Affordable Access

Prediction of Shear Strength for High Density Foamed Plastics

Authors
Publisher
Aalborg Universitetsforlag
Publication Date
Disciplines
  • Communication
  • Computer Science
  • Linguistics

Abstract

Microsoft Word - VITAE_D_TRUST__13.docx A Fuzzy Approach to Trust Based Access Control in Internet of Things Parikshit N. Mahalle, Pravin A. Thakre*, Neeli Rashmi Prasad and Ramjee Prasad Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark {pnm, np, [email protected] *Jayawantrao Sawant College of Engineering, Pune, India [email protected] Abstract: In the Internet of things (IoT), the activities of daily life are supported by a multitude of heterogeneous, loosely coupled ubiquitous devices. Traditional access control models are not suitable to the nomadic, decentralized and dynamic scenarios in the IoT where identities are not known in advance. This makes the trust management in IoT more promising to address the access control issues .This paper present a Fuzzy approach to the Trust Based Access Control (FTBAC) with the notion of trust levels for identity management. The presented fuzzy approach for trust calculations deals with the linguistic information of devices to address access control in the IoT. The simulation result shows that the fuzzy approach for trust based access control guarantees scalability and it is energy efficient. This paper also proposes FTBAC framework for trust based dynamic access control in distributed IoT. FTBAC framework is a flexible and scalable as increasing number of devices do not affect the functioning and performance. Keywords: Access Control; Fuzzy Rule Base; Identity Management; Internet of Things; Trust. I. Introduction Internet of Things (IoT) refers to the wireless network of devices such as household appliances, office appliances with self-configuring capability [1]. In IoT, people are surrounded by different types of computing devices which are billion in number, varied in size and capabilities to communicate with each other. Devices are having limited capabilities and ranges from Radio Frequency Identification (RFID) tags to embedded devices, PDAs and sensor nod

There are no comments yet on this publication. Be the first to share your thoughts.