Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/10326
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Burakgazi Bilgen, Melike | - |
dc.contributor.author | Abul, Osman | - |
dc.contributor.author | Bıçakçı, Kemal | - |
dc.date.accessioned | 2023-04-16T10:00:17Z | - |
dc.date.available | 2023-04-16T10:00:17Z | - |
dc.date.issued | 2023 | - |
dc.identifier.issn | 1615-5262 | - |
dc.identifier.issn | 1615-5270 | - |
dc.identifier.uri | https://doi.org/10.1007/s10207-022-00639-x | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/10326 | - |
dc.description.abstract | Smart home technologies constantly bring significant convenience to our daily lives. Unfortunately, increased security risks accompany this convenience. There can be severe consequences when unauthorized or malicious users gain access to smart home devices. Therefore, dependable and comprehensive access control models are needed to address the security concerns. To this end, the attribute-based access control (ABAC) model is usually considered the most satisfactory access control model for running IoT applications. However, the uncertainty left with the authentication stage should be carried to the authorization policy specification. In this work, we extend the ABAC model by carrying the assurance level of user authentication obtained from biometric authentication systems for authorization. The extended ABAC model quantifies how far the authentication matching score is from the predefined threshold. This quantification serves as a regular attribute like others to define authorization policies. The novelty in this quantification is that it consults false matching rate and hence can easily normalize across wide range of biometric authentication devices and algorithms. As a result, the resulting access control policies are concise and easy to comprehend. Moreover, our model is fine-grained in that different access policies can be specified for each smart device functionality. This work also shows, through case studies, that the extended ABAC model is feasible and implementable in XACML language. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.relation.ispartof | International Journal of Information Security | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Access control | en_US |
dc.subject | Attribute-based access control | en_US |
dc.subject | Internet of Things | en_US |
dc.subject | False matching rate | en_US |
dc.subject | Smart home security | en_US |
dc.subject | Internet | en_US |
dc.subject | Things | en_US |
dc.title | Authentication-Enabled Attribute-Based Access Control for Smart Homes | en_US |
dc.type | Article | en_US |
dc.department | TOBB ETÜ | en_US |
dc.identifier.volume | 22 | en_US |
dc.identifier.issue | 2 | en_US |
dc.identifier.startpage | 479 | en_US |
dc.identifier.endpage | 495 | en_US |
dc.identifier.wos | WOS:000899734700001 | en_US |
dc.identifier.scopus | 2-s2.0-85144146759 | en_US |
dc.institutionauthor | … | - |
dc.identifier.doi | 10.1007/s10207-022-00639-x | - |
dc.authorscopusid | 57222052217 | - |
dc.authorscopusid | 6602597612 | - |
dc.authorscopusid | 6603355557 | - |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | Q1 | - |
item.openairetype | Article | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
WEB OF SCIENCETM
Citations
1
checked on Oct 5, 2024
Page view(s)
108
checked on Dec 23, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.