TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things

被引:2
|
作者
Liu, Chunchi [1 ,2 ]
Xu, Minghui [3 ]
Guo, Hechuan [3 ]
Cheng, Xiuzhen [3 ]
Xiao, Yinhao [4 ]
Yu, Dongxiao [3 ]
Gong, Bei [5 ]
Yerukhimovich, Arkady [1 ]
Wang, Shengling [6 ]
Lyu, Weifeng [7 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[2] Ernst & Young, London SE1 2AF, England
[3] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Shandong, Peoples R China
[4] Guangdong Univ Finance & Econ, Sch Informat Sci, Guangzhou 510320, Guangdong Provi, Peoples R China
[5] Beijing Univ Technol, Beijing 100021, Peoples R China
[6] Beijing Normal Univ, Beijing 100875, Peoples R China
[7] Beihang Univ, Beijing 100191, Peoples R China
基金
国家重点研发计划;
关键词
Access control; Program processors; Microcontrollers; Prototypes; User interfaces; Blockchains; Internet of Things; Fine-grained access control; access procedure control; auditability; overprivilege attack; blockchain; trusted execution environment (TEE); IoT; SECURITY;
D O I
10.1109/TMC.2023.3316622
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Overprivilege Attack, a widely reported phenomenon in IoT that accesses unauthorized or excessive resources, is notoriously hard to prevent, trace and mitigate. In this paper, we propose TBAC, a Tokoin-Based Access Control model enabled by blockchain and Trusted Execution Environment (TEE) technologies, to offer fine-grained access control and strong auditability for IoT. TBAC materializes the virtual access power into a definite-amount, secure and accountable cryptographic coin, termed "tokoin" (token+coin), and manages it using atomic and accountable state-transition functions in a blockchain. A tokoin carries a fine-grained policy defined by the resource owner to specify the requirements to be satisfied before an access is granted, and the behavioral constraints that describe the correct procedure to follow during access. The strong-auditability is achieved with blockchain and a TEE-enabled trusted access control object (TACO) to ensure that all access activities are securely monitored and auditable. We prototype TBAC by implementing all its functions with well-studied cryptographic primitives over different blockchain platforms, building a TACO on top of the ARM Cortex-M33 TEE microcontroller, and constructing a user-friendly APP for regular users. A case study is finally presented to demonstrate how TBAC is employed to enable autonomous and secure in-home cargo delivery.
引用
收藏
页码:6133 / 6148
页数:16
相关论文
共 50 条
  • [41] Risk models for trust-based access control (TBAC)
    Dimmock, N
    Bacon, J
    Ingram, D
    Moody, K
    TRUST MANAGEMENT, PROCEEDINGS, 2005, 3477 : 364 - 371
  • [42] A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things
    Ullah, Syed Sajid
    Oleshchuk, Vladimir
    Pussewalage, Harsha S. Gardiyawasam
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 528 - 539
  • [43] Securing Consumer Electronics Device Loops in the Internet of Things Through β Control Access Scheme
    Shingari, Nitinkumar
    Mago, Beenu
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (03) : 5154 - 5166
  • [44] A Novel Access Control Scheme to Construct Fresh Database of Ambient Information in Internet of Things
    Kawamoto, Yuichi
    Nishiyama, Hiroki
    Kato, Nei
    Shimizu, Yoshitaka
    Takahara, Atsushi
    Jiang, Tingting
    2015 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2015, : 914 - 919
  • [45] Privacy data access control of internet of things based on user attributes
    Rongzhi L.
    Yaofeng M.
    International Journal of Reasoning-based Intelligent Systems, 2022, 14 (2-3) : 67 - 72
  • [46] Attribute-Role-Based Hybrid Access Control in the Internet of Things
    Sun, Kaiwen
    Yin, Lihua
    WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 : 333 - 343
  • [47] Blockchain based permission delegation and access control in Internet of Things (BACI)
    Ali, Gauhar
    Ahmad, Naveed
    Cao, Yue
    Asif, Muhammad
    Cruickshank, Haitham
    Ali, Qazi Ejaz
    COMPUTERS & SECURITY, 2019, 86 : 318 - 334
  • [48] Overview of Internet of Medical Things Security Based on Blockchain Access Control
    Liu, Yikai
    Ju, Fenglan
    Zhang, Qunwei
    Zhang, Meng
    Ma, Zezhong
    Li, Mingduo
    Yang, Aimin
    Liu, Fengchun
    JOURNAL OF DATABASE MANAGEMENT, 2023, 34 (03)
  • [49] Survey on Internet of Things Access Control Security
    Liu Q.
    Jin Z.
    Chen C.
    Gao X.
    Zheng N.
    Fang Y.
    Feng Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2190 - 2211
  • [50] Trust and Risk Based on Access Control Model in Social Internet of Things
    Zhang, Hongbin
    Liu, Jian
    Zhao, Dongmei
    Liu, Bin
    Wang, Yanmei
    Fan, Fan
    International Journal of Network Security, 2023, 25 (05) : 736 - 744