Smart Contract-Based Access Control for the Internet of Things

被引:469
作者
Zhang, Yuanyu [1 ]
Kasahara, Shoji [1 ]
Shen, Yulong [2 ]
Jiang, Xiaohong [2 ,3 ]
Wan, Jianxiong [4 ]
机构
[1] Nara Inst Sci & Technol, Grad Sch Sci & Technol, Ikoma 6300192, Japan
[2] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Shaanxi, Peoples R China
[3] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate, Hokkaido 0418655, Japan
[4] Inner Mongolia Univ Technol, Sch Data Sci & Applicat, Hohhot 010051, Peoples R China
关键词
Access control; blockchain; Internet of Things (IoT); smart contract; ARCHITECTURE; SECURITY;
D O I
10.1109/JIOT.2018.2847705
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates a critical access control issue in the Internet of Things (IoT). In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC), and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. Each ACC provides one access control method for a subject-object pair, and implements both static access right validation based on predefined policies and dynamic access right validation by checking the behavior of the subject. The JC implements a misbehavior-judging method to facilitate the dynamic validation of the ACCs by receiving misbehavior reports from the ACCs, judging the misbehavior and returning the corresponding penalty. The RC registers the information of the access control and misbehavior-judging methods as well as their smart contracts, and also provides functions (e.g., register, update, and delete) to manage these methods. To demonstrate the application of the framework, we provide a case study in an IoT system with one desktop computer, one laptop and two Raspberry Pi single-board computers, where the ACCs, JC, and RC are implemented based on the Ethereum smart contract platform to achieve the access control.
引用
收藏
页码:1594 / 1605
页数:12
相关论文
共 29 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]   MedRec: Using Blockchain for Medical Data Access and Permission Management [J].
Azaria, Asaph ;
Ekblaw, Ariel ;
Vieira, Thiago ;
Lippman, Andrew .
PROCEEDINGS 2016 2ND INTERNATIONAL CONFERENCE ON OPEN AND BIG DATA - OBD 2016, 2016, :25-30
[3]   Botnets and Internet of Things Security [J].
Bertino, Elisa ;
Islam, Nayeem .
COMPUTER, 2017, 50 (02) :76-79
[4]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[5]   Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies [J].
D'Orazio, Christian J. ;
Choo, Kim-Kwang Raymond ;
Yang, Laurence T. .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02) :524-535
[6]  
Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634
[7]   Toward a Lightweight Authentication and Authorization Framework for Smart Objects [J].
Hernandez-Ramos, Jose L. ;
Pawlowski, Marcin Piotr ;
Jara, Antonio J. ;
Skarmeta, Antonio F. ;
Ladid, Latif .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2015, 33 (04) :690-702
[8]   Attribute-Based Access Control [J].
Hu, Vincent C. ;
Kuhn, D. Richard ;
Ferraiolo, David F. .
COMPUTER, 2015, 48 (02) :85-88
[9]   A Community-Driven Access Control Approach in Distributed IoT Environments [J].
Hussein, Dina ;
Bertin, Emmanuel ;
Frey, Vincent .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (03) :145-153
[10]   Can Blockchain Strengthen the Internet of Things? [J].
Kshetri, Nir .
IT PROFESSIONAL, 2017, 19 (04) :68-72