Abstract

The Internet of Things (IoT) benefits our lives by integrating physical devices to the real world and offers a crucial internet infrastructure for future civilization. Because IoT devices are widely distributed and restricted in resources, it is difficult for them to adopt traditional security methods to resist malicious attacks. Unauthorized access to IoT devices, which results in severe privacy and security problems, has become a major challenge that has impeded IoT technology from being widely adopted. Therefore, the access control for IoT devices urgently needs to be improved when dealing with authorization issues. In this paper, we propose an attribute-based access control scheme that provides decentralized, flexible, and fine-grained authorization for IoT devices. Blockchain is utilized to provide authentic and reliable credentials. More importantly, a verifiable collaboration mechanism is designed to meet the needs of controlled access authorization in emergencies. Authority nodes are constructed to execute major computation tasks and interact with the blockchain. The security analysis shows that our scheme can reliably guarantee the security of authorized access. More than security assurance, a proof-of-concept prototype has been implemented to prove that our scheme is scalable, efficient, and accommodates IoT devices well.

Highlights

  • The Internet of Things (IoT) has emerged as a revolutionary type of technology that connects all smart devices together through a distributed capillary networking infrastructure

  • Since the messages are generated by valid users, there is a possibility that this information can satisfy the verification and help obtain illegal authorization

  • We evaluate the computation overhead in IoT devices by comparing our scheme with that of Ding et al [21]

Read more

Summary

Introduction

The Internet of Things (IoT) has emerged as a revolutionary type of technology that connects all smart devices together through a distributed capillary networking infrastructure. IoT platforms by utilizing attributes and ABAC policies to restrict access or detect malicious behaviors These schemes require very complex management, and the authorization credentials may be untrustworthy in IoT scenarios. One involves the storage and computational overheads of the proposed scheme, which should be accepted by IoT devices Another is that the distribution and acquisition of attributes and access policies should be credible and reliable. The latter urgently requires a trustworthy collaborative access method for IoT devices. The secure databasefor is utilized to provide credible credentials as verifiable well as tocollaboration trustfully transmit accessis access information authorization on behalf of IoT devices.

Background and Related
Attribute-Based Access Control Model
Blockchain Technology
Related Works
Access
Consortium Blockchain Network
Authority Nodes
Data thethe
Data structure of of thethe construction of of thethe access tree:
Threat and Security Model
Threat Model
Security Model
Proposed Access Control Scheme
System Initialization Phase
Registration Phase
Authorization Phase
AKA:Generate a random number ID
3: Utilize the pubKRe to verify the signature
Collaboration Phase
Verifiable
Security Analysis
Collusion Resistant
Verifiable and Controlled Collaboration
Reply Attack Resistant
Message Substitution Attack Resistant
Supervision and Revocation
Performance Analysis
Experiment Configuration
Storage Overhead
Storage storage
Computation Overhead
Time Consumption of Our Access Control Scheme
Performance of the Chaincode
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call