Blockchain-Based Access Control Techniques For IoT Applications
Blockchain-Based Access Control Techniques For IoT Applications
Review
Blockchain-Based Access Control Techniques for IoT Applications
Sarra Namane 1 and Imed Ben Dhaou 2,3,4, *
1 Networks and Systems Laboratory, Department of Computer Science, Badji Mokhtar University,
Annaba 23000, Algeria; [email protected]
2 Department of Computer Science, Hekma School of Engineering, Computing and Informatics,
Dar Al-Hekma University, Jeddah 22246-4872, Saudi Arabia
3 Department of Computing, University of Turku, FI-20014 Turku, Finland
4 Department of Technology, Higher Institute of Computer Sciences and Mathematics, University of Monastir,
Monastir 5000, Tunisia
* Correspondence: [email protected]
Abstract: The Internet of Things is gaining more importance in the present era of Internet technology.
It is considered as one of the most important technologies of everyday life. Moreover, IoT systems
are ceaselessly growing with more and more devices. They are scalable, dynamic, and distributed,
hence the origin of the crucial security requirements in IoT. One of the most challenging issues
that the IoT community must handle recently is how to ensure an access control approach that
manages the security requirements of such a system. Traditional access control technologies are not
suitable for a large-scale and distributed network structure. Most of them are based on a centralized
approach, where the use of a trusted third party (TTP) is obligatory. Furthermore, the emergence of
blockchain technology has allowed researchers to come up with a solution for these security issues.
This technology is highly used to record access control data. Additionally, it has great potential for
managing access control requests. This paper proposed a blockchain-based access control taxonomy
according to the access control nature: partially decentralized and fully decentralized. Furthermore,
it presents an overview of blockchain-based access control solutions proposed in different IoT
applications. Finally, the article analyzes the proposed works according to certain criteria that the
Citation: Namane, S.; Ben Dhaou, I.
authors deem important.
Blockchain-Based Access Control
Techniques for IoT Applications.
Keywords: Internet of Things (IoT); blockchain; access control; IoT applications; fully decentralized;
Electronics 2022, 11, 2225. https://
doi.org/10.3390/electronics11142225
partially decentralized
number of end devices in this layer is a few thousand. Finally, the top layer represents
the cloud servers with extensive computing and storage capabilities. They are used to run
heavy data analytic algorithms.
Whatever the type of attack, it invades security services such as authenticity, integrity,
confidentiality, and availability. These services can be protected using security mechanisms
such as access control. This latter encompasses two phases, namely: the authentication and
the authorization.
The authorization phase represents the process that specifies who can access particular
resources and under which conditions. This represents an effective solution to prevent
illegal access to IoT resources, such as smart devices and data. Traditional access control
approaches are unable to give an effective mechanism to encounter the requirements of
IoT systems. Additionally, most of these approaches use a centralized authorization server,
which may generate an important communication overhead and involve high latency. In ad-
dition, using a single centralized authorization server that treats all access control requests
can lead to a single point of failure (SPOF). To address these issues, many researchers used
blockchain technology. This represents a P2P system that manages a distributed ledger.
This latter can be used to store agreements, transactions, events, and smart contracts.
The emergence of blockchain technology permitted the users to benefit from its properties,
such as immutability, decentralization, anonymity, and confidentiality. Several surveys
on the use of blockchain technology in access control were proposed. These papers did
not present a deep analysis of the proposed solutions. Furthermore, none of these surveys
mentioned in detail the phase of access control taken into consideration. Some of them
presented the use of blockchain technology in several IoT applications but not, especially in
access control. Additionally, most of these works neglected the existence of three categories
of comparison criteria: some relating to blockchain technology, others relating to access
control itself, and the last category that is concerned with the implementation and evalua-
tion metrics. All the points mentioned above are motivating factors for the presentation of
this work.
The main contributions of this paper are the following:
• A provision of a deep analysis of existing surveys on access control solutions that
used blockchain technology to address the trusted third party (TTP) issue in an IoT
environment.
• A background on access control and blockchain technology is presented to explain the
importance of their combination to eliminate the use of a trusted third party (TTP) in
an access control solution.
• A classification of the existing blockchain-based access control solutions according to
their nature into two categories, namely: fully decentralized and partially decentral-
ized.
• Recent blockchain-based access control frameworks are also classified according to the
IoT applications. The analysis of these works according to the domain of application
makes it possible to specify the outcomes of each domain.
• Blockchain-based authorization solutions are also analyzed according to certain criteria
that we judge important.
• Open challenges that need to be addressed when designing blockchain-based access
control solutions for IoT applications are also discussed.
This paper is structured as follows. Section 2 presents the recent surveys on blockchain-
based access control solutions in IoT environments. Section 3 gives a brief background on
the access control mechanism. Section 4 presents the blockchain technology and how it can
be used in access control. Several works that deployed the blockchain concept in access
control were also discussed in Section 4. Section 5 presents the most recent blockchain-
based access control frameworks proposed in different IoT applications. Blockchain-based
authorization solutions are analyzed in Section 6. Discussion and open issues are presented
in Section 7. Finally, Section 8 concludes the paper.
Electronics 2022, 11, 2225 4 of 29
2. Related Works
Numerous reports have discussed access control techniques. In this section, surveys
pertaining to IoT, cloud computing, and wireless sensor networks (WSNs) are considered.
Table 1 gives a brief description of the contribution and limitations of these survey papers.
Maw et al. [15] proposed a taxonomy for the classification of access control mod-
els used in WSN. The taxonomy clustered the schemes into three classes: role-based,
cryptography-based, and privacy-preserving-based access control techniques. They further
elaborated on two metrics to compare the access control schemes: the first metric is based on
the feature of the scheme (support for data/user privacy, flexibility, support for emergency
data access, granularity, and context sensitivity), whereas the second one is based on the
implementation performance. This includes computational overhead, energy consumption,
and memory requirement.
Cloud computing is a paradigm shift in ICT (information and communication technol-
ogy). It is a model in which computing resources (storage, network, services, servers, and
applications) are shared among geographically distributed users or tenants.
There are four categories of cloud computing: private, community, public, and hybrid.
The positive and negative aspects of each model are discussed in Stalling and Brown, [22].
Cloud computing brought new challenges to legacy access control techniques [23]. The sur-
vey work of Cai et al. [16] discussed the subsequent models for access control: task-based,
action-based, attribute-based, usage-based, and encryption-based access control methods.
They further compared those models based on ten metrics: security, confidentiality, the
flexibility of authorization, minimum privilege, separation of duties, fine-grained control,
cloud environment attributes, constraints description, compatibility, and expansibility. At
length, the authors identified the security of the virtual server, data set, and cloud platform.
The Internet of Things, IoT, is an emerging technology that connects objects, sensors,
humans, machines, and living things using an all-IP network [24]. IoT is a disruptive
Electronics 2022, 11, 2225 5 of 29
technology that ignited the fourth industrial revolution, commonly known as Industry 4.0
or IIOT (Industry IoT). IoT has also been used in healthcare, transportation, agriculture,
smart-city, retail, etc. Security of the IoT has received considerable attention from multiple
stakeholders [25]. The legacy access control techniques (RBAC, CapBAC, and ABAC)
are unfit for IoT [24]. To remedy this issue, blockchain-based access control has been
proposed as a suitable candidate for IoT. In [17], Rouhani and Deters analyzed the issues
of current access control solutions and explained how blockchain technology can handle
these problems. Moreover, they classified the existing proposed solutions according to
the following categories: transactions and smart contract category; data sharing category;
cloud federation category; multiple organization category; blockchain category; and self-
sovereign identities category. The authors also studied the application domain as well as
the blockchain platform used in each solution.
