Abstract

The Internet of Things paradigm is growing rapidly. In fact, controlling this massive growth of IoT globally raises new security and privacy issues. The traditional access control mechanisms provide security to IoT systems such as DAC (discretionary access control) and mandatory access control (MAC). However, these mechanisms are based on central authority management, which raises some issues such as absence of scalability, single point of failure, and lack of privacy. Recently, the decentralized and immutable nature of blockchain technology integrated with access control can help to overcome privacy and security issues in the IoT. This paper presents a review of different access control mechanisms in IoT systems. We present a comparison table of reviewed access control mechanisms. The mechanisms’ scalability, distribution, security, user-centric, privacy and policy enforcing are compared. In addition, we provide access control classifications. Finally, we highlight challenges and future research directions in developing decentralized access control mechanisms for IoT systems.

Highlights

  • The Internet of Things (IoT) refers to digital objects connected to the Internet

  • It can have security and privacy issues, so future research will focus on low latency and low computation consensus algorithms that can be adapted to the IoT environment

  • We briefly reviewed IoT paradigms and the blockchain concept and provided a classification of access control for IoT into two main parts, centralized and decentralized access control, each part of which has subcategories

Read more

Summary

Introduction

The IoT technology takes the main role in enhancing our lifestyle, based on different domains such as health care, smart cities, transportation, and Smart Grids Those interconnected IoT devices are continuously growing to 20.4 billion IoT connections by the year 2022 [1]. These large numbers of IoT can share information with other entities, as well as generate collected data from surrounding environments. In the IoT system based on centralized management, service providers can access and analyze user data, which can cause security and privacy issues. To overcome these challenges, researchers have begun to work with decentralized environments over IoT access management. Lightweight: access control mechanisms must have low overhead communication and computation to adapt to constrained devices

Blockchain
Main Characteristics of the Blockchain
Types of Blockchain Systems
Smart Contract
Access Control Classification for IoT Systems
Centralized Access Control for IoT
Decentralized Access Control for IoT
Non-Blockchain Distributed Access Control for IoT
Blockchain-Based Decentralized Access Control for IoT
Findings
Discussion and Open
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.