2020
DOI: 10.1016/j.comcom.2020.01.030
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized authorization in constrained IoT environments exploiting interledger mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(18 citation statements)
references
References 5 publications
0
12
0
Order By: Relevance
“…For constructing an efficient, safe and reliable data exchange mechanism between the independent smart toy data platform and other IoT systems, Yang et al [ 114 ] used smart contract to solve the problem of automatic maintenance of tamper proof, reliable and distributed ledger under the premise of mutual distrust among participants, but with lower scalability. In order to provide decentralized authorization for restricted IOT devices, Vasilios et al [ 115 ] proposed an application model based on the combination of smart contract and interleaving apparatus mechanism, but it has the problems of higher execution cost and lower throughput. To address the problems of single point of failure and data tampering in the methods of traditional access control in the IoT environment, Zhang et al [ 116 ] designed Internet of things access control system based on smart contract, which made the system more flexible on the basis of address this problem, but the privacy of access control strategy still needs to be enhanced.…”
Section: Research On the Application Status Of Smart Contractmentioning
confidence: 99%
See 1 more Smart Citation
“…For constructing an efficient, safe and reliable data exchange mechanism between the independent smart toy data platform and other IoT systems, Yang et al [ 114 ] used smart contract to solve the problem of automatic maintenance of tamper proof, reliable and distributed ledger under the premise of mutual distrust among participants, but with lower scalability. In order to provide decentralized authorization for restricted IOT devices, Vasilios et al [ 115 ] proposed an application model based on the combination of smart contract and interleaving apparatus mechanism, but it has the problems of higher execution cost and lower throughput. To address the problems of single point of failure and data tampering in the methods of traditional access control in the IoT environment, Zhang et al [ 116 ] designed Internet of things access control system based on smart contract, which made the system more flexible on the basis of address this problem, but the privacy of access control strategy still needs to be enhanced.…”
Section: Research On the Application Status Of Smart Contractmentioning
confidence: 99%
“…On-demand insurance system [109] Identity management framework [110] Automatic gasoline purchase application [111] Enhance the trust of users [112] Resolve transaction overhead and latency issues [113] Data exchange mechanism [114] IoT access control system [116] Decentralized authorization for restricted devices [115]…”
Section: Ethereum Hyperledger Fabricmentioning
confidence: 99%
“…Users retrieve relevant information ba In Hyperledger, the centralized authorization and authentication of CAs may generate risks such as tampering and forgery. To solve the problem of centralized CA authorization, Siris [37] proposed two decentralized authorization strategies based on Hyperledger (Fabric). In Figure 14, it is shown that multiple organizations are authorized instead of unified authorization by CA nodes, and the authorized nodes for transactions at a certain moment are filtered according to the corresponding time of the nodes.…”
Section: Iot Securitymentioning
confidence: 99%
“…Researchers designed applicationaware consensus management for software-defined intelligent blockchain and an intelligent scheme to analyze packets at the IoT application-layer. Also, [65] aimed at quantifying the performance of constrained IoT devices in terms of reducing transaction delay and cost. These researchers proposed models based on inter-ledger mechanisms and smart contracts to provide decentralized authorization for IoT devices.…”
Section: Research Surveymentioning
confidence: 99%