2022
DOI: 10.3390/electronics11142225
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Access Control Techniques for IoT Applications

Abstract: The Internet of Things is gaining more importance in the present era of Internet technology. It is considered as one of the most important technologies of everyday life. Moreover, IoT systems are ceaselessly growing with more and more devices. They are scalable, dynamic, and distributed, hence the origin of the crucial security requirements in IoT. One of the most challenging issues that the IoT community must handle recently is how to ensure an access control approach that manages the security requirements of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 79 publications
0
2
0
Order By: Relevance
“…What criteria must be met when picking a blockchain scheme (private or public)? Attempting to combine RBAC with blockchain technology presented its own set of difficulties [132]. The first concern is the incompatibility (lack of standardization) of blockchain applications in various contexts and sectors.…”
Section: Device Imp Policiementioning
confidence: 99%
“…What criteria must be met when picking a blockchain scheme (private or public)? Attempting to combine RBAC with blockchain technology presented its own set of difficulties [132]. The first concern is the incompatibility (lack of standardization) of blockchain applications in various contexts and sectors.…”
Section: Device Imp Policiementioning
confidence: 99%
“…We would like to develop of a real testbed experiment for the whole proposed scheme for implementing the access control and key management parts. Next, we would like to apply "fog computing", "multi-access edge computing", and "dew computing" as in [75] to check if it is possible to come out with an efficient blockchain-based access control technique that can significantly reduce the computation cost.…”
Section: Discussionmentioning
confidence: 99%
“…In [83], smart contracts have been used to replace access control lists and access management systems. In a nutshell, these self-executing contracts automate access control based on the pre-established rules in a decentralized and automated permissions manner.…”
Section: Aslam Et Al [84] Transaction Verification and Consensusmentioning
confidence: 99%