A Review of Distributed Access Control for Blockchain Systems Towards Securing the Internet of Things

As the Internet of Things (IoT) paradigm gets more attention from academia and industry, implementation tools of IoT will be explored more and more. One example is the applicability of blockchain systems to provide security and privacy of IoT networks, which is the topic of this article. Blockchain systems are on the rise, as crypto-currency payment systems (such as Bitcoin, Litecoin, etc.) boomed in the last few years due to their attractive de-centralized and anonymous features. As in every transaction, access of the users to IoT systems needs to be controlled. However, these systems are peer-to-peer systems and do not have centralized control, which means that traditional access control techniques will not be optimal. As a result, distributed access control schemes are needed and this paper aims at providing the state of the art in the literature. Thereby, we introduce and discuss the details and applicability of centralized (role-based) and distributed (threshold-signature, reputation, trusted-computing, identity, capability, ACL, group-signature, and hybrid) access control schemes to blockchain systems under the IoT ecosystems. Moreover, permissioned vs. permissionless blockchain systems are also discussed. Finally, challenges and research directions related to the application of all those presented blockchain systems to IoT are discussed.

[1]  Ruixuan Li,et al.  A Role-Based Access Control Architecture for P2P File-Sharing Systems Using Primary/Backup Strategy , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[2]  Sachin Shetty,et al.  A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things , 2020, IEEE Access.

[3]  Salil S. Kanhere,et al.  Blockchain Technologies for IoT , 2019, Studies in Big Data.

[4]  Ravi S. Sandhu,et al.  Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.

[5]  Konstantinos Demertzis,et al.  Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem , 2018, ICETE.

[6]  Gene Tsudik,et al.  Admission control in peer groups , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..

[7]  Tooska Dargahi,et al.  A systematic , 2022 .

[8]  Qingju Wang,et al.  When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.

[9]  Joon S. Park,et al.  Trusted P2P computing environments with role-based access control , 2007, IET Inf. Secur..

[10]  M. ALAkhras Voice over IP (VoIP) , 2008, 2008 Mosharaka International Conference on Communications, Computers and Applications.

[11]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[12]  Masahiro Sasabe,et al.  Capability-Based Access Control for the Internet of Things: An Ethereum Blockchain-Based Scheme , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[13]  Ismail Butun,et al.  Industrial Networks and IIoT: Now and Future Trends , 2020, Industrial IoT.

[14]  Ismail Butun,et al.  Security Implications of Fog Computing on the Internet of Things , 2018, 2019 IEEE International Conference on Consumer Electronics (ICCE).

[15]  Yang Lu Blockchain: A Survey on Functions, Applications and Open Issues , 2018 .

[16]  Vijay Varadharajan,et al.  A Trust based Access Control Framework for P2P File-Sharing Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[17]  Spyros Makridakis,et al.  Blockchain: Current Challenges and Future Prospects/Applications , 2019, Future Internet.

[18]  Nuno Pereira,et al.  Analysis of LoRaWAN v1.1 security: research paper , 2018, SmartObjects@MobiHoc.

[19]  Ashok Kumar Das,et al.  On the Design of Blockchain-Based Access Control Scheme for Software Defined Networks , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[20]  Jun Lin,et al.  Using Blockchain and IoT Technologies to Enhance Intellectual Property Protection , 2019, ICCSE.

[21]  Sudeep Tanwar,et al.  Blockchain for Industry 4.0: A Comprehensive Review , 2020, IEEE Access.

[22]  Joel J. P. C. Rodrigues,et al.  On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[23]  Marc Pilkington,et al.  Blockchain Technology: Principles and Applications , 2015 .

[24]  Xiong Luo,et al.  Blockchain-Enabled Cyber–Physical Systems: A Review , 2020, IEEE Internet of Things Journal.

[25]  Ravi Sankar,et al.  A brief survey of access control in Wireless Sensor Networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[26]  Alan H. Karp,et al.  E-speak e-xplained , 2003, CACM.

[27]  Marko Vukolić,et al.  Rethinking Permissioned Blockchains , 2017 .

