315Accesses
4Citations
Abstract
One of the critical requirement in managing security of any computing system is access control, which includes protection and access management to the available resources. This requirement becomes more strict especially in a distributed computing environment that consists of constrained devices such as Machine-to-Machine (M2M). New challenges in access control are identified in a system comprises a group of distributed multiple M2M gateways forming a so called M2M local cloud platform (Vallati et al. in Wirel Trans Commun 87(3):1071–1091,2016). Scalability is obviously a necessity which is lacking in some existing access control system. In addition, flexibility in managing access from users or entity belonging to other authorization domains as well as delegating access right are not provided as an integrated features. Lately, the capability-based access control has been suggested as method to manage access for M2M as the key enabler of Internet of Things. In this paper, a capability based access control equipped with Elliptic Curve Cryptography based key management is proposed for the M2M local cloud platform. The feasibility of the proposed capability based access control and key management are tested by implementing them within the security manager that is part of the overall component of the platform architecture, and evaluating their performances by a series of experimentations.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.









Similar content being viewed by others
Abbreviations
- BETaaS:
Building the Environment for Thing as a Service
- TaaS:
Things as a Service
- IoT:
Internet of Things
- M2M:
Machine-to-Machine
- WSN:
Wireless Sensor Network
- MANET:
Mobile Ad-hoc Network
- ECC:
Elliptic Curve Cryptography
- RFID:
Radio Frequency IDentification
- PKI:
Public Key Infrastructure
- IBE:
Identity-Based Encryption
- ETSI:
European Telecommunications Standards Institute
- CoAP:
Constrained Application Protocol
- API:
Application Programming Interface
- CA:
Certificate Authority
- ECDH:
Elliptic Curve Diffie-Hellman
- ECMQV:
Elliptic Curve Menezes-Qu-Vanstone
- ECDLP:
Elliptic Curve Discrete Logarithm Problem
- SLA:
Service Level Agreement
- ACL:
Access Control List
- RBAC:
Role Based Access Control
- ABAC:
Attribute Based Access Control
- CCAAC:
Capability-based Context Aware Access Control
- VID:
Virtual Identity
- XML:
EXtensible Markup Language
- JSON:
JavaScript Object Notation
References
Vallati, C., Mingozzi, E., Tanganelli, G., Buonaccorsi, N., Valdambrini, N., Zonidis, N., et al. (2016). BeTaaS: A platform for development and execution of machine-to-machine applications in the Internet of Things.Wireless Personal Communications,87(3), 1071–1091.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed Internet of Things.Computer Networks,57(10), 2266–2279.
Gusmeroli, S., Piccione, S., & Rotondi, D. (2013). A capability-based security approach to manage access control in the Internet of Things.Mathematical and Computer Modelling,58(5–6), 1189–1205.
Anggorojati, B., Prasad, N., & Prasad, R. (2016). Evaluation of secure capability-based access control in the M2M local cloud platform. In2016 10th International conference on telecommunication systems services and applications (TSSA).
Xively. (2016). Api docs—Authentication.https://developer.xively.com/v1.0/reference#getting-user-credentials.
Hardt, D. (2012). The OAuth 2.0 authorization framework. RFC 6749.
Anggorojati, B., Mahalle, P. N., Prasad, N. R., & Prasad, R. (2013). Secure access control and authority delegation based on capability and context awareness for federated IoT. In F. Theoleyre & A. C. Pang (Eds.),Internet of Things and M2M communications. San Francisco: River Publisher.
Anggorojati, B., Prasad, N., & Prasad, R. (2014). Secure capability-based access control in the M2M local cloud platform. In4th International conference on wireless communications, vehicular technology, information theory and aerospace electronic systems (VITAE), 2014.
Mahalle, P. N., Anggorojati, B., Prasad, N. R., & Prasad, R. (2012). Identity driven Capability based Access Control (ICAC) scheme for the Internet of Things. In2012 IEEE international conference on advanced networks and telecommunciations systems, ANTS 2012, pp. 49–54.