In [18], Riabi et al. proposed a comprehensive review of the existing blockchain-
based access control solutions. They classified these works into two categories, namely:
transaction-based access control and smart-contract-based access control. They focused
their comparison only on blockchain criteria: transaction or smart contract.
Furthermore, the authors did not specify the access control phase for which the blockchain
technology is used. Finally, Riabi et al. did not give information about the evaluation and
implementation of their solutions.
A review paper on blockchain-based authorization in IoT was presented in Patil et al. [19].
Several categories were used in this article to classify recent works, namely the attribute-
based access control (ABAC) category, the fair access category, the distributed access
control category, distributed key management category, token-based access control category,
control chain category, attribute update oriented access control category, ripple protocol
consensus algorithm (RPCA)-based authorization category and multiple smart contracts-
based authorization. In this paper, the authors give some other use cases of blockchain
technology such as vehicular ad hoc networks (VANETs), healthcare, and supply chain
applications.
In [20], Hussain et al. presented a survey on recent blockchain-based access control
schemes. They used two groups to classify these solutions. The first group is concerned
with access control based on blockchain transactions. The second one is relative to the
solutions that used the smart contract technology. Additionally, the authors give the
positive and negative aspects of each solution while defining its level of security. The
implementation criterion was also taken into consideration in this survey.
The recent work of Shantanu et al. [21] summarized the advantages of blockchain-
based access control and compared recent works using five features: permission enforce-
ment, access rights transfer, resource management, scalability, and attribute management.
The authors reported that further work is needed in standardization, policy, identity, and
trust management.
After a deep analysis of Table 1, it is clear that most of the existing survey papers
presented a taxonomy of the blockchain-based access control solutions. This taxonomy is
concerned with two different concepts, namely: blockchain technology and access control
itself. Blockchain technology has its criteria that permit us to evaluate the effectiveness of
the access control model. To illustrate, it is suitable to give the example of two blockchain-
based access control solutions, one only using transactions for the creation of security
policies and the management of access requests. The second one uses a smart contract
with transactions. This last combination makes it possible to reduce the response time to
an access request because it eliminates the search for security policies on the blockchain.
On the other hand, access control has its criteria that can influence the effectiveness of the
solution. For instance, the choice of access control model influences the efficiency of the
solution. When taking the case of the RBAC model, its inadequateness for a distributed
and large-scale environment such as the IoT is detectable. It is fair to say that a survey on
blockchain-based access control solutions must consider all the necessary criteria relative
Electronics 2022, 11, 2225 6 of 29
to both blockchain technology and the access control process. This assumption will be
highlighted and discussed in this article.
Figure 2. Evolution of access control systems from metal keys to biometric systems.
Access control methods have also been applied to secure computer systems. Before
going deeper into this subject, here is a restatement of the definitions described in the
National Institute of Standards and Technology (NIST) and Stalling and Brown [22].
Definition 1. A subject is an entity (human, organization, system, process, an app, etc.) that can
interact with an object.
Definition 2. An object is an asset (sensor, CPU, memory, files, application, subject, etc.) with
restricted access.
The access rights for each subject are recorded in an access control matrix. An example
of a matrix is shown in Figure 3. The example shows three subjects (S1, S2, and S3) with six
objects. The subjects are also called an object. The entry in each matrix describes the access
rights for each subject to each object. For example, subject S1 can read the object file, use
the printer, and put the process in sleep mode.
Electronics 2022, 11, 2225 7 of 29
The presence of a flag (star in Figure 3) in the access right means that the subject
can transfer this right to another subject. This operation triggers the update of the access
control matrix. For example, subject S1 can assign Read or Read* to the subjects S2 and S3.
The subject who owns an object can grant access to other subjects. A detailed explanation
of the access control matrix is in Stalling and Brown, [22].
The legacy access control policies are attribute-based access control (ABAC), role-based
access control (RBAC), mandatory access control (MAC), and discretionary access control
(DAC).
gives selective access to encrypted data using a combination of key management and
cryptographic schemes, namely attribute-based encryption (ABE).
The mining process is executed through a consensus algorithm. The proof of work
(PoW) is largely used by several blockchains to validate transactions. In this algorithm, a
mathematical puzzle is solved by miners using a considerable amount of computational
power. The first miner who solves the problem will receive a reward for their work.
To overcome the greater energy consumption of PoW, a proof of stake (PoS) algorithm is
proposed. This algorithm favors nodes that have a high stake. These nodes can add blocks
to the blockchain. To reduce the consumption in mining, a random selection using the
amount of stake is accomplished to select a new block. A variable of the PoS algorithm
is presented as the delegated proof of stake (DPoS). It selects delegates that give blocks
according to an attributed order. The DPoS algorithm reduced the computational cost be-
cause the number of blocks is lower than other algorithm’s number of blocks. Additionally,
the delegates are disqualified if they give invalid blocks or lose them. A practical Byzantine
fault tolerance (PBFT) was presented. The principal aim of this algorithm was to address
issues of Byzantine fault tolerance. This takes into consideration the existence of malicious
nodes in the system. In this algorithm, nodes are divided into two categories: a primary
node known as a leader, and secondary nodes. PBFT requires that the number of harmful
nodes must not exceed one-third of the nodes’ total number in the system. Although this
algorithm does not waste energy, it is weak versus Sybil and scaling attacks.
technology enhances the overall network security. The following subsection is dedicated to
blockchain-based access control.
creates the token and another entity verifies it. Eventually, a distributed key-based process
is considered as a fully decentralized. Figure 7 illustrates the categories and subcategories
of authorization based on blockchain technology in an IoT environment. In this sub-section,
a classification is provided regarding the different related works based on two categories:
fully decentralized and partially decentralized.
token to the user and to the IoT device. Hence, the token verification is executed through
several IoT device; however, the token creation is executed through the smart contract.
In [36], Algarni et al. used a multi-agent architecture to guarantee secure access control
in IoT system. The main goal of the solution was to use different blockchain managers
(BCMs) that manage the IoT entire system. Furthermore, these managers set the access con-
trol policy for each device in the different layers of the system. This created the possibility
to classify the solution as a partially decentralized access control. Although the proposed
system allows securing communication between the fog nodes, cloud computing and IoT
devices, it used a big header size in the blockchain and it has not yet been implemented.
Hierarchical blockchain architecture for access control in IoT environment was pre-
sented in Abdi et al. [37]. The proposed solution reduced network overhead and transac-
tion latency where authors used three types of managers. An edge blockchain manager
(EBCM) validates and grants access to devices that need to reach or store data in the same
cluster. Furthermore, Abdi et al. introduced an aggregated edge blockchain manager
(AEBCM) to authorize requests from sub-device clusters and manage the security pol-
icy of the system, which is based on the attribute-based access control (ABAC) model.
