scholarly journals Data Sharing System Integrating Access Control Mechanism using Blockchain-Based Smart Contracts for IoT Devices

2020 ◽  
Vol 10 (2) ◽  
pp. 488 ◽  
Author(s):  
Tanzeela Sultana ◽  
Ahmad Almogren ◽  
Mariam Akbar ◽  
Mansour Zuair ◽  
Ibrar Ullah ◽  
...  

In this paper, a blockchain-based data sharing and access control system is proposed, for communication between the Internet of Things (IoT) devices. The proposed system is intended to overcome the issues related to trust and authentication for access control in IoT networks. Moreover, the objectives of the system are to achieve trustfulness, authorization, and authentication for data sharing in IoT networks. Multiple smart contracts such as Access Control Contract (ACC), Register Contract (RC), and Judge Contract (JC) are used to provide efficient access control management. Where ACC manages overall access control of the system, and RC is used to authenticate users in the system, JC implements the behavior judging method for detecting misbehavior of a subject (i.e., user). After the misbehavior detection, a penalty is defined for that subject. Several permission levels are set for IoT devices’ users to share services with others. In the end, performance of the proposed system is analyzed by calculating cost consumption rate of smart contracts and their functions. A comparison is made between existing and proposed systems. Results show that the proposed system is efficient in terms of cost. The overall execution cost of the system is 6,900,000 gas units and the transaction cost is 5,200,000 gas units.

2012 ◽  
Vol 463-464 ◽  
pp. 1630-1633
Author(s):  
Hai Yun Lin ◽  
Yu Jiao Wang ◽  
Jian Bi

Along with the increasing number of Chinese automobiles in cities, the vehicle management becomes a difficult issue. The effective management on vehicle is to identify the vehicle. RFID technology can be used for the access control management, which can serve an effective way to identify the vehicles, making access control management of the security protection more effective and intellective[1] . Access Control System based on RFID protocol is proposed, and then introduces a model of system and gives a brief description of each component of the model, A detailed explanation about the implementation of each model is given.


2014 ◽  
Vol 631-632 ◽  
pp. 1402-1408
Author(s):  
Hui Lin Zhang ◽  
Wei Li ◽  
Qiu Li Tong ◽  
Shi Xue Yin

It introduces the existing problems in the temporary houses management in universities, analyses the improvement the access control system based on campus card brings, expounds the authorization mechanism of offline access control system, the design of the structure of the access control document in the card and the authorizing and validating processes, emphasis the fully integration of the access control business and the temporary houses management business. Forward


Entropy ◽  
2021 ◽  
Vol 23 (8) ◽  
pp. 1054
Author(s):  
Adnan Iftekhar ◽  
Xiaohui Cui ◽  
Qi Tao ◽  
Chengliang Zheng

Blockchain-based applications are gaining traction in various application fields, including supply chain management, health care, and finance. The Internet of Things (IoT) is a critical component of these applications since it allows for data collection from the environment. In this work, we integrate the Hyperledger Fabric blockchain and IoT devices to demonstrate the access control and establish the root of trust for IoT devices. The Hyperledger Fabric is designed to be secure against unwanted access and use through encryption protocols, access restrictions, and cryptography algorithms. An attribute-based access control (ABAC) mechanism was created using Hyperledger Fabric components only to gain access to the IoT device. Single board computers based on the ARM architecture are becoming increasingly powerful and popular in automation applications. In this study, the Raspberry Pi 4 Model B based on ARM64 architecture is used as the IoT device. Because the ARM64 architecture is not supported by default, we build executable binaries and Docker images for the ARM64 architecture, using the Hyperledger Fabric source code. On an IoT device, we run the fabric node in native mode to evaluate the executable binaries generated for the ARM64 architecture. Through effective chaincode execution and testing, we successfully assess the Hyperledger fabric blockchain implementation and access control mechanism on the ARM64 architecture.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


Sign in / Sign up

Export Citation Format

Share Document