2019
DOI: 10.3390/app9102058
|View full text |Cite
|
Sign up to set email alerts
|

Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things

Abstract: Edge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIoT). However, computing′s unique features have also introduced new security problems. To solve the problem, in this paper, blockchain-based identity management combining access control mechanism is designed under edge computing. The self-certified cryptography is ut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 81 publications
(41 citation statements)
references
References 36 publications
0
35
0
Order By: Relevance
“…However, access mechanisms are not used efficiently. The authors in [20] presented a blockchain-based smart toy data exchange system to provide decentralized, secure, trusted, fair, and reliable data exchange. The system is efficient and ensures transparency and data confidentiality.…”
Section: Related Workmentioning
confidence: 99%
“…However, access mechanisms are not used efficiently. The authors in [20] presented a blockchain-based smart toy data exchange system to provide decentralized, secure, trusted, fair, and reliable data exchange. The system is efficient and ensures transparency and data confidentiality.…”
Section: Related Workmentioning
confidence: 99%
“…In order to solve the problem of edge computing security in IIoT, the authors of [ 15 ] develop a mechanism focused on blockchain identity management and access control. The registration and authentication of network entities are implemented using self-certified password technology.…”
Section: Related Workmentioning
confidence: 99%
“…Then, Ren et al designed an identity management combination access control based on blockchain [31], and realized the registration and authentication of network entities by using cryptographic algorithm. The above research results provide new inspiration for the combination of the IoT and blockchain, and show that the IoT has considerable security requirements for security access control.…”
Section: B Iot and Blockchainmentioning
confidence: 99%