Skip to main content


Front. Big Data, 12 January 2023
Sec. Data Science
Volume 5 - 2022 |

Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review

  • 1Department of Information Technology, Netaji Subhas University of Technology, New Delhi, India
  • 2Department of Information Technology, Indira Gandhi Delhi Technical University for Women, New Delhi, India

Internet of Things (IoT) enables communication among objects to collect information and make decisions to improve the quality of life. There are several unresolved security and privacy concerns in IoT due to multiple resource constrained devices, which lead to various cyber attacks. The conventional access control techniques depend on a central authority that further poses privacy and scalability issues in IoT. Various problems with access control in IoT can be resolved to prevent various cyber attacks using the decentralization and immutability properties of the blockchain. This study explored the current research trends in blockchain-enabled secure access control mechanisms and also identifies their applicability in creating reliable access control solutions for IoT. The basic properties of blockchain, such as decentralization, auditability, transparency, and immutability, act as the propulsion that provides integrity and security, disregarding the participation of an external entity. Initially, the application of blockchain was created only for cryptocurrencies but with the introduction of Ethereum, which allows the writiting and execution of smart contracts, applications other than cryptocurrencies are also being created. As various research articles have been written on the usage of different types of blockchains for creating secure access control solutions for IoT, this study intends to find and examine such primary researches as well as come up with a systematic review of various findings. This study perceives the most frequently utilized blockchain for creating blockchain-based access control solutions to prevent various cyber attacks and also discusses the improvement in access control mechanisms using blockchain along with smart contracts in IoT. The present study also discusses the obstacles in building decentralized access control solutions for IoT systems as well as future research areas. For new researchers, this article is a nice place to start and a strong reference point.

1. Introduction

Internet of Things (IoT) has changed the way people interact and communicate with each other. Due to the resource constrained property of IoT devices, access control is one of the primary challenges that IoT is confronted with, which further leads to various cyber attacks. The majority of existing access control techniques for IoT rely on a central authority that makes these techniques prone to different types of threats. The potential of blockchain to provide privacy, integrity, and security without depending on a third party makes it the best contender for providing secure access control in IoT to prevent various cyber attacks. However, the blockchain, which was initially presented in 2008 by Satoshi Nakamoto as the key technology for Bitcoin (Nakamoto, 2008), did not gain widespread use outside of cryptocurrencies, until the release of Ethereum (Buterin, 2014). Ethereum allows the creation and execution of smart contracts to specify the criteria and rules, in the form of a code, to which all parties involved in the deal have to agree. Activities mentioned in the contract may be carried out only if the conditions and rules are satisfied. Currently, Ethereum, Hyperledger Fabric (Androulaki et al., 2018), and many other blockchain platforms support the execution of smart contracts. Blockchain with smart contracts can be applied to the development of various applications, such as smart agriculture, smart grids, smart cities (Hakak et al., 2020), and many more. To find answers to various research issues and generate new paths, the present study identified and critically examined the current research explicitly relevant to the blockchain-enabled safe access management in IoT. The Systematic Literature Review (SLR) is organized as follows: Related work is mentioned in Section Related work and the procedure for the review process is described in Section Research methodology. Summary drafted after a thorough analysis of the collected studies is presented in Section Findings. The answers to various research questions, included in this study, are addressed in Section Answers to research questions. Various challenges and directions for future work with respect to the blockchain-enabled secure access control in IoT are given in Section Challenges and future work. Concluding remarks are presented in Section Limitations of using blockchain in access control for IoT.

