2016
DOI: 10.1002/sec.1748
|View full text |Cite
|
Sign up to set email alerts
|

FairAccess: a new Blockchain‐based access control framework for the Internet of Things

Abstract: Security and privacy are huge challenges in Internet of Things (IoT) environments, but unfortunately, the harmonization of the IoT-related standards and protocols is hardly and slowly widespread. In this paper, we propose a new framework for access control in IoT based on the blockchain technology. Our first contribution consists in providing a reference model for our proposed framework within the Objectives, Models, Architecture and Mechanism specification in IoT. In addition, we introduce FairAccess as a ful… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
275
0
3

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 570 publications
(303 citation statements)
references
References 27 publications
0
275
0
3
Order By: Relevance
“…The main drawback is that their fragmented ledger stores only hash values. Their architecture does not ensure data availability and data correctness. Ouaddah et al introduced FairAccess, authorization management framework with the added advantage of a privacy‐preserving mechanism. It allows users to manage their data.…”
Section: Existing Workmentioning
confidence: 99%
“…The main drawback is that their fragmented ledger stores only hash values. Their architecture does not ensure data availability and data correctness. Ouaddah et al introduced FairAccess, authorization management framework with the added advantage of a privacy‐preserving mechanism. It allows users to manage their data.…”
Section: Existing Workmentioning
confidence: 99%
“…The Common Criteria defines an organizational security policy as: a set of security rules, procedures, or guidelines imposed (or presumed to be imposed) now and/or in the future by an actual or hypothetical organization in the operational environment [4].…”
Section: Security Policy Managementmentioning
confidence: 99%
“…The devices can then query the contract, find out about the new firmware, and request it by its hash via a distributed peer-to-peer file system such as IPFS. Another approach to integrate the blockchain in the IoT is presented in the framework FairAccess [4] which will be detailed in section III.…”
Section: Ac and Blockchainmentioning
confidence: 99%
See 1 more Smart Citation
“…Since BTC has flourished, Blockchain, the technology that underpins BTC, could, according to Swan, have far-ranging consequences for all aspects of modern society. Based on the characteristics of Blockchain, many researchers have carried out research on its application in the IoT environment [21], such as applying BC to the smart home system to ensure the security and privacy of information [22], applying smart contract in IoT [23], using the BC platform to manage IoT devices [24], and made security transmission for IoT [25]. The reason for this explosion of interest is that, with the Blockchain technology in place, applications that could previously run only through a trusted intermediary can now operate in a decentralized fashion.…”
Section: Related Workmentioning
confidence: 99%