An Internet of Things Access Control Scheme Based on Permissioned Blockchain and Edge Computing
نویسندگان
چکیده
In the IoT (Internet of Things) environment, existing access control schemes for device resources have some problems, such as poor scalability, high latency, security, and dynamics. Combining advantages permissioned blockchain edge computing, an scheme Internet Things based on computing is proposed. By authenticating user’s identity at edge, reliable response time improved. ABAC (Attribute Based Access Control) model, regarded a trusted entity, policy written into smart contract deployed calling. Most consensus algorithms problems low throughput scalability. A Kraft (Kademlia–Raft) algorithm introduced to solve above issues. Security analysis experimental results show that can achieve fine-grained, dynamic control, has ensures security reliability.
منابع مشابه
Transparent Voting Platform Based on Permissioned Blockchain
Since 2004, different research was handling the challenges in the centralized voting systems, e-voting protocols and recently the decentralized voting. So electronic voting puts forward some difficulties regarding the voter anonymity, the secure casting of the votes and to prevent the voting process from frauding. The Decentralized property of the technology called"blockchain"could have the sol...
متن کاملFairAccess: a new Blockchain-based access control framework for the Internet of Things
Security and privacy are huge challenges in Internet of Things (IoT) environments, but unfortunately, the harmonization of the IoT-related standards and protocols is hardly and slowly widespread. In this paper, we propose a new framework for access control in IoT based on the blockchain technology. Our first contribution consists in providing a reference model for our proposed framework within ...
متن کاملMobile Edge Computing Empowers Internet of Things
In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by leveraging the fiber-wireless access technology, the cloudlet concept, and the software defined networking framework. The MEIoT architecture brings computing and storage resources close to Internet of Things (IoT) devices in order to speed up IoT data sharing and analytics. Specifically, the IoT devices (belongin...
متن کاملBlockchain Based Access Control
Access Control systems are used in computer security to regulate the access to critical or valuable resources. The rights of subjects to access such resources are typically expressed through access control policies, which are evaluated at access request time against the current access context. This paper proposes a new approach based on blockchain technology to publish the policies expressing t...
متن کاملAn Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things
This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mecha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13074167