At this level, the blockchain uses a practical Byzantine fault tolerance (PBFT) as a consensus
algorithm. By the end, a cloud consortium blockchain manager (CCBCM) authenticates
users and selects the corresponding ABAC policy; after evaluating the request, the manager
returns the response to the user. Several smart contracts were used in different layers of the
system to store the access control rules and information of IoT devices.
Islam et al. [38] proposed a federated learning-based data accumulation solution.
This latter combines drones and blockchain technology. Additionally, it handles the authen-
tication and authorization phases. To guarantee two-phase authentication, a cuckoo filter
and a timestamp nonce were used. Moreover, the scheme can be classified as a token and
cryptography-based technique. It is partially decentralized for the reason that the token is
created by the edge server closest to the entity.
nodes are built to make access control decisions and interact with the blockchain. Finally,
the evaluation of the proposed scheme has shown that it is efficient for it reduced the
computation and storage overhead.
In [43], Nakamura et al. focused on the critical access control issue for IoT devices using
Ethereum smart contracts to store and manage capability tokens. In the proposed CapBAC
scheme, the owner entity creates a capability token. Apart from that, the owner entity
can delegate tokens to other objects. Ultimately, the last step of the authorization process
represents the token verification. In the proposed solution, the subject is responsible for
passing the token to the smart contract to verify whether the access is accepted or denied.
Hence, the access control system is fully decentralized because the token creation and
delegation are executed by several entities. Furthermore, several subjects execute the token
verification. A fully decentralized key distribution access control system in IoT-enabled
smart grid environment was presented.
In [44], Bera et al. used a private blockchain to secure data transfer between smart
meters and service providers. The proposed solution used the practical Byzantine fault
tolerance (PBFT) algorithm as a consensus mechanism with a secure leader selection to
add blocks to the blockchain. Furthermore, the Elliptic curve cryptography (ECC) [45]
algorithm was used to encrypt transactions. Eventually, the authors demonstrated that
their solution was secure through several types of verification.
In [46], Zhai et al. used the attribute-based access control (ABAC) model with the smart
contract to achieve a fully decentralized policy-based access control system applicable in the
process of intelligent manufacturing. They used formal language to represent access control
attributes. Furthermore, in the proposed solution, security policies are self-created by each
resource owner. A requester obtains access to a resource provided that all its attribute–value
pairs and the current environment’s attributes meet the access policy requirements set by
the resource owner. The latter executes the evaluation of an access control request for each
smart contract it invokes..
To overcome the inflexibility and the key abuse problems of the attribute-based en-
cryption (ABE) scheme, Gu et al. proposed in [47] the TABE-DAC scheme, which can be
classified as a policy and cryptography-based solution. It has the feature of being fully
decentralized due to the fact that data owners create and update their security policies.
Additionally, these policies are verified by several entities. Hence, the proposed solution is
based on cryptography and blockchain technology, which offers the possibility of tracing
malicious users. Finally, the authors evaluated the effectiveness of the proposed scheme
theoretically.
In [48], Ali et al. presented a blockchain-based permission delegation authorization
model. In the proposed solution, they took into consideration two types of access control
requests, namely the event and the query ones. The first one is concerned with the request
generated in a response to an event. The second type, however, deals with the access
control request generated by a user to access a certain resource. In addition, the authors
managed the permission delegation for the two types using a private blockchain with smart
contract technology.
5. Applications
The Internet of Things paradigm has large applicability in several areas, such as smart
farming, smart healthcare, smart grid, smart transportation systems, and industry 4.0.
All these fields of application have one thing in common, which is the sensitivity of the data
generated by smart devices. It is clear from previous sections that traditional access control
techniques are inadequate for this type of environment. In addition, blockchain-based
access control makes it possible to guarantee a partially decentralized or fully decentralized
access control that meets the security requirements of an IoT environment. This section will
present the different blockchain-based access control techniques that have been proposed for
each area. Then, an analysis of the limitation of these works concerning the requirements of
the area will be presented. In the end, possible solutions for these limitations are provided.
Electronics 2022, 11, 2225 14 of 29
5.2. E-Health
The most important objective of a smart health environment is to allow medical
practitioners to guarantee better healthcare services. In a smart health system, smart
devices collect important data on patients’ health. These data must be transferred and
stored securely. Additionally, they must be only accessed by legitimate users, because
allowing access to unauthorized users can have serious consequences on the health of
the patient.
In [51], Sookhak et al. focused on EHR access control methods. They presented the
most recent works that used smart contracts with blockchain technology in the healthcare
domain. Moreover, several parameters such as consensus protocol, type of EHR storage,
type of blockchain, and type of ledger were used to present a blockchain-based access
control taxonomy. Finally, after analyzing the proposed blockchain-based access control
methods in the healthcare domain, the authors found that using a smart contract by the
data owner to define security policies is costly in such an environment because the owner
has to update the smart contract to guarantee user revocation. Furthermore, ensuring this
feature causes a high computation overhead on the blockchain. Sookhak et al. noticed
that several works were presented to overcome this issue. On the other hand, some of the
proposed reports have tried to resolve the data storage issue by protecting the EHRs before
outsourcing them into the cloud. The authors mentioned several works on blockchain
scalability wherein it was managed at different layers, such as a scalable IoT architecture
or a scalable consensus protocol (PoW, BFT). Finally, the last-mentioned issue cited in
this paper is latency in the blockchain network, which has a significant impact on the
patient’s life.
In [52], Hossein et al. proposed the BCHealth architecture that allows data owners to
specify their security policies over their data. For that purpose, the authors used two chains,
where the first chain was used to store data transactions and the second one concerned
access control policies’ storage. To reduce the communication overhead, the authors chose
to store healthcare data on a machine near the data owner. This point represents one of the
advantages of this solution because most of the previous works stocked data in the cloud or
in the healthcare data center. Finally, the authors used a proof of authority algorithm (PoA)
Electronics 2022, 11, 2225 15 of 29
as a consensus algorithm. Although the use of two blockchains has improved network
performance (reduction in transaction search time), the authors gathered the blockchain
network nodes into several clusters and attributed each user to a specific cluster for stocking
their access control policies and data. Consequently, cluster management remains an issue
to be resolved.
In [53], Zhang et al. presented a blockchain-based hierarchical data-sharing frame-
work (BHDSF) to give a fine-grained access control in the healthcare Internet of Things
(H-IoT). The authors implemented Ciphertext-policy attribute-based keyword search (CP-
ABKS) to reduce the burden of traditional CP-ABE schemes for PHR searching. Addition-
ally, they deployed a user hierarchy to delegate key distribution. One of the limitations
of the proposed solution is the data-sharing delay, which can be reduced using edge
computing.
In [54], Yang et al. proposed an efficient attribute-based encryption (CP-ABE) scheme
in the access control of patients’ electronic health records (EHRs). They used edge comput-
ing to improve health services and reduce transmission delay. This delay was decreased
by transferring encryption and decryption parts to the fog nodes. Moreover, the authors
used the blockchain technology with a smart contract to guarantee a the fine-grained access
control of the data. One of the limitations of this solution is the use of a key generation
center that represents a single point of failure and can cause key escrow problems.
collect parking offers, the driver’s location is masked using the cloaking technique. As
such, the authors guarantee the drivers’ privacy. Furthermore, after the selection of the best
offer based on some criteria, drivers use Bitcoin to pay for parking services. Eventually,
it is obvious that the presented scheme is based on authorized validators (parking lots),
which manage the parking services.
as a network with billions of industrial factories and machines equipped with sensors.
