Bagga Palak, Das Ashok Kumar, Chamola Vinay, Guizani Mohsen
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032 India.
Virginia Modeling, Analysis and Simulation Center, Old Dominion University, Suffolk, VA 23435 USA.
Telecommun Syst. 2022;81(1):125-173. doi: 10.1007/s11235-022-00938-7. Epub 2022 Jul 20.
With rapid advancements in the technology, almost all the devices around are becoming smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added to the network, it is important to verify the authenticity of the device before allowing it to communicate with the network. Hence, access control is a crucial security mechanism that allows only the authenticated node to become the part of the network. An access control mechanism also supports confidentiality, by establishing a session key that accomplishes secure communications in open public channels. Recently, blockchain has been implemented in access control protocols to provide a better security mechanism. The foundation of this survey article is laid on IoT, where a detailed description on IoT, its architecture and applications is provided. Further, various security challenges and issues, security attacks possible in IoT and their countermeasures are also provided. We emphasize on the blockchain technology and its evolution in IoT. A detailed description on existing consensus mechanisms and how blockchain can be used to overpower IoT vulnerabilities is highlighted. Moreover, we provide a comprehensive description on access control protocols. The protocols are classified into certificate-based, certificate-less and blockchain-based access control mechanisms for better understanding. We then elaborate on each use case like smart home, smart grid, health care and smart agriculture while describing access control mechanisms. The detailed description not only explains the implementation of the access mechanism, but also gives a wider vision on IoT applications. Next, a rigorous comparative analysis is performed to showcase the efficiency of all protocols in terms of computation and communication costs. Finally, we discuss open research issues and challenges in a blockchain-envisioned IoT network.
随着技术的飞速发展,几乎所有周围的设备都在变得智能化,并接入物联网(IoT)网络。当一个新的物联网设备添加到网络中时,在允许其与网络通信之前验证设备的真实性非常重要。因此,访问控制是一种关键的安全机制,它只允许经过认证的节点成为网络的一部分。访问控制机制还通过建立一个会话密钥来支持保密性,该会话密钥可在开放的公共信道中实现安全通信。最近,区块链已被应用于访问控制协议中,以提供更好的安全机制。这篇综述文章以物联网为基础,详细描述了物联网及其架构和应用。此外,还介绍了各种安全挑战和问题、物联网中可能出现的安全攻击及其对策。我们重点介绍了区块链技术及其在物联网中的发展。突出了对现有共识机制的详细描述以及区块链如何用于克服物联网漏洞。此外,我们还对访问控制协议进行了全面描述。为了便于理解,这些协议被分为基于证书的、无证书的和基于区块链的访问控制机制。然后,我们在描述访问控制机制的同时,详细阐述了智能家居、智能电网、医疗保健和智能农业等每个用例。详细描述不仅解释了访问机制的实现,还对物联网应用给出了更广阔的视野。接下来,进行了严格的比较分析,以展示所有协议在计算和通信成本方面的效率。最后,我们讨论了区块链设想的物联网网络中的开放研究问题和挑战。