A Review of Distributed Access Control for Blockchain Systems Towards Securing the Internet of Things
暂无分享,去创建一个
[1] Ruixuan Li,et al. A Role-Based Access Control Architecture for P2P File-Sharing Systems Using Primary/Backup Strategy , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[2] Sachin Shetty,et al. A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things , 2020, IEEE Access.
[3] Salil S. Kanhere,et al. Blockchain Technologies for IoT , 2019, Studies in Big Data.
[4] Ravi S. Sandhu,et al. Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.
[5] Konstantinos Demertzis,et al. Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem , 2018, ICETE.
[6] Gene Tsudik,et al. Admission control in peer groups , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[7] Tooska Dargahi,et al. A systematic , 2022 .
[8] Qingju Wang,et al. When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.
[9] Joon S. Park,et al. Trusted P2P computing environments with role-based access control , 2007, IET Inf. Secur..
[10] M. ALAkhras. Voice over IP (VoIP) , 2008, 2008 Mosharaka International Conference on Communications, Computers and Applications.
[11] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[12] Masahiro Sasabe,et al. Capability-Based Access Control for the Internet of Things: An Ethereum Blockchain-Based Scheme , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[13] Ismail Butun,et al. Industrial Networks and IIoT: Now and Future Trends , 2020, Industrial IoT.
[14] Ismail Butun,et al. Security Implications of Fog Computing on the Internet of Things , 2018, 2019 IEEE International Conference on Consumer Electronics (ICCE).
[15] Yang Lu. Blockchain: A Survey on Functions, Applications and Open Issues , 2018 .
[16] Vijay Varadharajan,et al. A Trust based Access Control Framework for P2P File-Sharing Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[17] Spyros Makridakis,et al. Blockchain: Current Challenges and Future Prospects/Applications , 2019, Future Internet.
[18] Nuno Pereira,et al. Analysis of LoRaWAN v1.1 security: research paper , 2018, SmartObjects@MobiHoc.
[19] Ashok Kumar Das,et al. On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[20] Jun Lin,et al. Using Blockchain and IoT Technologies to Enhance Intellectual Property Protection , 2019, ICCSE.
[21] Sudeep Tanwar,et al. Blockchain for Industry 4.0: A Comprehensive Review , 2020, IEEE Access.
[22] Joel J. P. C. Rodrigues,et al. On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[23] Marc Pilkington,et al. Blockchain Technology: Principles and Applications , 2015 .
[24] Xiong Luo,et al. Blockchain-Enabled Cyber–Physical Systems: A Review , 2020, IEEE Internet of Things Journal.
[25] Ravi Sankar,et al. A brief survey of access control in Wireless Sensor Networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[26] Alan H. Karp,et al. E-speak e-xplained , 2003, CACM.
[27] Marko Vukolić,et al. Rethinking Permissioned Blockchains , 2017 .
[28] Ismail Butun,et al. Hardware Security of Fog End-Devices for the Internet of Things , 2020, Sensors.
[29] Anthony Skjellum,et al. BLAST: Blockchain-based Trust Management in Smart Cities and Connected Vehicles Setup , 2019, 2019 IEEE High Performance Extreme Computing Conference (HPEC).
[30] Jeong Hyun Yi,et al. Access control in ad hoc groups , 2004, 2004 International Workshop on Hot Topics in Peer-to-Peer Systems.
[31] Liming Zhu,et al. Analysis of Blockchain Solutions for IoT: A Systematic Literature Review , 2019, IEEE Access.
[32] Jeong Hyun Yi,et al. Identity-Based Access Control for Ad Hoc Groups , 2004, ICISC.
[33] Nuno Pereira,et al. Security Risk Analysis of LoRaWAN and Future Directions , 2018, Future Internet.
[34] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[35] Nuno Pereira,et al. Formal security analysis of LoRaWAN , 2019, Comput. Networks.
[36] A. Stranieri,et al. A Lightweight Blockchain Based Framework for Underwater IoT , 2019, Electronics.
[37] Akhil Sahai,et al. A secure platform for peer-to-peer computing in the Internet , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[38] Stuart Haber,et al. Improving the Efficiency and Reliability of Digital Time-Stamping , 1993 .
[39] Peng Sun,et al. Sensor Fusion for Recognition of Activities of Daily Living , 2018, Sensors.
[40] Ripon Patgiri,et al. Supply Chain Management in Agriculture Using Blockchain and IoT , 2019, Studies in Big Data.
[41] Houbing Song,et al. Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.
[42] Ravi Sankar,et al. Prevention and detection of intrusions in wireless sensor networks , 2013 .
[43] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[44] Latika Singh,et al. Use of blockchain in designing smart city , 2020 .
[45] Arun Kumar Sangaiah,et al. Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach , 2020, IEEE Internet of Things Journal.
[46] Ersin Uzun,et al. A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[47] Joon S. Park,et al. Role-based access control for collaborative enterprise in peer-to-peer computing environments , 2003, SACMAT '03.
[48] Gang Qu,et al. A Privacy-Preserving Trust Model Based on Blockchain for VANETs , 2018, IEEE Access.
[49] Deepak Puthal,et al. PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE) , 2019, IEEE Consumer Electronics Magazine.
[50] Fu-Kuo Tseng,et al. Halo: A Hierarchical Identity-Based Public Key Infrastructure for Peer-to-Peer Opportunistic Collaboration , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.
[51] Abdullah Aljumah,et al. Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms , 2019, IEEE Access.
[52] Neeraj Kumar,et al. Blockchain-Enabled Certificate-Based Authentication for Vehicle Accident Detection and Notification in Intelligent Transportation Systems , 2021, IEEE Sensors Journal.
[53] Advanced Applications of Blockchain Technology , 2020, Studies in Big Data.
[54] Petar Solic,et al. LoRaWAN — A low power WAN protocol for Internet of Things: A review and opportunities , 2017, 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech).
[55] Anura P. Jayasumana,et al. Collaborative applications over peer-to-peer systems–challenges and solutions , 2013, Peer Peer Netw. Appl..
[56] Jeong Hyun Yi,et al. Admission control in Peer-to-Peer: design and performance evaluation , 2003, SASN '03.
[57] Hella Kaffel Ben Ayed,et al. A Blockchain based access control for IoT , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).
[58] Mustafa Kocakulak,et al. An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[59] Friedrich A. von Hayek,et al. The Denationalization of Money: An Analysis of the Theory and Practice of Concurrent Currencies , 1976 .
[60] Mehdi Sookhak,et al. The Evolution of Blockchain: A Bibliometric Study , 2019, IEEE Access.
[61] Leïla Azouz Saïdane,et al. A survey on Blockchain based access control for Internet of Things , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).