Show simple item record

dc.contributor.authorUriarte, Mikel
dc.contributor.authorAstorga Burgo, Jasone
dc.contributor.authorJacob Taquet, Eduardo Juan
dc.contributor.authorHuarte Arrayago, Maider
dc.contributor.authorCarnerero, Manuel
dc.date.accessioned2018-10-29T19:23:24Z
dc.date.available2018-10-29T19:23:24Z
dc.date.issued2018-02-01
dc.identifier.citationIEEE Access 6 :15-46 (2018)es_ES
dc.identifier.issn2169-3536
dc.identifier.urihttp://hdl.handle.net/10810/29345
dc.description.abstractUpcoming smart scenarios enabled by the Internet of Things envision smart objects that expose services that can adapt to user behavior or be managed with the goal of achieving higher productivity, often in multi-stakeholder applications. In such environments, smart things are cheap sensors (and actuators) and, therefore, constrained devices. However, they are also critical components because of the importance of the provided information. Therefore, strong security is a must. Nevertheless, existing feasible approaches do not cope well with the principle of least privilege; they lack both expressiveness and the ability to update the policy to be enforced in the sensors. In this paper, we propose an access control model that comprises a policy language that provides dynamic fine-grained policy enforcement in the sensors based on local context conditions. This dynamic policy cycle requires a secure, efficient, and traceable message exchange protocol. For that purpose, a security protocol called Hidra is also proposed. A security and performance evaluation demonstrates the feasibility and adequacy of the proposed protocol and access control model.es_ES
dc.description.sponsorshipThis work was supported in part by the Training and Research Unit through UPV/EHU under Grant UFI11/16 and in part by the Department of Economic Development and Competitiveness of the Basque Government through the Security Technologies SEKUTEK Collaborative Research Projectes_ES
dc.language.isoenges_ES
dc.publisherIEEEes_ES
dc.rightsinfo:eu-repo/semantics/openAccesses_ES
dc.subjectaccess control modeles_ES
dc.subjectauthorizationes_ES
dc.subjectresource-constrained devicees_ES
dc.subjectexpressive policy languagees_ES
dc.subjectleast privilegees_ES
dc.subjectmessage exchange protocoles_ES
dc.subjectmutual authenticationes_ES
dc.subjectpolicy codificationes_ES
dc.subjectsensores_ES
dc.titleExpressive Policy-Based Access Control for Resource-Constrained Deviceses_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.rights.holder(c) 2017 IEEEes_ES
dc.relation.publisherversionhttps://ieeexplore.ieee.org/document/7990134es_ES
dc.identifier.doi10.1109/ACCESS.2017.2730958
dc.departamentoesIngeniería de comunicacioneses_ES
dc.departamentoeuKomunikazioen ingeniaritzaes_ES


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record