Access Control Models and Frameworks for the IoT Environment: Review, Challenges, and Future Direction

被引:0
|
作者
Mishra, Rajiv Kumar [1 ]
Yadav, Rajesh K. [1 ]
Nath, Prem [2 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, Delhi, India
[2] HNB Garhwal Univ, Dept Comp Sci & Engn, Srinagar, Uttarakhand, India
关键词
Internet of things; Security; Privacy; Access control; Blockchain; CONTROL SCHEME; INTERNET; BLOCKCHAIN; SECURITY; THINGS; AUTHORIZATION; ARCHITECTURE; LIGHTWEIGHT;
D O I
10.1007/s11277-024-11568-4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid growth of the Internet of Things and the massive growth of sensitive data created by user equipment have headed to resilient demand for additional security and privacy measures. The data produced by the IoT devices are often sensitive & personal, which raises new concerns about security measurement. The development & adoption of IoT and the security aspects of the IoT are not going at the same pace. The future IoT architecture must emphasize enough security concerns and provides adequate measures to prevent devices/data from being accessed by unauthorized means. This work encompasses a comprehensive analysis of frameworks & models of access control for the IoT environment. In this review paper, the analysis of access control solutions is done in four parts: the first part compares various existing review articles with our work, the second part encompasses architecture-based access control mechanisms, the third part comprises access control models, and the fourth part contains few emergent solutions including blockchain-based solutions. Subsequently, prevalent solutions are mapped to vital requirements of the IoT environment. Eventually, security obligations for the IoT environment, probable challenges, and forthcoming research directions are highlighted. This research explores the growing literature on access control for IoT, emphasizing its security requirements.
引用
收藏
页码:1671 / 1701
页数:31
相关论文
共 50 条
  • [1] Decentralising Access Control for IoT Environment
    Savvaidis, Charalampos
    Patsonakis, Christos
    Stavropoulos, Georgios
    Blitsi, Anastasia Kassiani
    Papoutsoglou, Iordanis
    Votis, Konstantinos
    Tzovaras, Dimitrios
    2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,
  • [2] A Review on Blockchain-based Access Control Models in IoT Applications
    Zhang, Yunpeng
    Memariani, Ali
    Bidikar, Nirupam
    2020 IEEE 16TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION (ICCA), 2020, : 671 - 676
  • [3] Applicability of IoT for Smart Agriculture: Challenges & Future Research Direction
    Kaushik, Ila
    Prakash, Nupur
    2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 462 - 467
  • [4] A Review of Internet of Things (IoT) Forensics Frameworks and Models
    Al-Hussaeni, Khalil
    Brits, Jarryd
    Praveen, Meghna
    Yaqoob, Afra
    Karamitsos, Ioannis
    INFORMATION SYSTEMS, EMCIS 2022, 2023, 464 : 515 - 533
  • [5] A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
    Farhadighalati, Nastaran
    Estrada-Jimenez, Luis A.
    Nikghadam-Hojjati, Sanaz
    Barata, Jose
    IEEE ACCESS, 2025, 13 : 17777 - 17806
  • [6] Overview of Device Access Control in the IoT and its Challenges
    Beltran, V
    Skarmeta, A. F.
    IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (01) : 154 - 160
  • [7] IoT Attacks Countermeasures: Systematic Review and Future Research Direction
    Ibibo, Joshua Teddy
    BIG DATA TECHNOLOGIES AND APPLICATIONS, EAI INTERNATIONAL CONFERENCE, BDTA 2023, 2024, 555 : 95 - 111
  • [8] Secure and scalable access control protocol for IoT environment
    Iqbal, Ummer
    Mir, Ajaz Hussain
    INTERNET OF THINGS, 2020, 12
  • [9] Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction
    Istiaque Ahmed, Kazi
    Tahir, Mohammad
    Hadi Habaebi, Mohamed
    Lun Lau, Sian
    Ahad, Abdul
    SENSORS, 2021, 21 (15)
  • [10] SEPD: An Access Control Model for Resource Sharing in an IoT Environment
    Pereira, Henrique G. G.
    Fong, Philip W. L.
    COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 195 - 216