Reference Hub2
The Access of Things: Spatial Access Control for the Internet of Things

The Access of Things: Spatial Access Control for the Internet of Things

Peter J. Hawrylak, Steven Reed, Matthew Butler, John Hale
ISBN13: 9781466651708|ISBN10: 1466651709|EISBN13: 9781466651715
DOI: 10.4018/978-1-4666-5170-8.ch007
Cite Chapter Cite Chapter

MLA

Hawrylak, Peter J., et al. "The Access of Things: Spatial Access Control for the Internet of Things." Handbook of Research on Progressive Trends in Wireless Communications and Networking, edited by M.A. Matin, IGI Global, 2014, pp. 189-207. https://doi.org/10.4018/978-1-4666-5170-8.ch007

APA

Hawrylak, P. J., Reed, S., Butler, M., & Hale, J. (2014). The Access of Things: Spatial Access Control for the Internet of Things. In M. Matin (Ed.), Handbook of Research on Progressive Trends in Wireless Communications and Networking (pp. 189-207). IGI Global. https://doi.org/10.4018/978-1-4666-5170-8.ch007

Chicago

Hawrylak, Peter J., et al. "The Access of Things: Spatial Access Control for the Internet of Things." In Handbook of Research on Progressive Trends in Wireless Communications and Networking, edited by M.A. Matin, 189-207. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-5170-8.ch007

Export Reference

Mendeley
Favorite

Abstract

Access to resources, both physical and cyber, must be controlled to maintain security. The increasingly connected nature of our world makes access control a paramount issue. The expansion of the Internet of Things into everyday life has created numerous opportunities to share information and resources with other people and other devices. The Internet of Things will contain numerous wireless devices. The level of access each user (human or device) is given must be controlled. Most conventional access control schemes are rigid in that they do not account for environmental context. This solution is not sufficient for the Internet of Things. What is needed is a more granular control of access rights and a gradual degradation or expansion of access based on observed facts. This chapter presents an access control system termed the Access of Things, which employs a gradual degradation of privilege philosophy. The Access of Things concept is applicable to the dynamic security environment present in the Internet of Things.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.