Journal
IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 5, Pages 3729-3742Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3099089
Keywords
Internet of Things; Privacy; Security; Monitoring; Temperature sensors; Smart manufacturing; Computer architecture; Anonymous credentials; credential delegation; credential revocation; Internet of Things (IoT); IoT service chain; security and privacy
Categories
Funding
- Mid-Career Institute Research and Development Award (IRDA) from IIT Madras (2017-2020)
- DST Grant from the Government of India (2017-2020) [EMR/2016/003016]
Ask authors/readers for more resources
This article presents an approach for providing privacy-preserving access control in IoT systems. It proposes an anonymous delegated credential-based system architecture to protect the requester's identity, and explores options for implementing the architecture on resource-full and resource-constrained services. A prototype implementation using Linux-based containers is demonstrated, showing the feasibility of the architecture for practical use in large-scale IoT systems.
This article deals with providing privacy-preserving access control in Internet of Things (IoT) systems. Here, a user/IoT device requests access to services provided by other IoT devices and multiple requests are combined to a request-specific service chain. An anonymous delegated credential-based system architecture is proposed, where the requester's identity is not exposed to the services. The article presents the proposed architecture's various components including the security aspects. Various options for implementing the architecture on resource-full and resource-constrained services are presented. A prototype of the proposed architecture is then implemented using Linux-based containers to emulate the services. Two representative systems, namely, a small-scale home automation system using a short service chain and a large-scale industrial automation system using a long service chain are considered. Timing measurements from the implementation are presented to demonstrate that the architecture is feasible and can be adapted for practical use in large-scale IoT systems.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available