2022
DOI: 10.1109/jiot.2021.3096129
|View full text |Cite
|
Sign up to set email alerts
|

Access Control for Distributed Ledgers in the Internet of Things: A Networking Approach

Abstract: In the Internet of Things (IoT) domain, devices need a platform to transact seamlessly without a trusted intermediary. Although Distributed Ledger Technologies (DLTs) could provide such a platform, blockchains, such as Bitcoin, were not designed with IoT networks in mind, hence are often unsuitable for such applications: they offer poor transaction throughput and confirmation times, put stress on constrained computing and storage resources, and require high transaction fees. In this work, we consider a class o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 35 publications
0
14
0
Order By: Relevance
“…While our results generally apply to any DAG-based DLT, we include some details of IOTA's implementation as a concrete example. Specifically, the rate at which nodes can issue transactions in the IOTA network is regulated by an access control algorithm [27], [28]. Each node regulates its own issue rate via a distributed algorithm based on the additive increase multiplicative decrease (AIMD) algorithm [29]- [31] 3 .…”
Section: System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…While our results generally apply to any DAG-based DLT, we include some details of IOTA's implementation as a concrete example. Specifically, the rate at which nodes can issue transactions in the IOTA network is regulated by an access control algorithm [27], [28]. Each node regulates its own issue rate via a distributed algorithm based on the additive increase multiplicative decrease (AIMD) algorithm [29]- [31] 3 .…”
Section: System Modelmentioning
confidence: 99%
“…In a PoW ledger, this would be a fixed value, λi (t) = λ i , based on the computing power of node i (provided the node's computing power remains constant). In this work, however, we focus our attention on the IOTA protocol in which the service rate of the LTP is governed by an AIMD rate setter [27] as part of IOTA's access control algorithm which replaces the need for PoW. We employ a max-min moving average filter to estimate the issue rate of each node as described in the Appendix.…”
Section: Algorithm 3 Dbns Executed By Usersmentioning
confidence: 99%
See 1 more Smart Citation
“…Their model assumes that the computational power of the agent is known to the transaction rate regulator. [18] borrows an idea from wireless networks to control the transaction using an access control scheme. Congestion control has also been studied in the context of wireless communication.…”
Section: Related Workmentioning
confidence: 99%
“…To this end, in the future, the distributed ledger technology, e.g., blockchain, can provide a solution [122,123]. Furthermore, it reinforces the decentralized requirement of access control in both IoT and IIoT systems at scale [124]. For instance, hybrid access control is proposed in [125] for IIoT networks.…”
mentioning
confidence: 99%