Online citations, reference lists, and bibliographies.

A Study On Secured Authentication And Authorization In Internet Of Things: Potential Of Blockchain Technology

Syeda Mariam Muzammal, Raja Kumar Murugesan
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
With the proliferation of Internet of Things (IoT) and its influence in various use case scenarios, it can be expected that IoT services will create a global reach. Smart cities, smart grids, smart industries, smart wearables etc. are some examples of IoT services today. Besides all the benefits that IoT provide, security issues of these services and data generated by IoT are of major concern. Traditional security practices of authentication and authorization have been initially designed for security needs of centralized client/server models which are good to deal with human-machine interaction over the Internet. In centralized systems, normally devices and users are trusted for being in the same application domain. Moreover, such systems can become a bottleneck for a number of queries at the same time; or may become a single point of failure causing unavailability of connected devices that are totally relying on a single trusted party. This paper explores the IoT security issues and concerns. Moreover, it provides a review of centralized and decentralized IoT security solutions in terms of authentication and authorization. Additionally, it discusses how Blockchain technology can be leveraged to provide IoT security.
This paper references
10.1109/IConAC.2016.7604942
ScreenStealer: Addressing Screenshot attacks on Android devices
Syeda Mariam Muzammal (2016)
10.1109/JIOT.2018.2847705
Smart Contract-Based Access Control for the Internet of Things
Yuanyu Zhang (2019)
10.1109/ACCESS.2018.2826225
Counter Measuring Conceivable Security Threats on Smart Healthcare Devices
Syeda Mariam Muzammal (2018)
10.5220/0006353903440349
Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper -
Paul Fremantle (2017)
10.1007/S11633-016-1011-5
Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices
Syeda Mariam Muzammal (2016)
10.1109/JIOT.2016.2615180
IoT Middleware: A Survey on Issues and Enabling Technologies
A. Ngu (2017)
10.1016/j.future.2017.11.037
Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things
Pedro Peris-Lopez (2018)
10.1109/MITP.2017.3680960
Authentication and Authorization for the Internet of Things
Hokeun Kim (2017)
10.1016/J.COMNET.2018.11.025
Current research on Internet of Things (IoT) security: A survey
Mardiana binti Mohamad Noor (2019)
10.1016/j.jpdc.2017.09.004
AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks
M. Tao (2018)
10.1016/j.cose.2018.06.004
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
M. T. Hammi (2018)
10.1007/978-3-319-46568-5_53
Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT
Aafaf Ouaddah (2017)
10.1109/ACCESS.2018.2842685
A Review on the Use of Blockchain for the Internet of Things
T. Fernández-Caramés (2018)
10.1177/1550147717718496
TBAS: Token-based authorization service architecture in Internet of things scenarios
Shih-Hsiung Lee (2017)
10.1109/Cybermatics_2018.2018.00237
Blockchain Based Access Control Services
Damiano Di Francesco Maesa (2018)
10.1109/JIOT.2018.2812239
Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT
O. Novo (2018)
10.1109/JIOT.2016.2569094
Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies
Christian D'Orazio (2017)
10.1016/j.future.2016.11.024
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks
P. Vijayakumar (2018)
10.1109/JIOT.2018.2846040
Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking
Francesco Restuccia (2018)
10.1109/PERCOMW.2017.7917634
Blockchain for IoT security and privacy: The case study of a smart home
A. Dorri (2017)
Using Blockchain and smart contracts for secure data provenance management
A. Ramachandran (2017)
10.1039/b904090k
Controllable synthesis of P-chiral 1,2- and 1,3-diphosphines via asymmetric Diels-Alder reactions involving functionalized allylic phosphines as dienophiles.
Mingjun Yuan (2009)
10.1109/MCE.2016.2640718
Create Your Own Internet of Things: A survey of IoT platforms.
Kiran Jot Singh (2017)
10.1007/978-3-319-94370-1_11
Using Blockchain for IOT Access Control and Authentication Management
Abdallah Zoubir Ourad (2018)
10.1109/ACCESS.2016.2566339
Blockchains and Smart Contracts for the Internet of Things
K. Christidis (2016)
10.1155/2018/9675050
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
E. F. Jesus (2018)
10.1016/j.future.2016.12.036
Efficient certificateless access control for industrial Internet of Things
F. Li (2017)
10.3390/MTI2020018
Enhancing Privacy in Wearable IoT through a Provenance Architecture
Richard K. Lomotey (2018)
10.1155/2018/4351603
Survey of Authentication and Authorization for the Internet of Things
Michal Trnka (2018)
10.1016/J.SMHL.2017.06.001
A policy enforcement framework for Internet of Things applications in the smart health
S. Sicari (2017)
10.1109/JSEN.2015.2502401
BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network
Prosanta Gope (2016)
10.1016/j.comnet.2016.11.007
Access control in the Internet of Things: Big challenges and new opportunities
Aafaf Ouaddah (2017)
10.3390/s18082575
Blockchain and IoT Integration: A Systematic Survey
Alfonso Panarello (2018)
10.1016/j.adhoc.2015.05.014
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
M. Farash (2016)
10.1109/WCNC.2018.8376948
BCTrust: A decentralized authentication blockchain-based mechanism
M. T. Hammi (2018)



Semantic Scholar Logo Some data provided by SemanticScholar