Dynamic-IoTrust: A Dynamic Access Control for IoT Based on Smart Contracts

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The Internet of things (IoT) is an active, real-world area in need of more investigation. One of the top weaknesses in security challenges that IoTs face, the centralized access control server, which can be a single point of failure. In this paper, Dynamic-IoTrust, a decentralized access control smart contract based aims to overcome distrusted, dynamic, trust and authentication issues for access control in IoT. It also integrates dynamic trust value to evaluate users based on behavior. In particular, the Dynamic-IoTrust contains multiple Main Smart Contract, one Register Contract, and one Judging Contract to achieve efficient distributed access control management. Dynamic-IoTrust provides both static access rights by allowing predefined access control policies and also provides dynamic access rights by checking the trust value and the behavior of the user. The system also provides to detected user misbehavior and make a decision for user trust value and penalty. There are several levels of trusted users to access the IoTs device. Finally, the case study demonstrates the feasibility of the Dynamic-IoTrust model to offer a dynamic decentralized access control system with trust value attribute to evaluate the internal user used IoTs devices.

  • Keywords

    Access control, blockchain, Internet of Things (IoT), smart contract, trust value.

  • References

      [1] Ibrar Yaqoob, Ejaz Ahmed, Ibrahim Abaker Targio Hashem, Abdelmuttlib Ibrahim Abdalla Ahmed, Abdullah Gani, Muhammad Imran, and Mohsen Guizani. Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wireless Communications, 24(3):10–16, 2017.

      [2] Li Da Xu, Wu He, and Shancang Li. Internet of things in industries: A survey. IEEE Transactions on industrial informatics, 10(4):2233–2243, 2014. [3] Oscar Novo. Scalable access management in iot using blockchain: A performance evaluation. IEEE Internet of Things Journal, 6(3):4694–4701, 2019.

      [4] Sheng Ding, Jin Cao, Chen Li, Kai Fan, and Hui Li. A novel attribute-based access control scheme using blockchain for iot. IEEE Access, 7:38431–38441, 2019.

      [5] Di Lin and Yu Tang. Blockchain consensus based user access strategies in d2d networks for data-intensive applications. IEEE Access, 6:72683–72690, 2018.

      [6] Sergio Gusmeroli, Salvatore Piccione, and Domenico Rotondi. A capability-based security approach to manage access control in the internet of things. Mathematical and Computer Modelling, 58(5-6):1189–1205, 2013.

      [7] Laphou Lao, Zecheng Li, Songlin Hou, Bin Xiao, Songtao Guo, and Yuanyuan Yang. A survey of iot applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Computing Surveys (CSUR), 53(1):1–32, 2020.

      [8] Sheng Ding, Jin Cao, Chen Li, Kai Fan, and Hui Li. A novel attribute-based access control scheme using blockchain for iot. IEEE Access, 7:38431–38441, 2019.

      [9] Guoping Zhang and Jiazheng Tian. An extended role based access control model for the internet of things. In 2010 International Conference on Information, Networking and Automation (ICINA), volume 1, pages V1–319. IEEE, 2010.

      [10] Oscar Novo. Blockchain meets iot: An architecture for scalable access management in iot. IEEE Internet of Things Journal, 5(2):1184–1195, 2018.

      [11] Han Liu, Dezhi Han, and Dun Li. Fabric-iot: A blockchain-based access control system in iot. IEEE Access, 8:18207–18218, 2020.

      [12] Tanzeela Sultana, Ahmad Almogren, Mariam Akbar, Mansour Zuair, Ibrar Ullah, and Nadeem Javaid. Data sharing system integrating access control mechanism using blockchain-based smart contracts for iot devices. Applied Sciences, 10(2):488, 2020.

      [13] Adam Ibrahim Abdi, Fathy Elbouraey Eassa, Kamal Jambi, Khalid Almarhabi, and Abdullah Saad AL AL-Ghamdi. Blockchain platforms and access control classification for iot systems. Symmetry, 12(10):1663, 2020.

      [14] Aafaf Ouaddah, Anas Abou Elkalam, and Abdellah Ait Ouahman. Fairaccess: a new blockchain-based access control framework for the internet of things. Security and communication networks, 9(18):5943–5964, 2016.

      [15] Y. Zhang, S. Kasahara, Y. Shen, X. Jiang, and J. Wan. Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2):1594–1605, 2019.

      [16] R.S. Sandhu and P. Samarati. Access control: principle and practice. IEEE Communications Magazine, 32(9):40–48, 1994.

      [17] Ethereum. Ethereum homestead documentation, 2021. Last accessed 15 March 2021.

      [18] Quorum. Goquorum, 2021. Last accessed 10 March 2021.

      [19] istanbul. istanbul-tools, 2021. Last accessed 15 March 2021.

      [20] geth. Go ethereum, 2021. Last accessed 13 March 2021.

      [21] Solidity. Solidity language, 2021. Last accessed 16 March 2021.

      [22] remix. Remix environment, 2021. Last accessed 15 March 2021.

      [23] web3. web3.js - ethereum javascript api, 2021. Last accessed 15 March 2021




Article ID: 31553
DOI: 10.14419/ijet.v10i2.31553

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.