These devices are connected to the Internet for collecting and sharing data. That is why it
contributes to the increase in new risks and security challenges, such as malicious access,
data tampering, and several cyber-attacks. This subsection will present the most recent
works that used blockchain technology to ensure and improve security in Industry 4.0
environments.
In [63], Wan et al. integrated the blockchain technology in the Industrial Internet of
Things (IIoT) architecture for smart factories. They proposed that the solution is based
on five layers, namely the sensing layer, the management hub layer, the storage layer, the
firmware layer, and the application layer. Each layer plays an important role in ensuring
the best functioning of the system. Furthermore, the authors used the SHA-256 [64] and the
elliptic curve cryptography (ECC) [45] to guarantee the privacy of the data generated by
sensors. Regarding the access control process, the authors used an access control list that
combines the Bell–La Padula (BLP) [65] model with the Biba model [66]. This combination
permits maintaining the confidentiality, integrity, and availability (CIA) requirements.
In [67], Lahbib et al. proposed a privacy-preserving distributed access management
framework (PDAMF). In the proposed solution, the authors used blockchain technology
with ring signatures to ensure the access requester’s anonymity. Additionally, they took
into consideration both the authentication and the authorization phases. For this latter,
they used a smart contract that evaluates the access request by checking the validity of
the requester’s role. On the other hand, the smart contract must verify the existence of
the access control policy among the predefined security policies. The evaluation of the
proposed scheme shows that it is suitable for an Industry 4.0 environment.
In [68], Feng et al. combined a consortium blockchain with the 5G technology to
present a secure access control framework in the Industrial Internet of Things (IIoT) system.
They used three types of chain codes, namely policy management chain code (PMC), access
control chain code (ACC), and credit evaluation chain code (CEC). The PMC chain code is
used to specify the security policies of the objects. These policies are based on the attribute-
based access control (ABAC) model. Only the object owner can execute the PMC. The ACC
chain code plays the role of a policy decision point (PDP). First, it checks the existence of
the policy that is needed to evaluate the access request. Then, if a security policy is found,
the ACC evaluates the policy using the attributes’ values and returns the access control
response. Regarding the CEC, Feng et al. used credit evaluation criteria to dynamically
select the order nodes. This last selection permits improving the security of the process.
Finally, the evaluation of the proposed scheme showed that the use of the credit criterion
improved the security of the access control process. Furthermore, the proposed framework
reduced resource and communication consumption compared to the practical Byzantine
fault tolerance (PBFT)-based scheme.
In [69], Shih et al. deployed three types of smart contracts with blockchain technology
to present a distributed access control in the environment of the Industrial Internet of
Things (IIoT), starting with The first type of smart contract, namely the policy contract (PC).
The latter deals with the creation of a security policy using the attribute-based access control
(ABAC) model, its validation, as well as its deletion. Furthermore, the authors used a device
contract (DC) responsible for stocking the device URL in the ledger.
This contract can also generate a one-time device URL to ensure the security of the shared
data. Eventually, the authors used an access contract (AC) that evaluated the access control
request and returned the permissions. The evaluation of the proposed solution showed a
less requirement of time compared to proof of work (PoW) to reach a consensus.
the second group encompasses the criteria that are related to access control, namely Cr5,
Cr6, and Cr7. At last, the third group contains two general criteria that are: Cr8 and Cr9.
Consensus
Reference Transaction/S.Contract Contacts Number
Algorithm
[27] Smart contract Multiples DPOS
[34] Smart contract One contract NM
Lightweight
[36] Transaction NA
mechanism
[37] Smart contract Multiple PBFT
[40] Smart contract Multiple PoW
[41] Smart contract One contract Endorsement policy
[42] Smart contract One contract Endorsement policy
[43] Smart contract Multiple PoW
[44] Transaction NA PBFT
Low overhead
[49] Smart contract One contract
approach
[52] Transaction NA PoA
[48] Smart contract Multiple PBFT
NA: not applicable; NM: not mentioned.
In [40,43], the authors used the proof of work (PoW) algorithm despite the fact that
there is the strong requirement of a large computational capacity leading to large con-
sumption of energy. In [37,44,48], the practical Byzantine fault tolerance (PBFT) algorithm
was used. This algorithm offers high processing transactions with low latency. In [52],
Hussein et al. used the proof of authority (PoA) algorithm that can be considered as a
recent family of Byzantine fault tolerant (BFT) consensus algorithms that work on private
blockchain. PoA is known as a lighter message exchange algorithm because it improves the
performance and the scalability of the system compared to traditional practical Byzantine
fault tolerance (PBFT).
In [41], Islam and Madria did not use one of the familiar consensus algorithms,
yet there was a deployment of an endorsement policy wherein the data owner specifies
the identity of all endorsing peers using a configuration transaction. Therefore, these
findings can help judge that choosing an efficient consensus algorithm is an issue that
needs to be addressed. For this purpose, several criteria must be evaluated, namely energy
consumption, computing capacity, scaling, and latency.
3. Cr3: smart contract and number of contracts
After a deep analysis of the proposed solutions (summarized in Table 4), it is clear
that some authors only used transactions in the blockchain [36,44,52]. These transactions
can be of different types according to their functions such as access transaction, update
transaction, and add transaction. In [52], Hussein et al. used two blockchains to reduce the
transaction’s research time. For this purpose, they used two different types of transactions,
namely policy transactions and data transactions. Some others combined smart contract
Electronics 2022, 11, 2225 20 of 29
Reference Platform
[34] Ethereum
[35] Ethereum
[37] Hyperledger Fabric
[39] Ethereum
[40] Ethereum
[41] Hyperledger Fabric
[43] Ethereum
[48] Hyperledger Fabric
Electronics 2022, 11, 2225 21 of 29
In [72], Ameer et al. noticed that each IoT application domain has challenges to
consider when choosing the access control model. For this reason, the HABAC model
was proposed, which was an attribute-based access control model which was especially
designed for a smart home context. To conclude, the choice of an adequate access control
model remains an issue to be addressed since it depends on several factors such as the
application’s domain, the nature of the environment, and its security requirements.
8. Cr8: Domain application
In Section 5, the existing blockchain-based access control solutions were classified
according to the domain applications, namely: smart farming, smart health, intelligent
transportation systems, smart grids, and Industry 4.0. A deep analysis of the recent solu-
tions, reveals that access control in smart farming has not been widely considered by current
researchers. In fact, two related works have recently been proposed. Consequently, there
are insufficient research resources. Moreover, the authors in [49] proposed a blockchain-
based solution managed by an administrator. This last point allows us to estimate that it is
a solution close to traditional centralized access control approaches. Furthermore, Vangala
et al. in [50] focused only on the authentication phase. In summary, as mentioned above,
this field of application requires further in-depth studies on its security needs to move
towards an adequate access control solution.
Regarding the E-health applications, it cannot be denied that several works have been
proposed in this field. Indeed, a recent survey was presented in [51], wherein Sookhak
et al. proposed a taxonomy of the different blockchain-based access control solutions.
Furthermore, it is safe to assert that the attention for this domain application can also be
due to the health situation that the world has been experiencing in the last three years.
