A Review of Distributed Access Control for Blockchain Systems Towards Securing the Internet of Things

被引:30
作者
Butun, Ismail [1 ,2 ]
Osterberg, Patrik [3 ]
机构
[1] Chalmers Univ Technol, Dept Comp Engn, SE-41296 Gothenburg, Sweden
[2] Konya Food & Agr Univ, Dept Comp Engn, TR-42080 Konya, Turkey
[3] Mid Sweden Univ, Dept Informat Syst & Technol, S-85170 Sundsvall, Sweden
关键词
Blockchain; Access control; Peer-to-peer computing; Security; Internet of Things; Servers; Cryptography; IoT; survey; P2P; security; Bitcoin; permissioned; permissionless; ledger; LoRa; FRAMEWORK; IOT;
D O I
10.1109/ACCESS.2020.3047902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet of Things (IoT) paradigm gets more attention from academia and industry, implementation tools of IoT will be explored more and more. One example is the applicability of blockchain systems to provide security and privacy of IoT networks, which is the topic of this article. Blockchain systems are on the rise, as crypto-currency payment systems (such as Bitcoin, Litecoin, etc.) boomed in the last few years due to their attractive de-centralized and anonymous features. As in every transaction, access of the users to IoT systems needs to be controlled. However, these systems are peer-to-peer systems and do not have centralized control, which means that traditional access control techniques will not be optimal. As a result, distributed access control schemes are needed and this paper aims at providing the state of the art in the literature. Thereby, we introduce and discuss the details and applicability of centralized (role-based) and distributed (threshold-signature, reputation, trusted-computing, identity, capability, ACL, group-signature, and hybrid) access control schemes to blockchain systems under the IoT ecosystems. Moreover, permissioned vs. permissionless blockchain systems are also discussed. Finally, challenges and research directions related to the application of all those presented blockchain systems to IoT are discussed.
引用
收藏
页码:5428 / 5441
页数:14
相关论文
共 65 条
[1]   Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms [J].
Ahanger, Tariq Ahamed ;
Aljumah, Abdullah .
IEEE ACCESS, 2019, 7 :11020-11028
[2]  
[Anonymous], 2005, Proceedings of the tenth ACM symposium on Access control models and technologies
[3]  
[Anonymous], 2017, P 2 INT MULT C COMP
[4]  
[Anonymous], 2003, P 1 ACM WORKSHOP SEC
[5]   Collaborative applications over peer-to-peer systems-challenges and solutions [J].
Bandara, H. M. N. Dilum ;
Jayasumana, Anura P. .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (03) :257-276
[6]  
Bayer D., 1993, SEQUENCES 2 METHODS, P329, DOI DOI 10.1007/978-1-4613-9323-824
[7]   Blockchain for Industry 4.0: A Comprehensive Review [J].
Bodkhe, Umesh ;
Tanwar, Sudeep ;
Parekh, Karan ;
Khanpara, Pimal ;
Tyagi, Sudhanshu ;
Kumar, Neeraj ;
Alazab, Mamoun .
IEEE ACCESS, 2020, 8 :79764-79800
[8]  
Butun I., 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC 2011), P1118, DOI 10.1109/CCNC.2011.5766345
[9]  
Butun I., 2013, THESIS U S FLORIDA
[10]   Analysis of LoRaWAN v1.1 Security [J].
Butun, Ismail ;
Pereira, Nuno ;
Gidlund, Mikael .
PROCEEDINGS OF THE 4TH ACM MOBIHOC WORKSHOP ON EXPERIENCES WITH THE DESIGN AND IMPLEMENTATION OF SMART OBJECTS: SMARTOBJECTS'18, 2018,