Survey of Blockchain Access Control in Internet of Things

被引:0
作者
Shi J.-S. [1 ,2 ]
Li R. [1 ,2 ]
机构
[1] College of Computer Science, Inner Mongolia University, Hohhot
[2] Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing, Inner Mongolia University, Hohhot
来源
Ruan Jian Xue Bao/Journal of Software | 2019年 / 30卷 / 06期
基金
中国国家自然科学基金;
关键词
Access control; Blockchain; Internet of things; Privacy protection; Smart contract;
D O I
10.13328/j.cnki.jos.005740
中图分类号
学科分类号
摘要
With the development of the Internet of things, the privacy protection of the IoT has attracted people's attention, and access control technology is one of the important methods of privacy protection. The IoT access control model is based on the concept of a central trusted entity. The decentralized blockchain technology solves the security risks brought by the centralized model. This study proposes three issues that must be resolved according to the characteristics of the IoT environment. These three issues are: (1) IoT terminal device lightweight; (2) IoT has a large number of terminal nodes; and (3) dynamic issues under the IoT. Then, using these three issues as the core, it is analyzed and summarized that how the mainstream access control model in the existing IoT and blockchain-based access control model solves these problems. Finally, two types of blockchain access control models and the advantages of using blockchain for IoT access control are summarized, as well as the problems that need to be solved in the future for blockchain and IoT access control. © Copyright 2019, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1632 / 1648
页数:16
相关论文
共 69 条
  • [51] Garay J.A., Kiayias A., Leonardos N., The bitcoin backbone protocol: Analysis and applications, Proc. of the Annual Int'l Conf. on the Theory and Applications of Cryptographic Techniques, pp. 281-310, (2015)
  • [52] Lamport L., Shostak R.E., Pease M.C., The Byzantine generals problem, ACM Trans. on Programming Languages and Systems (TOPLAS), 4, 3, pp. 382-401, (1982)
  • [53] Castro M., Liskov B., Proactive recovery in a Byzantine-fault-tolerant system, Proc. of the 4th Conf. on Symp. on Operating System Design & Implementation, 4, pp. 273-288, (2000)
  • [54] Castro M., Liskov B., Practical Byzantine fault tolerance and proactive recovery, ACM Trans. on Computer Systems (TOCS), 20, 4, pp. 398-461, (2002)
  • [55] Lamport L., The part-time parliament, ACM Trans. on Computer Systems, 16, 2, pp. 133-169, (1998)
  • [56] Lamport L., Fast paxos, Distributed Computing, 19, 2, pp. 79-103, (2006)
  • [57] Hernandez-Ramos J.L., Pawlowski M.P., Jara A.J., Skarmeta A.F., Toward a lightweight authentication and authorization framework for smart objects, IEEE Journal on Selected Areas in Communications, 33, 4, pp. 690-702, (2015)
  • [58] Hussein D., Bertin E., Frey V., A community-driven access control approach in distributed IoT environments, IEEE Communications Magazine, 55, 3, pp. 146-153, (2017)
  • [59] Kokoris-Kogias E., Jovanovic P., Gailly N., Khoffi I., Gasser L., Enhancing bitcoin security and performance with strong consistency via collective signing, Applied Mathematical Modelling, 37, 8, pp. 5723-5742, (2016)
  • [60] Luu L., Narayanan V., Zheng C., Baweja K., Gilbert S., Saxena P., A secure sharding protocol for open blockchains, Proc. of the 2016 ACM SIGSAC Conf. on Computer and Communications Security, pp. 17-30, (2016)