2022
DOI: 10.1109/tii.2021.3108676
|View full text |Cite
|
Sign up to set email alerts
|

DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(20 citation statements)
references
References 23 publications
0
16
0
Order By: Relevance
“…Access control was tested and found equally effective in firewall, server, application, database, and data layer. Rule-based [120][121][122] Prioritize sensing and communicating nodes as per their role LACS [123] Authorizing Fog nodes based on caching services, DeCoNet [124] Cluster reachability-distance based utilization of thinning operation to enforce Access validation.…”
Section: Classification Of Internet Of Things Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…Access control was tested and found equally effective in firewall, server, application, database, and data layer. Rule-based [120][121][122] Prioritize sensing and communicating nodes as per their role LACS [123] Authorizing Fog nodes based on caching services, DeCoNet [124] Cluster reachability-distance based utilization of thinning operation to enforce Access validation.…”
Section: Classification Of Internet Of Things Access Controlmentioning
confidence: 99%
“…Fog-cloud computing outsourcing verification to avoid access structure data leaks Li et al [115] highlighted the ability of CP-WABE to safeguard information security on the Internet of Health Things (IoHT) as a crucial component of a highly appreciated security technique for attaining flawless access control. To tackle this limitation, a novel method of formulating access policies was devised that makes use of 0-1 coding technol- Rule-based [120][121][122] Prioritize sensing and communicating nodes as per their role LACS [123] Authorizing Fog nodes based on caching services, DeCoNet [124] Cluster reachability-distance based utilization of thinning operation to enforce Access validation.…”
Section: Oac-has [127]mentioning
confidence: 99%
“…Moving the focus towards industrial application, Sah et al proposed in [28] a blockchain-based framework called Decentralized Hybrid Access Control for Smart contract (DHACS) for the Industrial Internet-of-Thing (IIoT) to bring up a robust access control mechanism for the IIoT. In another work, Lin et al considered the challenge of secure data aggregation for the increasing number of data processing and sharing flows via industrial applications and services [29].…”
Section: Related Workmentioning
confidence: 99%
“…The rapid development of the Internet has prompted the beginning of the information age [ 1 , 2 , 3 , 4 ]. As a two-dimensional image, the quick response (QR) code carries a lot of information [ 5 ].…”
Section: Introductionmentioning
confidence: 99%