GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017
DOI: 10.1109/glocom.2017.8254521
|View full text |Cite
|
Sign up to set email alerts
|

ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
83
0
5

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 140 publications
(89 citation statements)
references
References 69 publications
(141 reference statements)
1
83
0
5
Order By: Relevance
“…It uses the Blockchain as a platform for storing and synchronizing all the data essential for authorization decision making. Furthermore, we also expanded the original ControlChain to a hybrid approach. This main change was the employment of a side channel, off‐Blockchain, used for the propagation of time‐sensitive data.…”
Section: Introductionmentioning
confidence: 99%
“…It uses the Blockchain as a platform for storing and synchronizing all the data essential for authorization decision making. Furthermore, we also expanded the original ControlChain to a hybrid approach. This main change was the employment of a side channel, off‐Blockchain, used for the propagation of time‐sensitive data.…”
Section: Introductionmentioning
confidence: 99%
“…This architecture can help in making the network more scalable and fault tolerant with a wide range of access control to IoT devices. The ControlChain also provides attributes assignment and relationship management in a secure manner . The Ethereum‐ControlChain ( E‐ControlChain ) was created as a ControlChain proof of concept to check ControlChain practical viability for the IoT.…”
Section: Existing Workmentioning
confidence: 99%
“…The ControlChain also provides attributes assignment and relationship management in a secure manner. 84 The Ethereum-ControlChain (E-ControlChain) was created as a ControlChain proof of concept to check ControlChain practical viability for the IoT. Their cost and performance analysis showed that even limited devices, like a Raspberry Pi, can easily handle the E-ControlChain requirements.…”
Section: Research Issue Research Workmentioning
confidence: 99%
“…[60] Mobile applications. Alansari et al [1,2] Cloud federation Ouaddah et al [39], Pinno et al [41], Dukkipati [21], Ma et al [34] Personal data generated by IoT devices Dagher et al [14], Azaria et al [5], Xia et al [52] Healthcare patients data Le and Mutka [30] Pervasive environment…”
Section: Blockchain-based Access Control Systemmentioning
confidence: 99%
“…Blockchain applications initially were limited to the cryptocurrencies and financial transactions. Invention of smart contracts leads to development of more divers applications [10], such as healthcare [5,14,42,52], IoT [16,21,38,41,46,47], supply chain [8,12,29]. In our previous study [43], after reviewing many research studies based on blockchain and smart contracts, we noticed that the primary focus of many presented applications is providing an efficient and secure access control mechanism.…”
Section: Introductionmentioning
confidence: 99%