2. Related work

As per our knowledge, no such SLR is available on the blockchain-enabled secure access control in IoT. However, Lone and Naaz (2021) performed an SLR that emphasized safeguarding the IoT and Internet using smart contracts. According to their findings, many of the security services can be achieved using blockchain smart contracts, some of which are non-repudiation, integrity, protection of data, secure access control, and authentication. Their research works also found that Ethereum, followed by Hyperledger Fabric, was a popular blockchain for creating smart contract-based security mechanisms. They suggested that, for the construction of security solutions for IoT, future research should focus on the requirement for enhanced and private smart contracts, as well as on a scalable and secure blockchain platform that facilitates the execution of smart contracts. Stojkov et al. (2020) conducted a study on traditional and blockchain-driven access control solutions in IoT to find out how challenges in conventional access control solutions can be overcome using the blockchain technology. It was concluded that it is possible to make the transition from traditional to blockchain-based solutions for various applications. Patil et al. (2021) performed a study on the blockchain-enabled existing security techniques in the areas of health care, IoT access control, supply chain, and Vehicular Ad Hoc Networks (VANETs). They evaluated existing solutions on the basis of storage and computation overhead, scalability, privacy, extensibility, and accuracy. They concluded that the consortium of blockchain combined with an effectual consensus algorithm serves as a better option for various applications. Dadhania and Patel (2020) presented a review on potential improvement in IoT access control with decentralized architecture using blockchain and concluded that IoT transactions can be made more secure using the potential of blockchain technology.

Butun and Osterberg (2021) conducted a study to find out the usability of traditional and blockchain-enabled access control mechanisms in an IoT environment with blockchain systems along with permissioned and permissionless blockchains. The authors concluded that the security of IoT networks can be enhanced using permissioned blockchains, and hence, this security feature would be more suited to an IoT environment than to an IoT environment with permissionless blockchains. They also provided a remedy to facilitate access control functionality in permissioned blockchains by focusing on the recent access control mechanisms suggested for peer-to-peer networks.

3. Research methodology

The SLR was conducted as per the guidelines presented by Kitchenham and Charters (2007) to explore the answers to the research questions. Many sources, including significant web databases, were investigated to get an unprejudiced and comprehensive viewpoint. The following databases were combed through:

• Elsevier,

• ACM (Association for Computing Machinery) Digital Library,

• MDPI (Multidisciplinary Digital Publishing Institute),

• Springer Link, and

• IEEE Xplore Digital Library.

To review extant publications, compiling the results and recapitulating the factual data referencing the utilization of blockchain for secure access control in IoT is the major goal of this study. To accomplish our objectives, the study considers the research questions as listed in Table 1.


Table 1. Research questions.

3.1. Selection of primary studies

Selected databases were searched using specific words to obtain a collection of primary research. We were able to obtain a wide range of results using general search phrases. The main search words were entered between the logical AND and OR operators and expressed as (“Distributed ledger” OR “Blockchain”) AND (“IOT” OR “Internet of Things”) AND (“Access Control”). The searches were undertaken in 9 August 2022, and publications from 2017 to the aforementioned date were examined. The results of a search query applied to several databases were subjected to a filtering procedure. We acquired a set of primary studies by applying the inclusion–exclusion criteria (presented in Section Inclusion–exclusion criteria) to the results received from a previous step.

3.2. Inclusion–exclusion criteria

These inclusion–exclusion criteria are established to make sure the selected publications accommodate with our SLR. The key inclusion–exclusion measures are presented in Table 2.


Table 2. Inclusion–exclusion criteria.

3.3. Selection results and quality assessment

Figure 1 represents the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) diagram of the selection process. A total of 168 papers were retrieved using predefined search criteria, out of which 49 were discovered to be duplicates, resulting in 119 non-identical publications. The number of publications shrank from 119 to 71 after applying the inclusion–exclusion measures. Seventy-one articles were reviewed in their entirety, and the inclusion–exclusion criteria were applied again, leaving 41 articles for SLR evaluation.


Figure 1. PRISMA diagram of selection process.

3.4. Publications over time

Despite the notion of blockchain having been around since the introduction of Bitcoin in late 2008, there were very few publications available before the introduction of Ethereum. The number of final primary researches published in the years 2017 until 2021 is shown in Figure 2.


Figure 2. Number of publications over time.

