Fuzzy logic with expert judgment to implement an adaptive risk-based access control model for IoT
AffiliationUniversity of Southampton
Menoufia University, Menoufia, Egypt
Security Futures Practice, BT Research & Innovation, Ipswich, UK
MetadataShow full item record
AbstractThe Internet of Things (IoT) is becoming the future of the Internet with a large number of connected devices that are predicted to reach about 50 billion by 2020. With proliferation of IoT devices and need to increase information sharing in IoT applications, risk-based access control model has become the best candidate for both academic and commercial organizations to address access control issues. This model carries out a security risk analysis on the access request by using IoT contextual information to provide access decisions dynamically. This model solves challenges related to flexibility and scalability of the IoT system. Therefore, we propose an adaptive risk-based access control model for the IoT. This model uses real-time contextual information associated with the requesting user to calculate the security risk regarding each access request. It uses user attributes while making the access request, action severity, resource sensitivity and user risk history as inputs to analyze and calculate the risk value to determine the access decision. To detect abnormal and malicious actions, smart contracts are used to track and monitor user activities during the access session to detect and prevent potential security violations. In addition, as the risk estimation process is the essential stage to build a risk-based model, this paper provides a discussion of common risk estimation methods and then proposes the fuzzy inference system with expert judgment as to be the optimal approach to handle risk estimation process of the proposed risk-based model in the IoT system.
CitationAtlam, H.F., Walters, R.J., Wills, G.B. and Daniel, J., (2019). 'Fuzzy logic with expert judgment to implement an adaptive risk-based access control model for IoT'. Mobile Networks and Applications, pp. 1-13.
PublisherSpringer Science and Business Media LLC
JournalMobile Networks and Applications
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by/4.0