Modeling and Design of Secure Internet of Things 2020
DOI: 10.1002/9781119593386.ch22
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Access Control for IoT Based on Blockchain and Smart Contract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…A large IoT network within the smart city can connect a huge number of resource-constrained devices with various storage and computing capabilities and it demands low latency for data gathering and access. However, the heterogeneous nature of such an IoT environment within a smart city poses significant privacy and security concerns [ 18 , 19 , 20 , 21 , 22 , 23 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…A large IoT network within the smart city can connect a huge number of resource-constrained devices with various storage and computing capabilities and it demands low latency for data gathering and access. However, the heterogeneous nature of such an IoT environment within a smart city poses significant privacy and security concerns [ 18 , 19 , 20 , 21 , 22 , 23 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Moreover, a light-weight blockchain along with the concept of identity-based distributed data possession in multi-cloud storage can be leveraged to ensure privacy and authorized access in many smart applications; additional works are required, though [14], [27], [28]. However, due to concerns on privacy and performance issues, a public blockchain is not an ideal candidate.…”
Section: B Blockchain Technologymentioning
confidence: 99%
“…An access control mechanism defines the admittance in certain kind of resources or services, promoting security and privacy. Such a mechanism determines the system's communication rights, as well as the authorization of all involving networking entities based on security models and policies [113]. A comprehensive access control of the ESG should be able to deal efficiently with authentication and authorization procedures.…”
Section: Access Control Mechanisms In Esgmentioning
confidence: 99%