Next Article in Journal
A Survey of Analog-to-Digital Converters for Operation under Radiation Environments
Next Article in Special Issue
A Fast Deep Learning Method for Security Vulnerability Study of XOR PUFs
Previous Article in Journal
Intra-Network Interference Robustness: An Empirical Evaluation of IEEE 802.15.4-2015 SUN-OFDM
Previous Article in Special Issue
Multibit-Generating Pulsewidth-Based Memristive-PUF Structure and Circuit Implementation
Open AccessArticle

From Conventional to State-of-the-Art IoT Access Control Models

Department of Computer Science, COMSATS University Islamabad, Islamabad Campus, Islamabad 45000, Pakistan
Department of Computer Science, Lahore College for Women University, Lahore 54000, Pakistan
School of Electrical Engineering and Computer Science (SEECS), National University of Sciences & Technology (NUST), Islamabad 44000, Pakistan
School of Computer Science and Informatics, De Montfort University, The Gateway, Leicester LE1 9BH, UK
Faculty of Computing and Information Technology, King Abdul Aziz University, Jeddah 21589, Saudi Arabia
College of Computer Science and Engineering, University of Jeddah, Jeddah 23218, Saudi Arabia
Author to whom correspondence should be addressed.
Electronics 2020, 9(10), 1693;
Received: 23 July 2020 / Revised: 25 September 2020 / Accepted: 1 October 2020 / Published: 15 October 2020
(This article belongs to the Special Issue Cyber Security for Internet of Things)
The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people’s daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user’s access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the same. View Full-Text
Keywords: access control models; security; privacy; social network security; internet of things access control models; security; privacy; social network security; internet of things
Show Figures

Figure 1

MDPI and ACS Style

Malik, A.K.; Emmanuel, N.; Zafar, S.; Khattak, H.A.; Raza, B.; Khan, S.; Al-Bayatti, A.H.; Alassafi, M.O.; Alfakeeh, A.S.; Alqarni, M.A. From Conventional to State-of-the-Art IoT Access Control Models. Electronics 2020, 9, 1693.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop