access control for smart objects access control for smart
play

Access Control for Smart Objects Access Control for Smart Objects - PowerPoint PPT Presentation

IAB Workshop on Smart Object Security Paris, March 2012 Access Control for Smart Objects Access Control for Smart Objects Jan Janak, Hyunwoo Nam, Henning Schulzrinne I R T Columbia University Internet Real-Time Laboratory This work is


  1. IAB Workshop on Smart Object Security Paris, March 2012 Access Control for Smart Objects Access Control for Smart Objects Jan Janak, Hyunwoo Nam, Henning Schulzrinne I R T Columbia University Internet Real-Time Laboratory This work is sponsored by AT&T Research.

  2. Office Automation with Smart Objects ● Multiple controllers ● Need to specify and enforce policy ● A variety of inputs ● Provide reasonable default policies for SO Overhead Light Policy: id==“irt_switch” or location==“irt_lab” or (action==“OFF” and app==“SECE”) or Group==“Facilities”

  3. Initial System Architecture ● Controllers sends requests with a set of attributes ● PEP verifies attribute values and signs the request. ● Policy documents specify conditions and required attributes. ● Each Smart Object type has a default policy that can be overridden.

  4. What Makes it Complicated? Policy Inputs SO Candidates ● Lights ● Identity ● Motion detectors ● Date and time ● Door locks ● Proximity ● Wall sockets ● Geo-location ● Towel dispensers ● Effort (press 3x) ● Fire alarm buttons ● Result of a vote ● Elevator controls ● Current state of SO ● Phones ● Organizational role ● Indoor location ● Randomness

  5. Open Questions ● How do we describe and enforce access restrictions applied to Smart Objects? ● What protocols can we use to implement attribute-based access control? ● Mapping of credentials to CoAP/HTTP requests? ● Where is policy enforced? How do SOs learn the outcome? ● Default policy from SO manufacturers?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend