Enhancing Iot Security Through Attribute-Based Access Control: A Review And Future Directions

Authors

  • Sudhanshu Shekhar
  • Arvind Kumar Shukla

Keywords:

Attribute-Based Access Control (ABAC), Internet of Things (IoT), Fine-grained access control, Data security, Policy-driven access, Context-aware authorization, Blockchain, Privacy-preserving mechanisms, IoT security challenges

Abstract

The Internet of Things (IoT) has significantly transformed how devices and systems interact, enabling data-driven insights and smarter services across industries. However, this connectivity introduces complex security challenges, particularly in managing dynamic and fine-grained access to sensitive data. Attribute-Based Access Control (ABAC) emerges as a flexible and scalable solution to these challenges, offering policy-driven access control based on diverse attributes rather than rigid identities or roles. This paper provides a comprehensive review of ABAC in the context of IoT ecosystems, discussing its core principles, advantages, and limitations. We examine recent research efforts aimed at lightweight ABAC schemes, blockchain integration, context-aware access decisions, and privacy-preserving mechanisms. Furthermore, the paper outlines future directions to address policy complexity, resource constraints, and cross-domain interoperability. By addressing these issues, ABAC can play a pivotal role in securing IoT data sharing while ensuring scalability, privacy, and trustworthiness.

Downloads

Download data is not yet available.

References

V. C. Hu, D. F. Ferraiolo, and D. R. Kuhn, "Assessment of Access Control Systems," NIST Interagency Report 7316, National Institute of Standards and Technology, 2013.

M. N. Ibrahim, M. H. Al-Khouri, and H. S. Hassanein, "Attribute-based access control in the internet of things: A survey," IEEE Internet of Things Journal, vol. 7, no. 10, pp. 10104–10121, Oct. 2020.

P. R. J. L. Ferreira, A. E. C. da Rocha, and R. de L. Barbosa, "A Lightweight Attribute-Based Access Control Model for IoT Devices," Sensors, vol. 19, no. 22, pp. 4895, Nov. 2019.

Y. Wang, K. Liang, J. Wu, and R. H. Deng, "Privacy-Preserving Attribute-Based Access Control for IoT Applications," IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 2, pp. 733–746, Mar.–Apr. 2021.

M. Z. A. Bhuiyan, S. H. Ahmed, and M. F. Zolkipli, "Blockchain-Based Access Control for Secure IoT Ecosystems," IEEE Access, vol. 8, pp. 137055–137069, 2020.

OASIS, "eXtensible Access Control Markup Language (XACML) Version 3.0," OASIS Standard, Jan. 2013. [Online]. Available: https://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html

R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-Based Access Control Models," IEEE Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996.

Abomhara and G. M. Køien, "Security and Privacy in the Internet of Things: Current Status and Open Issues," International Journal of Information Security, vol. 14, no. 5, pp. 283–294, Oct. 2015.

K. R. Jackson, P. S. Saini, and A. Y. Zomaya, "Context-Aware Attribute-Based Access Control for Internet of Things," ACM Computing Surveys, vol. 52, no. 3, pp. 1–37, June 2019.

S. J. R. Al-Muhtadi, S. Raza, and M. F. Zolkipli, "Policy Management for IoT Security: A Survey," Journal of Network and Computer Applications, vol. 128, pp. 19–39, Nov. 2019.

Downloads

Published

2025-09-11

How to Cite

1.
Shekhar S, Shukla AK. Enhancing Iot Security Through Attribute-Based Access Control: A Review And Future Directions. J Neonatal Surg [Internet]. 2025Sep.11 [cited 2025Sep.12];14(2):286-91. Available from: https://www.jneonatalsurg.com/index.php/jns/article/view/9125