Attribute-Based Access Control Scheme in Federated IoT Platforms

  title={Attribute-Based Access Control Scheme in Federated IoT Platforms},
  author={Savio Sciancalepore and Michal Pilc and Svenja Schr{\"o}der and Giuseppe Bianchi and Gennaro Boggia and Marek Pawlowski and Giuseppe Piro and Marcin Pl{\'o}ciennik and Hannes Weisgrab},
The Internet of Things (IoT) introduced the possibility to connect electronic things from everyday life to the Internet, while making them ubiquitously available. With advanced IoT services, based on a trusted federation among heterogeneous IoT platforms, new security problems (including authentication and authorization) emerge. This contribution aims at describing the main facets of the preliminary security architecture envisaged in the context of the symbIoTe project, recently launched by… 

Multi-Domain Access Rights Composition in Federated IoT Platforms

The work presented herein aims at solve the access control issue through a novel solution based on the Attribute Based Access Control logic, which leverages the Decentralized Multi-Authority - Ciphertext-Policy - Attribut Based Encryption algorithm, in a way that is completely different with respect to its conventional usage.

An Attribute-Based Collaborative Access Control Scheme Using Blockchain for IoT Devices

An attribute-based access control scheme that provides decentralized, flexible, and fine-grained authorization for IoT devices and a verifiable collaboration mechanism is designed to meet the needs of controlled access authorization in emergencies.

Dynamic Access Control Framework for Internet of Things

This research introduces a holistic and dynamic access control framework for IoT environments that consists of an automatic and context-aware policy specification method, continuous policy enforcement mechanism and an adaptive policy adjustment technique.

Brokering Policies and Execution Monitors for IoT Middleware

This work proposes to extend the modular event-based system architecture of Fiege et al., to incorporate brokering policies and execution monitors, in order to address the three protection challenges mentioned above.

Access Controls for IoT Networks

This paper defines a highly expressive attribute-based access control (ABAC) security model for the MQTT protocol that allows to regulate not only publications and subscriptions, but also distribution of messages to subscribers.

A Security Model for IoT Networks

This paper defines a highly expressive ABAC (Attribute-Based Access Control) security model for the MQTT protocol that allows to regulate not only publications and subscriptions but also distribution of messages to subscribers.

Collaboration Mechanisms for IoT Platform Federations Fostering Organizational Interoperability

This paper presents the interoperability approach pursued by the project symbIoTe that implements a flexible interoperability framework, and put forward its solution for organizational interoperability offering decentralized and secure interworking between IoT platforms–-IoT-platform federations.

On the Design of a Decentralized and Multiauthority Access Control Scheme in Federated and Cloud-Assisted Cyber-Physical Systems

The proposed design approach is able to address several security issues characterizing the emerging use cases in this context, including the decoupling between authentication and authorization, fine-grained, offline, and time-limited authorization, protection against collusion attacks, access rights revocation, and user privacy.

Enhanced dynamic team access control for collaborative Internet of Things using context

The enhanced dynamic team access control (EDTMAC) model introduces a formal theoretical model which relies on the top of the role‐based access control model and is flexible and scalable, user‐driven, reliable, and secure against unauthorized access requests.



A survey on trust management for Internet of Things

The OAuth 2.0 Authorization Framework

The OAuth 2.0 authorization framework replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.


This paper discusses various features of attribute based access control mechanism, suitable for cloud computing environment, and leads to the design of attribute Based Access Control mechanism for cloud Computing.

Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud

It is considered how macaroons can enable more fine-grained authorization in the Cloud, e.g., by strengthening mechanisms like OAuth2 [17], and a formalization ofmacaroons is given in authorization logic.

Everything you wanted to know about smart cities: The Internet of things is the backbone

  • S. Mohanty
  • Computer Science
    IEEE Consumer Electronics Magazine
  • 2016
A smart sustainable city is an innovative city that uses information and communication technologies and other means to improve quality of life, efficiency of urban operations and services, and competitiveness, while ensuring that it meets the needs of present and future generations.

The Transport Layer Security (TLS) Protocol Version 1.1

This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol, which provides communications security over the Internet by allowing client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

Guide to Attribute Based Access Control (ABAC) Definition and Considerations

This document provides Federal agencies with a definition of attribute based access control (ABAC) and considerations for using ABAC to improve information sharing within organizations and between organizations while maintaining control of that information.

That ‘Internet of Things’ Thing

Jun 22, 2009—I could be wrong, but I'm fairly sure the phrase "Internet of Things" started life as the title of a presentation I made at Procter & Gamble (P&G) in 1999. Linking the new idea of RFID

The Internet of things.

A ski binding comprises a base and a jaw pivotally mounted on the base for engaging a ski boot and the ski binding is provided with an indicator mechanism to indicate the break away force for which the binding is set.