Accès libre

Dynamic Trust-based Access Control with Hybrid Encryption for Secure IoT Applications

, ,  et   
02 mai 2025
À propos de cet article

Citez
Télécharger la couverture

Fig. 1.

Performance comparison.
Performance comparison.

Performance comparison analysis_

Metric Traditional model ISM-AAC
Confidentiality 85 % 92 %
Integrity 72 % 80 %
Authentication 88 % 91 %
Energy consumption 2.5 J 1.2 J
Scalability efficiency 80 % 86 %

Terminology_

Terminology Explanation
IoT A network of interconnected devices that communicate and exchange data, often including sensors, actuators, and smart devices.
ISM-AAC A security framework for IoT networks integrating FE and RBAC to ensure secure communication and data access.
FE An advanced encryption technique that enables selective decryption of specific functionalities or computations of encrypted data without exposing the entire dataset.
Re-encryption The process of updating encryption keys when a device's role changes or unauthorized access is detected, ensuring continued security and integrity of transmitted data.
Access control A mechanism that regulates who can access certain data or resources in the IoT network, based on role assignments and permissions.
Key management The process of generating, distributing, storing, and updating cryptographic keys used in encryption and decryption processes.
Data confidentiality Ensuring that sensitive data remains protected from unauthorized access during transmission and storage within the IoT network.
Data integrity Ensuring that the data is accurate, unmodified, and has not been manipulated during transmission or storage.

j_msr-2025-0007_tab_003

1. Initialize the IoT network with devices (deviceID) and users (UserCredentials)
2. Assign Roles to the users (RoleAssignments)
3. Authenticate the user/device using the credentials
4. If the user is authenticated:
  5. Check the access permissions for the assigned role (RBAC)
  6. If access is allowed:
    7. Encrypt the data with FE
    8. Transmit the encrypted data via the IoT network
    9. If unauthorized access is detected:
      10. Trigger Re-encryption process to update the encryption keys
    11. Upon reception, the recipient decrypts the data with their decryption keys
    12. Verify the recipient’s access permissions based on their role
    13. If access is verified:
      14. Decrypt the data and process it
    Otherwise:
      15. Deny access and log the event
  End algorithm