Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 671038, 15 pages
http://dx.doi.org/10.1155/2014/671038
Research Article

Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

1Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
2Beijing Key Laboratory of IOT Information Security, Beijing 100093, China
3Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China

Received 13 March 2014; Accepted 29 April 2014; Published 6 August 2014

Academic Editor: Fei Yu

Copyright © 2014 Yunchuan Guo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. Chen, “Stuxnet, the real start of cyber warfare?” IEEE Network, vol. 24, no. 6, pp. 2–3, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. R. Sandhu, “The future of access control: attributes, automation, and adaptation,” in Computational Intelligence, Cyber Security and Computational Models, vol. 246 of Advances in Intelligent Systems and Computing, p. 45, Springer, New York, NY, USA, 2014. View at Publisher · View at Google Scholar
  3. J. Park and R. Sandhu, “The UCON ABC usage control model,” ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 128–174, 2004. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Almutairi and F. Siewe, “CA-UCON: a context-aware usage control model,” in Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems (CASEMANS '11), pp. 38–43, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. B. Fang, Y. Guo, and Y. Zhou, “Information content security on the internet: the control model and its evaluation,” Science in China F: Information Sciences, vol. 53, no. 1, pp. 30–49, 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. K. Z. Bijon, K. Ram, and S. Ravi, “Constraints specication in attribute based access control,” Science, vol. 2, no. 3, pp. 131–144, 2013. View at Google Scholar
  7. F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, and C. Cowan, “User-driven access control: rethinking permission granting in modern operating systems,” in Proceedings of the IEEE 33rd Symposium on Security and Privacy (S and P '12), pp. 224–238, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. K. Sun, A. Liu, R. Xu, P. Ning, and D. Maughan, “Securing network access in wireless sensor networks,” in Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec '09), pp. 261–268, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. H.-F. Huang, “A novel access control protocol for secure sensor networks,” Computer Standards and Interfaces, vol. 31, no. 2, pp. 272–276, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. H. F. Huang and K. C. Liu, “A new dynamic access control in wireless sensor networks,” in Proceedings of the IEEE Asia-Pacific Services Computing Conference (APSCC '08), pp. 901–906, December 2008. View at Publisher · View at Google Scholar
  11. G. Zhang and M. Parashar, “Context-aware dynamic access control for pervasive applications,” in Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference, pp. 21–30, 2004.
  12. L. Chen and J. Crampton, “On spatio-temporal constraints and inheritance in role-based access control,” in Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS '08), pp. 205–216, March 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Aich, S. Mondal, S. Sural, and A. K. Majumdar, “Role based access control with spatiotemporal context for mobile applications,” in Transactions on Computational Science IV, vol. 5430 of Lecture Notes in Computer Science, pp. 177–199, Springer, New York, NY, USA, 2009. View at Publisher · View at Google Scholar
  14. M. Toahchoodee and I. Ray, “On the formalization and analysis of a spatio-temporal role-based access control model,” Journal of Computer Security, vol. 19, no. 3, pp. 399–452, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. R. Abdunabi, I. Ray, and R. France, “Specification and analysis of access control policies formobile applications,” IEEE Systems Journal, vol. 7, no. 3, pp. 501–515, 2013. View at Publisher · View at Google Scholar
  16. J. Liu, Y. Xiao, and C. L. P. Chen, “Authentication and access control in the Internet of things,” in Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW '12), pp. 588–592, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. B. Anggorojati, P. N. Mahalle, N. R. Prasad, and R. Prasad, “Capability-based access control delegation model on the federated IoT network,” in Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications (WPMC '12), pp. 604–608, September 2012. View at Scopus
  18. J. Á. M. Naranjo, P. Orduña, A. Gómez-Goiri, D. López-de-Ipiña, and L. G. Casado, “Enabling user access control in energy-constrained wireless smart environments,” Journal of Universal Computer Science, vol. 19, no. 17, pp. 2490–2502, 2013. View at Google Scholar
  19. S. Jha, N. Li, M. Tripunitara, Q. Wang, and W. H. Winsborough, “Toward formal verification of role-based access control policies,” IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 4, pp. 242–255, 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. C. A. Ardagna, S. de Capitani di Vimercati, S. Foresti, T. W. Grandison, S. Jajodia, and P. Samarati, “Access control for smarter healthcare using policy spaces,” Computers and Security, vol. 29, no. 8, pp. 848–858, 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. D. Chen, G. Chang, D. Sun, J. Jia, and X. Wang, “Modeling access control for cyber-physical systems using reputation,” Computers and Electrical Engineering, vol. 38, no. 5, pp. 1088–1101, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Misra and A. Vaish, “Reputation-based role assignment for role-based access control in wireless sensor networks,” Computer Communications, vol. 34, no. 3, pp. 281–294, 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. L. Mui, A. Halberstadt, and M. Mohtashemi, “Notions of reputation in multi-agents systems: a review,” in Proceedings of the 1st International Joint Conference on Autonomous Agents adn Multiagent Systems, pp. 280–287, July 2002. View at Scopus
  24. E. Bertino, P. A. Bonatti, and E. Ferrari, “TRBAC: a temporal role-based access control model,” ACM Transactions on Information and System Security (TISSEC), vol. 4, no. 3, pp. 191–233, 2001. View at Publisher · View at Google Scholar
  25. J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, “A generalized temporal role-based access control model,” IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 1, pp. 4–23, 2005. View at Publisher · View at Google Scholar · View at Scopus
  26. H. Zhang, Y. He, and Z. Shi, “A formal model for access control with supporting spatial context,” Science in China F: Information Sciences, vol. 50, no. 3, pp. 419–439, 2007. View at Publisher · View at Google Scholar · View at Scopus
  27. S. Chong and A. C. Myers, “Security policies for downgrading,” in Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), pp. 198–209, October 2004. View at Scopus
  28. G. Behrmann, A. David, and K. G. Larsen, “A tutorial on uppaal,” in Formal Methods For the Design of Real-Time Systems, vol. 3185 of Lecture Notes in Computer Science, pp. 200–236, 2004. View at Publisher · View at Google Scholar