TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things

被引:2
|
作者
Liu, Chunchi [1 ,2 ]
Xu, Minghui [3 ]
Guo, Hechuan [3 ]
Cheng, Xiuzhen [3 ]
Xiao, Yinhao [4 ]
Yu, Dongxiao [3 ]
Gong, Bei [5 ]
Yerukhimovich, Arkady [1 ]
Wang, Shengling [6 ]
Lyu, Weifeng [7 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[2] Ernst & Young, London SE1 2AF, England
[3] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Shandong, Peoples R China
[4] Guangdong Univ Finance & Econ, Sch Informat Sci, Guangzhou 510320, Guangdong Provi, Peoples R China
[5] Beijing Univ Technol, Beijing 100021, Peoples R China
[6] Beijing Normal Univ, Beijing 100875, Peoples R China
[7] Beihang Univ, Beijing 100191, Peoples R China
基金
国家重点研发计划;
关键词
Access control; Program processors; Microcontrollers; Prototypes; User interfaces; Blockchains; Internet of Things; Fine-grained access control; access procedure control; auditability; overprivilege attack; blockchain; trusted execution environment (TEE); IoT; SECURITY;
D O I
10.1109/TMC.2023.3316622
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Overprivilege Attack, a widely reported phenomenon in IoT that accesses unauthorized or excessive resources, is notoriously hard to prevent, trace and mitigate. In this paper, we propose TBAC, a Tokoin-Based Access Control model enabled by blockchain and Trusted Execution Environment (TEE) technologies, to offer fine-grained access control and strong auditability for IoT. TBAC materializes the virtual access power into a definite-amount, secure and accountable cryptographic coin, termed "tokoin" (token+coin), and manages it using atomic and accountable state-transition functions in a blockchain. A tokoin carries a fine-grained policy defined by the resource owner to specify the requirements to be satisfied before an access is granted, and the behavioral constraints that describe the correct procedure to follow during access. The strong-auditability is achieved with blockchain and a TEE-enabled trusted access control object (TACO) to ensure that all access activities are securely monitored and auditable. We prototype TBAC by implementing all its functions with well-studied cryptographic primitives over different blockchain platforms, building a TACO on top of the ARM Cortex-M33 TEE microcontroller, and constructing a user-friendly APP for regular users. A case study is finally presented to demonstrate how TBAC is employed to enable autonomous and secure in-home cargo delivery.
引用
收藏
页码:6133 / 6148
页数:16
相关论文
共 50 条
  • [21] A provably secure identity-based access control scheme for renewable energy Internet of Things
    Zhang, Jiyu
    Wu, Kehe
    Tian, Zheng
    Sun, Yizhen
    Wu, Yuxi
    Guo, Yaodong
    ENERGY, 2024, 313
  • [22] A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things
    Hao, Xiaohan
    Ren, Wei
    Fei, Yangyang
    Zhu, Tianqing
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) : 773 - 786
  • [23] An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things
    Yi, Meng
    Chen, Qingkui
    Xiong, Neal N.
    SENSORS, 2016, 16 (11)
  • [24] A survey on Blockchain based access control for Internet of Things
    Riabi, Imen
    Ben Ayed, Hella Kaffel
    Saidane, Leila Azzouz
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 502 - 507
  • [25] A lightweight access management scheme for the internet of things based smart applications
    Saad, Aldosary
    Shalaby, Ahmed
    Mohamed, Abdallah Abdulghaffar
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (10):
  • [26] SAC-FIIoT: Secure Access Control Scheme for Fog-Based Industrial Internet of Things
    Wazid, Mohammad
    Obaidat, Mohammad S.
    Das, Ashok Kumar
    Vijayakumar, Pandi
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [27] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [28] Access control in Internet of Things: A survey
    Trabelsi, Rahma
    Fersi, Ghofrane
    Jmaiel, Mohamed
    COMPUTERS & SECURITY, 2023, 135
  • [29] Situational Access Control in the Internet of Things
    Schuster, Roei
    Shmatikov, Vitaly
    Tromer, Eran
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1056 - 1073
  • [30] Internet of things' authentication and access control
    Liu, Jing
    Xiao, Yang
    Chen, C.L. Philip
    International Journal of Security and Networks, 2012, 7 (04) : 228 - 241