University of Hertfordshire

By the same authors

Known unknowns: Indeterminacy in authentication in IoT

Research output: Contribution to journalArticlepeer-review

Standard

Known unknowns: Indeterminacy in authentication in IoT. / Heydari, Mohammad; Mylonas, Alexios; Tafreshi, Vahid Heydari Fami; Benkhelifa, Elhadj; Singh, Surjit.

In: Future Generation Computer Systems, Vol. 111, 01.10.2020, p. 278-287.

Research output: Contribution to journalArticlepeer-review

Harvard

APA

Vancouver

Author

Heydari, Mohammad ; Mylonas, Alexios ; Tafreshi, Vahid Heydari Fami ; Benkhelifa, Elhadj ; Singh, Surjit. / Known unknowns: Indeterminacy in authentication in IoT. In: Future Generation Computer Systems. 2020 ; Vol. 111. pp. 278-287.

Bibtex

@article{fbbad6f85fda4420861cfc5af5882f08,
title = "Known unknowns: Indeterminacy in authentication in IoT",
abstract = "The Internet of Things (IoT), comprising a plethora of heterogeneous devices, is an enabling technology that can improve the quality of our daily lives, for instance by measuring parameters from the environment (e.g., humidity, temperature, weather, energy consumption, traffic, and others) or our bodies (e.g., health data). However, as with any technology, IoT has introduced a number of security and privacy challenges. Indeed, IoT devices create, process, transfer and store data, which are often sensitive, and which must be protected from unauthorized access. Similarly, the infrastructure that links with IoT, as well as the IoT devices themselves, is an asset that needs to be protected. The focus of this work is examining authentication in IoT. In particular, in this work we conducted a state-of-the-art review of the access control models that have been proposed, including both traditional access control models and emerging models that have recently been proposed and are tailored for IoT. We identified that the existing models cannot cope with indeterminacy, an inherent characteristic of IoT, which hinders authentication decisions. In this context, we studied the two known components of indeterminacy, i.e., uncertainty and ambiguity, and proposed a new model that handles indeterminacy in authentication in IoT environments.",
keywords = "Access control, Ambiguity, Authentication, Internet of Things, Uncertainty",
author = "Mohammad Heydari and Alexios Mylonas and Tafreshi, {Vahid Heydari Fami} and Elhadj Benkhelifa and Surjit Singh",
year = "2020",
month = oct,
day = "1",
doi = "10.1016/j.future.2020.03.005",
language = "English",
volume = "111",
pages = "278--287",
journal = "Future Generation Computer Systems",
issn = "0167-739X",
publisher = "Elsevier",

}

RIS

TY - JOUR

T1 - Known unknowns: Indeterminacy in authentication in IoT

AU - Heydari, Mohammad

AU - Mylonas, Alexios

AU - Tafreshi, Vahid Heydari Fami

AU - Benkhelifa, Elhadj

AU - Singh, Surjit

PY - 2020/10/1

Y1 - 2020/10/1

N2 - The Internet of Things (IoT), comprising a plethora of heterogeneous devices, is an enabling technology that can improve the quality of our daily lives, for instance by measuring parameters from the environment (e.g., humidity, temperature, weather, energy consumption, traffic, and others) or our bodies (e.g., health data). However, as with any technology, IoT has introduced a number of security and privacy challenges. Indeed, IoT devices create, process, transfer and store data, which are often sensitive, and which must be protected from unauthorized access. Similarly, the infrastructure that links with IoT, as well as the IoT devices themselves, is an asset that needs to be protected. The focus of this work is examining authentication in IoT. In particular, in this work we conducted a state-of-the-art review of the access control models that have been proposed, including both traditional access control models and emerging models that have recently been proposed and are tailored for IoT. We identified that the existing models cannot cope with indeterminacy, an inherent characteristic of IoT, which hinders authentication decisions. In this context, we studied the two known components of indeterminacy, i.e., uncertainty and ambiguity, and proposed a new model that handles indeterminacy in authentication in IoT environments.

AB - The Internet of Things (IoT), comprising a plethora of heterogeneous devices, is an enabling technology that can improve the quality of our daily lives, for instance by measuring parameters from the environment (e.g., humidity, temperature, weather, energy consumption, traffic, and others) or our bodies (e.g., health data). However, as with any technology, IoT has introduced a number of security and privacy challenges. Indeed, IoT devices create, process, transfer and store data, which are often sensitive, and which must be protected from unauthorized access. Similarly, the infrastructure that links with IoT, as well as the IoT devices themselves, is an asset that needs to be protected. The focus of this work is examining authentication in IoT. In particular, in this work we conducted a state-of-the-art review of the access control models that have been proposed, including both traditional access control models and emerging models that have recently been proposed and are tailored for IoT. We identified that the existing models cannot cope with indeterminacy, an inherent characteristic of IoT, which hinders authentication decisions. In this context, we studied the two known components of indeterminacy, i.e., uncertainty and ambiguity, and proposed a new model that handles indeterminacy in authentication in IoT environments.

KW - Access control

KW - Ambiguity

KW - Authentication

KW - Internet of Things

KW - Uncertainty

UR - http://www.scopus.com/inward/record.url?scp=85084481077&partnerID=8YFLogxK

U2 - 10.1016/j.future.2020.03.005

DO - 10.1016/j.future.2020.03.005

M3 - Article

AN - SCOPUS:85084481077

VL - 111

SP - 278

EP - 287

JO - Future Generation Computer Systems

JF - Future Generation Computer Systems

SN - 0167-739X

ER -