Securing the web of things with role-based access control

Ezedine Barka, Sujith Samuel Mathew, Yacine Atif

Research output: Chapter in Book/Report/Conference proceedingConference contribution

38 Citations (Scopus)


Real-world things are increasingly becoming fully qualified members of the Web. From, pacemakers and medical records to children’s toys and sneakers, things are connected over the Web and publish information that is available for the whole world to see. It is crucial that there is secure access to this Web of Things (WoT) and to the related information published by things on the Web. In this paper, we introduce an architecture that encompasses Web-enabled things in a secure and scalable manner. Our architecture utilizes the features of the well-known role-based access control (RBAC) to specify the access control policies to the WoT, and we use cryptographic keys to enforce such policies. This approach enables prescribers to WoT services to control who can access what things and how access can continue or should terminate, thereby enabling privacy and security of large amount of data that these things are poised to flood the future Web with.

Original languageEnglish
Title of host publicationCodes, Cryptology, and Information Security - 1st International Conference, C2SI 2015, Proceedings
EditorsEl Mamoun Souidi, Said El Hajji, Claude Carlet, Abderrahmane Nitaj
PublisherSpringer Verlag
Number of pages13
ISBN (Print)9783319186801
Publication statusPublished - 2015
Event1st International Conference on Codes, Cryptology, and Information Security, C2SI 2015 - Rabat, Morocco
Duration: May 26 2015May 28 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other1st International Conference on Codes, Cryptology, and Information Security, C2SI 2015


  • Access Control
  • Privacy
  • RBAC
  • UCON
  • Web of Things

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Securing the web of things with role-based access control'. Together they form a unique fingerprint.

Cite this