Figure 7 - available via license: CC BY
Content may be subject to copyright.
Flowchart of access control.

Flowchart of access control.

Source publication
Article
Full-text available
With the rapid development of the internet of things (IoT), traditional industries are setting off a massive wave of digitization. In the era of the Internet of Everything, millions of devices and links in IoT pose more significant challenges to data management. Most existing solutions employ centralized systems to control IoT devices, which brings...

Context in source publication

Context 1
... contracts ensure that only authorized smart device's data can communicate with the notary and perform access control on incoming access request transactions. The flowchart of our access control model is presented in Figure 7. The decentralized consortium network is formed by the interconnection of the notary nodes in each sub-angle. ...

Similar publications

Conference Paper
Full-text available
Internet of Things (IoT) as per estimated will connect 50 billion devices by 2020. Since its evolution, IoT technology provides lots of flexibility to develop and implement any application. Most of the application improves the human living standard and also makes life easy to access and monitoring the things in real time. Though there exist some se...

Citations

... In [13][14][15][16][17][18][19], researchers present schemes that are based on tokenization. Similarly, in [20][21][22][23][24][25][26][27][28][29][30][31][32], the researchers present schemes that require trusted admin, management hub, or fog node for access permission verification from the blockchain. To the best of our knowledge, IoT access control for enterprise network environment has not received much attention. ...
... other solutions [13][14][15][16][17][18][19], the design of ACS-IoT does not require token-based authentication for access control. As the solution application scenario is a standalone enterprise environment, the design operates in a single, smart contract rather than multiple contracts [20][21][22][23][24][25][26][27][28][29][30][31][32]. The Etherscan verified proof of concept implementation of the SC is available publically on Etherscan under the OSL-3.0 ...
... IoT devices, which belong to the blockchain network Token and Smart contract-based Access Control for IoT using blockchain • Token-based schemes [13][14][15][16][17][18][19] store access privileges in a digitally signed token, and access to resources require token verification. Smart contract-based methods [20][21][22][23][24][25][26][27][28][29][30][31][32] define and enforce access policies through a smart contract. ...
Article
Full-text available
    Centralized access control systems are unsuitable for IoT due to their resource-constrained, heterogeneous, and dynamic nature. Blockchain-assisted decentralized access control systems exist for IoT, but those approaches are tokenization-based. In some cases, IoT devices are not part of the blockchain network due to which they cannot interact with the access control system directly. Instead, they need a trusted admin, management hub, or a fog node for permissions verification and access to resources. This paper presents a smart contract and blockchain-assisted framework for the access control systems in the IoT enterprise environment, called ACS-IoT. In the proposed framework, resource-constrained IoT devices belong to the blockchain network. Therefore, these devices can directly access the permitted resources without any centrally administered authority and management hub's verification. We used smart contract and Ethereum blockchain for the new framework. Smart contract allows automated enforcement of access policies and serves as an autonomous agent running exactly as programmed. The proposed framework is validated through implementation of the proof of concept, and implemented prototype is deployed and tested on the Ethereum test network. The obtained results confirm that usage of blockchain and smart contract can be used as access management technology in the IoT enterprise environment.
    ... However, these wearable ECG sensors face challenges either in near real-time ECG monitoring, reliable diagnosis algorithms, security strategies, or all of these areas. Various studies have been done in the open literature related to remote monitoring, effective diagnosis algorithms, and security measures [9][10][11][12][13][14][15][16][17][18][19][20][21][22]. Some of the states of the art that were captivating to our research work are discussed below. ...
    ... A physiological sensor with intelligence is less than ideal if it cannot safely transmit/receive medical data to/ from other processing nodes and cannot protect it from malicious nodes run by attackers. In the current state-ofthe-art, numerous works can be found related to providing a secure platform for sharing and recording medical data among processing nodes and medical organizations [15][16][17][18][19][20][21][22]. Most of these research works apply blockchain technology to enhance the security features: confidentiality, data integrity, authorization, authentication, and non-repudiation in the medical ecosystem. ...
    ... Jiang et al. proposed a cross-chain framework to integrate multiple blockchains [22]. They proposed the sidechains and consortium blockchains in their multi-layer model. ...
    Article
    Full-text available
