Atjaunināt sīkdatņu piekrišanu

E-grāmata: Internet of Things and Access Control: Sensing, Monitoring and Controlling Access in IoT-Enabled Healthcare Systems

  • Formāts - EPUB+DRM
  • Cena: 142,16 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book presents the design and development of an access control architecture for the Internet of Things (IoT) systems. It considers the significant authentication and authorization issues for large-scale IoT systems, in particular, the need for access control, identity management, delegation of access rights and the provision of trust within such systems. It introduces a policy-based access control approach for the IoT that provides fine-grained access for authorized users to services while protecting valuable resources from unauthorized access. Further, the book discusses an identity-less, asynchronous and decentralized delegation model for the IoT leveraging the advantage of blockchain technology. It also presents an approach of attribute-based identity and examines the notion of trust in an IoT context by considering the uncertainty that exists in such systems. Fully explaining all the techniques used, the book is of interest to engineers, researchers and scientists working in the field of the wireless sensor networks, IoT systems and their access control management.  
1 Introduction
1(12)
1.1 The Internet of Things
1(2)
1.2 Need for Access Control
3(1)
1.3 Motivation and Use Case Examples
4(2)
1.4 The Aim of the Book
6(2)
1.5 Research Contributions
8(5)
References
10(3)
2 Background and Related Work
13(46)
2.1 The IoT Paradigm
13(4)
2.1.1 Architecture
14(2)
2.1.2 Characteristics
16(1)
2.2 Basics of Access Control
17(10)
2.2.1 Definition
17(2)
2.2.2 Working Principle
19(1)
2.2.3 Mechanisms
20(2)
2.2.4 Language
22(2)
2.2.5 Cryptography
24(3)
2.3 Access Control in the IoT
27(10)
2.3.1 Architecture
27(1)
2.3.2 Requirements
28(1)
2.3.3 Existing Works
29(8)
2.4 Representing Identity
37(3)
2.4.1 Identity Establishment
38(1)
2.4.2 Identity Management Models
39(1)
2.5 Approaches to Delegation
40(3)
2.5.1 Definition
40(1)
2.5.2 Architecture
41(2)
2.6 The Notion of Trust
43(7)
2.6.1 Trust Concept
43(2)
2.6.2 Trust Modeling
45(2)
2.6.3 Mechanisms
47(2)
2.6.4 Category
49(1)
2.7 Summary
50(9)
References
51(8)
3 Developing an IoT Access Control Architecture
59(44)
3.1 Introduction
59(4)
3.1.1 Problem Description
60(2)
3.1.2 Contributions
62(1)
3.2 Background
63(3)
3.2.1 IoT-Enabled Smart Systems
63(1)
3.2.2 Current Limitations
64(2)
3.3 An Example Scenario
66(3)
3.4 Proposed Access Control Architecture
69(17)
3.4.1 Assumptions
69(1)
3.4.2 System Functionality
69(2)
3.4.3 Granting Different Level of Access
71(3)
3.4.4 Overview of the Architectural Components
74(2)
3.4.5 Core Modules of the System
76(2)
3.4.6 A Formal Specification of the Model
78(3)
3.4.7 Capability Structure
81(1)
3.4.8 Capability Instantiation
82(4)
3.5 Different Access Scenarios
86(2)
3.6 System Operation: Symmetric Key Approach
88(4)
3.6.1 Registration
88(2)
3.6.2 Generating a Capability
90(1)
3.6.3 Processing an Access Request
91(1)
3.7 System Operation: Asymmetric Key Approach
92(3)
3.7.1 Registration
92(1)
3.7.2 Generating a Capability
93(1)
3.7.3 Processing an Access Request
94(1)
3.8 Discussion
95(2)
3.9 Summary
97(6)
References
98(5)
4 System Implementation and Evaluation
103(20)
4.1 Introduction
103(3)
4.1.1 Testbed Development
103(2)
4.1.2 Methodology
105(1)
4.2 Results
106(9)
4.2.1 Performance Analysis: Symmetric Key Approach
106(4)
4.2.2 Performance Analysis: Asymmetric Key Approach
110(5)
4.3 Comparison with Existing Approaches
115(1)
4.4 Comparison of Number of Policy Expressions
116(2)
4.5 Adversary Analysis
118(2)
4.6 Summary
120(3)
References
122(1)
5 Modeling and Management of Identity
123(20)
5.1 Introduction
123(2)
5.1.1 Problem Description
123(2)
5.1.2 Contributions
125(1)
5.2 Core Concepts
125(6)
5.2.1 Identity
125(1)
5.2.2 Representation of Identity
126(5)
5.3 An Approach to IoT Identity
131(7)
5.3.1 IoT Identity
131(1)
5.3.2 Requirements and Considerations
132(1)
5.3.3 Our Approach: Things-Centric Identity
133(1)
5.3.4 Use of Attributes
134(1)
5.3.5 A Formal Specification
135(3)
5.4 Use-Case Examples
138(1)
5.5 Summary
139(4)
References
140(3)
6 Delegation of Access Rights
143(34)
6.1 Introduction
143(6)
6.1.1 Problem Description
144(4)
6.1.2 Contributions
148(1)
6.2 Background
149(8)
6.2.1 Core Concepts
149(3)
6.2.2 Blockchain Technology
152(2)
6.2.3 Delegation in IoT Using Blockchain
154(3)
6.3 A Motivating Scenario
157(1)
6.4 Proposed Delegation Architecture
158(7)
6.4.1 Delegation Properties
158(2)
6.4.2 Secure Right Delegation
160(1)
6.4.3 Overview of the Architectural Components
160(2)
6.4.4 Communication Protocol
162(3)
6.5 Implementation
165(3)
6.6 Evaluation
168(2)
6.7 Discussion
170(3)
6.8 Summary
173(4)
References
174(3)
7 Integrating Trust to IoT Access Control
177(24)
7.1 Introduction
177(2)
7.1.1 Problem Description
178(1)
7.1.2 Contributions
178(1)
7.2 Background
179(3)
7.3 Context of the Model
182(4)
7.3.1 Characteristics
182(1)
7.3.2 Preliminaries
183(3)
7.4 Proposed Trust Model
186(5)
7.4.1 Entities
186(1)
7.4.2 Trust Relationship
187(1)
7.4.3 System Operation
188(2)
7.4.4 Summary of Trust Types
190(1)
7.5 Trust Evaluation
191(3)
7.6 Trust Comparison
194(1)
7.7 Use Case Scenarios
195(3)
7.7.1 Scenario 1
195(1)
7.7.2 Scenario 2
196(2)
7.8 Summary
198(3)
References
199(2)
8 Conclusion and Future Work
201
8.1 Conclusion
201(1)
8.2 Research Findings
202(2)
8.3 Open Research Questions and Future Work
204