Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.2.439

Design and Implementation of The Capability Token based Access Control System in the Internet of Things  

Lee, Bum-Ki (Mokpo National University)
Kim, Mi-Sun (Mokpo National University)
Seo, Jae-Hyun (Mokpo National University)
Abstract
IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.
Keywords
Internet of Things; Access Control; Capability Token; ACL; CL;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Rolf H. Weber,"Internet of Things-New security and privacy challenges," Computer Law & Security Review, Volume 26, Issue 1, pp. 23-30, Jan. 2010.   DOI   ScienceOn
2 S. Gusmeroli, S. Piccione, and D. Rotondi, "IoT access control issues: a capability based approach," IMIS-2012, pp.787-792, July 2012.
3 Gi-hyen Kim, Access Control Technology Overview, Korea Information Security Agency, June 2011.
4 L.J.Janczewski and A.M.Colarik, Cyber Warfare and Cyber Terrorism, IGI Global, Hershey,PA, pp.318-326, Sept. 2008.
5 Pierangela Samarati, Sabrina de Capitani di Vimercati, "Access Control: Policies, Models, and Mechanisms, Foundations of Security Analysis and Design," FOSAD 2000, LNCS 2171, pp.137-196, 2001.
6 C.P.Pfleeger, Security in Computing, Prentice-Hall, Inc., New Jersey, 1997.
7 Ministry of Public Administration and Security Department of personal information protection, A homepage privacy exposure protect guide-line, July 2012.
8 Sergio Gusmeroli, Salvatore Piccione, and Domenico Rotondi, "A capability-based security approach to manage access control in the Internet of Things," Mathematical and Computer Modelling 58, pp.1189-1205, Sept. 2013.   DOI
9 M. Miller, Ka-Ping Yee, and J. Shapiro, "Capability Myths Demolished," Tech.Report SRL 2003-02, Johns Hopkins University, 2003.
10 L. Fang, D. Gannon, and F. Siebenlist, "XPOLA-an extensible capability based authorization infrastructure for grids," 4th Annual PKI R&D Workshop, pp. 30-40, Apr. 2005.