• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

面向物联网应用的区块链设想访问控制:全面综述与未来方向

Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions.

作者信息

Bagga Palak, Das Ashok Kumar, Chamola Vinay, Guizani Mohsen

机构信息

Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032 India.

Virginia Modeling, Analysis and Simulation Center, Old Dominion University, Suffolk, VA 23435 USA.

出版信息

Telecommun Syst. 2022;81(1):125-173. doi: 10.1007/s11235-022-00938-7. Epub 2022 Jul 20.

DOI:10.1007/s11235-022-00938-7
PMID:35879968
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9299966/
Abstract

With rapid advancements in the technology, almost all the devices around are becoming smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added to the network, it is important to verify the authenticity of the device before allowing it to communicate with the network. Hence, access control is a crucial security mechanism that allows only the authenticated node to become the part of the network. An access control mechanism also supports confidentiality, by establishing a session key that accomplishes secure communications in open public channels. Recently, blockchain has been implemented in access control protocols to provide a better security mechanism. The foundation of this survey article is laid on IoT, where a detailed description on IoT, its architecture and applications is provided. Further, various security challenges and issues, security attacks possible in IoT and their countermeasures are also provided. We emphasize on the blockchain technology and its evolution in IoT. A detailed description on existing consensus mechanisms and how blockchain can be used to overpower IoT vulnerabilities is highlighted. Moreover, we provide a comprehensive description on access control protocols. The protocols are classified into certificate-based, certificate-less and blockchain-based access control mechanisms for better understanding. We then elaborate on each use case like smart home, smart grid, health care and smart agriculture while describing access control mechanisms. The detailed description not only explains the implementation of the access mechanism, but also gives a wider vision on IoT applications. Next, a rigorous comparative analysis is performed to showcase the efficiency of all protocols in terms of computation and communication costs. Finally, we discuss open research issues and challenges in a blockchain-envisioned IoT network.

摘要

随着技术的飞速发展,几乎所有周围的设备都在变得智能化,并接入物联网(IoT)网络。当一个新的物联网设备添加到网络中时,在允许其与网络通信之前验证设备的真实性非常重要。因此,访问控制是一种关键的安全机制,它只允许经过认证的节点成为网络的一部分。访问控制机制还通过建立一个会话密钥来支持保密性,该会话密钥可在开放的公共信道中实现安全通信。最近,区块链已被应用于访问控制协议中,以提供更好的安全机制。这篇综述文章以物联网为基础,详细描述了物联网及其架构和应用。此外,还介绍了各种安全挑战和问题、物联网中可能出现的安全攻击及其对策。我们重点介绍了区块链技术及其在物联网中的发展。突出了对现有共识机制的详细描述以及区块链如何用于克服物联网漏洞。此外,我们还对访问控制协议进行了全面描述。为了便于理解,这些协议被分为基于证书的、无证书的和基于区块链的访问控制机制。然后,我们在描述访问控制机制的同时,详细阐述了智能家居、智能电网、医疗保健和智能农业等每个用例。详细描述不仅解释了访问机制的实现,还对物联网应用给出了更广阔的视野。接下来,进行了严格的比较分析,以展示所有协议在计算和通信成本方面的效率。最后,我们讨论了区块链设想的物联网网络中的开放研究问题和挑战。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/af6da1d91cf4/11235_2022_938_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/7b34b4b292f5/11235_2022_938_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/dbfb6fec0ddf/11235_2022_938_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/ae4fff9b9259/11235_2022_938_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/3ddbff68dc78/11235_2022_938_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/633509972fd0/11235_2022_938_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/47962f16d1cc/11235_2022_938_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/a19d499126d5/11235_2022_938_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/f30cfa8507d1/11235_2022_938_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/62a3b3db6765/11235_2022_938_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/3719fa001fcd/11235_2022_938_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/b1cae137163b/11235_2022_938_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/b81406b4e0cb/11235_2022_938_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/af6da1d91cf4/11235_2022_938_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/7b34b4b292f5/11235_2022_938_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/dbfb6fec0ddf/11235_2022_938_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/ae4fff9b9259/11235_2022_938_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/3ddbff68dc78/11235_2022_938_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/633509972fd0/11235_2022_938_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/47962f16d1cc/11235_2022_938_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/a19d499126d5/11235_2022_938_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/f30cfa8507d1/11235_2022_938_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/62a3b3db6765/11235_2022_938_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/3719fa001fcd/11235_2022_938_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/b1cae137163b/11235_2022_938_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/b81406b4e0cb/11235_2022_938_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c70d/9299966/af6da1d91cf4/11235_2022_938_Fig13_HTML.jpg

