Skip to main content

Attribute-Based Access Control Scheme in Federated IoT Platforms

  • Conference paper
  • First Online:
Interoperability and Open-Source Solutions for the Internet of Things (InterOSS-IoT 2016)

Abstract

The Internet of Things (IoT) introduced the possibility to connect electronic things from everyday life to the Internet, while making them ubiquitously available. With advanced IoT services, based on a trusted federation among heterogeneous IoT platforms, new security problems (including authentication and authorization) emerge. This contribution aims at describing the main facets of the preliminary security architecture envisaged in the context of the symbIoTe project, recently launched by European Commission under the Horizon 2020 EU program. Our approach features distributed and decoupled mechanisms for authentication and authorization services in complex scenarios embracing heterogeneous and federated IoT platforms, by leveraging Attribute Based Access Control and token-based authorization techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.symbiote-h2020.eu.

  2. 2.

    http://www.inter-iot-project.eu.

  3. 3.

    http://biotope.cs.hut.fi.

  4. 4.

    http://iotsecurityconnection.com/posts/security-is-a-must-in-everyiot-device.

  5. 5.

    https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project.

  6. 6.

    http://www.openiot.eu.

  7. 7.

    http://www.smartie-project.eu.

  8. 8.

    https://www.ict-rerum.eu.

  9. 9.

    http://www.compose-project.eu.

  10. 10.

    https://www.fiware.org.

References

  1. Ashton, K.: That Internet of Things thing. RFID J. 22, 97–114 (2009)

    Google Scholar 

  2. Gershenfeld, N., Krikorian, R., Cohen, D.: The Internet-of-Things. Technical report, Scientific American (2004)

    Google Scholar 

  3. Gross, M.: Smart house and home automation technologies. Technical report, Encyclopedia of Housing (1998)

    Google Scholar 

  4. Mohanty, S.P., Choppali, U., Kougianos, E.: Everything you wanted to know about smart cities. IEEE Consum. Electron. Mag. 5(3), 60–70 (2016)

    Article  Google Scholar 

  5. Hu, V., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) definition and considerations. NIST special publication 800-162. NIST, January 2014

    Google Scholar 

  6. Khan, A.: Access control in cloud computing environment. ARPN J. Eng. Appl. Sci. 7(5), 613–615 (2012)

    Google Scholar 

  7. Juniper-Networks: Architecture for secure SCADA and distributed control system networks. Juniper Networks White Paper (2010)

    Google Scholar 

  8. Yan, Z., Zhang, P., Vasilakos, A.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42, 120–134 (2014)

    Article  Google Scholar 

  9. Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  10. Birgisson, A., Gibbs Politz, J., Erlingisson, U., Lentczner, M.: Macaroons: cookies with contextual caveats for decentralized authorization in the cloud. In: Proceedings of the Conference on Network and Distributed System Security Symposium (2014)

    Google Scholar 

  11. Jones, M., Bradley, J., Sakimura, N.: JSON Web Token (JWT). RFC 5719, IETF, May 2015

    Google Scholar 

  12. Seitz, L., Selander, G., Wahlstroem, E., Erdtman, S., Tschofenig, H.: Authorization for the Internet of Things for constrained environments draft-ietf-ace-oauth-authz-04. Internet draft, IETF (2016)

    Google Scholar 

  13. Hennebert, C., et al.: IoT governance. privacy and security issues. Technical report, European Research Cluster on the Internet of Things, January 2015

    Google Scholar 

  14. Hardt, D.: The OAuth 2.0 authorization framework. RFC 6749, IETF, October 2012

    Google Scholar 

  15. Dierks, T., Rescorla, E.: The transport layer security protocol Version 1.1. IETF, April 2006

    Google Scholar 

Download references

Acknowledgments

This work is supported by the H2020 symbIoTe project, which has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 688156. The authors would like to cordially thank the entire symbIoTe consortium for their valuable comments and discussions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Savio Sciancalepore .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Sciancalepore, S. et al. (2017). Attribute-Based Access Control Scheme in Federated IoT Platforms. In: Podnar Žarko, I., Broering, A., Soursos, S., Serrano, M. (eds) Interoperability and Open-Source Solutions for the Internet of Things. InterOSS-IoT 2016. Lecture Notes in Computer Science(), vol 10218. Springer, Cham. https://doi.org/10.1007/978-3-319-56877-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56877-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56876-8

  • Online ISBN: 978-3-319-56877-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics