2019
DOI: 10.1109/jiot.2018.2847705
|View full text |Cite
|
Sign up to set email alerts
|

Smart Contract-Based Access Control for the Internet of Things

Abstract: This paper investigates a critical access control issue in the Internet of Things (IoT). In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. Each ACC provides one access control method for a subject-object pair, and implements both static access right validation based on predefined policies and dynamic access right val… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
355
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 574 publications
(357 citation statements)
references
References 28 publications
1
355
0
1
Order By: Relevance
“…RELATED WORK The work in [16] presents a blockchain-based decentralized authorization system where authorization proofs can be efficiently verified. The work in [17] presents a decentralized access control system where IoT devices are required to interact directly with the blockchain and are assumed to be always connected, while [18], [19] present solutions where policies and access control decisions are directly recorded on Bitcoin's blockchain. The work in [20] present a system based on OAuth 2.0 where a smart contract generates authorization tokens, which a key server verifies in order to provide private keys that allow clients to access a protected resource.…”
Section: Discussionmentioning
confidence: 99%
“…RELATED WORK The work in [16] presents a blockchain-based decentralized authorization system where authorization proofs can be efficiently verified. The work in [17] presents a decentralized access control system where IoT devices are required to interact directly with the blockchain and are assumed to be always connected, while [18], [19] present solutions where policies and access control decisions are directly recorded on Bitcoin's blockchain. The work in [20] present a system based on OAuth 2.0 where a smart contract generates authorization tokens, which a key server verifies in order to provide private keys that allow clients to access a protected resource.…”
Section: Discussionmentioning
confidence: 99%
“…This section introduces the main components of the Ethereum protocol [15], that is a popular choice for blockchain systems tailored for IoT applications [3], [16], [17]. The common trait of Ethereum with other blockchain protocols can be found in [18].…”
Section: Blockchain Protocolmentioning
confidence: 99%
“…The work in [14] presents a blockchain-based decentralized access control system where IoT devices interact directly with the blockchain and are always connected, while [15] presents a system where policies and access control events are directly recorded on Bitcoin's blockchain. [16] presents a smart contract-based system for providing access control to IoT devices while satisfying access policies in terms of the minimum time interval between consecutive accesses. The above works all assume that the IoT device can directly access the blockchain, which is not possible in constrained IoT environments.…”
Section: Related Workmentioning
confidence: 99%