Cargando…
Statement Recognition of Access Control Policies in IoT Networks
Access Control Policies (ACPs) are essential for ensuring secure and authorized access to resources in IoT networks. Recognizing these policies involves identifying relevant statements within project documents expressed in natural language. While current research focuses on improving recognition acc...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10536329/ https://www.ncbi.nlm.nih.gov/pubmed/37765992 http://dx.doi.org/10.3390/s23187935 |
_version_ | 1785112840069185536 |
---|---|
author | Ma, Li Yang, Zexian Bu, Zhaoxiong Lao, Qidi Yang, Wenyin |
author_facet | Ma, Li Yang, Zexian Bu, Zhaoxiong Lao, Qidi Yang, Wenyin |
author_sort | Ma, Li |
collection | PubMed |
description | Access Control Policies (ACPs) are essential for ensuring secure and authorized access to resources in IoT networks. Recognizing these policies involves identifying relevant statements within project documents expressed in natural language. While current research focuses on improving recognition accuracy through algorithm enhancements, the challenge of limited labeled data from individual clients is often overlooked, which impedes the training of highly accurate models. To address this issue and harness the potential of IoT networks, this paper presents FL-Bert-BiLSTM, a novel model that combines federated learning and pre-trained word embedding techniques for access control policy recognition. By leveraging the capabilities of IoT networks, the proposed model enables real-time and distributed training on IoT devices, effectively mitigating the scarcity of labeled data and enhancing accessibility for IoT applications. Additionally, the model incorporates pre-trained word embeddings to leverage the semantic information embedded in textual data, resulting in improved accuracy for access control policy recognition. Experimental results substantiate that the proposed model not only enhances accuracy and generalization capability but also preserves data privacy, making it well-suited for secure and efficient access control in IoT networks. |
format | Online Article Text |
id | pubmed-10536329 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-105363292023-09-29 Statement Recognition of Access Control Policies in IoT Networks Ma, Li Yang, Zexian Bu, Zhaoxiong Lao, Qidi Yang, Wenyin Sensors (Basel) Article Access Control Policies (ACPs) are essential for ensuring secure and authorized access to resources in IoT networks. Recognizing these policies involves identifying relevant statements within project documents expressed in natural language. While current research focuses on improving recognition accuracy through algorithm enhancements, the challenge of limited labeled data from individual clients is often overlooked, which impedes the training of highly accurate models. To address this issue and harness the potential of IoT networks, this paper presents FL-Bert-BiLSTM, a novel model that combines federated learning and pre-trained word embedding techniques for access control policy recognition. By leveraging the capabilities of IoT networks, the proposed model enables real-time and distributed training on IoT devices, effectively mitigating the scarcity of labeled data and enhancing accessibility for IoT applications. Additionally, the model incorporates pre-trained word embeddings to leverage the semantic information embedded in textual data, resulting in improved accuracy for access control policy recognition. Experimental results substantiate that the proposed model not only enhances accuracy and generalization capability but also preserves data privacy, making it well-suited for secure and efficient access control in IoT networks. MDPI 2023-09-16 /pmc/articles/PMC10536329/ /pubmed/37765992 http://dx.doi.org/10.3390/s23187935 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Ma, Li Yang, Zexian Bu, Zhaoxiong Lao, Qidi Yang, Wenyin Statement Recognition of Access Control Policies in IoT Networks |
title | Statement Recognition of Access Control Policies in IoT Networks |
title_full | Statement Recognition of Access Control Policies in IoT Networks |
title_fullStr | Statement Recognition of Access Control Policies in IoT Networks |
title_full_unstemmed | Statement Recognition of Access Control Policies in IoT Networks |
title_short | Statement Recognition of Access Control Policies in IoT Networks |
title_sort | statement recognition of access control policies in iot networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10536329/ https://www.ncbi.nlm.nih.gov/pubmed/37765992 http://dx.doi.org/10.3390/s23187935 |
work_keys_str_mv | AT mali statementrecognitionofaccesscontrolpoliciesiniotnetworks AT yangzexian statementrecognitionofaccesscontrolpoliciesiniotnetworks AT buzhaoxiong statementrecognitionofaccesscontrolpoliciesiniotnetworks AT laoqidi statementrecognitionofaccesscontrolpoliciesiniotnetworks AT yangwenyin statementrecognitionofaccesscontrolpoliciesiniotnetworks |