Trust-Based Blockchain Authorization for IoT

被引:47
|
作者
Putra, Guntur Dharma [1 ,2 ]
Dedeoglu, Volkan [3 ]
Kanhere, Salil S. [1 ,2 ]
Jurdak, Raja [4 ]
Ignjatovic, Aleksandar [1 ,2 ]
机构
[1] Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW 2052, Australia
[2] Cyber Secur Cooperat Res Ctr, Joondalup, WA 6027, Australia
[3] Commonwealth Sci & Ind Res Org, Data61, Pullenvale, Qld 4069, Australia
[4] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
关键词
Blockchain; Authorization; Smart contracts; Proposals; Privacy; Trust management; Biological system modeling; privacy; authorization; blockchain; IoT; reputation; ACCESS-CONTROL; MANAGEMENT; INTERNET; SYSTEM;
D O I
10.1109/TNSM.2021.3077276
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authorization or access control limits the actions a user may perform on a computer system, based on predetermined access control policies, thus preventing access by illegitimate actors. Access control for the Internet of Things (IoT) should be tailored to take inherent IoT network scale and device resource constraints into consideration. However, common authorization systems in IoT employ conventional schemes, which suffer from overheads and centralization. Recent research trends suggest that blockchain has the potential to tackle the issues of access control in IoT. However, proposed solutions overlook the importance of building dynamic and flexible access control mechanisms. In this paper, we design a decentralized attribute-based access control mechanism with an auxiliary Trust and Reputation System (TRS) for IoT authorization. Our system progressively quantifies the trust and reputation scores of each node in the network and incorporates the scores into the access control mechanism to achieve dynamic and flexible access control. We design our system to run on a public blockchain, but we separate the storage of sensitive information, such as user's attributes, to private sidechains for privacy preservation. We implement our solution in a public Rinkeby Ethereum test-network interconnected with a lab-scale testbed. Our evaluations consider various performance metrics to highlight the applicability of our solution for IoT contexts.
引用
收藏
页码:1646 / 1658
页数:13
相关论文
共 50 条
  • [1] TBDD: A new trust-based, DRL-driven framework for blockchain sharding in IoT
    Zhang, Zixu
    Yu, Guangsheng
    Sun, Caijun
    Wang, Xu
    Wang, Ying
    Zhang, Ming
    Ni, Wei
    Liu, Ren Ping
    Reeves, Andrew
    Georgalas, Nektarios
    [J]. COMPUTER NETWORKS, 2024, 244
  • [2] Trust-based management in IoT federations
    Yahyaoui, Hamdi
    Maamar, Zakaria
    Alkhafajiy, Mohamed
    Al-Hamadi, Hamid
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 136 : 182 - 192
  • [3] TABI: Trust-Based ABAC Mechanism for Edge-IoT Using Blockchain Technology
    Pathak, Aditya
    Al-Anbagi, Irfan
    Hamilton, Howard J. J.
    [J]. IEEE ACCESS, 2023, 11 : 36379 - 36398
  • [4] Trust-based management in IoT federations
    Yahyaoui, Hamdi
    Maamar, Zakaria
    Al-Khafajiy, Mohammed
    Al-Hamadi, Hamid
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 136 : 182 - 192
  • [5] Trust-based dynamic authorization model for pervasive computing
    Guo, Yajun
    Wang, Liang
    Hong, Fan
    Han, Lansheng
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (08): : 70 - 73
  • [6] Blockchain and trust-based clustering scheme for the IoV
    Ayed, Samiha
    Hbaieb, Amal
    Chaari, Lamia
    [J]. AD HOC NETWORKS, 2023, 142
  • [7] TAS-IoT: Trust-based Adaptive Security in the IoT
    Hellaoui, Hamed
    Bouabdallah, Abdelmadjid
    Koudil, Mouloud
    [J]. 2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, : 599 - 602
  • [8] Trust-Based Privacy Authorization Model for Web Service Composition
    Zheng, Jun
    Huang, Zhiqiu
    Hu, Jun
    Wei, Ou
    Liu, Linyuan
    [J]. INFORMATION AND MANAGEMENT ENGINEERING, PT V, 2011, 235 : 409 - +
  • [9] Trust-Based Privacy Authorization Model for Web Service Composition
    Zheng, Jun
    Huang, Zhiqiu
    Hu, Jun
    Wei, Ou
    Liu, Linyuan
    [J]. SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 2, 2012, 115 : 307 - +
  • [10] On Blockchain Architectures for Trust-based Collaborative Intrusion Detection
    Kolokotronis, Nicholas
    Brotsis, Sotirios
    Germanos, Georgios
    Vassilakis, Costas
    Shiaeles, Stavros
    [J]. 2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 21 - 28