Access Control Framework for API Enabled Devices

Authors(5) :-Vandana C. P, Taffazul Imam, Shubham Dubey, Suman Thapa, Pradip Thapa

The recent advances in information and communication technologies brought about a novel paradigm, Internet of Things (IoT), in which a variety of devices in the physical world are connected to the Internet. The security cannot be disregarded from the employment of API-enabled devices because the impact of the security breach in these devices tends to be larger, as it directly affects the physical environment we live in. If an unauthorized user is able to access API-enabled devices in smart buildings, it may harm an occupant’s life for instance by locking a door, turning off lights or air conditioners, which make occupants, lose their comfortable and so on. In this paper, an access control framework for API-enabled devices in smart buildings is implemented.

Authors and Affiliations

Vandana C. P
Department of Information Science Engineering, New Horizon College of Engineering, Bangalore, Karnataka, India
Taffazul Imam
Department of Information Science Engineering, New Horizon College of Engineering, Bangalore, Karnataka, India
Shubham Dubey
Department of Information Science Engineering, New Horizon College of Engineering, Bangalore, Karnataka, India
Suman Thapa
Department of Information Science Engineering, New Horizon College of Engineering, Bangalore, Karnataka, India
Pradip Thapa
Department of Information Science Engineering, New Horizon College of Engineering, Bangalore, Karnataka, India

Internet of Things, API, Authentication Manager and Access Control Manager, Access Control Manager, MICROCONTROLLER, IDE, XML, SOAP, RFID, AVR

  1. Access Control Framework for API-Enabled Devices in Smart Buildings Syafril Bandara, Takeshi Yashiro, Noboru Koshizuka and Ken Sakamura
  2. L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
  3. C. Lee, L. Zappaterra, K. Choi, and H.-A. Choi, “Securing smart home: Technologies, security challenges, and security requirements,” in Communications and Network Security (CNS), 2014 IEEE Conference on. IEEE, 2014, pp. 67–72.
  4. J. Al-Muhtadi, A. Ranganathan, R. Campbell, and M. D. Mickunas, “A flexible, privacy-preserving authentication framework for ubiquitous computing environments,” in Distributed Computing Systems Workshops, 2002. Proceedings. 22nd International Conference on. IEEE, 2002, pp. 771–776.
  5. H. Wang, Y. Zhang, and J. Cao, “Access control management for ubiquitous computing,” Future Generation Computer Systems, vol. 24, no. 8, pp. 870–878, 2008.
  6. K. Fysarakis, C. Konstantourakis, K. Rantos, C. Manifavas, and I. Papaefstathiou, “Wsacd-a usable access control framework for smart home devices,” in Information Security Theory and Practice. Springer, 2015, pp. 120–133.
  7. J. E. Kim, G. Boulos, J. Yackovich, T. Barth, C. Beckel, and D. Mosse, “Seamless integration of heterogeneous devices and access control in smart homes,” in Intelligent Environments (IE), 2012 8th International Conference on. IEEE, 2012, pp. 206–213.
  8. S. Cirani, M. Picone, P. Gonizzi, L. Veltri, and G. Ferrari, “Iot-oas: An oauth-based authorization service architecture for secure services in iot scenarios,” Sensors Journal, IEEE, vol. 15, no. 2, pp. 1224–1234, 2015.
  9. S. W. Oh and H. S. Kim, “Study on access permission control for the web of things,” in Advanced Communication Technology (ICACT), 2015 17th International Conference on. IEEE, 2015, pp. 574–580.

Publication Details

Published in : Volume 2 | Issue 3 | May-June 2017
Date of Publication : 2017-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 876-880
Manuscript Number : CSEIT1723268
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Vandana C. P, Taffazul Imam, Shubham Dubey, Suman Thapa, Pradip Thapa, "Access Control Framework for API Enabled Devices", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.876-880, May-June-2017.
Journal URL : http://ijsrcseit.com/CSEIT1723268

Article Preview

Follow Us

Contact Us