Access Control Enforcement within MQTT-based Internet of Things Ecosystems. Colombo, P. & Ferrari, E. In Bertino, E., Lin, D., & Lobo, J., editors, Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018, pages 223–234, 2018. ACM.
Access Control Enforcement within MQTT-based Internet of Things Ecosystems [link]Paper  doi  abstract   bibtex   
Confidentiality and privacy of data managed by IoT ecosystems is becoming a primary concern. This paper targets the design of a general access control enforcement mechanism for MQTT-based IoT ecosystems. The proposed approach is presented with ABAC, but other access control models can be similarly supported. The solution is based on an enforcement monitor that has been designed to operate as a proxy between MQTT clients and an MQTT server. The monitor enforces access control constraints by intercepting and possibly manipulating the flow of exchanged MQTT control packets. Early experimental evaluations have overall shown low enforcement overhead.
@inproceedings{DBLP:conf/sacmat/ColomboF18a,
title = {Access Control Enforcement within MQTT-based Internet of Things Ecosystems},
author = {Pietro Colombo and Elena Ferrari},
editor = {Elisa Bertino and Dan Lin and Jorge Lobo},
url = {https://doi.org/10.1145/3205977.3205986},
doi = {10.1145/3205977.3205986},
year  = {2018},
date = {2018-01-01},
booktitle = {Proceedings of the 23nd ACM on Symposium on Access Control Models 
 and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 
 2018},
pages = {223--234},
publisher = {ACM},
abstract = {Confidentiality and privacy of data managed by IoT ecosystems is becoming a primary concern. This paper targets the design of a general access control enforcement mechanism for MQTT-based IoT ecosystems. The proposed approach is presented with ABAC, but other access control models can be similarly supported. The solution is based on an enforcement monitor that has been designed to operate as a proxy between MQTT clients and an MQTT server. The monitor enforces access control constraints by intercepting and possibly manipulating the flow of exchanged MQTT control packets. Early experimental evaluations have overall shown low enforcement overhead.},
keywords = {Access control; Internet of Things; MQTT},
pubstate = {published},
tppubtype = {inproceedings}
}

Downloads: 0