2020 International Computer Symposium (ICS) 2020
DOI: 10.1109/ics51289.2020.00097
|View full text |Cite
|
Sign up to set email alerts
|

User-Managed Access Delegation for Blockchain-driven IoT Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…There are many use cases where UMA can be utilized for IoT networks. However, the research has identified four major challenges, including availability, transparency, traceability, and maintainability [ 48 ]. UMA follows a centralized architecture and therefore is at risk of a single point of failure [ 48 ].…”
Section: Access Control Authorization Architecturementioning
confidence: 99%
See 3 more Smart Citations
“…There are many use cases where UMA can be utilized for IoT networks. However, the research has identified four major challenges, including availability, transparency, traceability, and maintainability [ 48 ]. UMA follows a centralized architecture and therefore is at risk of a single point of failure [ 48 ].…”
Section: Access Control Authorization Architecturementioning
confidence: 99%
“…However, the research has identified four major challenges, including availability, transparency, traceability, and maintainability [ 48 ]. UMA follows a centralized architecture and therefore is at risk of a single point of failure [ 48 ]. In a third-party access control service utilizing UMA, it can be a difficult task to trace the authorization history [ 48 ].…”
Section: Access Control Authorization Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…• Security threats The single blockchain node that is responsible for validation of all user requests is vulnerable to various distributed denial-of-service (DDoS) attacks such as when the malicious adversary produces a large volume of access requests in a periodical manner to waste the resources of the blockchain node. • Privacy threats The access control is carried out by the single public blockchain node by verifying the access policies and attributes stored in the blockchain, which poses privacy issues for the attribute owners [15], [16].…”
Section: Introductionmentioning
confidence: 99%