Have a personal or library account? Click to login
Dynamic Trust-based Access Control with Hybrid Encryption for Secure IoT Applications Cover

Dynamic Trust-based Access Control with Hybrid Encryption for Secure IoT Applications

Open Access
|May 2025

Figures & Tables

Fig. 1.

Performance comparison.
Performance comparison.

Performance comparison analysis_

MetricTraditional modelISM-AAC
Confidentiality85 %92 %
Integrity72 %80 %
Authentication88 %91 %
Energy consumption2.5 J1.2 J
Scalability efficiency80 %86 %

Terminology_

TerminologyExplanation
IoTA network of interconnected devices that communicate and exchange data, often including sensors, actuators, and smart devices.
ISM-AACA security framework for IoT networks integrating FE and RBAC to ensure secure communication and data access.
FEAn advanced encryption technique that enables selective decryption of specific functionalities or computations of encrypted data without exposing the entire dataset.
Re-encryptionThe process of updating encryption keys when a device's role changes or unauthorized access is detected, ensuring continued security and integrity of transmitted data.
Access controlA mechanism that regulates who can access certain data or resources in the IoT network, based on role assignments and permissions.
Key managementThe process of generating, distributing, storing, and updating cryptographic keys used in encryption and decryption processes.
Data confidentialityEnsuring that sensitive data remains protected from unauthorized access during transmission and storage within the IoT network.
Data integrityEnsuring that the data is accurate, unmodified, and has not been manipulated during transmission or storage.

j_msr-2025-0007_tab_003

1. Initialize the IoT network with devices (deviceID) and users (UserCredentials)
2. Assign Roles to the users (RoleAssignments)
3. Authenticate the user/device using the credentials
4. If the user is authenticated:
  5. Check the access permissions for the assigned role (RBAC)
  6. If access is allowed:
    7. Encrypt the data with FE
    8. Transmit the encrypted data via the IoT network
    9. If unauthorized access is detected:
      10. Trigger Re-encryption process to update the encryption keys
    11. Upon reception, the recipient decrypts the data with their decryption keys
    12. Verify the recipient’s access permissions based on their role
    13. If access is verified:
      14. Decrypt the data and process it
    Otherwise:
      15. Deny access and log the event
  End algorithm
Language: English
Page range: 48 - 52
Submitted on: Jul 27, 2024
|
Accepted on: Feb 4, 2025
|
Published on: May 2, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: Volume open

© 2025 A Velliangiri, Madhavi Damle, Peter Soosai Anandaraj Abraham, Jampani Satish Babu, published by Slovak Academy of Sciences, Institute of Measurement Science
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.