Electronics 2022, 11, 2225 23 of 29
Additionally, it may be due to the sensitive nature of medical data as malicious access can
cost human lives.
Concerning smart transportation systems, most blockchain-based access control solu-
tions targeted the smart parking issue. Dukkipati and Zhang in [56] proposed a blockchain-
based access control model in which they tried to minimize the number of security policies.
To validate their solution, they took into consideration the scenario of a security policy that
permits the sharing of information about parking slots, traffic signals flow between two
signals. Furthermore, in [57,58], the authors focused on the smart parking scenario.
After analyzing smart grids access control schemes, it is notable that the cryptography
is largely used [59–62]. In [60,61], the authors proposed a cryptography- and policy-based
solution. In [62], Nasser et al. used elliptic curve cryptography (ECC).
Finally, regarding Industry 4.0 applications, different access control solutions were
proposed. In [68,69], the authors presented a policy-based access control. In both solutions,
the scheme was based on the ABAC model and used multiple smart contracts. In [63], Wan
et al. used the ECC to ensure data privacy. In [67], Lahbib et al. intended to guarantee the
requester’s anonymity. For this purpose, they used ring signatures. Therefore, it is possible
to say that each IoT domain has its relative security requirements. These must later be
identified before designing the authorization solution.
9. Cr9: Implementation of the solution and evaluation criteria
In [34], Novo implemented a proof of concept (PoC) prototype of the proposed solution
evaluating the influence of the new management hub on system scalability and performance.
The author used the Ethereum blockchain with a single smart contract implemented with
solidity language. The latency of access control operations was also evaluated, and the
throughput in the management hub using different scenarios.
In [36], Algarni et al. did not implement the proposed solution, they left this step for fu-
ture work. There is also an intention to resolve the big header size issue.
In [37], Abdi et al. performed simulations of the proposed solution by using the Hy-
perledger Fabric blockchain platform. Additionally, the Golang language was used to
implement smart contracts. The authors used the Hyperledger Caliper to evaluate the
performance of their solution. For this purpose, they calculated the transaction latency
and transaction throughput. In [39], Xu et al. implemented a proof of concept proto-
type of the proposed scheme BlendCAC. The Ethereum blockchain with Solidity lan-
guage was employed in this procedure to implement the smart contract. As hardware
equipment, the authors adapted two Raspberry Pi 3, two laptops, and four desktops.
The mining process was performed by laptops and desktops while the two raspberry Pi 3
played the role of client and service provider, respectively. Furthermore, the authors evalu-
ated the computational and communication overheads of the proposed solution. As a result,
the BlendCAC scheme seems to have less processing time than the RBAC and ABAC mod-
els. Additionally, a small amount of overhead was introduced by the BlendCAC scheme.
The authors believe that it can be improved if the scheme will be implemented on more
powerful smart devices.
In [40], Zhang et al. provided a case study to show the application of the proposed
solution in the IoT. As hardware, they used one desktop computer, one laptop, and two
Raspberry Pi 3 Model B. Furthermore, the procedure consisted of employing the Ethereum
blockchain and the Solidity programming language to implement smart contracts. The
number of gas required to deploy the three smart contracts was evaluated. Parenthetically,
the gas is a unit used in the Ethereum platform to measure the capital cost to execute a
smart contract. Furthermore, the authors calculated the average time required to deploy
the three smart contracts.
In [41], the proposed access control system was fully implemented. First, Islam and
Madria developed an IoT test-bed. Afterward, they implemented the blockchain network in
Hyperledger Fabric v1.3. The evaluation of the proposed solution shows that it can treat access
control requests of IoT resources faster than the public blockchain and that using the optimum
parameter values (block size: 20 and 40 transactions per second, block timeout = 1 s).
Electronics 2022, 11, 2225 24 of 29
In [43], Nakamura et al. implemented the capability, delegation graph, and the token’s
creation, delegation, revocation, and verification functions. They used one MacBook Pro,
one MacBook Air, and two Raspberry pi as hardware. The evaluation of the proposed
solution is based on a private Ethereum blockchain. Nakamura et al. evaluated the gas
consumption of the proposed scheme in the case of token creation, token delegation, and
token revocation. Furthermore, they compared the obtained results to those obtained
by the BlendCAC scheme [39]. The experimental results have shown that the proposed
solution needs less gas than the BlendCAC scheme. In conclusion, the implementation
of the proposed solution can be estimated as the unique point that allows us to validate
the proposal and this is after the definition of the most important criteria that need to be
evaluated.
This section is dedicated to a comparison between this work and the studies previously
summarized in Section 2. This comparison is based on some criteria deemed important
(illustrated in Table 8) . In addition, an in-depth analysis of recent blockchain-based
access control solutions (carried out in Section 6) also consisted of using the same criteria.
Table 2 illustrates a brief description of each criterion. In [15], Maw et al. satisfied the
Cr5 and the Cr9 criteria while Rouhani and Deters in [17] took into consideration the
Cr3, Cr5, and the Cr8 criteria. Moreover, it is shown that in [16,18,19] authors took into
account only one criterion: Cr5, Cr3, and Cr1, respectively. Furthermore, Hussein et al. [20]
managed Cr3 and Cr9 criteria. Furthermore, it can be noticed that none of the previously
cited comparison criteria was managed by Shantanu et al. [21]. Finally, According to this
analysis, it is clear that only our work took into account all these comparison criteria.
This section includes an analysis of the recent blockchain-based access control models
in the IoT environment. This analysis is based on three categories of criteria deemed
important. The first group deals with the criteria relative to the blockchain technology
whereas the second group encompasses the criteria that are concerned with the access
control mechanism. The last group is defined as general feature criteria such as domain
application and implementation. Adding on that, this paper provided a comparison
between the presented content and the related work papers, and this comparison showed
that only this work took into consideration the three categories of criteria.
• How to propose a decentralized and lightweight access control solution for distributed
and high-scale IoT environments even though IoT devices have limited storage and
computing capacity.
• Should the proposed solution combine the two access control phases or does it just
take into consideration one phase? Furthermore, which technique can be chosen to
ensure an effective authorization (fully decentralized, partially decentralized)?
• What is the suitable access control model used in the proposed access control solution?
Will an existing model be used or will a combination of several models be necessary?
What are the criteria that can be used to determine an appropriate access control
model?
2. Blockchain-related issues
Blockchain technology represents an appealing solution to ensure access control
decentralization. However, blockchain-enabled access control is a very promising scheme
and permits dealing with a single point of failure problems. However, there are still some
potential problems related to the blockchain technology that need to be addressed. Some of
these issues have already been discussed in [33].
• The first issue is the harmonization (interoperability) of blockchain across application
areas and geographic locations.
• The second issue is the power consumption associated with the consensus algorithm
that solves the double-spending problem.
• The third issue is the bandwidth overheads associated with the blockchain which can
increase the latency.
• The last issue concerns the implementation of the blockchain algorithm on diminutive
devices.
Several solutions can be proposed to overcome the issues mentioned above. In a
blockchain, there is an obligation on each node to perform a comparable task for the
verification of each transaction at the same time. This comparison generates a high com-
putation cost. Gupta et al. [73] proposed a game theory-based authentication framework
with blockchain technology to resolve the Internet of Vehicles (IoV) cross trusted author-
ity’s authentication issues. To manage the network scarcity challenges, Islam et al. [38]
proposed a lightweight scheme employing drones to assist IoT devices for secure data
collection. Furthermore, dew computing was used to permit offline computations.
