2020 2nd Conference on Blockchain Research &Amp; Applications for Innovative Networks and Services (BRAINS) 2020
DOI: 10.1109/brains49436.2020.9223293
|View full text |Cite
|
Sign up to set email alerts
|

IOTA-Based Access Control Framework for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…By publishing these trust ratings, nodes are empowered to carry out decision-making processes with only the most trustworthy nodes, thereby simultaneously distributing workloads and maximizing the trustworthiness of the result. To facilitate this behaviour, the framework follows a network architecture based on DAGs, as utilized in the IoTA cryptocurrency [32].…”
Section: B Design Considerationsmentioning
confidence: 99%
“…By publishing these trust ratings, nodes are empowered to carry out decision-making processes with only the most trustworthy nodes, thereby simultaneously distributing workloads and maximizing the trustworthiness of the result. To facilitate this behaviour, the framework follows a network architecture based on DAGs, as utilized in the IoTA cryptocurrency [32].…”
Section: B Design Considerationsmentioning
confidence: 99%
“…The publisher specifies the authorization key and can change it at any time in the channel's stream. This enables the publisher to revoke access [29] in their channel from future messages at any point in time. If access is not granted to the subscriber for the current authorization key, they will be unable to decode and locate subsequent transactions in the chain of messages.…”
Section: Modes and Channels Of Mammentioning
confidence: 99%
“…A preliminary version of the proposed scheme has been published as a conference paper in [ 37 ]. Compared with our previous work, this paper includes enhanced security by introducing an additional security measure, i.e., authentication of the subjects in order to prevent the use of illegally-obtained tokens.…”
Section: Introductionmentioning
confidence: 99%