Online citations, reference lists, and bibliographies.

A Study On Secured Authentication And Authorization In Internet Of Things: Potential Of Blockchain Technology

Syeda Mariam Muzammal, Raja Kumar Murugesan
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
With the proliferation of Internet of Things (IoT) and its influence in various use case scenarios, it can be expected that IoT services will create a global reach. Smart cities, smart grids, smart industries, smart wearables etc. are some examples of IoT services today. Besides all the benefits that IoT provide, security issues of these services and data generated by IoT are of major concern. Traditional security practices of authentication and authorization have been initially designed for security needs of centralized client/server models which are good to deal with human-machine interaction over the Internet. In centralized systems, normally devices and users are trusted for being in the same application domain. Moreover, such systems can become a bottleneck for a number of queries at the same time; or may become a single point of failure causing unavailability of connected devices that are totally relying on a single trusted party. This paper explores the IoT security issues and concerns. Moreover, it provides a review of centralized and decentralized IoT security solutions in terms of authentication and authorization. Additionally, it discusses how Blockchain technology can be leveraged to provide IoT security.
This paper references
ScreenStealer: Addressing Screenshot attacks on Android devices
Syeda Mariam Muzammal (2016)
Smart Contract-Based Access Control for the Internet of Things
Yuanyu Zhang (2019)
Counter Measuring Conceivable Security Threats on Smart Healthcare Devices
Syeda Mariam Muzammal (2018)
Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper -
Paul Fremantle (2017)
Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices
Syeda Mariam Muzammal (2016)
IoT Middleware: A Survey on Issues and Enabling Technologies
A. Ngu (2017)
Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things
Pedro Peris-Lopez (2018)
Authentication and Authorization for the Internet of Things
Hokeun Kim (2017)
Current research on Internet of Things (IoT) security: A survey
Mardiana binti Mohamad Noor (2019)
AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks
M. Tao (2018)
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
M. T. Hammi (2018)
Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT
Aafaf Ouaddah (2017)
A Review on the Use of Blockchain for the Internet of Things
T. Fernández-Caramés (2018)
TBAS: Token-based authorization service architecture in Internet of things scenarios
Shih-Hsiung Lee (2017)
Blockchain Based Access Control Services
Damiano Di Francesco Maesa (2018)
Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT
O. Novo (2018)
Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies
Christian D'Orazio (2017)
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks
P. Vijayakumar (2018)
Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking
Francesco Restuccia (2018)
Blockchain for IoT security and privacy: The case study of a smart home
A. Dorri (2017)
Using Blockchain and smart contracts for secure data provenance management
A. Ramachandran (2017)
Controllable synthesis of P-chiral 1,2- and 1,3-diphosphines via asymmetric Diels-Alder reactions involving functionalized allylic phosphines as dienophiles.
Mingjun Yuan (2009)
Create Your Own Internet of Things: A survey of IoT platforms.
Kiran Jot Singh (2017)
Using Blockchain for IOT Access Control and Authentication Management
Abdallah Zoubir Ourad (2018)
Blockchains and Smart Contracts for the Internet of Things
K. Christidis (2016)
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
E. F. Jesus (2018)
Efficient certificateless access control for industrial Internet of Things
F. Li (2017)
Enhancing Privacy in Wearable IoT through a Provenance Architecture
Richard K. Lomotey (2018)
Survey of Authentication and Authorization for the Internet of Things
Michal Trnka (2018)
A policy enforcement framework for Internet of Things applications in the smart health
S. Sicari (2017)
BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network
Prosanta Gope (2016)
Access control in the Internet of Things: Big challenges and new opportunities
Aafaf Ouaddah (2017)
Blockchain and IoT Integration: A Systematic Survey
Alfonso Panarello (2018)
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
BCTrust: A decentralized authentication blockchain-based mechanism
M. T. Hammi (2018)

Semantic Scholar Logo Some data provided by SemanticScholar