Kumar et al. [74] proposed a blockchain-based edge framework (BlockEdge) to ensure
low-latency services for IIoT applications, while Sosu et al. [75] presented a review paper
where they highlighted the importance of integrating blockchain technology with dew
computing. Furthermore, machine learning can be suggested as a solution to some of the
previously discussed challenges. Xiao et al. [76] showed how machine learning techniques
can help to build lightweight access control protocols in a heterogeneous environment with
multi-source data and multiple types of nodes such as IoT. To solve the complex computa-
tion offloading of vehicles while ensuring the high security of the cloud server in vehicular
ad hoc networks (VANETs), a blockchain-based solution was proposed in Zheng et al. [77].
This solution considers offloading tasks by optimizing offloading decisions, consensus
mechanism decisions, the allocation of computation resources, and channel bandwidth.
The access control model issue was managed in [78] where Zhaou et al. applied machine
learning to obtain a fully user-role assignment process in the RBAC model in the SCADA
system. The combination of a blockchain and physically unclonable function for IoT is an
interesting area of research [79] to solve bandwidth, integration, scalability, latency, and
energy requirements for the Internet of Energy (IoE) systems.
8. Conclusions
This article first explained the importance of using blockchain technology in access
control in an IoT environment. Next, a classification of recent works on blockchain-based
access control was presented according to the nature of the approach: fully decentralized or
Electronics 2022, 11, 2225 26 of 29
partially decentralized. Additionally, the recent solutions were classified and analyzed ac-
cording to the IoT applications. Finally, a deep analysis of recent authorization frameworks
was performed according to three categories of criteria. The first one concerns blockchain
technology. The second category of criteria is relative to access control. The last group repre-
sents general criteria. In our future works, we plan to present a survey on blockchain-based
authentication schemes. One of the obvious concerns that will be discussed is whether
these solutions can follow the same taxonomy proposed in this paper. Since these schemes
are based on blockchain technology, there must be a notion of decentralization. It remains
to be seen whether this decentralization is total or partial. Adding to that, an analysis of
the relationship between the authentication technique and authorization technique will
be provided. Furthermore, an important question that cannot be neglected is whether
the choice of authentication technique influences that of authorization, namely: policy-
based, token-based, and cryptography-based. Additionally, there is a plan to study several
paradigms such as fog computing, multi-access edge computing, and dew computing to
see whether they permit us to implement blockchain-based access control techniques to
reduce the computation cost.
Author Contributions: S.N. and I.B.D. equally contributed to the manuscript concept, methodology,
original draft writing, visualization and editing. I.B.D. secured the funding of the manuscript. All
authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies,
Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [CrossRef]
2. Sethi, P.; Sarangi, S.R. Internet of Things: Architectures, Protocols, and Applications. J. Electr. Comput. Eng. 2017, 2017, 9324035.
[CrossRef]
3. IEEE Std 1934-2018; IEEE Standard for Adoption of OpenFog Reference Architecture for Fog Computing. IEEE: New York, NY,
USA, 2018.
4. Ray, P.P. An Introduction to Dew Computing: Definition, Concept and Implications. IEEE Access 2018, 6, 723–737. [CrossRef]
5. Filali, A.; Abouaomar, A.; Cherkaoui, S.; Kobbane, A.; Guizani, M. Multi-Access Edge Computing: A Survey. IEEE Access 2020,
8, 197017–197046. [CrossRef]
6. Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020, 10.
[CrossRef]
7. Riahi Sfar, A.; Natalizio, E.; Challal, Y.; Chtourou, Z. A roadmap for security challenges in the Internet of Things. Digit. Commun.
Netw. 2018, 4, 118–137. [CrossRef]
8. Mohanta, B.K.; Jena, D.; Satapathy, U.; Patnaik, S. Survey on IoT security: Challenges and solution using machine learning,
artificial intelligence and blockchain technology. Internet Things 2020, 11, 100227. [CrossRef]
9. Sharma, M.; Tandon, A.; Narayan, S.; Bhushan, B. Classification and analysis of security attacks in WSNs and IEEE 802.15.4
standards : A survey. In Proceedings of the 2017 3rd International Conference on Advances in Computing, Communication &
Automation (ICACCA) (Fall), Dehradun, India, 15–16 September 2017, pp. 1–5. [CrossRef]
10. Sinha, P.; Rai, A.k.; Bhushan, B. In Proceedings of the Information Security threats and attacks with conceivable counteraction.
In Proceedings of the 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies
(ICICICT), Kannur, India, 5–6 July 2019; Volume 1, pp. 1208–1213. [CrossRef]
11. Saxena, S.; Bhushan, B.; Ahad, M.A. Blockchain based solutions to secure IoT: Background, integration trends and a way forward.
J. Netw. Comput. Appl. 2021, 181, 103050. [CrossRef]
12. Ben Dhaou, I. A Secure IoT-enabled Sensor Node for Traffic Light Management and Level of Service Computation. In Proceedings
of the 2021 18th International Multi-Conference on Systems, Signals & Devices (SSD), Monastir, Tunisia, 22–25 March 2021;
pp. 644–648. [CrossRef]
13. Tsvetanov, T.; Slaria, S. The effect of the Colonial Pipeline shutdown on gasoline prices. Econ. Lett. 2021, 209, 110122. [CrossRef]
14. Oz, H.; Aris, A.; Levi, A.; Uluagac, A.S. A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. ACM Comput.
Surv. 2022, Just Accepted. [CrossRef]
15. Maw, H.A.; Xiao, H.; Christianson, B.; Malcolm, J.A. A Survey of Access Control Models in Wireless Sensor Networks. J. Sens.
Actuator Netw. 2014, 3, 150–180. [CrossRef]
16. Cai, F.; Zhu, N.; He, J.; Mu, P.; Li, W.; Yu, Y. Survey of access control models and technologies for cloud computing. Clust. Comput.
2019, 22, 6111–6122. [CrossRef]
Electronics 2022, 11, 2225 27 of 29
17. Rouhani, S.; Deters, R. Blockchain Based Access Control Systems: State of the Art and Challenges. In Proceedings of the WI
’19: IEEE/WIC/ACM International Conference on Web Intelligence, Thessaloniki, Greece, 14–17 October 2019; Association for
Computing Machinery: New York, NY, USA, 2019; pp. 423–428. [CrossRef]
18. Riabi, I.; Ayed, H.K.B.; Saidane, L.A. A survey on Blockchain based access control for Internet of Things. In Proceedings of the
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June
2019; pp. 502–507. [CrossRef]
19. Patil, P.; Sangeetha, M.; Bhaskar, V. Blockchain for IoT Access Control, Security and Privacy: A Review. Wirel. Pers. Commun.
2021, 117, 1815–1834. [CrossRef]
20. Hussain, H.A.; Mansor, Z.; Shukur, Z. Comprehensive Survey and Research Directions on Blockchain IoT Access Control. Int. J.
Adv. Comput. Sci. Appl. 2021, 12. [CrossRef]
21. Pal, S.; Dorri, A.; Jurdak, R. Blockchain for IoT access control: Recent trends and future research directions. J. Netw. Comput. Appl.