4. Findings

Every publication from the final list was reviewed, and important findings were retrieved and are summarized in Table 3 after a comprehensive evaluation. The present study categorized the studies on the basis of blockchain platform they had used to provide access control in IoT. Figure 3 presents the classification of different blockchain platforms used for implementing secure access control in IoT, as identified by this SLR. Most of the primary research focused on the Ethereum (39%) and Hyperledger Fabric (24%) blockchain for secure access control. Other primary studies explored Bitcoin (7%) or some other blockchains such as Ripple (3%). Some studies have not mentioned the name of the blockchain used but specified some of the features for the same (generic). Blockchains have played a crucial role in dealing with the access control issues in all primary studies.


Table 3. Key findings and themes of primary studies.


Figure 3. Blockchain platform used for access control solutions in IoT.

5. Answers to research questions

Blockchains along with Turing-complete smart contracts enable us to conduct increasingly complicated activities in a variety of sectors, with endless applications. As blockchains cater to several purposes, the researchers used various blockchain platforms, which are delineated in the later part of this section. This study perceives the most frequently utilized blockchain for creating blockchain-based access control solutions to prevent various cyber attacks and also discusses the improvement in access control mechanisms by using blockchain along with smart contracts in IoT. Characteristics of a blockchain, such as traceability, decentralization, and robustness, are intrinsic by nature. When the number of participating nodes is large, decentralization and confidence in individual nodes are prevalent, which increase the blockchain security and dependability. However, based on our preliminary research, we conclude that the access control in IoT can be enhanced further by utilizing the bespoke property of smart contracts.

5.1. RQ1: How many and what are the different blockchain platforms used to implement secure access control in IoT?

As per our findings, a substantial number of primary studies (Ouaddah et al., 2017b; Novo, 2018, 2019; Ourad et al., 2018; Xu et al., 2018; Breiki et al., 2019; Putra et al., 2019, 2021; Wang et al., 2019; Yutaka et al., 2019; Sultana et al., 2020; Tapas et al., 2020; Yu et al., 2020; Liu et al., 2021 and Oktian and Lee, 2021; Xiang and Yuanyuan, 2021) have used Ethereum platform for developing blockchain-driven access control mechanisms in Internet of Things (IoT). Some other studies (Ali et al., 2019; Ding et al., 2019; Islam and Madria, 2019; Liu et al., 2020; Xu et al., 2020; Zhang et al., 2020; Iftekhar et al., 2021; Sun et al., 2021; Han et al., 2022; Li T. et al., 2022) have made use of the Hyperledger Fabric platform to deal with access control issues in IoT. Primary studies (Bera et al., 2020) utilized the Ripple Blockchain platform for secure access control in Internet of Drones (IoD). There are some other studies (Ouaddah et al., 2017c; Outchakoucht et al., 2017; Dukkipati et al., 2018; El Kalam et al., 2018; Hwang et al., 2018; Ma et al., 2019; Saha et al., 2020; Algarni et al., 2021; Bera et al., 2021; Ahmed et al., 2022) where the researchers have exploited customized Blockchain platforms for access control solutions in IoT. Furthermore, primary studies (Li et al., 2021) addressed secure (Kukreja et al., 2019a,b) access control in IoT using multiple blockchains (Ethereum, FISCO Bcos). Some studies (Ouaddah et al., 2017c; Outchakoucht et al., 2017; Dukkipati et al., 2018; El Kalam et al., 2018; Hwang et al., 2018) offered smart contract-based access control solutions that can be applied on a generic blockchain having smart contracts. Ouaddah et al. (2017a), Pinno et al. (2017), and Shafagh et al. (2017) made use of Bitcoin platform for designing access control solutions in IoT.

5.2. RQ2: How does blockchain improve the strength of access control solutions in IoT?

Single point of failure, lack of scalability, and privacy are some of the problems that one comes across in conventional access control techniques that work under a centralized entity. Based on primary studies shown in Table 3, we observed that blockchain-based access control mechanisms do not require a remarkable difference to the present network architecture, but they rely on the blockchain's intrinsic attributes and the substantial programming attributes of smart contracts. All primary researches depend on the transparent, decentralized, tamperproof, and traceable properties of the blockchain technology. Blockchain's decentralized and immutable nature can aid in overcoming access control concerns, as some of the studies used these properties (Li D. et al., 2022; Tao et al., 2022) as well as the configurable nature of smart contracts for creating access control solutions in IoT. Furthermore, primary research has used blockchain's tamper-resistant characteristics to ensure data integrity in access control systems.