    Today, distributed medical network necessitates considering various dimensions of decentralized diagnosis environments to improve present wearable ECG sensors in terms of their versatility and security. This paper proposes five important mechanisms for the enhancement of ECG sensors. The proposed mechanisms are the partition of diagnosis, switch modes as per the communication status and severity, feedback channel, emergency alert system, and medical virtual chain (MVC). The proposed partition of diagnosis is based on the involvement of processing nodes according to the computational need. Two switch modes open-loop and closed-loop switch modes are put forward to deal with unpredictable communication scenarios and the severity of the patient. An MVC-based medical network is proposed where communication exists in and between medical organizations. The non-partitioned diagnosis used a CNN inference module with low computational complexity to give a diagnostic accuracy of 95.67% at the local ECG sensor, whereas the partitioned diagnosis was completed with an accuracy of 99.17% at the edge tier. In case of a poor communication scenario and low severity level of the patient, switch mode was activated to open loop to find that it was nearly six times more efficient than the regular transmission. The average delay observed for an intelligent sensor accessing a copy of MVC was only 0.3708 ms. Likewise, the average delay to record medical sessions initiated by the respective intelligent sensors in multiple medical institutions was 14.17 ms. These simulation results for the partition of diagnosis in multiple layers, switch mode initiation and MVC-based node interactions indicated that the proposed mechanisms for the intelligent ECG sensors are efficient and effective and hence can be implemented in a real-world scenario.
    ... However, the lack of interconnection between different blockchain systems greatly restricts and hinders the further development and application of blockchain technology, and the demand for interconnection of applications and data between chains has become an urgent problem to be solved in the path of blockchain development. Therefore, research on the expandability and interoperability of blockchain has become more and more popular in the current blockchain direction [7][8][9]. ...
    Article
    Full-text available
    In the context of the increasingly diversified blockchain technology, interoperability among heterogeneous blockchains has become key to further advancing this field. Existing cross-chain technologies, while facilitating data and asset exchange between different blockchains to some extent, have exposed issues such as insufficient security, low efficiency, and inconsistent standards. Consequently, these issues give rise to significant obstacles in terms of both scalability and seamless communication among blockchains within a multi-chain framework. To address this, this paper proposes an efficient method for cross-chain interaction in a multi-chain environment. Building upon the traditional sidechain model, this method employs smart contracts and hash time-locked contracts (HTLCs) to design a cross-chain interaction scheme. This approach decentralizes the execution of locking, verifying, and unlocking stages in cross-chain transactions, effectively avoiding centralization risks associated with third-party entities in the process. It also greatly enhances the efficiency of fund transfers between the main chain and sidechains, while ensuring the security of cross-chain transactions to some extent. Additionally, this paper innovatively proposes a cross-chain data interaction strategy. Through smart contracts on the main chain, data from sidechains can be uploaded, verified, and stored on the main chain, achieving convenient and efficient cross-chain data sharing. The contribution of this paper is the development of a decentralized protocol that coordinates the execution of cross-chain interactions without the need to trust external parties, thereby reducing the risk of centralization and enhancing security. Experimental results validate the effectiveness of our solution in increasing transaction security and efficiency, with significant improvements over existing models. Our experiments emphasize the system's ability to handle a variety of transaction scenarios with improved throughput and reduced latency, highlighting the practical applicability and scalability of our approach.
    ... Peng X [4] based on data analysis, the authors proposed a collection/supervised cross-chain mechanism based on "hash lock + smart contract + relay chain" and a concurrent mechanism based on K-means algorithm and Bloom filter suitable for multi-chain consensus called Supervised Practical Byzantine Fault Tolerance (SPBFT). Jiang Y [5] proposed a cross-chain framework to integrate multiple blockchains for efficient and secure IoT data management. The solution establishes an interactive decentralized access model, which employs a federated blockchain as a control station. ...
    Article
    Full-text available
    With the development of blockchain technology and the economy, the demand for data interaction and application collaboration between blockchains is increasing. Due to the differences in the data structure, interface protocols, consensus mechanisms, and even business models, new "chain silos" have been formed among blockchain applications, which limit the interoperability of asset exchange and business collaboration among blockchains. Based on the full analysis of blockchain technology characteristics and blockchain Internet development needs, this paper designs a blockchain cross-chain system based on the unified NFT identity identification technology, address tracking technology, and seamless interconnection of mobile security cross-chain technology, based on the "NFT + Cross-chain bridge". Based on the service mode, verification mode, and security of Bridges, six model timeliness, smart contract robustness, and convergence radius were selected from 44 cross-chain Bridges for experimental verification. Finally, it is concluded that the overall performance of the blockchain cross-chain system based on "NFT + Cross-chain bridge" is far more universal and better security than the performance of ordinary Bridges.