2022, 203, 103371. [CrossRef]
22. Stallings, W.; Brown, L. Computer Security, 4th ed.; Pearson: London, UK, 2017; pp. 127–165.
23. Singh, A.; Chatterjee, K. Cloud security issues and challenges: A survey. J. Netw. Comput. Appl. 2017, 79, 88–115. [CrossRef]
24. Qiu, J.; Tian, Z.; Du, C.; Zuo, Q.; Su, S.; Fang, B. A Survey on Access Control in the Age of Internet of Things. IEEE Internet Things
J. 2020, 7, 4682–4696. [CrossRef]
25. Rachit.; Bhatt, S.; Ragiri, P.R. Security trends in Internet of Things: A survey. SN Appl. Sci. 2021, 3, 121. [CrossRef]
26. Sandhu, R.S. Role-based Access Control. In Advances in Computers; Elsevier: Amsterdam, The Netherlands, 1998; Volume 46,
pp. 237–286. [CrossRef]
27. Sun, S.; Chen, S.; Du, R.; Li, W.; Qi, D. Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy.
In Proceedings of the 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC), Hangzhou, China, 23–25
June 2019; pp. 598–603. [CrossRef]
28. Shen, H.B. A Semantic- and Attribute-Based Framework for Web Services Access Control. In Proceedings of the 2010 2nd
International Workshop on Intelligent Systems and Applications, Wuhan, China, 22–23 May 2010; pp. 1–4. [CrossRef]
29. Bhushan, B.; Sinha, P.; Sagayam, K.M.; Onesimu, J.A. Untangling blockchain technology: A survey on state of the art, security
threats, privacy services, applications and future research directions. Comput. Electr. Eng. 2021, 90, 106897. [CrossRef]
30. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Appl. Sci. 2008. Available online: https://bitcoin.org/bitcoin.pdf
(accessed on 14 June 2022).
31. Sharma, T.; Satija, S.; Bhushan, B. Unifying Blockchian and IoT:Security Requirements, Challenges, Applications and Future
Trends. In Proceedings of the 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS),
Greater Noida, India, 18–19 October 2019; pp. 341–346. [CrossRef]
32. Pavithran, D.; Shaalan, K.; Al-Karaki, J.N.; Gawanmeh, A. Towards building a blockchain framework for IoT. Clust. Comput.
2020, 23, 2089–2103. [CrossRef]
33. Kondoro, A.; Rwegasira, D.; Dhaou, I.B.; Tenhunen, H. Trends of Using Blockchain Technology in the Smart Grid. In Proceedings
of the 2021 Global Congress on Electrical Engineering (GC-ElecEng), Valencia, Spain, 10–12 December 2021; pp. 102–108.
[CrossRef]
34. Novo, O. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet Things J. 2018, 5, 1184–1195.
[CrossRef]
35. Ourad, A.Z.; Belgacem, B.; Salah, K. Using Blockchain for IOT Access Control and Authentication Management. In Internet
of Things–ICIOT 2018; Georgakopoulos, D., Zhang, L.J., Eds.; Springer International Publishing: Cham, Switzerland, 2018;
pp. 150–164.
36. Algarni, S.; Eassa, F.; Almarhabi, K.; Almalaise, A.; Albassam, E.; Alsubhi, K.; Yamin, M. Blockchain-Based Secured Access
Control in an IoT System. Appl. Sci. 2021, 11, 1772. [CrossRef]
37. Abdi, A.I.; Eassa, F.E.; Jambi, K.; Almarhabi, K.; Khemakhem, M.; Basuhail, A.; Yamin, M. Hierarchical Blockchain-Based
Multi-Chaincode Access Control for Securing IoT Systems. Electronics 2022, 11, 711. [CrossRef]
38. Islam, A.; Al Amin, A.; Shin, S.Y. FBI: A Federated Learning-Based Blockchain-Embedded Data Accumulation Scheme Using
Drones for Internet of Things. IEEE Wirel. Commun. Lett. 2022, 11, 972–976. [CrossRef]
39. Xu, R.; Chen, Y.; Blasch, E.; Chen, G. BlendCAC: A BLockchain-Enabled Decentralized Capability-based Access Control for
IoTs. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and
Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData),
Halifax, NS, Canada, 30 July–3 August 2018.
40. Zhang, Y.; Kasahara, S.; Shen, Y.; Jiang, X.; Wan, J. Smart Contract-Based Access Control for the Internet of Things. IEEE Internet
Things J. 2019, 6, 1594–1605. [CrossRef]
41. Islam, M.A.; Madria, S. A Permissioned Blockchain Based Access Control System for IOT. In Proceedings of the 2019 IEEE
International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019; pp. 469–476. [CrossRef]
42. Zhang, Y.; Li, B.; Liu, B.; Wu, J.; Wang, Y.; Yang, X. An Attribute-Based Collaborative Access Control Scheme Using Blockchain for
IoT Devices. Electronics 2020, 9, 285. [CrossRef]
43. Nakamura, Y.; Zhang, Y.; Sasabe, M.; Kasahara, S. Exploiting Smart Contracts for Capability-Based Access Control in the Internet
of Things. Sensors 2020, 11, 1793. [CrossRef]
Electronics 2022, 11, 2225 28 of 29
44. Bera, B.; Saha, S.; Das, A.K.; Vasilakos, A.V. Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid
System. IEEE Internet Things J. 2021, 8, 5744–5761. [CrossRef]
45. Bafandehkar.; Yasin, S.M.; Mahmod, R.; Hanapi, Z.M. Comparison of ECC and RSA algorithm in resource constrained devices.
In Proceedings of the 2013 International Conference on IT Convergence and Security (ICITCS), Macau, China, 16–18 December
2013; pp. 1 –3.
46. Zhai, P.; He, J.; Zhu, N. Blockchain-Based Internet of Things Access Control Technology in Intelligent Manufacturing. Appl. Sci.
2022, 12, 3692. [CrossRef]
47. Guo, L.; Yang, X.; Yau, W.C. TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme with Dynamic Access Control
Based on Blockchain. IEEE Access 2021, 9, 8479–8490. [CrossRef]
48. Ali, G.; Ahmad, N.; Cao, Y.; Asif, M.; Cruickshank, H.; Ali, Q.E. Blockchain based permission delegation and access control in
Internet of Things(BACI). Comput. Secur. 2019, 86, 318–334. [CrossRef]
49. Arshad, J.; Siddique, M.A.B.; Zulfiqar, Z.; Khokhar, A.; Salim, S.; Younas, T.; Rehman, A.U.; Asad, A. A Novel Remote User
Authentication Scheme by using Private Blockchain-Based Secure Access Control for Agriculture Monitoring. In Proceedings of
the 2020 International Conference on Engineering and Emerging Technologies (ICEET), Lahore, Pakistan, 22–23 February 2020;
pp. 1–9. [CrossRef]
50. Vangala, A.; Sutrala, A.K.; Das, A.K.; Jo, M. Smart Contract-Based Blockchain-Envisioned Authentication Scheme for Smart
Farming. IEEE Internet Things J. 2021, 8, 10792–10806. [CrossRef]
51. Sookhak, M.; Jabbarpour, M.R.; Safa, N.S.; Yu, F.R. Blockchain and smart contract for access control in healthcare: A survey, issues
and challenges, and open issues. J. Netw. Comput. Appl. 2021, 178, 102950. [CrossRef]
52. Mohammad Hossein, K.; Esmaeili, M.E.; Dargahi, T.; Khonsari, A.; Conti, M. BCHealth: A Novel Blockchain-based Privacy-
Preserving Architecture for IoT Healthcare Applications. Comput. Commun. 2021, 180, 31–47. [CrossRef]
53. Zhang, J.; Yang, Y.; Liu, X.; Ma, J. An efficient blockchain-based hierarchical data sharing for Healthcare Internet of Things. IEEE
Trans. Ind. Inform. 2022, 1. [CrossRef]
54. Yang, Y.; hua Shi, R.; Li, K.; Wu, Z.; Wang, S. Multiple access control scheme for EHRs combining edge computing with smart
contracts. Future Gener. Comput. Syst. 2022, 129, 453–463. [CrossRef]
55. l-Tit, A., and Ben Dhaou, I. and Albejaidi, F. M. and Alshitawi, M. S. Traffic Safety Factors in the Qassim Region of Saudi Arabia.
