2021
DOI: 10.48550/arxiv.2106.04808
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Blockchain for IoT Access Control: Recent Trends and Future Research Directions

Abstract: With the rapid development of wireless sensor networks, smart devices, and traditional information and communication technologies, there is tremendous growth in the use of Internet of Things (IoT) applications and services in our everyday life. IoT systems deal with high volumes of data. This data can be particularly sensitive, as it may include health, financial, location, and other highly personal information. Finegrained security management in IoT demands effective access control. Several proposals discuss … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 92 publications
(123 reference statements)
0
1
0
Order By: Relevance
“…For example, Role-Based Access Control (RBAC) [6] links user access levels to their roles in an organisation's structure, Attribute-based access control (ABAC) [7] links different access control levels to a user's attributes, and Capability-based Access Control (Cap-BAC) [8] assesses a user's capabilities to determine the appropriate access control level. Although many studies indicate that these traditional access control methods can be used in IoTbased environments, implementing them in real-world situations raises concerns due to architecture-level capabilities such as centralised networks, protocol constraints, device heterogeneity, scalability requirements, and functional limitations in IoT-based environments [9]. Further, untrustworthy parties can potentially tamper with access policies in distributed environments, compromising system security by giving access unauthorised access to the users [10].…”
Section: Introductionmentioning
confidence: 99%
“…For example, Role-Based Access Control (RBAC) [6] links user access levels to their roles in an organisation's structure, Attribute-based access control (ABAC) [7] links different access control levels to a user's attributes, and Capability-based Access Control (Cap-BAC) [8] assesses a user's capabilities to determine the appropriate access control level. Although many studies indicate that these traditional access control methods can be used in IoTbased environments, implementing them in real-world situations raises concerns due to architecture-level capabilities such as centralised networks, protocol constraints, device heterogeneity, scalability requirements, and functional limitations in IoT-based environments [9]. Further, untrustworthy parties can potentially tamper with access policies in distributed environments, compromising system security by giving access unauthorised access to the users [10].…”
Section: Introductionmentioning
confidence: 99%