5.3. RQ3: How convincing is smart contract's appropriateness for solving access control concerns in IoT?

Like blockchain, smart contracts also cannot guarantee to resolve access control issues in IoT, but they can support the extant technical solutions to resolve these issues. As the blockchain uses its fundamental properties such as traceability, immutability, and transparency, smart contracts also take advantage of its adaptable features such as customizability, resemblance to commonly used scripting languages, and turing-completeness. According to the majority of primary researches, the smart contracts with existing architecture provide the answers to many access control issues in IoT. Apart from reducing the requirement for a change in the architecture of existing networks, smart contract also allows them to be changed if required to intensify the IoT framework. Most of the articles mentioned in Table 3 give substantial proof that smart contracts may have their usability to solve access control challenges in IoT environment, either in a standalone way or in combination with other technologies.

6. Challenges and future work

The blockchain technology offers a few concerns and constraints. Some of the fundamental concerns of blockchain-enabled access control are addressed here. As per the findings, Ethereum is the most frequently utilized blockchain by researchers for building blockchain-enabled access control mechanisms. One of the most common features of Ethereum smart contracts is that that they cannot be amended or updated after being deployed on a blockchain network. This feature presents both advantages and disadvantages. On the plus side, the platform is reliable because once the smart contracts are implemented, they cannot be amended to deceive someone or obtain unlawful benefit. On the minus side, the platform is not upgradable, that is, it cannot respond to progressive changes as fixing some issue in a previously implemented smart contract. With millions of connected IoT devices, achieving a high transaction throughput and low latency requirements is another major challenge. Furthermore, the present study observed that the majority of researchers suggested smart contract-enabled secure access control solutions for IoT. Another major concern is the expanding dimensions of blockchain over time. Since every transaction incurs a storage cost, blockchain grows in dimensions with each access/authentication request, which may restrict its scalability in accomplishing the needs of specific IoT applications. Resolving these difficulties and evaluating the suggested blockchain-based access control methods are therefore left as future work to be resolved. The research directions to achieve secure access control in IoT using blockchain lead to Cyber-Security Analysis (understanding the system behavior from the cyber-security perspective) and Performance Analysis (end-to-end performance analysis of the underlying blockchain).

Focusing on the findings of SLR, it was observed that, to achieve secure access control in an IoT network, a secure, lightweight, and scalable blockchain platform having upgradable and private smart contracts is required in the future.

7. Limitations of using blockchain in access control for IoT

Blockchains along with smart contracts integrated with IoT enable us to conduct increasingly complicated activities in a variety of sectors, with nearly endless applications. However, the blockchain technology has few concerns that should be investigated further:

• IoT devices are battery powered with low-energy requirements. However, with the integration of blockchain, the energy requirements of devices need to be explored further.

• As the number of nodes in IoT increases, blockchain scales poorly, which should be addressed at the earliest.

• Vulnerabilities, such as DoS attacks and the 51% attack, are common with blockchain and must be handled with utmost care.

8. Conclusion

From this SLR, it can be concluded that Hyperledger Fabric is the second most frequently utilized blockchain for creating blockchain-based access control solutions to prevent various cyber attacks, whereas Ethereum is the number one pick. The present study also discusses the improvement in access control mechanisms using blockchain along with smart contracts in IoT and difficulties that are currently preventing the use of blockchain in IoT.

Data availability statement

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.

Author contributions

All authors listed have made a substantial, direct, and intellectual contribution to the work and approved it for publication.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.


