2024
DOI: 10.1109/access.2023.3347495
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics

Zeinab M. Iqal,
Ali Selamat,
Ondrej Krejcar

Abstract: The Internet of Things (IoT) is an emerging technology with a very high market growth rate. In IoT, machines, and users from different levels need to collaborate to exchange data and share resources. IoT opens the door for a vast improvement in all human life aspects. However, the increasing adoption of IoT in many sectors makes it difficult to control security risks. For this reason, there is a need for more effort in both research and industry to address the risks and find convenient solutions. This systemat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 111 publications
0
1
0
Order By: Relevance
“…Technologies such as access control, encryption, and blockchain are fortunately capable of addressing the challenges faced by IoT data sharing. Access control stands out as a leading technology for securing IoT data, permitting users to access data within specified limits, legally [7][8][9]. It is widely recognized that conventional access control models provide only broad and coarse-grained access control, rendering them inadequate for the typical open environments of the IoT.…”
Section: Introductionmentioning
confidence: 99%
“…Technologies such as access control, encryption, and blockchain are fortunately capable of addressing the challenges faced by IoT data sharing. Access control stands out as a leading technology for securing IoT data, permitting users to access data within specified limits, legally [7][8][9]. It is widely recognized that conventional access control models provide only broad and coarse-grained access control, rendering them inadequate for the typical open environments of the IoT.…”
Section: Introductionmentioning
confidence: 99%