SAGE Open. 2020, 10. [CrossRef]
56. Dukkipati, Zhang, C. Decentralized, blockchain based access control framework for the heterogeneous internet of things. In
Proceedings of the 3rd Workshop on Attribute Based Access Control, Tempe, AZ, USA, 21 March 2018; pp. 61–69. [CrossRef]
57. Hu, J.; He, D.; Zhao, Q.; Choo, K.K.R. Parking Management: A Blockchain-Based Privacy-Preserving System. IEEE Consum.
Electron. Mag. 2019, 8, 45–49. [CrossRef]
58. Amiri, W.A.; Baza, M.; Banawan, K.; Mahmoud, M.; Alasmary, W.; Akkaya, K. Towards Secure Smart Parking System Using
Blockchain Technology. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications Networking Conference
(CCNC), Las Vegas, NV, USA, 10–13 January 2020; pp. 1–2. [CrossRef]
59. Zhou, Y.; Guan, Y.; Zhang, Z.; Li, F. A Blockchain-Based Access Control Scheme for Smart Grids. In Proceedings of the 2019
International Conference on Networking and Network Applications (NaNA), Daegu City, Korea, 10–13 October 2019; pp. 368–373.
[CrossRef]
60. Le, T.V.; Hsu, C.L.; Chen, W.X. A Hybrid Blockchain-Based Log Management Scheme with Non-Repudiation for Smart Grids.
IEEE Trans. Ind. Inform. 2021, 18, 9, pp 5771-5782 [CrossRef]
61. Yang, W.; Guan, Z.; Wu, L.; Du, X.; Guizani, M. Secure Data Access Control With Fair Accountability in Smart Grid Data Sharing:
An Edge Blockchain Approach. IEEE Internet Things J. 2021, 8, 8632–8643. [CrossRef]
62. Naseer.; Oumair.; Ullah.; Saif.; Anjum.; Luqman. Blockchain-Based Decentralized Lightweight Control Access Scheme for Smart
Grids. Arab. J. Sci. Eng. 2021, 46, 8233–8243. [CrossRef]
63. Wan, J.; Li, J.; Imran, M.; Li, D.; e Amin, F. A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory.
IEEE Trans. Ind. Inform. 2019, 15, 3652–3660. [CrossRef]
64. Gilbert, H ; Handschuh, H. Security analysis of SHA-256 and sisters. In Proceedings of the 10th Annual International Workshop
on Selected Areas in Cryptography, Ottawa, ON, Canada, 14–15 August 2003; pp. 175–193.
65. Elliott Bell, D., Bell–La Padula Model. In Encyclopedia of Cryptography and Security; van Tilborg, H.C.A., Jajodia, S., Eds.; Springer:
Boston, MA, USA, 2011; pp. 74–79. [CrossRef]
66. Millen, J.K., Biba Model. In Encyclopedia of Cryptography and Security; van Tilborg, H.C.A., Jajodia, S., Eds.; Springer: Boston, MA,
USA, 2011; pp. 81–82. [CrossRef]
67. Lahbib, A.; Toumi, K.; Laouiti, A.; Martin, S. Blockchain based Privacy Aware Distributed Access Management Framework
for Industry 4.0. In Proceedings of the 2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for
Collaborative Enterprises (WETICE), 27–29 October, Bayonne, France 2021; pp. 51–56. [CrossRef]
68. Feng, Y.; Zhang, W.; Luo, X.; Zhang, B. A Consortium Blockchain-Based Access Control Framework With Dynamic Orderer Node
Selection for 5G-Enabled Industrial IoT. IEEE Trans. Ind. Inform. 2022, 18, 2840–2848. [CrossRef]
69. Shih, D.H.; Wu, T.W.; Shih, M.H.; Chen, G.W.; Yen, D.C. Hyperledger Fabric Access Control for Industrial Internet of Things.
Appl. Sci. 2022, 12, 3125. [CrossRef]
Electronics 2022, 11, 2225 29 of 29
70. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; Caro, A.D.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich,
Y.; et al. Hyperledger fabric. In Proceedings of the Thirteenth EuroSys Conference. ACM, Porto, Portugal, 23–26 April 2018.
[CrossRef]
71. Aghili, S.F.; Sedaghat, M.; Singelée, D.; Gupta, M. MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control
scheme. Future Gener. Comput. Syst. 2022, 131, 75–90. [CrossRef]
72. Ameer, S.; Benson, J.; Sandhu, R. An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a
Comparison with a Role-Based Approach. Information 2022, 13, 60. [CrossRef]
73. Gupta, M.; Kumar, R.; Shekhar, S.; Sharma, B.; Patel, R.B.; Jain, S.; Dhaou, I.B.; Iwend, C. Game Theory Based Authentication
Framework to Secure Internet of Vehicles with Blockchain. Sensors 2022, 22, 5119. [CrossRef]
74. Kumar, T.; Harjula, E.; Ejaz, M.; Manzoor, A.; Porambage, P.; Ahmad, I.; Liyanage, M.; Braeken, A.; Ylianttila, M. BlockEdge:
Blockchain-Edge Framework for Industrial IoT Networks. IEEE Access 2020, 8, 154166–154185. [CrossRef]
75. Sosu, R.N.A.; Babu, C.N.; Frimpong, S.A.; Essuman, J. The Relevance Of Blockchain With Dew Computing: A Review. In
Proceedings of the 2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO),
Opatija Croatia, 6 November 2020 ; pp. 1934–1940. [CrossRef]
76. Xiao, L.; Wan, X.; Lu, X.; Zhang, Y.; Wu, D. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to
Enhance Security? IEEE Signal Process. Mag. 2018, 35, 41–49. [CrossRef]
77. Zheng, X.; Li, M.; Chen, Y.; Guo, J.; Alam, M.; Hu, W. Blockchain-Based Secure Computation Offloading in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst. 2021, 22, 4073–4087. [CrossRef]
78. Zhou, L.; Su, C.; Li, Z.; Liu, Z.; Hancke, G.P. Automatic fine-grained access control in SCADA by machine learning. Future Gener.
Comput. Syst. 2019, 93, 548–559. [CrossRef]
79. Asif, R.; Ghanem, K.; Irvine, J. Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy.
Sensors 2021, 21, 28. [CrossRef] [PubMed]