The Applications of Blockchains in Addressing the Integration and Security of IoT Systems: A Survey

Author(s):  
Zulfiqar Ali Khan ◽  
Akbar Siami Namin
Keyword(s):  
2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Yulong Fu ◽  
Zheng Yan ◽  
Jin Cao ◽  
Ousmane Koné ◽  
Xuefei Cao

Internet of Things (IoT) transforms network communication to Machine-to-Machine (M2M) basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS) is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.


Author(s):  
Delphine Beaulaton ◽  
Najah Ben Said ◽  
Ioana Cristescu ◽  
Regis Fleurquin ◽  
Axel Legay ◽  
...  
Keyword(s):  

2017 ◽  
pp. 115-130
Author(s):  
Martin Böhm ◽  
Ina Schiering ◽  
Diederich Wermser

Author(s):  
Supriya Khaitan ◽  
Rashi Agarwal ◽  
T. Poongodi ◽  
R. Indrakumari ◽  
A. Ilavendhan
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document