Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices.
Manuel BesslerPaul SangsterRadhika UpadrashtaTJ OConnorPublished in: CSET @ USENIX Security Symposium (2024)
Keyphrases
- resource constrained
- access control
- security mechanisms
- smart objects
- key management
- mobile devices
- embedded systems
- sensor networks
- wireless sensor networks
- resource constraints
- mobile computing
- data security
- dynamic access control
- location information
- rfid tags
- access control policies
- ambient intelligence
- ubiquitous computing
- management system
- security policies
- sensor nodes
- role based access control
- multipath
- rbac model
- database security
- cloud computing
- access control models
- context aware
- relational databases
- security requirements
- databases
- database