Ahmed, M. T., Al Hashim, F., Hashim, S. J., and Abdullah, A. (2022). Hierarchical blockchain structure for node authentication in IoT networks. Egypt. Inform. J. 23, 345–361. doi: 10.1016/j.eij.2022.02.005

CrossRef Full Text | Google Scholar

Algarni, S., Eassa, F., Almarhabi, K., Almalaise, A., Albassam, E., Alsubhi, K., et al. (2021). Blockchain-based secured access control in an iot system. Appl. Sci., 11, 1–16. doi: 10.3390/app11041772

CrossRef Full Text | Google Scholar

Ali, G., Ahmad, N., Cao, Y., Asif, M., Cruickshank, H., Ali, Q. E., et al. (2019). Blockchain based permission delegation and access control in Internet of Things (BACI). Comput. Secur. 86, 318–334. doi: 10.1016/j.cose.2019.06.010

CrossRef Full Text | Google Scholar

Androulaki, E, Barger, A., Bortnikov, V., Cachin, C., Christidis, K., et al. (2018). Hyperledger fabric: a distributed operating system for permissioned blockchains. EuroSys. 18 Proc. Thirteenth EuroSys Conf. 30, 1–15. doi: 10.1145/3190508.3190538

CrossRef Full Text | Google Scholar

Bera, B., Chattaraj, D., and Das, A. K. (2020). Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment. Comput. Commun. 153, 229–249. doi: 10.1016/j.comcom.2020.02.011

CrossRef Full Text | Google Scholar

Bera, B., Saha, S., Das, A. K., and Vasilakos, A. V. (2021). Designing blockchain-based access control protocol in iot-enabled smart-grid system. IEEE Internet Things J. 8, 5744–5761. doi: 10.1109/JIOT.2020.3030308

CrossRef Full Text | Google Scholar

Breiki, H., Al Qassem, L., Al, S.alah, K., Ur Rehman, M. H., and Sevtinovi, D. (2019). “Decentralized access control for IoT data using blockchain and trusted oracles,” Proceedings - IEEE International Conference Ind. Internet Cloud, ICII 2019, no. ICII 248–257.

Google Scholar

Buterin, V. (2014). A next-generation smart contract and decentralized application platform. Etherum, 1–36. Available online at:

Google Scholar

Butun, I., and Osterberg, P. (2021). A review of distributed access control for blockchain systems towards securing the internet of things. IEEE Access 9, 5428–5441. doi: 10.1109/ACCESS.2020.3047902

CrossRef Full Text | Google Scholar

Dadhania, A. J., and Patel, H. B. (2020). “Access control mechanism in internet of things using blockchain technology: A review,” Proceedings of the 3rd International Conference Intellectual Sustainable System ICISS 2020. New York, IEEE, 45–50.

Google Scholar

Ding, S., Cao, J., Li, C., Fan, K., and Li, H. (2019). A novel attribute-based access control scheme using blockchain for IoT. IEEE Access. 7, 38431–38441. doi: 10.1109/ACCESS.2019.2905846

PubMed Abstract | CrossRef Full Text | Google Scholar

Dukkipati, C., Zhang, Y., and Cheng, L. C. (2018). “Decentralized, blockchain based access control framework for the heterogeneous internet of things,” ABAC 2018 - Proc. 3rd ACM Work. Attrib. Access Control. Co-located with CODASPY, 61–69.

PubMed Abstract | Google Scholar

El Kalam, A. A., Outchakoucht, A., and Es-Samaali, H. (2018). “Emergence-based access control: New approach to secure the Internet of Things,” in Proceedings of the 1st International Conference on Digital Tools & Uses Congress, 1–11.

Google Scholar

Hakak, S., Khan, W. Z., Gilkar, G. A., Imran, M., and Guizani, N. (2020). Securing Smart Cities through Blockchain Technology: Architecture, Requirements, and Challenges. IEEE Netw. 34, 8–14. doi: 10.1109/MNET.001.1900178

CrossRef Full Text | Google Scholar

Han, D., Zhu, Z., Li, D., Liang, W., Souri, A., Li, K. C., et al. (2022). A blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE Trans. Ind. Informatics. 18, 3530–3540. doi: 10.1109/TII.2021.3114621

CrossRef Full Text | Google Scholar

Hwang, D., Choi, J., and Kim, K. H. (2018). “Dynamic Access Control Scheme for IoT Devices using Blockchain,” 2018 International Conference on Information and Communication Technology Convergence (ICTC)2018, 713–715.

