offer a broad survey of modern AC frameworks in IoT object research. We classify the proposed mechanisms into two categories: traditional and decentralized. Besides, we are discussing how the BC can be a key enabling factor for the access management model designed in IoT security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Siddiqa, A., Shah, M.A., Khattak, H.A., Akhunzada, A., Ali, I., Razak, Z.B., Gani, A.: Social internet of vehicles. Complexity, adaptivity, issues and beyond. IEEE Access 6, 62089–62106 (2018)

    Google Scholar 

  2. Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: FairAccess: a new blockchain based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943–5964 (2016)

    Article  Google Scholar 

  3. Webfarmr.eu: XACML 3.0.: enhancements, Nano scales Res. Lett. 6(1), 297 (2011). https://doi.org/10.1186/1556-276x-6-297, http://www.ncbi.nlm.nih.gov/pubmed/21711787

  4. Hardt, D.: The OAuth 2.0 authorization framework (2012). http://tools.ietf.org/html/rfc6749.html

  5. Tschofenig, H., Maler, E., Wahlstroem, E., Erdtman, S.: Authentication and authorization for constrained environments using OAuth and UMA. IETF Internet Draft (2015). draft-maler-ace-oauth-uma-00.txt

    Google Scholar 

  6. Xu, R., Chen, Y., Blasch, E., Chen, G.: A federated capability-based access control mechanism for Internet of Things (IoTs). In: 2017 Sensors and Systems for Space Applications XI, vol. 10641, p. 106410U. International Society for Optics and Photonics, May 2018

    Google Scholar 

  7. Pinno, O.J.A., Gregio, A.R.A., De Bona, L.C.: ControlChain: blockchain as a central enabler for access control authorizations in the IoT. In: GLOBECOM 2017-2017 IEEE Global Communications Conference, December 2017, pp. 1–6. IEEE (2017)

    Google Scholar 

  8. Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)

    Article  Google Scholar 

  9. Otte, P., de Vos, M., Pouwelse, J.: TrustChain: a Sybil-resistant scalable blockchain. Future Gener. Comput. Syst. (2017)

    Google Scholar 

  10. Alphandy, O., Amoretti, M., Claeysy, T., Dall’Asta, S., Duday, A., Ferrari, G., Rousseauy, F., Tourancheauy, B., Veltri, L., Zanichelli, F.: Department of Engineering and Architecture, University of Parma, Italy University of Grenoble Alpes, CNRS, Grenoble INP, LIG, F-38000 Grenoble, France. IoTChain: A BC Security Architecture for the Internet of Things (2018). https://hal.archives-ouvertes.fr/hal-01705455/document

  11. Xu, R., Chen, Y., Blasch, E., Chen, G.: BlendCAC: a blockchain-enabled decentralized capability-based AC for IoTs. arXiv:1804.09267v1 [cs.NI], 24 April 2018. https://arxiv.org/abs/1804.09267, https://doi.org/10.1007/978-3-662-48000-7_29

  12. El-Aziz, A.A., Kannan, A.: A comprehensive presentation to XACML (2013)

    Google Scholar 

  13. Seitz, L., Selander, G., Gehrmann, C.: Authorization framework for the Internet-of-Things. In: 2013 IEEE 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6. IEEE, June 2013

    Google Scholar 

  14. Cantor, S.M., Kemp, I.J., Philpott, N.R., Maler, E.: Assertions and protocols for the oasis security assertion markup language. OASIS Standard, pp. 1–86, March 2005

    Google Scholar 

  15. Hammer-Lahav, E.: The oauth 1.0 protocol (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Saghir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saghir, M., Abu Al Khair, B.A.H., Hamodi, J., Abdullah, N. (2020). Traditional Versus Decentralized Access Control for Internet of Things (IoT): Survey. In: Saeed, F., Mohammed, F., Gazem, N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham. https://doi.org/10.1007/978-3-030-33582-3_46

Download citation

Publish with us

Policies and ethics