A. A. E. Kalam, Aissam Outchakoucht, Hamza Es-Samaali
{"title":"Emergence-Based Access Control: New Approach to Secure the Internet of Things","authors":"A. A. E. Kalam, Aissam Outchakoucht, Hamza Es-Samaali","doi":"10.1145/3240117.3240136","DOIUrl":null,"url":null,"abstract":"The security is becoming the most important challenge that threatens the development of the internet of things. In this respect, access control is considered as the cornerstone and core element that should be well designed and implemented. However, this mission becomes more complex in IoT environments as they have additional and specific requirements such as heterogeneity, limited capacities of storage and computing as well as the huge number of the devices. Dealing with this issue, this paper proposes an 'emergence based' process aiming to benefit from this tremendous number of smart objects and extract the significant features that we cannot pick up in systems with smallest number. Then, it proposes an access control framework dedicated to IoT environments based on three extremely powerful concepts: Blockchain networks, Reputation systems and Reinforcement Learning algorithms.","PeriodicalId":318568,"journal":{"name":"Proceedings of the 1st International Conference on Digital Tools & Uses Congress","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st International Conference on Digital Tools & Uses Congress","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3240117.3240136","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
The security is becoming the most important challenge that threatens the development of the internet of things. In this respect, access control is considered as the cornerstone and core element that should be well designed and implemented. However, this mission becomes more complex in IoT environments as they have additional and specific requirements such as heterogeneity, limited capacities of storage and computing as well as the huge number of the devices. Dealing with this issue, this paper proposes an 'emergence based' process aiming to benefit from this tremendous number of smart objects and extract the significant features that we cannot pick up in systems with smallest number. Then, it proposes an access control framework dedicated to IoT environments based on three extremely powerful concepts: Blockchain networks, Reputation systems and Reinforcement Learning algorithms.