{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T17:40:35Z","timestamp":1741628435181,"version":"3.38.0"},"reference-count":12,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDT"],"published-print":{"date-parts":[[2024,6,7]]},"abstract":"<jats:p>As a direct consequence of the rapid development of wireless sensor networks, smart gadgets, and traditional information and communication technologies, there has been a considerable rise in the utilization of applications and services connected to the Internet of Things (IoT) in our day-to-day lives. This has led to an increase in the importance that the IoT has been given. The Internet of Things processes large amounts of data. This data may be very sensitive since it may contain highly personal information such as a person\u2019s health, finances, location, and other highly sensitive details. In order to implement fine-grained security management in the internet of things, an efficient access control system is required. Access control for the Internet of Things is considered in a number of suggestions; nevertheless, the development of blockchain-based solutions for IoT access control receives relatively little attention at this time. In this post, we take a look at some recent advances and essential needs for blockchain-based solutions for managing access to the Internet of Things. We highlight a few features controlling access to the Internet of Things, such as decentralized control, secure storage, and the ability to exchange information in a trustless manner. These include both the advantages and the constraints of this technology. In conclusion, we suggest some possible routes for further research on how to incorporate blockchain technology with IoT access control in an efficient and effective way.<\/jats:p>","DOI":"10.3233\/idt-230136","type":"journal-article","created":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T15:11:53Z","timestamp":1718723513000},"page":"953-963","source":"Crossref","is-referenced-by-count":0,"title":["Utilising blockchain technology to implement a security control method for node access to the Internet of Things"],"prefix":"10.1177","volume":"18","author":[{"given":"Swagata","family":"Sarkar","sequence":"first","affiliation":[{"name":"Department of Artificial Intelligence and Data Science, Sri Sai Ram Engineering College, Chennai, India"}]},{"given":"Kiran","family":"Kakade","sequence":"additional","affiliation":[{"name":"Lala Lajpatrai Institute of Management, University of Mumbai, Mumbai, India"}]},{"given":"Suntheya","family":"A.K.","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Panimalar Engineering College, Chennai, India"}]},{"given":"Rajalakshmi","family":"R","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Panimalar Engineering College, Chennai, India"}]}],"member":"179","reference":[{"issue":"3","key":"10.3233\/IDT-230136_ref1","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1109\/COMST.2018.2803740","article-title":"How canheterogeneous internet of things build our future: A survey","volume":"20","author":"Qiu","year":"2018","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"5","key":"10.3233\/IDT-230136_ref3","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/jiot.2017.2683200","article-title":"A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications","volume":"4","author":"Lin","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"10.3233\/IDT-230136_ref5","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","article-title":"Evaluating criticalsecurity issues of the iot world: Present and future challenges","volume":"5","author":"Frustaci","year":"2018","journal-title":"IEEEInternet of Things Journal"},{"issue":"1","key":"10.3233\/IDT-230136_ref7","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1057977.1057979","article-title":"Access control incollaborative systems","volume":"37","author":"Tolone","year":"2005","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10.3233\/IDT-230136_ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44860-28"},{"issue":"2","key":"10.3233\/IDT-230136_ref9","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1109\/JIOT.2018.2812239","article-title":"Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT","volume":"5","author":"Novo","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/IDT-230136_ref11","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1016\/j.ins.2020.07.001","article-title":"Deepemlan: Deep embedding learning for attributed networks","volume":"543","author":"Zhao","year":"2021","journal-title":"Inf. Sci"},{"key":"10.3233\/IDT-230136_ref12","doi-asserted-by":"crossref","first-page":"106218","DOI":"10.1016\/j.knosys.2020.106218","article-title":"Hetnerec: Heterogeneous network embedding based recommendation","volume":"204","author":"Zhao","year":"2020","journal-title":"Knowl. Based Syst"},{"key":"10.3233\/IDT-230136_ref14","doi-asserted-by":"crossref","first-page":"150","DOI":"10.3390\/jsan3020150","article-title":"A survey of access control models in wireless sensor networks","volume":"3","author":"Maw","year":"2014","journal-title":"J. Sens. Actuator Netw"},{"key":"10.3233\/IDT-230136_ref15","doi-asserted-by":"crossref","first-page":"6111","DOI":"10.1007\/s10586-018-1850-7","article-title":"Survey of access control models and technologies for cloud computing","volume":"22","author":"Cai","year":"2019","journal-title":"Clust. Comput"},{"key":"10.3233\/IDT-230136_ref18","doi-asserted-by":"crossref","first-page":"1815","DOI":"10.1007\/s11277-020-07947-2","article-title":"Blockchain for IoT access control, security and privacy: A review","volume":"117","author":"Patil","year":"2021","journal-title":"Wirel. Pers. Commun"},{"key":"10.3233\/IDT-230136_ref20","doi-asserted-by":"crossref","first-page":"103371","DOI":"10.1016\/j.jnca.2022.103371","article-title":"Blockchain for IoT access control: Recent trends and future research directions","volume":"203","author":"Pal","year":"2022","journal-title":"J. Netw. Comput. Appl"}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDT-230136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T16:28:42Z","timestamp":1741624122000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDT-230136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,7]]},"references-count":12,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/idt-230136","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"type":"print","value":"1872-4981"},{"type":"electronic","value":"1875-8843"}],"subject":[],"published":{"date-parts":[[2024,6,7]]}}}