TY - GEN
T1 - A Fine-Grained Cross-Domain Access Control Mechanism for Social Internet of Things
AU - Wu, Jun
AU - Dong, Mianxiong
AU - Ota, Kaoru
AU - Li, Jianhua
AU - Pei, Bei
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014
Y1 - 2014
N2 - The integration of Internet of Things (IoT) and social networks is the important trend of new network technologies, which is Social Internet of Tings (SIoT). In many application scenarios, SIoT are controlled by different authorities. And the network nodes belong to different domain can share the sensor data by standard protocols. Moreover, in a mission-critical application scenario various types of data generate by all kinks of the nodes of SIoT may belong to different security levels, and thus are meant to be accessed only by selected types of users. Therefore, a fine-grained cross-domain access is the core problem for it. To address this, this paper focus on the fine-grained cross-domain access control mechanism of SIoT, which including trust model for certificate authority, user login protocol, cross-domain secure authentication protocol, and cross-domain fine-grained access control. The simulation results show the feasibility and effectiveness of the proposed scheme, which provide strong support for integrating IoT and social networks securely.
AB - The integration of Internet of Things (IoT) and social networks is the important trend of new network technologies, which is Social Internet of Tings (SIoT). In many application scenarios, SIoT are controlled by different authorities. And the network nodes belong to different domain can share the sensor data by standard protocols. Moreover, in a mission-critical application scenario various types of data generate by all kinks of the nodes of SIoT may belong to different security levels, and thus are meant to be accessed only by selected types of users. Therefore, a fine-grained cross-domain access is the core problem for it. To address this, this paper focus on the fine-grained cross-domain access control mechanism of SIoT, which including trust model for certificate authority, user login protocol, cross-domain secure authentication protocol, and cross-domain fine-grained access control. The simulation results show the feasibility and effectiveness of the proposed scheme, which provide strong support for integrating IoT and social networks securely.
KW - Access control
KW - Cross-domain
KW - Fine-grained
KW - Security
KW - Social Internet of Things (SIoT)
UR - http://www.scopus.com/inward/record.url?scp=84949548151&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84949548151&partnerID=8YFLogxK
U2 - 10.1109/UIC-ATC-ScalCom.2014.140
DO - 10.1109/UIC-ATC-ScalCom.2014.140
M3 - Conference contribution
AN - SCOPUS:84949548151
T3 - Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014
SP - 666
EP - 671
BT - Proceedings - 2014 IEEE International Conference on Ubiquitous Intelligence and Computing, 2014 IEEE International Conference on Autonomic and Trusted Computing, 2014 IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014
A2 - Zheng, Yu
A2 - Thulasiraman, Parimala
A2 - Apduhan, Bernady O.
A2 - Nakamoto, Yukikazu
A2 - Ning, Huansheng
A2 - Sun, Yuqing
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 11th IEEE International Conference on Ubiquitous Intelligence and Computing and 11th IEEE International Conference on Autonomic and Trusted Computing and 14th IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014
Y2 - 9 December 2014 through 12 December 2014
ER -