Blockchain for IoT access control: Recent trends and future research directions

S Pal, A Dorri, R Jurdak - Journal of Network and Computer Applications, 2022 - Elsevier
With the rapid development of wireless sensor networks, smart devices, and traditional
information and communication technologies, there is tremendous growth in the use of …

Blockchain-based authentication schemes in smart environments: A systematic literature review

MA Al Sibahee, ZA Abduljabbar… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
This study presents a systematic literature review on blockchain-based authentication in
smart environments that include smart city, smart home, smart grid, smart healthcare, smart …

[HTML][HTML] A survey on blockchain envisioned attribute based access control for internet of things: Overview, comparative analysis, and open research challenges

SS Ullah, V Oleshchuk, HSG Pussewalage - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) network is rapidly expanding due to sudden
technological advancements, which enable objects to become intelligent and contribute to …

A survey on cross-chain technology: Challenges, development, and prospect

H Mao, T Nie, H Sun, D Shen, G Yu - Ieee Access, 2022 - ieeexplore.ieee.org
With the continuous development of blockchain technology, many blockchain applications,
such as digital currencies in the form of tokens, are deployed. However, due to the lack of …

Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey

F Ghaffari, E Bertin, N Crespi, J Hatin - Computer Science Review, 2023 - Elsevier
The accelerated growth of networking technologies highlights the importance of
Authentication and Access Control (AAC) as protection against associated attacks …

Attribute-based access control scheme for data sharing on hyperledger fabric

X Zhao, S Wang, Y Zhang, Y Wang - Journal of Information Security and …, 2022 - Elsevier
With the popularization of the IoT and big data, the application value of data has become
increasingly prominent. Therefore, it is particularly important to ensure the legitimate use of …

A DLT-based framework for secure IoT infrastructure in smart communities

G Gkogkos, C Patsonakis, A Drosou, D Tzovaras - Technology in Society, 2023 - Elsevier
In the field of smart communities, significant progress has been made in recent years. The
objective of constructing smart communities is to improve the quality of life of their …

A novel access control method via smart contracts for internet-based service provisioning

F Ghaffari, E Bertin, N Crespi, S Behrad, J Hatin - IEEE Access, 2021 - ieeexplore.ieee.org
The dramatic rise in internet-based service provisioning has highlighted the importance of
deploying scalable access control methods, facilitating service authorization for eligible …

Identity and access management using distributed ledger technology: A survey

F Ghaffari, K Gilani, E Bertin… - International Journal of …, 2022 - Wiley Online Library
As the basic building block of any information security system, identity and access
management (IAM) solutions play vital role in enterprise's security programmes. Providing …

A literature review on access control in networking employing blockchain

PADSN Wijesekara - The Indonesian Journal of Computer Science, 2024 - ijcs.net
Access Control (AC) in networking attempts to make sure that only authorized devices
perform actions formed upon privileges defined for them with a view to prevent malicious …