Google Scholar

Iftekhar, A., Cui, X., Tao, Q., and Zheng, C. (2021). Hyperledger fabric access control system for internet of things layer in blockchain-based applications. Entropy. 23, 1054. doi: 10.3390/e23081054

PubMed Abstract | CrossRef Full Text | Google Scholar

Islam, M. A., and Madria, S. (2019). “A permissioned blockchain based access control system for IOT,” Proceedings 2nd IEEE International Conference Blockchain, Blockchain. 469–476.

Google Scholar

Kitchenham, B. A., and Charters, S. (2007). “Guidelines for performing systematic literature reviews in software engineering,” EBSE Technical Report EBSE-2007-01. School of Computer Science and Mathematics, Keele University, 1–57.

Google Scholar

Kukreja, D., Dhurandher, S. K., and Reddy, B. V. R. (2019a). Securing ad hoc networks using energy efficient and distributed trust-based intrusion detection system. Int. J. Adv. Intell. Parad. 13, 430–448. doi: 10.1504/IJAIP.2019.101990

CrossRef Full Text | Google Scholar

Kukreja, D., Sharma, D. K., Dhurandher, S. K., and Reddy, B. V. R. (2019b). GASER: genetic algorithm-based secure and energy aware routing protocol for sparse mobile ad hoc networks. 13, 230–259. doi: 10.1504/IJAIP.2019.099953

CrossRef Full Text | Google Scholar

Li, D., Han, D., Crespi, N., Minerva, R., and Li, K. C. (2022). A blockchain-based secure storage and access control scheme for supply chain finance. J Supercomput. 78, 1–30 doi: 10.1007/s11227-022-04655-5

CrossRef Full Text | Google Scholar

Li, T., Wang, H., He, D., and Yu, J. (2022). Blockchain-based Privacy-preserving and Rewarding Private Data Sharing for IoT. IEEE Internet Things J. 9, 15138–15149. doi: 10.1109/JIOT.2022.3147925

CrossRef Full Text | Google Scholar

Li, Z., Hao, J., Liu, J., Wang, H., and Xian, M. (2021). An IoT-applicable access control model under double-layer blockchain. IEEE Trans. Circuits Syst. II Express Briefs 68, 2102–2106. doi: 10.1109/TCSII.2020.3045031

CrossRef Full Text | Google Scholar

Liu, H., Han, D., and Li, D. (2020). Fabric-iot: a blockchain-based access control system in IoT. IEEE Access. 8, 18207–18218. doi: 10.1109/ACCESS.2020.2968492

CrossRef Full Text | Google Scholar

Liu, Y., Lu, Q., Chen, S., Qu, Q., Choo, K. K. K., O'Connor, H., et al. (2021). Capability-based IoT access control using blockchain. Digit. Commun. Networks. 7, 463–469. doi: 10.1016/j.dcan.2020.10.004

CrossRef Full Text | Google Scholar

Lone, A. H., and Naaz, R. (2021). Applicability of Blockchain smart contracts in securing Internet and IoT: a systematic literature review. Comput. Sci. Rev. 39, 100360. doi: 10.1016/j.cosrev.2020.100360

CrossRef Full Text | Google Scholar

Ma, M., Shi, G., and Li, F. (2019). Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access.7, 34045–34059. doi: 10.1109/ACCESS.2019.2904042

CrossRef Full Text | Google Scholar

Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Bus. Rev. 21260, 1–221. Available online at:

PubMed Abstract | Google Scholar

Novo, O. (2018). Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet Things J. 5, 1184–1195. doi: 10.1109/JIOT.2018.2812239

CrossRef Full Text | Google Scholar

Novo, O. (2019). Scalable access management in IoT using blockchain: A performance evaluation. IEEE Internet Things J. 6, 4694–4701. doi: 10.1109/JIOT.2018.2879679

