Loading [MathJax]/extensions/MathMenu.js
TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things | IEEE Journals & Magazine | IEEE Xplore

TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things


Abstract:

Overprivilege Attack, a widely reported phenomenon in IoT that accesses unauthorized or excessive resources, is notoriously hard to prevent, trace and mitigate. In this p...Show More

Abstract:

Overprivilege Attack, a widely reported phenomenon in IoT that accesses unauthorized or excessive resources, is notoriously hard to prevent, trace and mitigate. In this paper, we propose TBAC, a Tokoin-Based Access Control model enabled by blockchain and Trusted Execution Environment (TEE) technologies, to offer fine-grained access control and strong auditability for IoT. TBAC materializes the virtual access power into a definite-amount, secure and accountable cryptographic coin, termed “tokoin” (token+coin), and manages it using atomic and accountable state-transition functions in a blockchain. A tokoin carries a fine-grained policy defined by the resource owner to specify the requirements to be satisfied before an access is granted, and the behavioral constraints that describe the correct procedure to follow during access. The strong-auditability is achieved with blockchain and a TEE-enabled trusted access control object (TACO) to ensure that all access activities are securely monitored and auditable. We prototype TBAC by implementing all its functions with well-studied cryptographic primitives over different blockchain platforms, building a TACO on top of the ARM Cortex-M33 TEE microcontroller, and constructing a user-friendly APP for regular users. A case study is finally presented to demonstrate how TBAC is employed to enable autonomous and secure in-home cargo delivery.
Published in: IEEE Transactions on Mobile Computing ( Volume: 23, Issue: 5, May 2024)
Page(s): 6133 - 6148
Date of Publication: 19 September 2023

ISSN Information:

Funding Agency:

No metrics found for this document.

I. Introduction

With the rapid development of the Internet of Things (IoT), IoT devices have become much smaller, smarter, and more prevalent than ever before. Unfortunately, it has been widely reported that a variety of mainstream IoT devices and platforms such as Google Home [1], Amazon Alexa [2], [3] and Samsung SmartThings [4] have been secretly accessed by attackers without authorization. With the household penetration of smart home devices reaching 36.6% by the end of 2020 and being expected to hit 57.2% by 2025 [5], increasingly grave security threats have been posed to ordinary users and their everyday life.

Usage
Select a Year
2025

View as

Total usage sinceSep 2023:683
010203040JanFebMarAprMayJunJulAugSepOctNovDec191937000000000
Year Total:75
Data is updated monthly. Usage includes PDF downloads and HTML views.

Contact IEEE to Subscribe

References

References is not available for this document.