Nadine Kashmar, Mehdi Adda, Mirna Atieh, Hussein Ibrahim
{"title":"A New Dynamic Smart-AC Model Methodology to Enforce Access Control Policy in IoT Layers","authors":"Nadine Kashmar, Mehdi Adda, Mirna Atieh, Hussein Ibrahim","doi":"10.1109/SERP4IoT.2019.00011","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) is the conversion of everyday tangible devices or machines to smart objects. This means that these objects would be able to think, sense and feel. For example, your home devices will be able to detect and feel your absence to turn off the lights of empty rooms, close doors, lock the gates, and other tasks. Thus, would it be acceptable to find intruders who might mess up your daily life style or control your home appliances? Absolutely not! The same idea for factories, they definitely reject to detect any unacceptable access from any foreigner to their logical/physical assets or machines who might be able to locally or remotely control, for example, any machine operation. This would cause a significant loss for their reputation or investments, since any vulnerability or attack can produce, for example, fault products. So far, IoT is considered as one of the most essential areas of future technologies, especially for the industries. Hence, finding an environment full of smart devices needs a smart security methodology to prevent any illegal access. In this domain, various researches are conducted to find Access Control (AC) models to enforce security policies that prevent any unauthorized detection of sensitive data and enable secure access of information. For this purpose, we present a new dynamic Smart-AC model methodology to enforce security policy in IoT layers.","PeriodicalId":340042,"journal":{"name":"2019 IEEE/ACM 1st International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE/ACM 1st International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SERP4IoT.2019.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Internet of Things (IoT) is the conversion of everyday tangible devices or machines to smart objects. This means that these objects would be able to think, sense and feel. For example, your home devices will be able to detect and feel your absence to turn off the lights of empty rooms, close doors, lock the gates, and other tasks. Thus, would it be acceptable to find intruders who might mess up your daily life style or control your home appliances? Absolutely not! The same idea for factories, they definitely reject to detect any unacceptable access from any foreigner to their logical/physical assets or machines who might be able to locally or remotely control, for example, any machine operation. This would cause a significant loss for their reputation or investments, since any vulnerability or attack can produce, for example, fault products. So far, IoT is considered as one of the most essential areas of future technologies, especially for the industries. Hence, finding an environment full of smart devices needs a smart security methodology to prevent any illegal access. In this domain, various researches are conducted to find Access Control (AC) models to enforce security policies that prevent any unauthorized detection of sensitive data and enable secure access of information. For this purpose, we present a new dynamic Smart-AC model methodology to enforce security policy in IoT layers.