2017
DOI: 10.14569/ijacsa.2017.080757
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things

Abstract: Abstract-The Internet of Things (IoT) is now destroying the barriers between the real and digital worlds. However, one of the huge problems that can slow down the development of this global wave, or even stop it, concerns security and privacy requirements. The criticality of these latter comes especially from the fact that the smart objects may contain very intimate information or even may be responsible for protecting people's lives. In this paper, the focus is on access control in the IoT context by proposin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 113 publications
(66 citation statements)
references
References 24 publications
0
55
0
Order By: Relevance
“…Many researchers focus on the application of RL to IoT security; for instance, the work in [28] opted for an RL approach to learn a sub-band selection policy so that it could avoid both jammer signals as well as interference from other radios in wideband autonomous cognitive radios (WACRs). Two of our previous works [1,29] tackled the Access Control (AC) in IoT scenarios, the two building blocks were: first taking into account the smart devices' context while making an AC decision; and proposing AC policies that can be improved and optimized over time. However, given the enormous and heterogeneous amount of data generated by IoT devices, the proposition benefits from the power of RL, to accomplish this task.…”
Section: B Learning Applications For Iot Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Many researchers focus on the application of RL to IoT security; for instance, the work in [28] opted for an RL approach to learn a sub-band selection policy so that it could avoid both jammer signals as well as interference from other radios in wideband autonomous cognitive radios (WACRs). Two of our previous works [1,29] tackled the Access Control (AC) in IoT scenarios, the two building blocks were: first taking into account the smart devices' context while making an AC decision; and proposing AC policies that can be improved and optimized over time. However, given the enormous and heterogeneous amount of data generated by IoT devices, the proposition benefits from the power of RL, to accomplish this task.…”
Section: B Learning Applications For Iot Securitymentioning
confidence: 99%
“…Zero-day attacks Good results in time-based environments Data augmentation [25], [27] Security policy improvements RL Policy optimization Policy efficiency [1], [28], [29] New and unprecedented attacks K-means, RL Zero-day & Sybil attacks detection Avoid jammer signals [1], [20], [28], [29] www.ijacsa.thesai.org…”
Section: Network Threats and Network Traffic Behavior Rnn Ganmentioning
confidence: 99%
See 1 more Smart Citation
“…OrBAC consists of three entities (subject, action, object) which define that some subject has the permission to realize some action on some object. OrBAC has already been used in blockchain for IoT in a fair access blockchain model [92] and in dynamic access control model on blockchain [145].…”
Section: Organization-based Access Control (Orbac)mentioning
confidence: 99%
“…Even though several works propose blockchain technology for access control (e.g. [19,22]), research has put little emphasis on whether and how blockchain can be applied to the more fundamental concept of IAM in enterprises. The question whether the blockchain technology can deal with the mentioned IAM challenges as a whole in context of enterprise IoT has not been entirely addressed in research yet.…”
Section: Introductionmentioning
confidence: 99%