|
|
1 | (12) |
|
1.1 The Internet of Things |
|
|
1 | (2) |
|
1.2 Need for Access Control |
|
|
3 | (1) |
|
1.3 Motivation and Use Case Examples |
|
|
4 | (2) |
|
|
6 | (2) |
|
1.5 Research Contributions |
|
|
8 | (5) |
|
|
10 | (3) |
|
2 Background and Related Work |
|
|
13 | (46) |
|
|
13 | (4) |
|
|
14 | (2) |
|
|
16 | (1) |
|
2.2 Basics of Access Control |
|
|
17 | (10) |
|
|
17 | (2) |
|
|
19 | (1) |
|
|
20 | (2) |
|
|
22 | (2) |
|
|
24 | (3) |
|
2.3 Access Control in the IoT |
|
|
27 | (10) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (8) |
|
2.4 Representing Identity |
|
|
37 | (3) |
|
2.4.1 Identity Establishment |
|
|
38 | (1) |
|
2.4.2 Identity Management Models |
|
|
39 | (1) |
|
2.5 Approaches to Delegation |
|
|
40 | (3) |
|
|
40 | (1) |
|
|
41 | (2) |
|
|
43 | (7) |
|
|
43 | (2) |
|
|
45 | (2) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (9) |
|
|
51 | (8) |
|
3 Developing an IoT Access Control Architecture |
|
|
59 | (44) |
|
|
59 | (4) |
|
3.1.1 Problem Description |
|
|
60 | (2) |
|
|
62 | (1) |
|
|
63 | (3) |
|
3.2.1 IoT-Enabled Smart Systems |
|
|
63 | (1) |
|
3.2.2 Current Limitations |
|
|
64 | (2) |
|
|
66 | (3) |
|
3.4 Proposed Access Control Architecture |
|
|
69 | (17) |
|
|
69 | (1) |
|
3.4.2 System Functionality |
|
|
69 | (2) |
|
3.4.3 Granting Different Level of Access |
|
|
71 | (3) |
|
3.4.4 Overview of the Architectural Components |
|
|
74 | (2) |
|
3.4.5 Core Modules of the System |
|
|
76 | (2) |
|
3.4.6 A Formal Specification of the Model |
|
|
78 | (3) |
|
3.4.7 Capability Structure |
|
|
81 | (1) |
|
3.4.8 Capability Instantiation |
|
|
82 | (4) |
|
3.5 Different Access Scenarios |
|
|
86 | (2) |
|
3.6 System Operation: Symmetric Key Approach |
|
|
88 | (4) |
|
|
88 | (2) |
|
3.6.2 Generating a Capability |
|
|
90 | (1) |
|
3.6.3 Processing an Access Request |
|
|
91 | (1) |
|
3.7 System Operation: Asymmetric Key Approach |
|
|
92 | (3) |
|
|
92 | (1) |
|
3.7.2 Generating a Capability |
|
|
93 | (1) |
|
3.7.3 Processing an Access Request |
|
|
94 | (1) |
|
|
95 | (2) |
|
|
97 | (6) |
|
|
98 | (5) |
|
4 System Implementation and Evaluation |
|
|
103 | (20) |
|
|
103 | (3) |
|
4.1.1 Testbed Development |
|
|
103 | (2) |
|
|
105 | (1) |
|
|
106 | (9) |
|
4.2.1 Performance Analysis: Symmetric Key Approach |
|
|
106 | (4) |
|
4.2.2 Performance Analysis: Asymmetric Key Approach |
|
|
110 | (5) |
|
4.3 Comparison with Existing Approaches |
|
|
115 | (1) |
|
4.4 Comparison of Number of Policy Expressions |
|
|
116 | (2) |
|
|
118 | (2) |
|
|
120 | (3) |
|
|
122 | (1) |
|
5 Modeling and Management of Identity |
|
|
123 | (20) |
|
|
123 | (2) |
|
5.1.1 Problem Description |
|
|
123 | (2) |
|
|
125 | (1) |
|
|
125 | (6) |
|
|
125 | (1) |
|
5.2.2 Representation of Identity |
|
|
126 | (5) |
|
5.3 An Approach to IoT Identity |
|
|
131 | (7) |
|
|
131 | (1) |
|
5.3.2 Requirements and Considerations |
|
|
132 | (1) |
|
5.3.3 Our Approach: Things-Centric Identity |
|
|
133 | (1) |
|
|
134 | (1) |
|
5.3.5 A Formal Specification |
|
|
135 | (3) |
|
|
138 | (1) |
|
|
139 | (4) |
|
|
140 | (3) |
|
6 Delegation of Access Rights |
|
|
143 | (34) |
|
|
143 | (6) |
|
6.1.1 Problem Description |
|
|
144 | (4) |
|
|
148 | (1) |
|
|
149 | (8) |
|
|
149 | (3) |
|
6.2.2 Blockchain Technology |
|
|
152 | (2) |
|
6.2.3 Delegation in IoT Using Blockchain |
|
|
154 | (3) |
|
6.3 A Motivating Scenario |
|
|
157 | (1) |
|
6.4 Proposed Delegation Architecture |
|
|
158 | (7) |
|
6.4.1 Delegation Properties |
|
|
158 | (2) |
|
6.4.2 Secure Right Delegation |
|
|
160 | (1) |
|
6.4.3 Overview of the Architectural Components |
|
|
160 | (2) |
|
6.4.4 Communication Protocol |
|
|
162 | (3) |
|
|
165 | (3) |
|
|
168 | (2) |
|
|
170 | (3) |
|
|
173 | (4) |
|
|
174 | (3) |
|
7 Integrating Trust to IoT Access Control |
|
|
177 | (24) |
|
|
177 | (2) |
|
7.1.1 Problem Description |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (3) |
|
|
182 | (4) |
|
|
182 | (1) |
|
|
183 | (3) |
|
|
186 | (5) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (2) |
|
7.4.4 Summary of Trust Types |
|
|
190 | (1) |
|
|
191 | (3) |
|
|
194 | (1) |
|
|
195 | (3) |
|
|
195 | (1) |
|
|
196 | (2) |
|
|
198 | (3) |
|
|
199 | (2) |
|
8 Conclusion and Future Work |
|
|
201 | |
|
|
201 | (1) |
|
|
202 | (2) |
|
8.3 Open Research Questions and Future Work |
|
|
204 | |