Attribute-Based Access Control in Internet of Things Security

dc.contributor.authorKukut, Melike
dc.contributor.authorSoğukpinar, Ibrahim
dc.date.accessioned2025-10-29T12:10:09Z
dc.date.issued2024
dc.departmentGebze Teknik Üniversitesi
dc.description4th International Conference on Basic Sciences, Engineering and Technology, ICBASET 2024 -- Alanya -- 319979
dc.description.abstractWith the rapid spread of the use of Internet of Things devices, it has become an important situation for these devices to be provided with critical infrastructure, integrated into daily life and the creation of robust security mechanisms. The attribute-based access control (ABAC) method has emerged as a promising approach to manage access of IoT resources based on users' attributes. However, current ABAC models lack adequate privacy protections and do not address specific vulnerabilities, especially in scenarios where sensitive data is involved. The research includes a comprehensive review of the ABAC models that stand out in the context of IoT security, including the limitations and vulnerabilities that they carry. In this work, a new framework has been proposed that integrates zero-knowledge proofs (ZKP) with homomorphic encryption into the ABAC model, providing stronger security guarantees and privacy protection. While ZKPs allow users to prove that they have certain attributes or access rights without disclosing sensitive information, homomorphic encryption allows calculations to be performed on encrypted data without decryption. The proposed framework has been evaluated by theoretical analysis and simulation studies. The findings of this research are expected to contribute significantly to the field of IoT security by providing a more robust and privacy-protecting access control mechanism for IoT environments. The proposed framework has the potential to mitigate various security threats, including unauthorized access, data and privacy violations. © 2024 Elsevier B.V., All rights reserved.
dc.identifier.doi10.55549/epstem.1519125
dc.identifier.endpage33
dc.identifier.isbn9786256959712
dc.identifier.isbn9786256959705
dc.identifier.isbn9786057283252
dc.identifier.isbn9786256959385
dc.identifier.isbn9786256959255
dc.identifier.isbn9786057116567
dc.identifier.isbn9786256959309
dc.identifier.isbn9786256959095
dc.identifier.isbn9786256959576
dc.identifier.isbn9786256959088
dc.identifier.issn2602-3199
dc.identifier.scopus2-s2.0-85205591091
dc.identifier.scopusqualityQ4
dc.identifier.startpage23
dc.identifier.urihttps://doi.org/10.55549/epstem.1519125
dc.identifier.urihttps://hdl.handle.net/20.500.14854/14989
dc.identifier.volume28
dc.indekslendigikaynakScopus
dc.language.isoen
dc.publisherISRES Publishing
dc.relation.ispartofEurasia Proceedings of Science, Technology, Engineering and Mathematics
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/openAccess
dc.snmzKA_Scopus_20251020
dc.subjectABAC
dc.subjectHomomorphic encryption
dc.subjectIoT
dc.subjectZero knowledge proof
dc.titleAttribute-Based Access Control in Internet of Things Security
dc.typeConference Object

Dosyalar