    ... They employed ECDLP (Elliptic Curve Discrete Logarithm Problem) based encryption, which has produced extremely practical results. Yiming Jiang et al. [18] presented a cross-chain architecture to combine several blockchains for effective and safe handling of IoT data. A remedy is provided by them that creates an decentralized access paradigm that is interactive with a consortium blockchain serving as the command center. ...
    Article
    Full-text available
    The integration of various advancements, ongoing management, intellectual capacity, item sensors, and incorporated frameworks have all contributed to idea behind the internet of things. Due to the energy limitations of the majority of Internet of Things (IoT) devices, more and more developers are choosing to create IoT systems based on group communication. A safe and reliable authenticated group secret key is essential for complete group communication in these applications. As the resource-constrained character and widespread use of the Internet of Things (IoT) provide a significant problem for IoT application security. In this paper, using elliptic curve and bi-linear paring, we provide a Blockchain based lightweight authenticated key agreement and access control protocol for group communication. We also proved the secrecy of the protocol in the random-oracle paradigm and give a thorough heuristic security assessment to verify that our protocol is safe from all possible threats and offers the required security features. Furthermore, functional implementation using NS-3 simulation expose that presented protocol is applicable for real-life IoT environments.
    ... Cui et al. [57] propose a blockchain-based solution to manage the interoperability of trusted devices and restrict devices tagged as untrusted. Jiang et al. [58] propose integrating multiple blockchain technologies to manage device identification and data storage. Zhaofeng et al. [59] present a blockchain-based data management scheme solution for IoT data management at the edge level. ...
    Conference Paper
    Full-text available
    Security and privacy are primary concerns in IoT management. Security breaches in IoT resources, such as smart sensors, can leak sensitive data and compromise the privacy of individuals. Effective IoT management requires a comprehensive approach to prioritize access security and data privacy protection. Digital twins create virtual representations of IoT resources. Blockchain adds decentralization, transparency, and reliability to IoT systems. This research integrates digital twins and blockchain to manage access to IoT data streaming. Digital twins are used to encapsulate data access and view configurations. Access is enabled on digital twins, not on IoT resources directly. Trust structures programmed as smart contracts are the ones that manage access to digital twins. Consequently, IoT resources are not exposed to third parties, and access security breaches can be prevented. Blockchain has been used to validate digital twins and store their configuration. The research presented in this paper enables multitenant access and customization of data streaming views and abstracts the complexity of data access management. This approach provides access and configuration security and data privacy protection.
    ... Cui et al. [57] propose a blockchain-based solution to manage the interoperability of trusted devices and restrict devices tagged as untrusted. Jiang et al. [58] propose integrating multiple blockchain technologies to manage device identification and data storage. Zhaofeng et al. [59] present a blockchain-based data management scheme solution for IoT data management at the edge level. ...
    Preprint
    Full-text available
    Security and privacy are primary concerns in IoT management. Security breaches in IoT resources, such as smart sensors, can leak sensitive data and compromise the privacy of individuals. Effective IoT management requires a comprehensive approach to prioritize access security and data privacy protection. Digital twins create virtual representations of IoT resources. Blockchain adds decentralization, transparency, and reliability to IoT systems. This research integrates digital twins and blockchain to manage access to IoT data streaming. Digital twins are used to encapsulate data access and view configurations. Access is enabled on digital twins, not on IoT resources directly. Trust structures programmed as smart contracts are the ones that manage access to digital twins. Consequently, IoT resources are not exposed to third parties, and access security breaches can be prevented. Blockchain has been used to validate digital twins and store their configuration. The research presented in this paper enables multitenant access and customization of data streaming views and abstracts the complexity of data access management. This approach provides access and configuration security and data privacy protection.
    ... The two blockchains played a role in reducing the access control pressure of the single-chain system, thus improving its efficiency [5]. Research on multi-chain, cross-chain, side-chain, and fragmentation technology has improved blockchain scalability [6][7][8][9], but all these solutions were on the blockchain. Different schemas of blockchain architectures have significant potential to break through the current blockchain performance bottleneck, providing new directions to improve the consensus speed and throughput of blockchain systems. ...
    Article
    Full-text available
