TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things

被引:2
|
作者
Liu, Chunchi [1 ,2 ]
Xu, Minghui [3 ]
Guo, Hechuan [3 ]
Cheng, Xiuzhen [3 ]
Xiao, Yinhao [4 ]
Yu, Dongxiao [3 ]
Gong, Bei [5 ]
Yerukhimovich, Arkady [1 ]
Wang, Shengling [6 ]
Lyu, Weifeng [7 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[2] Ernst & Young, London SE1 2AF, England
[3] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Shandong, Peoples R China
[4] Guangdong Univ Finance & Econ, Sch Informat Sci, Guangzhou 510320, Guangdong Provi, Peoples R China
[5] Beijing Univ Technol, Beijing 100021, Peoples R China
[6] Beijing Normal Univ, Beijing 100875, Peoples R China
[7] Beihang Univ, Beijing 100191, Peoples R China
基金
国家重点研发计划;
关键词
Access control; Program processors; Microcontrollers; Prototypes; User interfaces; Blockchains; Internet of Things; Fine-grained access control; access procedure control; auditability; overprivilege attack; blockchain; trusted execution environment (TEE); IoT; SECURITY;
D O I
10.1109/TMC.2023.3316622
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Overprivilege Attack, a widely reported phenomenon in IoT that accesses unauthorized or excessive resources, is notoriously hard to prevent, trace and mitigate. In this paper, we propose TBAC, a Tokoin-Based Access Control model enabled by blockchain and Trusted Execution Environment (TEE) technologies, to offer fine-grained access control and strong auditability for IoT. TBAC materializes the virtual access power into a definite-amount, secure and accountable cryptographic coin, termed "tokoin" (token+coin), and manages it using atomic and accountable state-transition functions in a blockchain. A tokoin carries a fine-grained policy defined by the resource owner to specify the requirements to be satisfied before an access is granted, and the behavioral constraints that describe the correct procedure to follow during access. The strong-auditability is achieved with blockchain and a TEE-enabled trusted access control object (TACO) to ensure that all access activities are securely monitored and auditable. We prototype TBAC by implementing all its functions with well-studied cryptographic primitives over different blockchain platforms, building a TACO on top of the ARM Cortex-M33 TEE microcontroller, and constructing a user-friendly APP for regular users. A case study is finally presented to demonstrate how TBAC is employed to enable autonomous and secure in-home cargo delivery.
引用
收藏
页码:6133 / 6148
页数:16
相关论文
共 50 条
  • [31] Access Control with RFID in the Internet of Things
    Jensen, Steffen Elmstrom Holst
    Jacobsen, Rune Hylsberg
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 554 - 559
  • [32] Smart Contract-Based Access Control for the Internet of Things
    Zhang, Yuanyu
    Kasahara, Shoji
    Shen, Yulong
    Jiang, Xiaohong
    Wan, Jianxiong
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 1594 - 1605
  • [33] A Fuzzy Approach to Trust Based Access Control in Internet of Things
    Mahalle, Parikshit N.
    Thakre, Pravin A.
    Prasad, Neeli Rashmi
    Prasad, Ramjee
    2013 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2013,
  • [34] Situation logic based internet of things access control model
    Guo, S. (guoshuhang@hotmail.com), 1600, Central South University of Technology (44):
  • [35] Machine Learning based Access Control Framework for the Internet of Things
    Outchakoucht, Aissam
    Abou El Kalam, Anas
    Es-Samaali, Hamza
    Benhadou, Siham
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (02) : 331 - 340
  • [36] IOTA-Based Access Control Framework for the Internet of Things
    Nakanishi, Ruka
    Zhang, Yuanyu
    Sasabe, Masahiro
    Kasahara, Shoji
    2020 2ND CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2020, : 87 - 91
  • [37] Research on Trust-Based Access Control in The Internet of Things
    Cheng, Xiao-hui
    Hu, Meng
    Wang, Tong
    Deng, Yun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 283 - 288
  • [38] Blockchain-Based Access Control for the Internet of Things: A Survey
    Abdulrahman, Ebtihal
    Alshehri, Suhair
    Cherif, Asma
    2021 IEEE ASIA-PACIFIC CONFERENCE ON COMPUTER SCIENCE AND DATA ENGINEERING (CSDE), 2021,
  • [39] A scheme of access service recommendation for the Social Internet of Things
    Chen, Zhikui
    Ling, Ruochuan
    Huang, Chung-Ming
    Zhu, Xu
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (04) : 694 - 706
  • [40] RETRACTION: A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications
    Saad, A.
    Shalaby, A.
    Mohamed, A. A.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (10):