Policy-aware Distributed and Dynamic Trust based Access Control Scheme for Internet of Things

Main Article Content

Poonam Ninad Railkar
Parikshit Narendra Mahalle
Gitanjali Rahul Shinde
Nilesh P. Sable

Abstract

 The use of smart devices is driving the Internet of Things (IoT) trend today. Day by day IoT helps to support more services like car services, healthcare services, home automation, and security services, weather prediction services, etc, to ease user’s life. Integration of heterogeneous IoT devices and social resources sometimes creates many problems like the privacy of data. To avoid privacy issues, an appropriate access control mechanism is required to check authorized and trusted devices, so that only valid devices can access the data which is only required.  In the sequel, this paper presents implementation of distributed and dynamic trust based access control mechanism (DDTAC) for secure machine to machine communication or distributed IoT environment. Novelty of this mechanism is that, it uses trust calculation and device classification for dynamic access control. The proposed scheme is implemented, tested and deployed on Node MCU and same mechanism is also simulated on NS-2 for large number of nodes. This access control model support Scalability, Heterogeneity, Privacy, Trust, Selective disclosure, Principle of least privileges, and lightweight calculation features. Results of this models proves that it gives good performance as compared to existing scheme in terms of scalability, throughput and delay. As number of devices increase it does not degrade performance. This mechanism is also protected against the Man-in-the-Middle attack, Sniffing attack, Session Hijacking attacks and Injection attacks. It required less time to detect and resist those attacks.

Article Details

How to Cite
Railkar, P. N. ., Mahalle, P. N. ., Shinde, G. R. ., & Sable, N. P. . (2022). Policy-aware Distributed and Dynamic Trust based Access Control Scheme for Internet of Things. International Journal on Recent and Innovation Trends in Computing and Communication, 10(1s), 155–165. https://doi.org/10.17762/ijritcc.v10i1s.5820
Section
Articles

References

Kevin Ashton, “That ‘Internet of Things’ Thing”, RFID Journal, 22 June 2009.

ITU, TELECOMMUNICATION STANDARDIZATION SECTOR OF. “Overview of the Internet of Things.” Recommendation ITU-T Y 2060 (2012): 22.

Thirukkumaran, R., and P. Muthukannan. “TAACS-FL: trust aware access control system using fuzzy logic for internet of things.” International Journal of Internet Technology and Secured Transactions 9, no. 1-2 (2019): 201-220.

Railkar, Poonam N., Parikshit N. Mahalle, and Gitanjali R. Shinde. “Access control schemes for machine to machine communication in IoT: comparative analysis and discussion.” In 2018 IEEE global conference on wireless computing and networking (GCWCN), pp. 59-63. IEEE, 2018.

Qiu, Jing, Zhihong Tian, Chunlai Du, Qi Zuo, Shen Su, and Binxing Fang. “A survey on access control in the age of internet of things.” IEEE Internet of Things Journal 7, no. 6 (2020): 4682-4696.

Railkar, Poonam Ninad, Parikshit Narendra Mahalle, and Gitanjali Rahul Shinde. “Scalable Trust Management model for Machine To Machine communication in Internet of Things using Fuzzy approach.” Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 2483-2495.

Alkhresheh, Ashraf, Khalid Elgazzar, and Hossam S. Hassanein. “DACIoT: Dynamic Access Control Framework for IoT Deployments.” IEEE Internet of Things Journal 7, no. 12 (2020): 11401-11419.

Ding, Sheng, Jin Cao, Chen Li, Kai Fan, and Hui Li. “A novel attribute-based access control scheme using blockchain for IoT.” IEEE Access 7 (2019): 38431-38441.

Zhang, Guoping, and Jiazheng Tian. “An extended role based access control model for the Internet of Things.” In 2010 International Conference on Information, Networking and Automation (ICINA), vol. 1, pp. V1-319. IEEE, 2010.

Jindou, Jia, Qiu Xiaofeng, and Cheng Cheng. “Access control method for web of things based on role and sns.” In 2012 IEEE 12th International Conference on Computer and Information Technology, pp. 316-321. IEEE, 2012.

Ye, Ning, Yan Zhu, Ru-chuan Wang, Reza Malekian, and Qiao-min Lin. “An efficient authentication and access control scheme for perception layer of internet of things.” (2014).

Guoping, Zhang, and Gong Wentao. “The research of access control based on UCON in the internet of things.” Journal of Software 6, no. 4 (2011): 724-731.

Hernández-Ramos, José L., Antonio J. Jara, Leandro Marín, and Antonio F. Skarmeta Gómez. “DCapBAC: embedding authorization logic into smart things through ECC optimizations.” International Journal of Computer Mathematics 93, no. 2 (2016): 345-366.

Mahalle, Parikshit N., Pravin A. Thakre, Neeli Rashmi Prasad, and Ramjee Prasad. “A fuzzy approach to trust based access control in internet of things.” In Wireless VITAE 2013, pp. 1-5. IEEE, 2013.

Almenárez, Florina, Andrés Marín, Celeste Campo, and Carlos García. "TrustAC: Trust-based access control for pervasive devices." In International Conference on Security in Pervasive Computing, pp. 225-238. Springer, Berlin, Heidelberg, 2005.

Parikshit N. Mahalle, Bayu Anggorojati, Neeli R. Prasad and Ramjee Prasad, “Identity driven Capability based Access Control (lCAC) for the Internet of Things,” In 6th IEEE International Conference on Advanced Networks and

Telecommunications Systems (IEEE ANTS 2012). Bangalore – India, December 16-19 2012.

Anggorojati, Bayu, Parikshit Narendra Mahalle, Neeli Rashmi Prasad, and Ramjee Prasad. “Capability-based access control delegation model on the federated IoT network.” In The 15th International Symposium on Wireless Personal Multimedia Communications, pp. 604-608. IEEE, 2012.

Buschsieweke, Marian, and Mesut Güne?. “Securing critical infrastructure in smart cities: Providing scalable access control for constrained devices.” In 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1-6. IEEE, 2017.

Kortesniemi, Yki, Dmitrij Lagutin, Tommi Elo, and Nikos Fotiou. “Improving the privacy of iot with decentralised identifiers (dids).” Journal of Computer Networks and Communications 2019 (2019).

Norton, Duane. "An ettercap primer." SANS Institute InfoSec Reading Room 5 (2004).

https://www.ettercap-project.org/

Anand, Shajina, and Varalakshmi Perumal. "EECDH to prevent MITM attack in cloud computing." Digital Communications and Networks 5, no. 4 (2019): 276-287.