2020
DOI: 10.1109/jiot.2020.2969326
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Access Control in the Age of Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
124
0
3

Year Published

2020
2020
2021
2021

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 332 publications
(160 citation statements)
references
References 101 publications
0
124
0
3
Order By: Relevance
“…is network is used mainly to strengthen authentication services in IoTs and protect data [35,36]. It utilizes blockchain's end-to-end zero-knowledge proof for verification and consensus, to defend against network layer attacks and malicious tampering.…”
Section: A Network (Access Control Network)mentioning
confidence: 99%
“…is network is used mainly to strengthen authentication services in IoTs and protect data [35,36]. It utilizes blockchain's end-to-end zero-knowledge proof for verification and consensus, to defend against network layer attacks and malicious tampering.…”
Section: A Network (Access Control Network)mentioning
confidence: 99%
“…Moreover, sandboxing and virtualization technologies can be used to deploy guest tasks in controlled environments to prevent native and in-native users from attacks [51]. In IoT search [52], access control mechanisms are discussed, where the characteristic of IoT search such as dynamic environment and massive data are highlighted.…”
Section: Related Workmentioning
confidence: 99%
“…Although it is flexible, complex and dynamic network infrastructure as given in [19]. In many fields such as healthcare, smart homes, smart cities, retail, traffic, security, and agriculture, IoT offers multiple solutions [20]. With the help of an IoT we can monitor the elements such as wind, crops, soil, atmosphere, lights and water over a big area [21].…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%