2018
DOI: 10.1007/978-3-319-94370-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Using Blockchain for IOT Access Control and Authentication Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
44
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(46 citation statements)
references
References 5 publications
2
44
0
Order By: Relevance
“…There are 16 out of 35 studies used Ethereum [8], [10]- [12], [14], [19], [20], [23], [24], [27], [32], [34], [36]- [38], [42] while four used Bitcoin network [22], [28], [30], [34]. Out from the remaining 35, four used Multichain [21], [30], [33], [39], followed by three studies that used Hyperledger [15], [31], [40] and one used Monax [33].…”
Section: B Blockchain Infrastructure 1) Blockchain Platformmentioning
confidence: 99%
“…There are 16 out of 35 studies used Ethereum [8], [10]- [12], [14], [19], [20], [23], [24], [27], [32], [34], [36]- [38], [42] while four used Bitcoin network [22], [28], [30], [34]. Out from the remaining 35, four used Multichain [21], [30], [33], [39], followed by three studies that used Hyperledger [15], [31], [40] and one used Monax [33].…”
Section: B Blockchain Infrastructure 1) Blockchain Platformmentioning
confidence: 99%
“…Blockchain has also been studied for authentication and access control in IoT. In [113], instead of using centralized authentication, the user wishing to access the IoT resource authenticates itself to Blockchain via smart contract. Once the smart contract verifies the user, an access token is issued to the user that contains the services that a user can request from the IoT device.…”
Section: ) Authentication and Access Controlmentioning
confidence: 99%
“…They listed the limited capabilities, high transaction costs, and in certain cases privacy requirements for the data as main issues in integration of blockchain in IoT [37]. Ourad et al [38] proposed a blockchain-based authentication and access control mechanism for IoT devices based on smart contracts. After the user successfully authenticates to the smart contract, the user and the IoT device receive an authentication token and the Ethereum address of the authorized user.…”
Section: Blockchain Technology and Iotmentioning
confidence: 99%