2019
DOI: 10.1016/j.cose.2019.06.010
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain based permission delegation and access control in Internet of Things (BACI)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(37 citation statements)
references
References 12 publications
0
35
0
Order By: Relevance
“…The second is an in-depth study of permission delegation in the access control of the blockchain, which proposes a model with its own characteristics. Ali et al studied the application of permission delegation in blockchain-based access control in the IoT scenario, and divided the permission delegation into an event-based one and a query-based one [28]. But this study does not focus on the security issues brought about by permission delegation.…”
Section: Related Workmentioning
confidence: 99%
“…The second is an in-depth study of permission delegation in the access control of the blockchain, which proposes a model with its own characteristics. Ali et al studied the application of permission delegation in blockchain-based access control in the IoT scenario, and divided the permission delegation into an event-based one and a query-based one [28]. But this study does not focus on the security issues brought about by permission delegation.…”
Section: Related Workmentioning
confidence: 99%
“…If there is more than one output transaction, the person is attempting to spend the same coin twice, and the illegal transaction is called a spent transaction output (STOX) [35]. This ledger is how the decentralized network can differentiate between one unique coin from another [34,36,37]. Different consensus algorithms for blockchain are described as follows.…”
Section: Distributed Ledger and The Blockchainmentioning
confidence: 99%
“…Each node interacts with the smart contract through the provided contract address and the Remote Procedure Call (RPC) interface to check the validity of the tokens or access permission. Another method that is suitable for all access control mechanisms in IoT is proposed by Ali et al [34] with focus on right delegation. In this method the device (owner) in the process of registration in the blockchain, will sign a contract.…”
Section: A Using Blockchain As Database For Rulesmentioning
confidence: 99%