物联网网关的自适应认证和授权方案:基于区块链的方法

Achraf Fayad, Badis Hammi, R. Khatoun
{"title":"物联网网关的自适应认证和授权方案:基于区块链的方法","authors":"Achraf Fayad, Badis Hammi, R. Khatoun","doi":"10.1109/SSIC.2018.8556668","DOIUrl":null,"url":null,"abstract":"Security of the Internet of Things represents a field that strongly attracts academia and industry since it represents one of the main obstacles in its adoption. In this area, authentication and authorization methods holds a golden place in priority rank. Indeed, current approaches suffers from numerous limits. Moreover, generally, deployment systems use separately two methods one dedicated to the authentication and the other to the authorization, while the number of methods that combine both requirements is limited. In this work we propose an adaptive blockchain based authentication and authorization approach for IoT use cases. We provided a real implementation of our approach using Java language. The extensive evaluation provided, shows clearly the ability of our scheme in meeting the different requirements, as well as its ability in ensuring a very lightweight cost.","PeriodicalId":302563,"journal":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach\",\"authors\":\"Achraf Fayad, Badis Hammi, R. Khatoun\",\"doi\":\"10.1109/SSIC.2018.8556668\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security of the Internet of Things represents a field that strongly attracts academia and industry since it represents one of the main obstacles in its adoption. In this area, authentication and authorization methods holds a golden place in priority rank. Indeed, current approaches suffers from numerous limits. Moreover, generally, deployment systems use separately two methods one dedicated to the authentication and the other to the authorization, while the number of methods that combine both requirements is limited. In this work we propose an adaptive blockchain based authentication and authorization approach for IoT use cases. We provided a real implementation of our approach using Java language. The extensive evaluation provided, shows clearly the ability of our scheme in meeting the different requirements, as well as its ability in ensuring a very lightweight cost.\",\"PeriodicalId\":302563,\"journal\":{\"name\":\"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SSIC.2018.8556668\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSIC.2018.8556668","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

摘要

物联网安全是一个非常吸引学术界和工业界的领域,因为它是采用物联网的主要障碍之一。在这个领域,身份验证和授权方法在优先级中占有重要地位。事实上,目前的方法有许多限制。此外,部署系统通常单独使用两种方法,一种用于身份验证,另一种用于授权,而结合这两种需求的方法的数量是有限的。在这项工作中,我们为物联网用例提出了一种基于区块链的自适应认证和授权方法。我们使用Java语言提供了我们的方法的实际实现。所提供的广泛评估清楚地显示了我们的方案满足不同需求的能力,以及确保非常轻的成本的能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach
Security of the Internet of Things represents a field that strongly attracts academia and industry since it represents one of the main obstacles in its adoption. In this area, authentication and authorization methods holds a golden place in priority rank. Indeed, current approaches suffers from numerous limits. Moreover, generally, deployment systems use separately two methods one dedicated to the authentication and the other to the authorization, while the number of methods that combine both requirements is limited. In this work we propose an adaptive blockchain based authentication and authorization approach for IoT use cases. We provided a real implementation of our approach using Java language. The extensive evaluation provided, shows clearly the ability of our scheme in meeting the different requirements, as well as its ability in ensuring a very lightweight cost.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信