相似文献

1
Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions.面向物联网应用的区块链设想访问控制:全面综述与未来方向
Telecommun Syst. 2022;81(1):125-173. doi: 10.1007/s11235-022-00938-7. Epub 2022 Jul 20.
2
A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions.区块链与集中式认证架构在智慧城市物联网智能设备中的比较分析:全面回顾、最新进展和未来研究方向。
Sensors (Basel). 2022 Jul 10;22(14):5168. doi: 10.3390/s22145168.
3
Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey.基于区块链的物联网(IoT)中减轻分布式拒绝服务(DDoS)攻击的解决方案:一项综述。
Sensors (Basel). 2022 Jan 31;22(3):1094. doi: 10.3390/s22031094.
4
Blockchain-Based Data Access Control and Key Agreement System in IoT Environment.基于区块链的物联网环境中的数据访问控制和密钥协商系统。
Sensors (Basel). 2023 May 29;23(11):5173. doi: 10.3390/s23115173.
5
Blockchain-Based Context-Aware Authorization Management as a Service in IoT.基于区块链的物联网上下文感知授权管理即服务。
Sensors (Basel). 2021 Nov 18;21(22):7656. doi: 10.3390/s21227656.
6
Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review.利用区块链技术确保物联网中的安全和隐私方面:系统文献回顾。
Sensors (Basel). 2023 Jan 10;23(2):788. doi: 10.3390/s23020788.
7
An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network.基于工业物联网的区块链赋能的使用神经网络的医疗保健系统安全可搜索加密方法。
Sensors (Basel). 2022 Jan 12;22(2):572. doi: 10.3390/s22020572.
8
Dickson polynomial-based secure group authentication scheme for Internet of Things.基于迪克森多项式的物联网安全群组认证方案
Sci Rep. 2024 Feb 28;14(1):4947. doi: 10.1038/s41598-024-55044-2.
9
Multi-Layer Blockchain-Based Security Architecture for Internet of Things.基于多层区块链的物联网安全架构
Sensors (Basel). 2021 Jan 24;21(3):772. doi: 10.3390/s21030772.
10
Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review.基于区块链的访问控制以防止物联网中的网络攻击:系统文献综述
Front Big Data. 2023 Jan 12;5:1081770. doi: 10.3389/fdata.2022.1081770. eCollection 2022.

引用本文的文献

1
Secure IoT data dissemination with blockchain and transfer learning techniques.利用区块链和迁移学习技术实现安全的物联网数据传播。
Sci Rep. 2025 Jan 11;15(1):1665. doi: 10.1038/s41598-024-84837-8.
2
Securing oil port logistics: A blockchain framework for efficient and trustworthy trade documents.保障油港物流:一个用于高效可信贸易文件的区块链框架。
PLoS One. 2024 Oct 18;19(10):e0309526. doi: 10.1371/journal.pone.0309526. eCollection 2024.
3
[Blockchain in health: Transforming security and clinical data management].[健康领域的区块链:变革安全与临床数据管理]
Aten Primaria. 2024 May;56(5):102848. doi: 10.1016/j.aprim.2023.102848. Epub 2024 Jan 15.
4
A Bibliometric Review of the Evolution of Blockchain Technologies.区块链技术演进的文献计量学研究
Sensors (Basel). 2023 Mar 16;23(6):3167. doi: 10.3390/s23063167.
5
A Blockchain and Fingerprinting Traceability Method for Digital Product Lifecycle Management.区块链和指纹追踪方法在数字产品全生命周期管理中的应用
Sensors (Basel). 2022 Nov 1;22(21):8400. doi: 10.3390/s22218400.