Abstract

The Internet of Things (IoT) is a widely used technology in the last decade in different applications. The Internet of things is wirelessly or wired to communicate, store, compute and track various real-time scenarios. This survey mainly discussed the core problems of Internet of things security and access control to unauthorized users and security requirements for IoT. The Internet of things is a heterogeneous device and has low memory, less processing power because of the small sizes. Nowadays, IoT systems are not sure and powerless to protect themselves against cyber attacks. It is mainly due to inadequate space in IoT gadgets, immature standards, and the lack of protected hardware and software design, development, and deployment. To meet IoT requirements, the authors discussed the limitations of traditional access control. Then the authors examined the potential to spread access control by implementing the safe architecture accommodated by the Blockchain. The authors also addressed how to use the Blockchain to work with and resolve some of the standards relevant to IoT security issues. In the end, an analysis of this survey shows future, open-ended problems, and challenges. It offers how the Blockchain potentially ensures reliable, scalable, and more efficient security solutions for IoT and further research work.

Highlights

  • Internet of Things (IoT) is an infrastructure of smart things that exchange information over the Internet

  • [7] passed over the work has done in the IETF called CoAP Management Interface (CoMI) [11], and the result is done by the Open Mobile Alliance (OMA) called LWM2M [12] CoMI and LWM2M are primary mechanisms in a centralized environment for IoT device management

  • This paper identified two main access control patterns using Blockchain, access control depending on the transaction and access control depending on the smart contract

Read more

Summary

INTRODUCTION

Internet of Things (IoT) is an infrastructure of smart things that exchange information over the Internet. The infinite interlinking between physical and virtual objects notably stimulates processing, storage, and data exchange on the IoT It is a primary base for rendering services in critical areas such as hospitals, cars, bridges, schools, retail outlets, public constructions, communities, and even within human bodies in the form of wearable devices. The first Blockchain scenario is a shared P2P digital currency It is a service for high-security distributed applications with the introduction of a smart contract framework. The rest of the paper is organized as in Section 2; related research work based on Blockchain in IoT access control like problems and limitations of traditional access models are identified.

Access Control and IoT
Blockchain and IoT
SECURITY REQUIREMENTS FOR IOT
Available for Services
Trustworthy
Energy Efficiency and Cost-Effective
Single Points of Server Failure
ANALYSIS AND DISCUSSION
Limitations of Resources
Heterogeneous Devices
Interoperability of Security Protocols
Trusted Updates and Management
Blockchain Vulnerabilities
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call