CrossRef Full Text | Google Scholar

Oktian, Y. E., and Lee, S. G. (2021). Border chain: blockchain-based access control framework for the internet of things endpoint. IEEE Access 9, 3592–3615. doi: 10.1109/ACCESS.2020.3047413

CrossRef Full Text | Google Scholar

Ouaddah, A., AbouElkalam, A., and AitOuahman, A. (2017a). FairAccess: a new Blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9, 5943–5964. doi: 10.1002/sec.1748

CrossRef Full Text | Google Scholar

Ouaddah, A., Elkalam, A. A., and Ouahman, A. A. (2017b). “Harnessing the power of blockchain technology to solve IoT security and privacy issues,” Proceedings of the Second International Conference Internet things, Data Cloud Comput. 1–10.

Google Scholar

Ouaddah, A., Elkalam, A. A., and Ouahman, A. A. (2017c). Towards a Novel Privacy-Preserving access control model based on blockchain technology in IoT. Eur. MENA Coop. Adv. Inf. Commun. Technol. 520, 103–112. doi: 10.1007/978-3-319-46568-5_53

CrossRef Full Text | Google Scholar

Ourad, A. Z., Belgacem, B., and Salah, K. (2018). Using blockchain for IOT access control and authentication management, vol. 10972 LNCS. Berlin, Germany: Springer International Publishing.

Google Scholar

Outchakoucht, A., Samaali, H., and Philippe, J. (2017). Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things. Int. J. Adv. Comput. Sci. Appl. 8, 417–424. doi: 10.14569/IJACSA.2017.080757

CrossRef Full Text | Google Scholar

Patil, P., Sangeetha, M., and Bhaskar, V. (2021). Blockchain for IoT access control, security and privacy: a review. Wirel. Pers. Commun. 117, 1815–1834. doi: 10.1007/s11277-020-07947-2

PubMed Abstract | CrossRef Full Text | Google Scholar

Pinno, O. J. A., Gregio, A. R. A., and De Bona, L. C. E. (2017). “Control chain: blockchain as a central enabler for access control authorizations in the IoT,” in IEEE Glob. Commun. Conf. GLOBECOM 2017 - Proc. New York, IEEE, 1–6.

Google Scholar

Putra, D. R., Anggorojati, B., and Hartono, A. P. P. (2019). “Blockchain and smart-contract for scalable access control in Internet of Things,” Proceeding - 2019 International Conference ICT Smart Soc. Innov. Transform. Towar. Smart Reg. ICISS 2019. New York, IEEE.

Google Scholar

Putra, G. D., Dedeoglu, V., Kanhere, S. S., Jurdak, R., and Ignjatovic, A. (2021). Trust-based blockchain authorization for IoT. IEEE Trans. Netw. Serv. Manag. 18, 1646–1658. doi: 10.1109/TNSM.2021.3077276

CrossRef Full Text | Google Scholar

Saha, S., Sutrala, A. K., Das, A. K., Kumar, N., and Rodrigues, J. P. C. (2020). “On the design of blockchain-based access control protocol for IoT-enabled healthcare applications,” IEEE International Conference Commun. New York, IEEE, 1–6.

Google Scholar

Shafagh, H., Burkhalter, L., Hithnawi, A., and Duquennoy, S. (2017). “Towards blockchain-based auditable storage and sharing of iot data,” CCSW 2017 - Proc. Cloud Comput. Secur. Work. co-located with CCS 2017. New York, IEEE, 45–50.

Google Scholar

Stojkov, M., Simic, M., Sladi,ć, G., and Milosavljevic, B. (2020). “Traditional and blockchain - based access control models in IoT: A Review,” in ICIST 2020 Proceedings, eds. M. Zdravković, Z. Konjović, and M. Trajanović, M. New York, IEEE,51–55.

