2021
DOI: 10.1109/tnsm.2021.3077276
|View full text |Cite
|
Sign up to set email alerts
|

Trust-Based Blockchain Authorization for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
43
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
3

Relationship

2
8

Authors

Journals

citations
Cited by 64 publications
(45 citation statements)
references
References 27 publications
2
43
0
Order By: Relevance
“…We noted, among others, that building trust between various entities in a highly dynamic and scalable system like the IoT is a challenging task that is significant when sharing information and controlling their access. Most of the access control approaches at present enhance the traditional distributed trust management systems for the IoT, lacking the proper need for trust in an IoT context [124]. We argue that there is a need to investigate the fusion of multiple observations along with the distributed aspects of trust in decision making under multiple-sources for large-scale IoT systems.…”
Section: E Road Aheadmentioning
confidence: 99%
“…We noted, among others, that building trust between various entities in a highly dynamic and scalable system like the IoT is a challenging task that is significant when sharing information and controlling their access. Most of the access control approaches at present enhance the traditional distributed trust management systems for the IoT, lacking the proper need for trust in an IoT context [124]. We argue that there is a need to investigate the fusion of multiple observations along with the distributed aspects of trust in decision making under multiple-sources for large-scale IoT systems.…”
Section: E Road Aheadmentioning
confidence: 99%
“…Nevertheless, similar to authentication procedures, standard authorisation methods in the IoT rely on existing approaches, which incur overhead and centralisation. However, proposing decentralised, dynamic, and adaptable access control mechanisms is a critical requirement for resolving conventional authorisation or access control systems issues [179,180]. -Accountability of Network Users and Resources: After successfully authenticating and authorising users, an accountability process monitors resources consumed by network or application users.…”
Section: Security Requirementsmentioning
confidence: 99%
“…Blockchain is used instead of untrusted cloud servers to perform the outsourcing decryption on attributes determining the secure access to resources. To achieve the dynamic nature of authorisation mechanisms for IoT networks, Putra et al [40] presented a decentralised access control mechanism based on the ABAC model in conjunction with a trust and reputation system. The proposed mechanism sought to achieve dynamic access privileges by focusing on IoT device compromise scenarios.…”
Section: Smart Contracts-based Approachesmentioning
confidence: 99%