Cargando…

Statement Recognition of Access Control Policies in IoT Networks

Access Control Policies (ACPs) are essential for ensuring secure and authorized access to resources in IoT networks. Recognizing these policies involves identifying relevant statements within project documents expressed in natural language. While current research focuses on improving recognition acc...

Descripción completa

Detalles Bibliográficos
Autores principales: Ma, Li, Yang, Zexian, Bu, Zhaoxiong, Lao, Qidi, Yang, Wenyin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10536329/
https://www.ncbi.nlm.nih.gov/pubmed/37765992
http://dx.doi.org/10.3390/s23187935
_version_ 1785112840069185536
author Ma, Li
Yang, Zexian
Bu, Zhaoxiong
Lao, Qidi
Yang, Wenyin
author_facet Ma, Li
Yang, Zexian
Bu, Zhaoxiong
Lao, Qidi
Yang, Wenyin
author_sort Ma, Li
collection PubMed
description Access Control Policies (ACPs) are essential for ensuring secure and authorized access to resources in IoT networks. Recognizing these policies involves identifying relevant statements within project documents expressed in natural language. While current research focuses on improving recognition accuracy through algorithm enhancements, the challenge of limited labeled data from individual clients is often overlooked, which impedes the training of highly accurate models. To address this issue and harness the potential of IoT networks, this paper presents FL-Bert-BiLSTM, a novel model that combines federated learning and pre-trained word embedding techniques for access control policy recognition. By leveraging the capabilities of IoT networks, the proposed model enables real-time and distributed training on IoT devices, effectively mitigating the scarcity of labeled data and enhancing accessibility for IoT applications. Additionally, the model incorporates pre-trained word embeddings to leverage the semantic information embedded in textual data, resulting in improved accuracy for access control policy recognition. Experimental results substantiate that the proposed model not only enhances accuracy and generalization capability but also preserves data privacy, making it well-suited for secure and efficient access control in IoT networks.
format Online
Article
Text
id pubmed-10536329
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-105363292023-09-29 Statement Recognition of Access Control Policies in IoT Networks Ma, Li Yang, Zexian Bu, Zhaoxiong Lao, Qidi Yang, Wenyin Sensors (Basel) Article Access Control Policies (ACPs) are essential for ensuring secure and authorized access to resources in IoT networks. Recognizing these policies involves identifying relevant statements within project documents expressed in natural language. While current research focuses on improving recognition accuracy through algorithm enhancements, the challenge of limited labeled data from individual clients is often overlooked, which impedes the training of highly accurate models. To address this issue and harness the potential of IoT networks, this paper presents FL-Bert-BiLSTM, a novel model that combines federated learning and pre-trained word embedding techniques for access control policy recognition. By leveraging the capabilities of IoT networks, the proposed model enables real-time and distributed training on IoT devices, effectively mitigating the scarcity of labeled data and enhancing accessibility for IoT applications. Additionally, the model incorporates pre-trained word embeddings to leverage the semantic information embedded in textual data, resulting in improved accuracy for access control policy recognition. Experimental results substantiate that the proposed model not only enhances accuracy and generalization capability but also preserves data privacy, making it well-suited for secure and efficient access control in IoT networks. MDPI 2023-09-16 /pmc/articles/PMC10536329/ /pubmed/37765992 http://dx.doi.org/10.3390/s23187935 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ma, Li
Yang, Zexian
Bu, Zhaoxiong
Lao, Qidi
Yang, Wenyin
Statement Recognition of Access Control Policies in IoT Networks
title Statement Recognition of Access Control Policies in IoT Networks
title_full Statement Recognition of Access Control Policies in IoT Networks
title_fullStr Statement Recognition of Access Control Policies in IoT Networks
title_full_unstemmed Statement Recognition of Access Control Policies in IoT Networks
title_short Statement Recognition of Access Control Policies in IoT Networks
title_sort statement recognition of access control policies in iot networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10536329/
https://www.ncbi.nlm.nih.gov/pubmed/37765992
http://dx.doi.org/10.3390/s23187935
work_keys_str_mv AT mali statementrecognitionofaccesscontrolpoliciesiniotnetworks
AT yangzexian statementrecognitionofaccesscontrolpoliciesiniotnetworks
AT buzhaoxiong statementrecognitionofaccesscontrolpoliciesiniotnetworks
AT laoqidi statementrecognitionofaccesscontrolpoliciesiniotnetworks
AT yangwenyin statementrecognitionofaccesscontrolpoliciesiniotnetworks