Google Scholar

Sultana, T., Almogren, A., Akbar, M., Zuair, M., Ullah, I., Javaid, N., et al. (2020). Data sharing system integrating access control mechanism using blockchain-based smart contracts for IoT devices. Appl. Sci. 10, 488. doi: 10.3390/app10020488

CrossRef Full Text | Google Scholar

Sun, S., Du, R., Chen, S., and Li, W. (2021). Blockchain-based IoT access control system: Towards security, lightweight, and cross-domain. IEEE Access. 9, 36868–36878. doi: 10.1109/ACCESS.2021.3059863

CrossRef Full Text | Google Scholar

Tao, X., Liu, Y., Wong, P. K. Y., Chen, K., Das, M., Cheng, J. C. P., et al. (2022). Confidentiality-minded framework for blockchain-based BIM design collaboration. Autom. Construct.136, 104172. doi: 10.1016/j.autcon.2022.104172

CrossRef Full Text | Google Scholar

Tapas, N., Longo, F., Merlino, G., and Puliafito, A. (2020). Experimenting with smart contracts for access control and delegation in IoT. Futur. Gener. Comput. Syst. 111, 324–338. doi: 10.1016/j.future.2020.04.020

CrossRef Full Text | Google Scholar

Wang, P., Yue, Y., Sun, W., and Liu, J. (2019). “An attribute-based distributed access control for blockchain enabled IoT,” in 2019 International Conference Wirel. Mob. Comput. Netw. Commun. New York, IEEE, 1–6.

Google Scholar

Xiang, W., and Yuanyuan, Z. (2021). Scalable access control scheme of internet of things based on blockchain. Procedia Comput. Sci. 198, 448–453. doi: 10.1016/j.procs.2021.12.268

CrossRef Full Text | Google Scholar

Xu, H., He, Q., Li, X., Jiang, B., and Qin, K. (2020). BDSS-FA: a blockchain-based data security sharing platform with fine-grained access control. IEEE Access. 8, 87552–87561. doi: 10.1109/ACCESS.2020.2992649

CrossRef Full Text | Google Scholar

Xu, R., Chen, Y., Blasch, E., and Chen, G. (2018). “Blendcac: A blockchain-enabled decentralized capability-based access control for iots,” Proceedings. - IEEE 2018 Int. Congr. Cybermatics 2018 IEEE Conf. Internet Things, Green Comput. Commun. Cyber, Phys. Soc. Comput. Smart Data, Blockchain, Comput. Inf. Technol. iThings/Gree. New York, IEEE, 1027–1034.

Google Scholar

Yu, G., Zha, X., Wang, X., Ni, W., Yu, K., Yu, P., et al. (2020). Enabling attribute revocation for fine-grained access control in blockchain-IoT systems. IEEE Trans. Eng. Manag. 67, 1213–1230. doi: 10.1109/TEM.2020.2966643

CrossRef Full Text | Google Scholar

Yutaka, M., Zhang, Y., Sasabe, M., and Kasahara, S. (2019). “Using ethereum blockchain for distributed attribute-based access control in the internet of things,” in Proceedings 2019 IEEE Glob. Commun. Conf. GLOBECOM 2019. New York, IEEE.

Google Scholar

Zhang, Y., Li, B., Liu, B., Wu, J., Wang, Y., Yang, X., et al. (2020). An attribute-based collaborative access control scheme using blockchain for IoT devices. Electron. 9, 285. doi: 10.3390/electronics9020285

CrossRef Full Text | Google Scholar

Keywords: cyber attacks, Internet of Things, security, privacy, blockchain, access control, smart contract

Citation: Singh R, Kukreja D and Sharma DK (2023) Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review. Front. Big Data 5:1081770. doi: 10.3389/fdata.2022.1081770

Received: 27 October 2022; Accepted: 14 December 2022;
Published: 12 January 2023.

Edited by:

Namita Gupta, Maharaja Agrasen Institute of Technology, India

Reviewed by:

Yogesh Sharma, Maharaja Agrasen Institute of Technology, India
Neelam Sharma, Uttarakhand Technical University, India
Deepak Gupta, Maharaja Agrasen Institute of Technology, India
Hitesh Singh, Noida Institute of Engineering and Technology (NIET), India

Copyright © 2023 Singh, Kukreja and Sharma. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Deepika Kukreja, yes