Proceedings 2020 Workshop on Decentralized IoT Systems and Security 2020
DOI: 10.14722/diss.2020.23002
|View full text |Cite
|
Sign up to set email alerts
|

OAuth 2.0 Authorization using Blockchain-based Tokens

Abstract: OAuth 2.0 is the industry-standard protocol for authorization. It facilitates secure service provisioning, as well as secure interoperability among diverse stakeholders. All OAuth 2.0 protocol flows result in the creation of an access token, which is then used by a user to request access to a protected resource. Nevertheless, the definition of access tokens is transparent to the OAuth 2.0 protocol, which does not specify any particular token format, how tokens are generated, or how they are used. Instead, the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…The authors in [15] propose a blockchain-based smart contract design and implementation for OAuth 2.0 authorization tokens. The scenario presented by the authors considers clients, authorization servers, resource servers, and resource owners.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors in [15] propose a blockchain-based smart contract design and implementation for OAuth 2.0 authorization tokens. The scenario presented by the authors considers clients, authorization servers, resource servers, and resource owners.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed work in the present manuscript takes the ERC-721 approach of [15] as its basis but applies it to authentication instead of authorization. Our research aims to provide a secure distribution mechanism for enrollment tokens to create a strong identity.…”
Section: Related Workmentioning
confidence: 99%
“…The attack vector always finds ways to intervene in the security protocols. That is where the additional authentication protocols come in handy such as OpenID [ 58 ], Security Assertion Markups Language (SAML 1.1/2), Fast Identity Online (FIDO), or Open Authorization (OAuth) [ 59 , 60 , 61 ]. At the same time, the implementation relies on trusted third-party (TTP) solutions.…”
Section: Iot-enabled Smart Device Authentication Architectures In Sma...mentioning
confidence: 99%