A. Saxena, Pradeepkumar Duraisamy, Vikrant S. Kaulgud
{"title":"SMAC: Scalable Access Control in IoT","authors":"A. Saxena, Pradeepkumar Duraisamy, Vikrant S. Kaulgud","doi":"10.1109/CCEM.2015.22","DOIUrl":null,"url":null,"abstract":"We describe a messaging service called Simple Messaging and Access Control (SMAC), which has inbuilt access control features. SMAC extends previous works on capability-based-messaging and applies access policies at the communication layer, thereby eliminating the need for any additional access control at the endpoints. Furthermore, policy administration (revocation, delegation, etc) can be done in a decentralized manner by third parties. Additionally, SMAC prevents unauthorized communication, saving overall bandwidth. Finally, in SMAC, public keys can map to communication channels without any prior setup. This can assist in device discovery and system bootstrap. All these features make SMAC suitable for deploying large-scale IoT systems.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCEM.2015.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
We describe a messaging service called Simple Messaging and Access Control (SMAC), which has inbuilt access control features. SMAC extends previous works on capability-based-messaging and applies access policies at the communication layer, thereby eliminating the need for any additional access control at the endpoints. Furthermore, policy administration (revocation, delegation, etc) can be done in a decentralized manner by third parties. Additionally, SMAC prevents unauthorized communication, saving overall bandwidth. Finally, in SMAC, public keys can map to communication channels without any prior setup. This can assist in device discovery and system bootstrap. All these features make SMAC suitable for deploying large-scale IoT systems.