Access control for IoT environments: specification and analysis
dc.contributor.author | Peterson, Jordan T., author | |
dc.contributor.author | Ray, Indrakshi, advisor | |
dc.contributor.author | Prabhu, Vinayak, advisor | |
dc.contributor.author | Gersch, Joseph, committee member | |
dc.contributor.author | Hayne, Stephen, committee member | |
dc.date.accessioned | 2021-06-07T10:19:35Z | |
dc.date.available | 2021-06-07T10:19:35Z | |
dc.date.issued | 2021 | |
dc.description.abstract | Smart homes have devices which are prone to attacks as seen in the 2016 Mirai botnet attacks. Authentication and access control form the first line of defense. Towards this end, we propose an attribute-based access control framework for smart homes that is inspired by the Next Generation Access Control (NGAC) model. Policies in a smart home can be complex. Towards this end, we demonstrate how the formal modeling language Alloy can be used for policy analysis. In this work we formally define an IoT environment, express an example security policy in the context of a smart home, and show the policy analysis using Alloy. This work introduces processes for identifying conflicting and redundant rules with respect to a given policy. This work also demonstrates a practical use case for the processes described. In other words, this work formalizes policy rule definition, home IoT environment definition, and rule analysis all in the context of NGAC and Alloy. | |
dc.format.medium | born digital | |
dc.format.medium | masters theses | |
dc.identifier | Peterson_colostate_0053N_16416.pdf | |
dc.identifier.uri | https://hdl.handle.net/10217/232471 | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Colorado State University. Libraries | |
dc.relation.ispartof | 2020- | |
dc.rights | Copyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright. | |
dc.subject | attribute-based access control | |
dc.subject | formal modeling | |
dc.subject | redundancy identification | |
dc.subject | conflict identification | |
dc.subject | Alloy | |
dc.subject | Next Generation Access Control | |
dc.title | Access control for IoT environments: specification and analysis | |
dc.type | Text | |
dcterms.rights.dpla | This Item is protected by copyright and/or related rights (https://rightsstatements.org/vocab/InC/1.0/). You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). | |
thesis.degree.discipline | Computer Science | |
thesis.degree.grantor | Colorado State University | |
thesis.degree.level | Masters | |
thesis.degree.name | Master of Science (M.S.) |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Peterson_colostate_0053N_16416.pdf
- Size:
- 639.86 KB
- Format:
- Adobe Portable Document Format