Please use this identifier to cite or link to this item: http://hdl.handle.net/10125/71474

A Systematic Mapping Study of Access Control in the Internet of Things

File Size Format  
0693.pdf 2.37 MB Adobe PDF View/Open

Item Summary

Title:A Systematic Mapping Study of Access Control in the Internet of Things
Authors:Muthusamy Ragothaman, Kaushik Nagarajan
Wang, Yong
Keywords:Internet of Things Security: CyberAssurance for Edge, Software Defined, and Fog Computing Systems
access control
access management
internet of things
iot
show 1 moresmart things
show less
Date Issued:05 Jan 2021
Abstract:Internet of Things (IoT) provide wide range of services in both domestic and industrial environments. Access control plays a crucial role as to granting access rights to users and devices when an IoT device is connected to a network. Over the years, traditional access control models such as RBAC and ABAC have been extended to the IoT. Additionally, several other approaches have also been proposed for the IoT. This research performs a systematic mapping study of the research that has been conducted on the access control in the IoT. Based on the formulated search strategy, 1,617 articles were collected and screened for review. The systematic mapping study conducted in the paper answers three research questions regarding the access control in the IoT, i.e., what kind of access control related concerns have been raised in the IoT so far? what kind of solutions have been presented to improve access control in the IoT? what kind of research gaps have been identified in the access control research in the IoT? To the best of our knowledge, this is the first systematic mapping study performed on this topic.
Pages/Duration:10 pages
URI:http://hdl.handle.net/10125/71474
ISBN:978-0-9981331-4-0
DOI:10.24251/HICSS.2021.853
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
https://creativecommons.org/licenses/by-nc-nd/4.0/
Appears in Collections: Internet of Things Security: CyberAssurance for Edge, Software Defined, and Fog Computing Systems


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons