2019 IEEE 5th World Forum on Internet of Things (WF-IoT) 2019
DOI: 10.1109/wf-iot.2019.8767223
|View full text |Cite
|
Sign up to set email alerts
|

OAuth 2.0 meets Blockchain for Authorization in Constrained IoT Environments

Abstract: We present models for utilizing blockchain and smart contract technology with the widely used OAuth 2.0 open authorization framework to provide delegated authorization for constrained IoT devices. The models involve different tradeoffs in terms of privacy, delay, and cost, while exploiting key advantages of blockchains and smart contracts. These include linking payments to authorization grants, immutably recording authorization information and policies in smart contracts, and offering resilience through the ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…However, it requires a client, the protected resource, the RO, and the AS to be online at the moment of the access request, which is often difficult to fulfill when the protected resource is an IoT device with intermittent network access. As a potential solution, Siris et al proposed a variant of OAuth 2.0 for IoT devices: a two-fold scheme which uses blockchain and smart contract technology [14]. Firstly, they proposed a scheme in which the client requests the access for an IoT to an AS.…”
Section: A Iot Access Managementmentioning
confidence: 99%
“…However, it requires a client, the protected resource, the RO, and the AS to be online at the moment of the access request, which is often difficult to fulfill when the protected resource is an IoT device with intermittent network access. As a potential solution, Siris et al proposed a variant of OAuth 2.0 for IoT devices: a two-fold scheme which uses blockchain and smart contract technology [14]. Firstly, they proposed a scheme in which the client requests the access for an IoT to an AS.…”
Section: A Iot Access Managementmentioning
confidence: 99%
“…The work in this paper is related to our previous work published in [13]- [15]. However, in these papers we considered constrained devices not capable of accessing the blockchain.…”
Section: Related Workmentioning
confidence: 99%
“…Smart contracts are ideal for performing "fair exchange" of digital goods [19]. In our previous work, published in [15], we used smart contracts to exchange an access token for money. In a nutshell, with the solution presented in [15] the authorization server encrypts a token, the client "deposits" some money in the form of escrow, and the server receives the escrow only if it reveals the "correct" decryption key.…”
Section: Fair Exchangementioning
confidence: 99%
“…Siris et al 18 proposed an authorization framework based on blockchain and OAuth 2.0 to provide delegation of authorization for constrained IoT nodes. In this work, the authors combined OAuth 2.0 with blockchain to allow authorizations to be linked to payments so that the OAuth 2.0 message flow for the payments remains on the blockchain.…”
Section: Introductionmentioning
confidence: 99%