Please use this identifier to cite or link to this item:
http://ir.lib.seu.ac.lk/handle/123456789/7156
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mohamed Nafrees, Abdul Cader | - |
dc.contributor.author | Sankavi, Gobalakirushnan | - |
dc.contributor.author | Karipper, R. K. A. R. | - |
dc.contributor.author | Bharathi, B. | - |
dc.contributor.author | Prince Mary, S. | - |
dc.date.accessioned | 2024-10-02T06:42:57Z | - |
dc.date.available | 2024-10-02T06:42:57Z | - |
dc.date.issued | 2024-10-01 | - |
dc.identifier.citation | Proceedings of World Conference on Artificial Intelligence: Advances and Applications pp. 41-53. | en_US |
dc.identifier.isbn | 978-981-97-4495-4 | - |
dc.identifier.isbn | 978-981-97-4496-1 | - |
dc.identifier.uri | http://ir.lib.seu.ac.lk/handle/123456789/7156 | - |
dc.description.abstract | This paper explores the transformative impact of the IoT on device connectivity, emphasizing the critical role of Access Control (AC) in securing IoT and ensuring appropriate resource access. The study conducts a comprehensive survey, addressing challenges, requirements, and approaches in designing effective IoT AC, considering device diversity, resource constraints, and energy consumption complexities. The adaptation of traditional AC methods for IoT is examined, highlighting complications arising from device heterogeneity and advocating for suitable AC solutions aligned with global IoT policies. The focus shifts to two emerging technologies, Blockchain (BC) and Machine Learning (ML), as potential solutions for IoT AC challenges. BC’s decentralization, security, and transparency are explored, emphasizing their role in mitigating AC issues. ML techniques are investigated for real-time identification of suspicious activities, enhancing the adaptability of AC mechanisms. Integrating BC and ML in IoT AC is a key research question, with insights suggesting enhanced security, transparency, and efficiency. The survey employs a systematic review approach, utilizing NVIVO software and the CASP tool for data coding to ensure the validity of the information. The conclusion summarizes key findings, addressing how BC and ML can mitigate AC challenges in IoT. BC’s decentralized and tamper-resistant nature and ML’s dynamic learning capabilities contribute to enhanced security. Alternative technologies for IoT AC are explored, including smart contracts, attribute-based AC, and certificate-based schemes. The integration of BC and ML is identified as a means to deliver trusted IoT services, achieve fine-grained AC, and enable efficient data transfer methods. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Springer, Singapore | en_US |
dc.title | Access control in IOT: a comprehensive survey of challenges, approaches, and future directions | en_US |
dc.type | Article | en_US |
Appears in Collections: | Research Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Proceedings of World Conference.pdf | 80.07 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.