consideration when selecting the risk
estimation technique. Also, the performance
should not be affected.
Limited resources: The resources associated
with IoT devices such as energy, memory, and
processing power are limited due to the small
size of these devices (Adda et al., 2015).
Therefore, the risk estimation technique
should support efficient solutions.
Data availability: In order to accurately
calculate the risk associated with a particular
factor, data is needed. Once real world data is
collected, it can be used in various probability
distributions to calculate a much more
accurate risk value. So the availability of the
proper data will allow to analytically
determine the appropriate risk estimation
technique for the IoT.
6 CONCLUSIONS
The IoT has become the current technology
revolution that is intended to convert the existing
environment into a more pervasive and ubiquitous
domain. The successful deployment of the IoT in our
environment is related to conquer security and
privacy issues specifically authentication and access
control issues. Risk-based access control model
provides a dynamic and efficient way to make the
access decision depending on the risk estimates of
each access request. Risk estimation is a complex
operation that requires the consideration of a variety
of factors in the access control domain. Selecting the
appropriate risk estimation technique for the IoT is
not an easy task. In this paper, we provided an
overview of different risk estimation techniques that
are used in existing risk-based access control models.
Also, we have presented some of the IoT
requirements for selecting the appropriate risk
estimation technique. Our future direction would be
to empirically compare among these risk estimation
techniques to select the most appropriate technique
for the IoT system. However, the lack of the proper
data will be a big issue.
ACKNOWLEDGEMENTS
We acknowledge Egyptian cultural affairs and
mission sector and Menoufia University for their
scholarship to Hany Atlam that allows the research to
be undertaken.
REFERENCES
Abul-Haggag, O.Y. & Barakat, W., 2013. Application of
Fuzzy Logic for Risk Assessment using Risk Matrix.
International Journal of Emerging Technology and
Advanced Engineering, 3(1), pp.49–54.
Adda, M. et al., 2015. Toward an Access Control Model for
IOTCollab. The 6th International Conference on
Ambient Systems, Networks and Technologies, 52(Ant),
pp.428–435.
Chen, P. et al., 2007. Fuzzy Multi – Level Security : An
Experiment on Quantified Risk – Adaptive Access
Control. 2007 IEEE Symposium on Security and
Privacy(SP’07), pp.222–227.
Diep, N.N. et al., 2007. Enforcing Access Control Using
Risk Assessment. the Fourth European Conference on
Universal Multiservice Networks, pp.419–424.
Fremantle, P. et al., 2014. Federated Identity and Access
Management for the Internet of Things. 2014
International Workshop on Secure Internet of Things
(SIoT), pp.10–17.
Goerdin, S.A. V, Smit, J.J. & Mehairjan, R.P.Y., 2015a.
Monte Carlo simulation applied to support risk-based
decision making in electricity distribution networks.
2015 IEEE Eindhoven PowerTech, PowerTech 2015.
Goerdin, S.A. V, Smit, J.J. & Mehairjan, R.P.Y., 2015b.
Monte Carlo simulation applied to support risk-based
decision making in electricity distribution networks.
2015 IEEE Eindhoven PowerTech.
Habib, K. & Leister, W., 2015. Context-Aware
Authentication for the Internet of Things. The Eleventh
International Conference on Autonomic and
Autonomous Systems fined, pp.134–139.
Hamdi, M. & Abie, H., 2014. Game-based adaptive security
in the Internet of Things for eHealth. 2014 IEEE
International Conference on Communications, ICC
2014, pp.920–925.
Kahneman, D., Slovic, P. & Tversky, A., 1974. Judgment
under uncertainty: heuristics and biases. Science,
185(4157), pp.1124–1131.
Khambhammettu, H. et al., 2013. A framework for risk
assessment in access control systems. Computers &
Security, 39(Sec 2012), pp.86–103.
Kulk, G.P., Peters, R.J. & Verhoef, C., 2009. Quantifying
IT estimation risks. Science of Computer
Programming, 74(11–12), pp.900–933.
Langaliya, C. & Aluvalu, R., 2015. Enhancing Cloud
Security through Access Control Models : A Survey.
International Journal of Computer Applications,
112(7), pp.8–12.
Li, J., Bai, Y. & Zaman, N., 2013. A fuzzy modeling
approach for risk-based access control in eHealth cloud.
Proceedings - 12th IEEE International Conference on
Trust, Security, and Privacy in Computing and
Communications, TrustCom 2013, pp.17–23.
Liu, J., Xiao, Y. & Chen, C.L.P., 2012. Authentication and
access control in the Internet of things. Proceedings -
32nd IEEE International Conference on Distributed
Computing Systems Workshops, ICDCSW 2012,
pp.588–592.