Making Access Control Easy in IoT

12/04/2021
by   Vafa Andalibi, et al.
0

Secure installation of Internet of Things (IoT) devices requires configuring access control correctly for each device. In order to enable correct configuration the Manufacturer Usage Description (MUD) has been developed by Internet Engineering Task Force (IETF) to automate the protection of IoT devices by micro-segmentation using dynamic access control lists. The protocol defines a conceptually straightforward method to implement access control upon installation by providing a list of every authorized access for each device. This access control list may contain a few rules or hundreds of rules for each device. As a result, validating these rules is a challenge. In order to make the MUD standard more usable for developers, system integrators, and network operators, we report on an interactive system called MUD-Visualizer that visualizes the files containing these access control rules. We show that, unlike manual analysis, the level of the knowledge and experience does not affect the accuracy of the analysis when MUD-Visualizer is used, indicating that the tool is effective for all participants in our study across knowledge and experience levels.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/13/2021

On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment

Manufacturer Usage Description (MUD) is an Internet Engineering Task For...
research
08/09/2018

Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management

The emerging Internet of Things (IoT) drastically increases the number o...
research
01/01/2023

Internet of Things: Digital Footprints Carry A Device Identity

The usage of technologically advanced devices has seen a boom in many do...
research
05/28/2020

IoT-based Remote Control Study of a Robotic Trans-esophageal Ultrasound Probe via LAN and 5G

A robotic trans-esophageal echocardiography (TEE) probe has been recentl...
research
03/22/2023

A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt Systems

In recent years, the open source operating system OpenWrt has become a p...
research
11/10/2020

Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things

With the prevalence of Internet of Things (IoT) applications, IoT device...
research
11/05/2019

Context Aware Family Dynamics based Internet of Things Access Control Towards Better Child Safety

Today, children are increasingly connected to the Internet and consume c...

Please sign up or login with your details

Forgot password? Click here to reset