Loading

Block-Chain Based Authorization and Access Control Mechanisms for IoT Environments: Challenges and Opportunities
Asra Kalim1, Deepak Singh Tomar2, Sheikh Ikhlaq3

1Asra Kalim, Deanship of E-learning and IT, Jazan University, Kingdom of Saudi Arabia.
2Deepak Singh Tomar, Associate Professor, CSE, MANIT, Bhopal, India.
3Sheikh Ikhlaq, Cloud Consultant, Accenture, New Delhi, India.
Manuscript received on September 21, 2020. | Revised Manuscript received on September 30, 2020. | Manuscript published on October 10, 2020. | PP: 237-244 | Volume-9 Issue-12, October 2020 | Retrieval Number: 100.1/ijitee.L79971091220 | DOI: 10.35940/ijitee.L7997.1091220
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of Things (IoT) involves interconnecting smart devices for data collection and making intelligent decisions where, the usual devices become autonomous and smart. With the swift and fast paced developments in the area of smart cities, smart homes, and smart everything the Internet of Things (IoT) is creating an exceptional role that has scope for immense growth and potential. Its objective is the seamless integration of digital and physical worlds into one ecosystem that would lead to the latest intelligent era of the Internet. This state of the art technology can offer huge potential for businesses and offer opportunities for already existent areas like healthcare, energy etc. Yet due to insufficient security techniques IoT is not completely fool proof against security breaches and privacy issues. Since IoT is made up of devices that are resource constrained and it has a complex environment, which makes enforcement of security measures even more complicated and tricky. This is where Blockchain’s (BC) “security by design” comes in; that is capable of tackling IoT’s foremost security requirements. Features like transparency, data encryption, auditability, operational resilience and immutability can help remove IoT’s architectural shortcomings. This paper focuses on this relationship and surveys the most relevant work in this area, for analyzing how blockchain is capable of solving the issues related to authorization and access control for IoT environments. 
Keywords: Blockchain, Smart contract, Authentication, Access control, Ethereum.
Scope of the Article: IoT