OAuth 2.0 meets Blockchain for Authorization in Constrained IoT Environments

05/05/2019
by   Vasilios A. Siris, et al.
0

We present models for utilizing blockchain and smart contract technology with the widely used OAuth 2.0 open authorization framework to provide delegated authorization for constrained IoT devices. The models involve different tradeoffs in terms of privacy, delay, and cost, while exploiting key advantages of blockchains and smart contracts. These include linking payments to authorization grants, immutably recording authorization information and policies in smart contracts, and offering resilience through the execution of smart contract code on all blockchain nodes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/05/2019

Interledger Smart Contracts for Decentralized Authorization to Constrained Things

We present models that utilize smart contracts and interledger mechanism...
research
04/01/2021

Blockchain and smart contract for IoT enabled smart agriculture

The agricultural sector is still lagging behind from all other sectors i...
research
07/05/2022

Can We Effectively Use Smart Contracts to Stipulate Time Constraints?

Smart contracts provide the means to stipulate rules of interaction betw...
research
07/06/2020

Rethinking IoT Security: A Protocol Based on Blockchain Smart Contracts for Secure and Automated IoT Deployments

Proliferation of IoT devices in society demands a renewed focus on secur...
research
10/10/2022

A Privacy Preserving IoT Data Marketplace Using IOTA Smart Contracts

In recent years, the volume of data generated by IoT devices has increas...
research
04/29/2020

AuthSC: Mind the Gap between Web and Smart Contracts

Although almost all information about Smart Contract addresses is shared...
research
08/26/2020

TZ4Fabric: Executing Smart Contracts with ARM TrustZone

Blockchain technology promises to revolutionize manufacturing industries...

Please sign up or login with your details

Forgot password? Click here to reset