- مبلغ: ۸۶,۰۰۰ تومان
- مبلغ: ۹۱,۰۰۰ تومان
In this paper, an extensive state of the art review of different access control solutions in IoT within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An analysis of the security and privacy requirements for the most dominant IoT application domains, including Personal and home, Government and utilities, and Enterprise and industry, is conducted. The pros and cons of traditional, as well as recent access control models and protocols from an IoT perspective are highlighted. Furthermore, a qualitative and a quantitative evaluation of the most relevant IoT related-projects that represent the majority of research and commercial solutions proposed in the field of access control conducted over the recent years (2011- 2016) is achieved. Finally, potential challenges and future research directions are defined.
Recently, many efforts have overcome many of the technological requirements for the integration of smart objects into the current Internet. However, IoT paradigm has still to face hard challenges related to the application of security and access control mechanisms over constrained environments. In this survey, we have established a taxonomy of IoT domain applications, ranging from big industries such as smart grid, to personal and everyday appliance such as smart homes. Furthermore, an OM-AM analysis of authorization process in IoT was provided. We have also extracted the pros and cons of existing access control solutions from an IoT perspective and their usability in the IoT domain applications already defined. We evaluated related literature in both quantitative and qualitative ways based on main IoT security requirements. This evaluation is highlighted with graph that shows in a very representative way how each model meets each requirement. On the light of our evaluation, we identified the main challenges of applying access control mechanisms to IoT and argued that commonly used Internet protocols cannot in every case be applied to constrained environments. We also discussed the main advantages and drawbacks of adopting a distributed or centralized access control management in IoT. Finally, based on latest innovations in IoT field, we have dressed the main future directions of security and particularly those of access control in IoT. Future work consists in implementing a privacy-preserving access control framework based on the presented OM-AM reference model in order to conceive an adequate access control framework for IoT.