2018 IEEE Wireless Communications and Networking Conference (WCNC) 2018
DOI: 10.1109/wcnc.2018.8377385
|View full text |Cite
|
Sign up to set email alerts
|

IoTChain: A blockchain security architecture for the Internet of Things

Abstract: In this paper, we propose IoTChain, a combination of the OSCAR architecture [1] and the ACE authorization framework [2] to provide an E2E solution for the secure authorized access to IoT resources. IoTChain consists of two components, an authorization blockchain based on the ACE framework and the OSCAR object security model, extended with a group key scheme. The blockchain provides a flexible and trustless way to handle authorization while OSCAR uses the public ledger to set up multicast groups for authorized … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
87
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 202 publications
(99 citation statements)
references
References 11 publications
0
87
0
3
Order By: Relevance
“…The work in [17] presents a decentralized access control system where IoT devices are required to interact directly with the blockchain and are assumed to be always connected, while [18], [19] present solutions where policies and access control decisions are directly recorded on Bitcoin's blockchain. The work in [20] present a system based on OAuth 2.0 where a smart contract generates authorization tokens, which a key server verifies in order to provide private keys that allow clients to access a protected resource. The work in [21] contains a high level description of using smart contracts with OAuth 2.0 to provide an architecture where a user can freely select the server to provide authorization for the user's protected resource.…”
Section: Discussionmentioning
confidence: 99%
“…The work in [17] presents a decentralized access control system where IoT devices are required to interact directly with the blockchain and are assumed to be always connected, while [18], [19] present solutions where policies and access control decisions are directly recorded on Bitcoin's blockchain. The work in [20] present a system based on OAuth 2.0 where a smart contract generates authorization tokens, which a key server verifies in order to provide private keys that allow clients to access a protected resource. The work in [21] contains a high level description of using smart contracts with OAuth 2.0 to provide an architecture where a user can freely select the server to provide authorization for the user's protected resource.…”
Section: Discussionmentioning
confidence: 99%
“…Similar to FairAccess, the IoTChain [86] also uses a solution based on tokens, however, instead of using the token gathered from the Blockchain to access the resource information, it uses it to get decryption keys from key servers. In its turn, they can be used in the decryption of downloaded data from proxy server or resources servers.…”
Section: Blockchain-based Access Controlmentioning
confidence: 99%
“…The output of the CH is the ciphertext, which is appended to the transaction. The miners/users use the decryption algorithm and credentials for the ciphertext received from the CH. IoTChain was proposed by Alphand et al It is a BC‐based IoT security architecture, which consists of a flexible and trustless authorization mechanism based on BC. The architecture consists of two components: an authorization BC based on the ACE framework and the OSCAR object security model, extended with a group key.…”
Section: Existing Workmentioning
confidence: 99%