首页> 外文学位 >Capability Based Access Control Strategies to Deter DDoS Attacks Exploting IoT Devices
【24h】

Capability Based Access Control Strategies to Deter DDoS Attacks Exploting IoT Devices

机译:基于能力的访问控制策略可阻止物联网设备的DDoS攻击

获取原文
获取原文并翻译 | 示例

摘要

The prevalence of the Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, the IoTs also incur more concerns on privacy and security. The large number of insecure smart things with high communication and computation capacity become attractive targets for attackers to build large-scale botnets, which are used for various malicious activities such as distributed denial-of-service (DDoS) attacks. Among the top security challenges that IoTs face, the access authorization is critical in resource and information protection. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices.;This thesis aims at improving the security of IoT devices by enhancing the access control (AC) mechanisms. A federated capability based access control (FedCAC) framework and a blockchain-enabled decentralized capability-based access control (BlendCAC) framework are proposed. Through federating the capability delegation mechanism, the FedCAC allows local domain owners to delegate centralized authorization decision-making policy from server to enforce access control. However, the FedCAC scheme still suffers the weaknesses inherited from the centralized schemes, such as the single point of failure and performance bottleneck problems. In order to address these shortcomings, the BlendCAC takes advantage of smart contract on the blockchain network to enable a completely decentralized access control solution in the trustless network environment. Implemented and tested on resource-constrained devices under a physical IoT network environment, the experimental results demonstrate the feasibility of the proposals to offer the scalable, lightweight and fine-grained access control strategies to deter DDoS attacks exploiting IoT devices.
机译:物联网(IoT)的盛行允许异构嵌入式智能设备在有或没有人为干预的情况下协作提供智能服务。在利用诸如Smart Gird和Smart Cities之类的大规模基于IoT的应用程序时,IoT也引起了对隐私和安全性的更多关注。大量具有高通信和计算能力的不安全智能事物成为攻击者构建大型僵尸网络的诱人目标,僵尸网络用于各种恶意活动,例如分布式拒绝服务(DDoS)攻击。在物联网面临的最大安全挑战中,访问授权对于资源和信息保护至关重要。庞大的节点数量,异构性和动态性,使得物联网设备需要更细粒度,更轻量级的机制。本文旨在通过增强访问控制(AC)机制来提高物联网设备的安全性。提出了基于联邦能力的访问控制(FedCAC)框架和基于区块链的去中心化基于权限的访问控制(BlendCAC)框架。通过联合功能委派机制,FedCAC允许本地域所有者从服务器委派集中式授权决策策略以实施访问控制。但是,FedCAC方案仍然遭受集中式方案所继承的弱点,例如单点故障和性能瓶颈问题。为了解决这些缺点,BlendCAC利用了区块链网络上的智能合约优势,可以在无信任的网络环境中实现完全分散的访问控制解决方案。实验结果在物理物联网网络环境下的资源受限设备上进行实施和测试,实验结果证明了提议的可行性,以提供可扩展,轻量级和细粒度的访问控制策略,以阻止利用物联网设备的DDoS攻击。

著录项

  • 作者

    Xu, Ronghua.;

  • 作者单位

    State University of New York at Binghamton.;

  • 授予单位 State University of New York at Binghamton.;
  • 学科 Computer engineering.
  • 学位 M.S.
  • 年度 2018
  • 页码 88 p.
  • 总页数 88
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 水产、渔业;
  • 关键词

  • 入库时间 2022-08-17 11:53:04

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号