Rethinking Access Control and Authentication for the Home Internet of Things (IoT)

被引:0
|
作者
He, Weijia [1 ]
Golla, Maximilian [2 ]
Padhi, Roshni [1 ]
Ofek, Jordan [1 ]
Duermuth, Markus [2 ]
Fernandes, Earlence [3 ]
Ur, Blase [1 ]
机构
[1] Univ Chicago, Chicago, IL 60637 USA
[2] Ruhr Univ Bochum, Bochum, Germany
[3] Univ Washington, Seattle, WA 98195 USA
基金
美国国家科学基金会;
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which multiple users with complex social relationships interact with a single device. Currently deployed techniques fail to provide usable access-control specification or authentication in such settings. In this paper, we begin reenvisioning access control and authentication for the home IoT. We propose that access control focus on IoT capabilities (i.e., certain actions that devices can perform), rather than on a per-device granularity. In a 425-participant online user study, we find stark differences in participants' desired access-control policies for different capabilities within a single device, as well as based on who is trying to use that capability. From these desired policies, we identify likely candidates for default policies. We also pinpoint necessary primitives for specifying more complex, yet desired, access-control policies. These primitives range from the time of day to the current location of users. Finally, we discuss the degree to which different authentication methods potentially support desired policies.
引用
收藏
页码:255 / 272
页数:18
相关论文
共 50 条
  • [1] Internet of things' authentication and access control
    Liu, Jing
    Xiao, Yang
    Chen, C.L. Philip
    [J]. International Journal of Security and Networks, 2012, 7 (04) : 228 - 241
  • [2] Secure and Efficient CoAP Based Authentication and Access Control for Internet of Things (IoT)
    Tamboli, Mohsin B.
    Ambawade, Dayanand D.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1245 - 1250
  • [3] Security analysis and improvements of authentication and access control in the internet of things
    Ndibanje, Bruce
    Lee, Hoon-Jae
    Lee, Sang-Gon
    [J]. Sensors (Switzerland), 2014, 14 (08): : 14786 - 14805
  • [4] Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
    Ndibanje, Bruce
    Lee, Hoon-Jae
    Lee, Sang-Gon
    [J]. SENSORS, 2014, 14 (08): : 14786 - 14805
  • [5] Authentication, Authorization, Access Control, and Key Exchange in Internet of Things
    Simsek, Irfan
    [J]. ACM TRANSACTIONS ON INTERNET OF THINGS, 2024, 5 (02):
  • [6] Authentication and Context Awareness Access Control in Internet of Things: A Review
    Kaur, Amritpal
    Isha
    Rai, Gaurav
    Malik, Arun
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 630 - 635
  • [7] Taxonomy of Authentication Techniques in Internet of Things (IoT)
    El-hajj, Mohammed
    Chamoun, Maroun
    Fadlallah, Ahmad
    Serhrouchni, Ahmed
    [J]. PROCEEDINGS OF THE 2017 IEEE 15TH STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED), 2017, : 67 - 71
  • [8] A Survey of Internet of Things (IoT) Authentication Schemes
    El-hajj, Mohammed
    Fadlallah, Ahmad
    Chamoun, Maroun
    Serhrouchni, Ahmed
    [J]. SENSORS, 2019, 19 (05)
  • [9] Analysis of Authentication Techniques in Internet of Things (IoT)
    El-hajj, Mohammed
    Chamoun, Maroun
    Fadlallah, Ahmad
    Serhrouchni, Ahmed
    [J]. 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [10] Home Telehealth by Internet of Things (IoT)
    Al-Majeed, Salah S.
    Al-Mejibli, Intisar S.
    Karam, Jalal
    [J]. 2015 IEEE 28TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2015, : 609 - 613