2021
DOI: 10.26599/tst.2021.9010001
|View full text |Cite
|
Sign up to set email alerts
|

Access control and authorization in smart homes: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
18
0
3

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(21 citation statements)
references
References 0 publications
0
18
0
3
Order By: Relevance
“…We use this arbitration result as a reliable prior condition for iterative calculation. Therefore, for each iteration, both M and P conditions need to be combined to make the various nodes converge quickly, and singularity and periodicity are also avoided [25] . The calculation formula is given in Algorithm 5.…”
Section: Trust Updatementioning
confidence: 99%
See 1 more Smart Citation
“…We use this arbitration result as a reliable prior condition for iterative calculation. Therefore, for each iteration, both M and P conditions need to be combined to make the various nodes converge quickly, and singularity and periodicity are also avoided [25] . The calculation formula is given in Algorithm 5.…”
Section: Trust Updatementioning
confidence: 99%
“…We improve the Eigen trust model [24] to evaluate trust in two dimensions: communication and storage. The communication and storage data are sent to the leader node regularly through P2P network [25] , and the trust result is calculated by the improved model. Then, we select a group of trusted nodes by the trust ranking as the leader candidate nodes to speed up the transition process and reduce the network split [26] .…”
Section: Introductionmentioning
confidence: 99%
“…6 For privacy protection, users often do not want to expose their personal information. 7,8 For example, some users do not want to reveal that they have been to the hospital, or some users deliberately hide their experience of having been to the bar. Users act in this way to protect their privacy and avoid check-in, which leads to the sparse check-in.…”
Section: Introductionmentioning
confidence: 99%
“…Privacy protection 6 . For privacy protection, users often do not want to expose their personal information 7,8 . For example, some users do not want to reveal that they have been to the hospital, or some users deliberately hide their experience of having been to the bar.…”
Section: Introductionmentioning
confidence: 99%
“…APPs in the general world enter the monitor mode using a subset of Secure Monitor Call instructions or HW exception mechanisms. TrustZone technology is widely used for its high efficiency, lightweightness, and security, which can be deployed in heterogeneous mobile systems [4,5] and smart homes [6] , such as Qualcomm SEE architecture, Kinibi microkernel, Trusty, and open-source (OP)-TEE. Among them, OP-TEE is an open-source implementation of TEE developed by STMicroelectronics and Linaro.…”
mentioning
confidence: 99%