Abstract

This chapter presents a detailed description of the implementation of the proposed access control architecture that is presented in Chap. 3. This chapter aims to show how the proposed architecture can achieve significant improvement by reducing the number of policies required for specifying access control settings while providing efficient access control in an IoT environment. Standard XACML [1] based policy scheme is used. The proof of concept prototype is implemented using a physical testbed experiment to demonstrate the feasibility of the proposed approach. Note, the system’s operations are tested with both symmetric and asymmetric key cryptography based approaches.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.