TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
A survey of trust and reputation systems for online service provision
Decision Support Systems
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
An Access Control Scheme in Wireless Sensor Networks
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
A role-based access in a hierarchical sensor network architecture to provide multilevel security
Computer Communications
Secure Control: Towards Survivable Cyber-Physical Systems
ICDCSW '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops
Extending IP to Low-Power, Wireless Personal Area Networks
IEEE Internet Computing
Computer
An optimal control method for applications using wireless sensor/actuator networks
Computers and Electrical Engineering
Wireless ad hoc, sensor and mesh networks
Computers and Electrical Engineering
A detailed review of energy-efficient medium access control protocols for mobile sensor networks
Computers and Electrical Engineering
RFID- from Tracking to the Internet of Things: A Review of Developments
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Security Issues and Challenges for Cyber Physical System
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Key management systems for sensor networks in the context of the Internet of Things
Computers and Electrical Engineering
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
Physical process resilience-aware network design for SCADA systems
Computers and Electrical Engineering
Hi-index | 0.00 |
The emergence of Cyber-Physical Systems (CPSs) heralds the ubiquitous and autonomous globally interconnected networks of embedded devices with their own means of interaction with the physical environment. The complex interactions with the physical environment significantly increase security risks. Especially, for mission-critical CPSs, sensitive data are closely related to security issues and are accessed only by authorized users. Role based access control is an essential component for protecting CPSs from unauthorized access. However, existing mechanisms are inadequate. We argue that role assignment should not depend on the remaining energy of a node but its reputation. This paper proposes a role-based access control model, R2BAC, for CPSs using reputation. The definitions and evaluation metrics of trust and reputation are given in order to evaluate the behavior of the nodes. Then reputation evaluation scheme and role assignment scheme are presented, respectively. In addition, we give the proofs of correctness and complexity analysis for R2BAC. Eventually, a wide set of simulations are provided to evaluate its performance.