consideration  when  selecting  the  risk 
estimation  technique.  Also,  the  performance 
should not be affected. 
  Limited resources: The  resources  associated 
with  IoT devices such as energy, memory, and 
processing power are limited due to the small 
size  of  these  devices  (Adda  et  al.,  2015). 
Therefore,  the  risk  estimation  technique 
should support efficient solutions. 
  Data availability: In  order  to  accurately 
calculate the risk associated with a particular 
factor, data is needed. Once real world data is 
collected, it can be used in various probability 
distributions  to  calculate  a  much  more 
accurate risk value. So the availability of the 
proper  data  will  allow  to  analytically 
determine  the  appropriate  risk  estimation 
technique for the IoT. 
6  CONCLUSIONS 
The  IoT  has  become  the  current  technology 
revolution  that  is  intended  to  convert  the  existing 
environment  into  a  more  pervasive  and  ubiquitous 
domain. The successful deployment of the IoT in our 
environment  is  related  to  conquer  security  and 
privacy issues specifically authentication and access 
control  issues.  Risk-based  access  control  model 
provides  a  dynamic  and  efficient  way  to  make  the 
access  decision  depending  on  the  risk  estimates  of 
each  access  request.  Risk  estimation  is  a  complex 
operation that requires the consideration of a variety 
of factors in the access control domain. Selecting the 
appropriate risk  estimation  technique for  the  IoT  is 
not  an  easy  task.  In  this  paper,  we  provided  an 
overview of different risk estimation techniques that 
are used in existing risk-based access control models. 
Also,  we  have  presented  some  of  the  IoT 
requirements  for  selecting  the  appropriate  risk 
estimation technique. Our future direction would be 
to empirically compare among these risk estimation 
techniques to select  the most  appropriate technique 
for the IoT system. However, the lack of the proper 
data will be a big issue. 
ACKNOWLEDGEMENTS 
We  acknowledge  Egyptian  cultural  affairs  and 
mission  sector  and  Menoufia  University  for  their 
scholarship to Hany Atlam that allows the research to 
be undertaken. 
REFERENCES 
Abul-Haggag,  O.Y.  &  Barakat,  W., 2013.  Application  of 
Fuzzy  Logic for  Risk  Assessment  using Risk  Matrix. 
International Journal of Emerging Technology and 
Advanced Engineering, 3(1), pp.49–54.  
Adda, M. et al., 2015. Toward an Access Control Model for 
IOTCollab.  The 6th International Conference on 
Ambient Systems, Networks and Technologies, 52(Ant), 
pp.428–435.  
Chen,  P. et  al., 2007.  Fuzzy  Multi –  Level Security :  An 
Experiment  on  Quantified  Risk  –  Adaptive  Access 
Control.  2007 IEEE Symposium on Security and 
Privacy(SP’07), pp.222–227.  
Diep,  N.N. et  al., 2007.  Enforcing Access  Control  Using 
Risk Assessment. the Fourth European Conference on 
Universal Multiservice Networks, pp.419–424. 
Fremantle,  P. et  al.,  2014.  Federated  Identity  and  Access 
Management  for  the  Internet  of  Things.  2014 
International Workshop on Secure Internet of Things 
(SIoT), pp.10–17.  
Goerdin,  S.A.  V,  Smit,  J.J.  &  Mehairjan,  R.P.Y.,  2015a. 
Monte  Carlo  simulation applied to  support  risk-based 
decision  making  in  electricity  distribution  networks. 
2015 IEEE Eindhoven PowerTech, PowerTech 2015. 
Goerdin,  S.A.  V,  Smit,  J.J.  &  Mehairjan,  R.P.Y.,  2015b. 
Monte  Carlo  simulation applied to  support  risk-based 
decision  making  in  electricity  distribution  networks. 
2015 IEEE Eindhoven PowerTech.  
Habib,  K.  &  Leister,  W.,  2015.  Context-Aware 
Authentication for the Internet of Things. The Eleventh 
International Conference on Autonomic and 
Autonomous Systems fined, pp.134–139. 
Hamdi, M. & Abie, H., 2014. Game-based adaptive security 
in  the  Internet  of  Things  for  eHealth.  2014 IEEE 
International Conference on Communications, ICC 
2014, pp.920–925. 
Kahneman, D., Slovic, P. & Tversky, A., 1974. Judgment 
under  uncertainty:  heuristics  and  biases.  Science, 
185(4157), pp.1124–1131. 
Khambhammettu,  H.  et  al.,  2013.  A  framework  for  risk 
assessment  in  access  control  systems.  Computers & 
Security, 39(Sec 2012), pp.86–103.  
Kulk, G.P., Peters, R.J. & Verhoef, C., 2009. Quantifying 
IT  estimation  risks.  Science of Computer 
Programming, 74(11–12), pp.900–933.  
Langaliya,  C.  &  Aluvalu,  R.,  2015.  Enhancing  Cloud 
Security  through  Access  Control  Models :  A  Survey. 
International Journal of Computer Applications, 
112(7), pp.8–12. 
Li,  J.,  Bai,  Y.  &  Zaman,  N.,  2013.  A  fuzzy  modeling 
approach for risk-based access control in eHealth cloud. 
Proceedings - 12th IEEE International Conference on 
Trust, Security, and Privacy in Computing and 
Communications, TrustCom 2013, pp.17–23. 
Liu, J., Xiao, Y. & Chen, C.L.P., 2012. Authentication and 
access control in the Internet of things. Proceedings - 
32nd IEEE International Conference on Distributed 
Computing Systems Workshops, ICDCSW 2012, 
pp.588–592.