An Internet of Things Access Control Scheme Based on Permissioned Blockchain and Edge Computing

14Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.

Abstract

In the IoT (Internet of Things) environment, the existing access control schemes for device resources have some problems, such as poor scalability, high latency, security, and dynamics. Combining the advantages of the permissioned blockchain and edge computing, an access control scheme for the Internet of Things based on the permissioned blockchain and edge computing is proposed. By authenticating the user’s identity at the edge, the user’s identity is reliable and the response time is improved. In the ABAC (Attribute Based Access Control) model, the blockchain is regarded as a trusted entity, and the access control policy is written into a smart contract and deployed on the blockchain for calling. Most of the existing consensus algorithms have the problems of low throughput and scalability. A Kraft (Kademlia–Raft) consensus algorithm is introduced to solve the above issues. Security analysis and experimental results show that the scheme can achieve fine-grained, dynamic access control, has high throughput and low latency, and ensures security and reliability.

Cite

CITATION STYLE

APA

Zhang, L., Li, B., Fang, H., Zhang, G., & Liu, C. (2023). An Internet of Things Access Control Scheme Based on Permissioned Blockchain and Edge Computing. Applied Sciences (Switzerland), 13(7). https://doi.org/10.3390/app13074167

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free