An adaptive authentication and authorization scheme for IoT's gateways: A blockchain based approach

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Security of the Internet of Things represents a field that strongly attracts academia and industry since it represents one of the main obstacles in its adoption. In this area, authentication and authorization methods holds a golden place in priority rank. Indeed, current approaches suffers from numerous limits. Moreover, generally, deployment systems use separately two methods one dedicated to the authentication and the other to the authorization, while the number of methods that combine both requirements is limited. In this work we propose an adaptive blockchain based authentication and authorization approach for IoT use cases. We provided a real implementation of our approach using Java language. The extensive evaluation provided, shows clearly the ability of our scheme in meeting the different requirements, as well as its ability in ensuring a very lightweight cost.

Original languageEnglish
Title of host publication2018 3rd International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538681879
DOIs
Publication statusPublished - 3 Dec 2018
Event3rd International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018 - Shanghai, China
Duration: 18 Oct 201819 Oct 2018

Publication series

Name2018 3rd International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018 - Proceedings

Conference

Conference3rd International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018
Country/TerritoryChina
CityShanghai
Period18/10/1819/10/18

Keywords

  • Authentication
  • Authorization
  • Internet of things IoT
  • Privacy
  • Smart City
  • Smart home

Fingerprint

Dive into the research topics of 'An adaptive authentication and authorization scheme for IoT's gateways: A blockchain based approach'. Together they form a unique fingerprint.

Cite this