Blockchain-Based IoT Access Control System: Towards Security, Lightweight, and Cross-Domain
نویسندگان
چکیده
Most IoT devices cannot afford to be a blockchain node due the high computation and storage loads. Thus, is usually deployed on one delegate node, e.g., edge device or cloud, which may encounters three drawbacks: (1) The becomes single failure point when number of notes are limited. (2) replicating data can lead privacy information leak. (3) vulnerable Distributed Denial Service (DDoS) attack. To tackle these drawbacks, we consider minimize redundant make as specialized nodes. In this paper, integrate permissioned (HLF), an attribute-based access control (ABAC) identity-based signature (IBS) build security, lightweight, cross-domain blockchain-based system. Specifically, divided system into different function domains, named domains. Then, establish local ledger for each domain enable more records entities' attributes, policy files' digests, decisions. Meanwhile, use channel technology HLF realize IBS filter legal requests prevent DDoS attacks. We also design decision (PDP) selection algorithm that select multiple (blockchain nodes) achieve real-time distributed decisions (off-chain). Finally, implement evaluate proposed demonstrate its practicality.
منابع مشابه
LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy
BlockChain (BC) has attracted tremendous attention due to its immutable nature and the associated security and privacy benefits. BC has the potential to overcome security and privacy challenges of Internet of Things (IoT). However, BC is computationally expensive, has limited scalability and incurs significant bandwidth overheads and delays which are not suited to the IoT context. We propose a ...
متن کاملBlockchain Based Access Control
Access Control systems are used in computer security to regulate the access to critical or valuable resources. The rights of subjects to access such resources are typically expressed through access control policies, which are evaluated at access request time against the current access context. This paper proposes a new approach based on blockchain technology to publish the policies expressing t...
متن کاملRFID and Face Recognition Based Security and Access Control System
In the past, most of the companies were using a magnetic stripe card which is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. Card has a Personal Identification Number (PIN) allow to access account electronically. These days, RFID card has been used widely. In this paper the researcher used RFID ...
متن کاملHybrid Lightweight and Robust Encryption Design for Security in IoT
Pervasive computing is the emerging field that needs ultra lightweight secure designs. In this paper, we have proposed a robust hybrid structure by fusion of RECTANGLE, LED and SPECK. With the help of a hybrid design, we have improved the key scheduling aspect of LED and related key attacks which were neglected in the LED cipher. In this paper, we also aimed at providing robust architecture by ...
متن کاملTypes and Access Controls for Cross-Domain Security in Flash
The ubiquitous Flash platform enables programmers to build sophisticated web application “mash-ups” that combine Flash executables loaded from multiple trust domains with complex, asymmetric trust relationships. Flash provides APIs and run-time checks to help programmers declare and enforce trust relationships between different domains, but there is currently no formal security model for Flash....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3059863