2023
DOI: 10.3390/electronics12224606
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Technology for Access and Authorization Management in the Internet of Things

Maria Polychronaki,
Dimitrios G. Kogias,
Helen C. Leligkou
et al.

Abstract: The Internet of Things (IoT) continues to suffer from security issues, even after 20 years of technological evolution and continuing efforts. While the decentralization of the IoT seems to be a solution for improved resource management and scalability, most of the services remain centralized, exposing IoT systems to malicious attacks. As a result, this leads to functionality failures and endangers user and data integrity. Identity and Access Management (IAM) has the ability to provide defense against a great n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…This attack affects the data link, network, transport, and system layers. In [27], two identity and authentication solutions were presented as a proof-of-concept based on solidity smart contracts. Blockchain is effective for decentralized Identity and Access Management (IAM), and manufacturers can integrate it seamlessly into existing IoT systems without redeveloping them.…”
Section: Inclusionmentioning
confidence: 99%
See 1 more Smart Citation
“…This attack affects the data link, network, transport, and system layers. In [27], two identity and authentication solutions were presented as a proof-of-concept based on solidity smart contracts. Blockchain is effective for decentralized Identity and Access Management (IAM), and manufacturers can integrate it seamlessly into existing IoT systems without redeveloping them.…”
Section: Inclusionmentioning
confidence: 99%
“…[26] Raspberry House, a security gateway for monitoring and preventing IoT intrusion is proposed, where IoT security gateway targets Denial of Service attacks on IoT devices, at the level of the data link, network, and transport layers, as well as the system security layer. [27] A proof-of-concept design is demonstrated and a solidity smart contract-based IAM solution is implemented, and the challenges associated with integrating blockchain in existing IoT systems are identified, which prevents manufacturers from redesigning or redeveloping IoT systems. [28] A blockchain model that simplifies implementation while enhancing security, handling authentication and authorization locally by cluster heads, and leveraging the concept of clustering is proposed.…”
Section: Inclusionmentioning
confidence: 99%