2021
DOI: 10.1109/access.2021.3059863
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based IoT Access Control System: Towards Security, Lightweight, and Cross-Domain

Abstract: Most IoT devices cannot afford to be a blockchain node due to the high computation and storage loads. Thus, the blockchain is usually deployed on one delegate node, e.g., the edge device or cloud, which may encounters three drawbacks: (1) The delegate node becomes the single failure point when the number of delegate notes are limited. (2) The delegate node replicating the blockchain data can lead to privacy information leak. (3) The delegate node is vulnerable to the Distributed Denial of Service (DDoS) attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 96 publications
(51 citation statements)
references
References 24 publications
0
51
0
Order By: Relevance
“…Therefore, PKAM mitigates DDoS attacks by verifying access rights and preventing network traffic caused by fraudulent transactions. In addition, to avoid DDoS attacks, the authors in [ 109 ] design a Blocikchain-based access control system for IoT devices based on identity-based signature to enable servers to filter and forward access requests.…”
Section: Blockchain Based Solutions To Mitigate Ddos Attacks In Iotmentioning
confidence: 99%
“…Therefore, PKAM mitigates DDoS attacks by verifying access rights and preventing network traffic caused by fraudulent transactions. In addition, to avoid DDoS attacks, the authors in [ 109 ] design a Blocikchain-based access control system for IoT devices based on identity-based signature to enable servers to filter and forward access requests.…”
Section: Blockchain Based Solutions To Mitigate Ddos Attacks In Iotmentioning
confidence: 99%
“…The distributed architecture of blockchain happens to be an essential technology to solve the traditional single-point failure in IoT. A single point of failure in an IoT system may break the whole system, which is detrimental to achieving high reliability and availability in any system [236]; therefore, the peer-to-peer architecture in blockchain technology is a feasible solution to handle the bottleneck and the point of failure in an IoT system [237,238]. Additionally, peer-to-peer networks process and store the IoT data securely and efficiently [239].…”
Section: Convergence Challenges and Solutionsmentioning
confidence: 99%
“…The mechanism proposed in [101] provides a suitable smart contract scheme for guaranteeing the integrity of IoT devices, and immutable and dynamic management of malicious applications. In [102], a blockchain ledger is established to make more blockchain Item Contributions [76] Blockchain-based communication architecture is based on Named Data Networking by integrating IoT systems. [61] Security auditing system is constructed to predict and detect any anomalies to guarantee confidentiality of data.…”
Section: Analysis Of Responsiveness Considering Different Types Of At...mentioning
confidence: 99%
“…[101] Provides a suitable smart contract scheme for guaranteeing the integrity of IoT devices. [102] Designs a mechanism to select multiple IoT devices to enable the real-time policy decisions in a distributed way. [103] Proposes a proxy re-encryption mechanism for secure sharing of data in cloud environments.…”
Section: Analysis Of Responsiveness Considering Different Types Of At...mentioning
confidence: 99%