    A hybrid blockchain structure (hybrid directed acyclic graph, or H-DAG) is proposed in this article to solve the existing problem of blockchain architectures using symmetric key encryption technology by combining the characteristics of single-chain blockchains and DAG distributed ledgers. By improving the block and transaction structures and optimizing the consensus mechanism, the H-DAG confirmed transaction orders while maintaining the high-throughput characteristics of a DAG, thus solving the transaction order dependence problem. We introduced a lightweight PoW mechanism to the H-DAG to improve the anti-fork ability of the blockchain. An incentive mechanism was adopted in our model to compel honest nodes to be more enthusiastic about participating in, maintaining, and enhancing the security of a given network. The blockchain states achieved strong levels of consistency, and their transaction confirmation times were predictable. We evaluated the performance of the H-DAG by comparing and analyzing multiple experiments, and we modeled a forking attack strategy, verifying the resistance of the H-DAG to this attack strategy. The experimental results demonstrated that the order of transactions in the H-DAG was globally consistent, and the confirmation time of transactions was predictable. The H-DAG improved the anti-fork ability and enhanced the security of the blockchain to ensure a degree of decentralization of the blockchain system. Therefore, the system throughput was enhanced by improving the block structure using symmetric key technology.
    ... In 2019, Jiang et al. [21] proposed a cross-chain framework, which integrated multichains to implement efficient and secure IoT data management. In 2021, Tian et al. [22] proposed a distributed cryptocurrency trading scheme, which can implement secure and fair trading between different types of cryptocurrencies. ...
    Article
    Full-text available
    The maturation of wireless connectivity, blockchain (distributed ledger technologies), and intelligent systems has fostered a comprehensive ecosystem for the Internet of Things (IoT). However, the growing volume of data generated by IoT devices creates substantial pressure on blockchain storage and computation capabilities, impeding the further development of the IoT ecosystem. Decentralizing data storage across multiple chains and utilizing cross-chain technology for data exchange eliminates the need for expensive centralized infrastructure, lowers data transfer costs, and improves accessibility. Hence, the issue of computational and storage pressure in blockchain can be improved. Nonetheless, the data of IoT devices are constantly updating, and ensuring consistency for dynamic data across heterogeneous chains remains a significant challenge. To address the aforementioned challenge, we propose a blockchain-based distributed and lightweight data consistency verification model (BDCA), which leverages a batch verification dynamic Merkle hash tree (BV-MHT) and an advanced gamma multi-signature scheme (AGMS) to enable consistent verification of dynamic data while ensuring secure and private data transmission. The AGMS scheme is reliable and robust based on security analysis while the dependability and consistency of BDCA are verified through inductive reasoning. Experimental results indicate that BDCA outperforms CPVPA and Fortress in communication and computation overhead for data preprocessing and auditing in a similar condition, and the AGMS scheme exhibits superior performance when compared to other widely adopted multi-signature schemes such as Cosi, BLS, and RSA. Furthermore, BDCA provides up to 99% data consistency guarantees, demonstrating its practicality.
    ... This work extends Belchior et al. [11] classification to map some solutions that were hard to categorize, as interoperability solutions evolved in its definitions and features. For example, some earlier works are self defined as Sidechain/Relays solutions [32,33], but nowadays it is more suitable to classify them as Blockchain of blockhains, a new category not available before. On the other hand, newer subcategories like Trusted Relays are not clear enough and became too broad, as they include different level of software complexity on a same category. ...
    ... Unfortunately, interoperability solutions evolve very fast and classifications become quickly outdated. For example, papers dated on 2019 self classify their work as Sidechains/Relays involving multiple blockchains [32,33], but nowadays it is more suitable to follow Belchior et al. [11] classification and classify them as Blockchain of blockchains. Another example is that these earlier works only included public interoperability solutions (e.g. ...
    ... To the best of our knowledge there is little research focusing on interoperability between DLT and blockchain as well as on DLT platforms between each other. Two examples are the works presented by Bradach et al. [44] and Jiang et al. [33], which focus on interoperability between Corda and Hyperledger Fabric, but further research is required. ...
    Article
    Full-text available
    Blockchain is one of the most recent disrupting technologies. Since Bitcoin emerged as its initial application, many blockchain projects arose offering different features for general and domain specific scenarios. In turn, Blockchain platforms work as isolated environments and they do not support interaction (i.e. interoperability) between each other.During the last years, some academic and industry efforts were performed in order to achieve interoperability between blockchain platforms. However, these efforts solve specific use cases and do not provide a general interoperability solution. In order to organize existing work in the area, this paper provides a feature-based classification framework based on 16 key interoperability features, that enabled the classification of 65 academic papers in three categories and six subcategories.The results show that nowadays research is focused on public interoperability, while private and public-to-private interoperability are still on their first steps. Based on these results, this work also discusses nowadays blockchain interoperability landscape, identifies challenges, and suggests future research directions.