Access control approaches for smart cities

Author(s):  
Nuray Baltaci Akhuseyinoglu ◽  
James Joshi
Keyword(s):  
2019 ◽  
Vol 11 (2) ◽  
pp. 503 ◽  
Author(s):  
Min He ◽  
Zheng Guan ◽  
Liyong Bao ◽  
Zhaoxu Zhou ◽  
Marco Anisetti ◽  
...  

In vehicular ad hoc networks (VANETs), one of the important challenges is the lack of precise mathematical modeling taking into account the passive vacation triggered by the zero-arrival state of nodes. Therefore, a polling-based access control is proposed in this paper using a sleeping schema to meet the challenge of quality of service (QoS) and energy-efficient transport in VANET environments for smart cities. Based on IEEE 802.11p, it was developed in an attempt to improve the energy efficiency of the hybrid coordination function of controlled channel access (HCCA) through a self-managing sleeping mechanism for both the roadside unit (RSU) and on-board units (OBUs) or sensor nodes according to the traffic load in vehicle -to-infrastructure (V2I) scenarios. Additionally, a Markov chain was developed for analyzing the proposed mechanism, and the exact mathematical model is provided with regard to the passive vacation. Then, the performance characteristics—including the mean cyclic period, delay, and queue length—were accurately obtained. In addition, the closed-form expression of the quantitative relationship among sleeping time, performance characteristics, and service parameters was obtained, which can easily evaluate the energy efficiency. It was proven that theoretical calculations were completely consistent with simulation results. The simulation results demonstrate that the suggested method had much lower energy consumption than the standard strategy at the expense of rarely access delay.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Runnan Zhang ◽  
Gang Liu ◽  
Shancang Li ◽  
Yongheng Wei ◽  
Quan Wang

Smart cities require new access control models for Internet of Things (IoT) devices that preserve user privacy while guaranteeing scalability and efficiency. Researchers believe that anonymous access can protect the private information even if the private information is not stored in authorization organization. Many attribute-based access control (ABAC) models that support anonymous access expose the attributes of the subject to the authorization organization during the authorization process, which allows the authorization organization to obtain the attributes of the subject and infer the identity of the subject. The ABAC with anonymous access proposed in this paper called ABSAC strengthens the identity-less of ABAC by combining homomorphic attribute-based signatures (HABSs) which does not send the subject attributes to the authorization organization, reducing the risk of subject identity re-identification. It is a secure anonymous access framework. Tests show that the performance of ABSAC implementation is similar to ABAC’s performance.


2017 ◽  
Vol 21 (5) ◽  
pp. 937-947 ◽  
Author(s):  
Kai Fan ◽  
Junxiong Wang ◽  
Xin Wang ◽  
Yintang Yang

2018 ◽  
Vol 2018 ◽  
pp. 1-22 ◽  
Author(s):  
Faouzi Jaïdi ◽  
Faten Labbene Ayachi ◽  
Adel Bouhoula

Substantial advances in Information and Communication Technologies (ICT) bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things,edge-fog-social-cloudcomputing, and big data analytics) is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare) and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our systemSVIRVROthat allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.


Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 553 ◽  
Author(s):  
Luca Leonardi ◽  
Lucia Lo Bello ◽  
Filippo Battaglia ◽  
Gaetano Patti

Low-Power Wide-Area Networks (LPWANs) are emerging as appealing solutions for several Internet of Things (IoT) applications, such as healthcare, smart cities and Industry 4.0, thanks to their ease of deployment, low energy consumption and large coverage range. LoRaWAN is one of the most successful LPWAN standards, as it supports robust long-distance communications using low-cost devices. To comply with the ETSI regulations, LoRaWAN can adopt as medium access control (MAC) layer either a pure ALOHA approach with duty-cycle limitations or a polite spectrum access technique, such as Listen Before Talk (LBT). The two approaches have their pros and cons that need to be carefully evaluated. The studies in the literature that so far have addressed an evaluation of MAC protocols for LoRaWAN refer to a previous and now obsolete version of the ETSI regulations, therefore they do not take into account the current limits on the timing parameters for polite spectrum access, such as that maximum time an end-node is allowed to be transmitting per hour. For this reason, the contribution of this work is two-fold. First, the paper discusses the restrictions that the current ETSI regulations impose on some timing parameters of the two kinds of MAC protocols for LoRaWAN. Second, the paper provides comparative performance assessments of the two protocols through simulations in realistic scenarios under different workload conditions.


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4253
Author(s):  
Rubina Ghazal ◽  
Ahmad Kamran Malik ◽  
Basit Raza ◽  
Nauman Qadeer ◽  
Nafees Qamar ◽  
...  

Significance and popularity of Role-Based Access Control (RBAC) is inevitable; however, its application is highly challenging in multi-domain collaborative smart city environments. The reason is its limitations in adapting the dynamically changing information of users, tasks, access policies and resources in such applications. It also does not incorporate semantically meaningful business roles, which could have a diverse impact upon access decisions in such multi-domain collaborative business environments. We propose an Intelligent Role-based Access Control (I-RBAC) model that uses intelligent software agents for achieving intelligent access control in such highly dynamic multi-domain environments. The novelty of this model lies in using a core I-RBAC ontology that is developed using real-world semantic business roles as occupational roles provided by Standard Occupational Classification (SOC), USA. It contains around 1400 business roles, from nearly all domains, along with their detailed task descriptions as well as hierarchical relationships among them. The semantic role mining process is performed through intelligent agents that use word embedding and a bidirectional LSTM deep neural network for automated population of organizational ontology from its unstructured text policy and, subsequently, matching this ontology with core I-RBAC ontology to extract unified business roles. The experimentation was performed on a large number of collaboration case scenarios of five multi-domain organizations and promising results were obtained regarding the accuracy of automatically derived RDF triples (Subject, Predicate, Object) from organizational text policies as well as the accuracy of extracted semantically meaningful roles.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5264
Author(s):  
Fariza Sabrina ◽  
Julian Jang-Jaccard

Smart cities use the Internet of Things (IoT) devices such as connected sensors, lights, and meters to collect and analyze data to improve infrastructure, public utilities, and services. However, the true potential of smart cities cannot be leveraged without addressing many security concerns. In particular, there is a significant challenge for provisioning a reliable access control solution to share IoT data among various users across organizations. We present a novel entitlement-based blockchain-enabled access control architecture that can be used for smart cities (and for any ap-plication domains that require large-scale IoT deployments). Our proposed entitlement-based access control model is flexible as it facilitates a resource owner to safely delegate access rights to any entities beyond the trust boundary of an organization. The detailed design and implementation on Ethereum blockchain along with a qualitative evaluation of the security and access control aspects of the proposed scheme are presented in the paper. The experimental results from private Ethereum test networks demonstrate that our proposal can be easily implemented with low latency. This validates that our proposal is applicable to use in the real world IoT environments.


Sign in / Sign up

Export Citation Format

Share Document