[28]  Ismail Butun,et al.  Hardware Security of Fog End-Devices for the Internet of Things , 2020, Sensors.

[29]  Anthony Skjellum,et al.  BLAST: Blockchain-based Trust Management in Smart Cities and Connected Vehicles Setup , 2019, 2019 IEEE High Performance Extreme Computing Conference (HPEC).

[30]  Jeong Hyun Yi,et al.  Access control in ad hoc groups , 2004, 2004 International Workshop on Hot Topics in Peer-to-Peer Systems.

[31]  Liming Zhu,et al.  Analysis of Blockchain Solutions for IoT: A Systematic Literature Review , 2019, IEEE Access.

[32]  Jeong Hyun Yi,et al.  Identity-Based Access Control for Ad Hoc Groups , 2004, ICISC.

[33]  Nuno Pereira,et al.  Security Risk Analysis of LoRaWAN and Future Directions , 2018, Future Internet.

[34]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[35]  Nuno Pereira,et al.  Formal security analysis of LoRaWAN , 2019, Comput. Networks.

[36]  A. Stranieri,et al.  A Lightweight Blockchain Based Framework for Underwater IoT , 2019, Electronics.

[37]  Akhil Sahai,et al.  A secure platform for peer-to-peer computing in the Internet , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[38]  Stuart Haber,et al.  Improving the Efficiency and Reliability of Digital Time-Stamping , 1993 .

[39]  Peng Sun,et al.  Sensor Fusion for Recognition of Activities of Daily Living , 2018, Sensors.

[40]  Ripon Patgiri,et al.  Supply Chain Management in Agriculture Using Blockchain and IoT , 2019, Studies in Big Data.

[41]  Houbing Song,et al.  Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.

[42]  Ravi Sankar,et al.  Prevention and detection of intrusions in wireless sensor networks , 2013 .

[43]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[44]  Latika Singh,et al.  Use of blockchain in designing smart city , 2020 .

[45]  Arun Kumar Sangaiah,et al.  Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach , 2020, IEEE Internet of Things Journal.

[46]  Ersin Uzun,et al.  A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[47]  Joon S. Park,et al.  Role-based access control for collaborative enterprise in peer-to-peer computing environments , 2003, SACMAT '03.

[48]  Gang Qu,et al.  A Privacy-Preserving Trust Model Based on Blockchain for VANETs , 2018, IEEE Access.

[49]  Deepak Puthal,et al.  PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE) , 2019, IEEE Consumer Electronics Magazine.

[50]  Fu-Kuo Tseng,et al.  Halo: A Hierarchical Identity-Based Public Key Infrastructure for Peer-to-Peer Opportunistic Collaboration , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[51]  Abdullah Aljumah,et al.  Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms , 2019, IEEE Access.

[52]  Neeraj Kumar,et al.  Blockchain-Enabled Certificate-Based Authentication for Vehicle Accident Detection and Notification in Intelligent Transportation Systems , 2021, IEEE Sensors Journal.

[53]  Advanced Applications of Blockchain Technology , 2020, Studies in Big Data.

[54]  Petar Solic,et al.  LoRaWAN — A low power WAN protocol for Internet of Things: A review and opportunities , 2017, 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech).

[55]  Anura P. Jayasumana,et al.  Collaborative applications over peer-to-peer systems–challenges and solutions , 2013, Peer Peer Netw. Appl..

[56]  Jeong Hyun Yi,et al.  Admission control in Peer-to-Peer: design and performance evaluation , 2003, SASN '03.

[57]  Hella Kaffel Ben Ayed,et al.  A Blockchain based access control for IoT , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).

[58]  Mustafa Kocakulak,et al.  An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[59]  Friedrich A. von Hayek,et al.  The Denationalization of Money: An Analysis of the Theory and Practice of Concurrent Currencies , 1976 .

[60]  Mehdi Sookhak,et al.  The Evolution of Blockchain: A Bibliometric Study , 2019, IEEE Access.

[61]  Leïla Azouz Saïdane,et al.  A survey on Blockchain based access control for Internet of Things , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).