Anggorojati, B., Prasad, N., & Prasad, R. (2016). Elliptic Curve Cryptography based key management for the M2M local cloud platform. In2016 International conference on advanced computer science and information systems (ICACSIS), pp. 73–78.
Sandhu, R., Coyne, E., Feinstein, H., & Youman, C. (1996). Role-based access control models.Computer,29(2), 38–47.
Zhang, J., & Varadharajan, V. (2010). Review: Wireless sensor network key management survey and taxonomy.Journal of Network and Computer Applications,33(2), 63–75.
Boubakri, W., Abdallah, W., & Boudriga, N. (2014). A chaos-based authentication and key management scheme for M2M communication. In9th International conference for internet technology and secured transactions (ICITST), 2014, pp. 366–371
Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C., & Kruus, P. (2004). TinyPK: Securing sensor networks with public key technology. InProceedings of the 2Nd ACM workshop on security of ad hoc and sensor networks. SASN ’04, pp. 59–64
Malan, D., Welsh, M., & Smith, M. (2004). A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In2004 First annual IEEE communications society conference on sensor and ad hoc communications and networks, 2004. IEEE SECON 2004, pp. 71–80
Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. (2004). Comparing Elliptic Curve Cryptography and rsa on 8-bit CPUs. In M. Joye & J. J. Quisquater (Eds.),Cryptographic hardware and embedded systems–CHES 2004 (Vol. 3156, pp. 119–132)., Lecture Notes in Computer Science Berlin Heidelberg: Springer.
Shamir, A. (1985). Identity-based cryptosystems and signature schemes. InAdvances in cryptology Volume 196 of Lecture Notes in Computer Science (pp. 47–53) Berlin:Springer.
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In J. Kilian (Ed.),Advances in cryptology—CRYPTO 2001: 21st annual international cryptology conference (pp. 213–229). Berlin: Springer.
Yang, G., Rong, C. M., Veigner, C., Wang, J. T., & Cheng, H. B. (2006). Identity-based key agreement and encryption for wireless sensor networks.The Journal of China Universities of Posts and Telecommunications,13(4), 54–60.
Adiga, B. S., Balamuralidhar, P., Rajan, M. A., Shastry, R., & Shivraj, V. L. (2012). An identity based encryption using Elliptic Curve Cryptography for secure M2M communication. InProceedings of the first international conference on security of Internet of Things. SecurIT ’12.
BETaaS. (2012). D1.2.1—user and system requirements. Technical report, Building the Environment for the Things as a Service (BETaaS).
BETaaS. (2014). D3.1.2—BETaaS architecture. Technical report, Building the Environment for the Things as a Service (BETaaS)
Vanstone, S., & Campagna, M. (2011). A cryptographic suite for embedded systems (SuiteE). In6th ETSI security workshop.
Hankerson, D., Menezes, A. J., & Vanstone, S. (2004).Guide to Elliptic Curve Cryptography. Secaucus, NJ: Springer-Verlag New York Inc.
Research, C. (2000).SEC2: Recommended Elliptic Curve Domain Parameters. Mississauga: Certicom Corp.
Author information
Authors and Affiliations
Faculty of Computer Science, Universitas Indonesia, Depok, Indonesia
Bayu Anggorojati
Engineering Management Faculty, International Technological University, San Jose, CA, USA
Neeli Rashmi Prasad
Future Technologies for Business Ecosystem Innovation (FT4BI), Aarhus, Denmark
Ramjee Prasad
- Bayu Anggorojati
You can also search for this author inPubMed Google Scholar
- Neeli Rashmi Prasad
You can also search for this author inPubMed Google Scholar
- Ramjee Prasad
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toBayu Anggorojati.
Rights and permissions
About this article
Cite this article
Anggorojati, B., Prasad, N.R. & Prasad, R. Capability-Based Access Control with ECC Key Management for the M2M Local Cloud Platform.Wireless Pers Commun100, 519–538 (2018). https://doi.org/10.1007/s11277-017-5216-x
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative