{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T22:27:22Z","timestamp":1772490442857,"version":"3.50.1"},"reference-count":265,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:00:00Z","timestamp":1745971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Bavarian State Ministry of Science and Arts (BayStMWK)"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. However, due to limits on performance and bandwidth, IoT devices are often not powerful enough to execute, e.g., costly cryptographic algorithms or protocols. This limitation can be solved through a delegation concept. By delegating certain operations to devices with sufficient resources, it is possible to achieve a high level of security without overloading a device that needs protection. In this paper, we give an overview of current approaches for security delegation in the context of IoT, formalise security notions, discuss the security of existing approaches, and identify further research questions. Furthermore, a mathematical formalisation of the CIA triad (confidentiality, integrity, and availability) is proposed for the predefined application areas, in order to evaluate the different approaches.<\/jats:p>","DOI":"10.3390\/fi17050202","type":"journal-article","created":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T06:49:02Z","timestamp":1746082142000},"page":"202","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["SoK: Delegated Security in the Internet of Things"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9847-7656","authenticated-orcid":false,"given":"Emiliia","family":"Geloczi","sequence":"first","affiliation":[{"name":"Faculty of Computer Science and Mathematics, University of Passau, 94032 Passau, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9650-7698","authenticated-orcid":false,"given":"Felix","family":"Klement","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Mathematics, University of Passau, 94032 Passau, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7738-2017","authenticated-orcid":false,"given":"Patrick","family":"Struck","sequence":"additional","affiliation":[{"name":"Cryptography and Cyber Security, Department of Computer and Information Science, University of Konstanz, 78464 Konstanz, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3608-874X","authenticated-orcid":false,"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Mathematics, University of Passau, 94032 Passau, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,30]]},"reference":[{"key":"ref_1","unstructured":"Statista (2025, April 28). Internet of Things\u2014Market Outlook Report; Statista. Juni 2024. Available online: https:\/\/de.statista.com\/statistik\/studie\/id\/109209\/dokument\/internet-der-dinge-market-outlook-report\/."},{"key":"ref_2","unstructured":"Statista Market Insights (2025, April 28). Annual Number of Cyberattacks Worldwide from 2016 to 2023 (In Millions); Graph: 2024. Available online: https:\/\/www.statista.com\/forecasts\/1485031\/cyberattacks-annual-worldwide."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Internet of Things: Vision, applications and research challenges","volume":"10","author":"Miorandi","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"e2","DOI":"10.4108\/eai.13-7-2018.155079","article-title":"Security and Privacy Issues with IoT in Healthcare","volume":"4","author":"Chacko","year":"2018","journal-title":"EAI Endorsed Trans. Pervasive Health Technol."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Canavese, D., Mannella, L., Regano, L., and Basile, C. (2024). Security at the Edge for Resource-Limited IoT Devices. Sensors, 24.","DOI":"10.3390\/s24020590"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Jajodia, S., and Lopez, J. (2008, January 6\u20138). On the Security of Delegation in Access Control Systems. Proceedings of the Computer Security\u2014ESORICS 2008, M\u00e1laga, Spain.","DOI":"10.1007\/978-3-540-88313-5"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Chuat, L., Abdou, A., Sasse, R., Sprenger, C., Basin, D., and Perrig, A. (2020, January 7\u201311). SoK: Delegation and Revocation, the Missing Links in the Web\u2019s Chain of Trust. Proceedings of the 2020 IEEE European Symposium on Security and Privacy (EuroS&P), Genoa, Italy.","DOI":"10.1109\/EuroSP48549.2020.00046"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.comnet.2014.02.001","article-title":"Lightweight collaborative key establishment scheme for the Internet of Things","volume":"64","author":"Saied","year":"2014","journal-title":"Comput. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Alsubhi, K., Alzahrani, B., Fotiou, N., Albeshri, A., and Alreshoodi, M. (2022). Reliable Application Layer Routing Using Decentralized Identifiers. Future Internet, 14.","DOI":"10.3390\/fi14110322"},{"key":"ref_10","first-page":"103101","article-title":"Verifiable online\/offline multi-keyword search for cloud-assisted Industrial Internet of Things","volume":"65","author":"Ali","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Rastogi, P., Singh, D., and Singh Bedi, S. (2022, January 28\u201329). Design of a Blockcdhain based Security Algorithm for IoT in Healthcare. Proceedings of the 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India.","DOI":"10.1109\/ICACITE53722.2022.9823466"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Dallel, O., Ayed, S.B., and Tahar, J.B.H. (2023, January 3\u20135). Smart Blockchain-based Authorization for Social Internet of Things. Proceedings of the 2023 International Conference on Cyberworlds (CW), Sousse, Tunisia.","DOI":"10.1109\/CW58918.2023.00074"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Moin, A., Challenger, M., Badii, A., and Gunnemann, S. (July, January 27). Supporting AI Engineering on the IoT Edge through Model-Driven TinyML. Proceedings of the 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC), Los Alamitos, CA, USA.","DOI":"10.1109\/COMPSAC54236.2022.00140"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Wiraatmaja, C., and Kasahara, S. (2023, January 11\u201313). Cost-Efficient Anonymous Authentication Scheme Based on Set-Membership Zero-Knowledge Proof. Proceedings of the 2023 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France.","DOI":"10.1109\/BRAINS59668.2023.10316788"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"23951","DOI":"10.1109\/ACCESS.2020.2969957","article-title":"Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things","volume":"8","author":"Ali","year":"2020","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Gritti, C., \u00d6nen, M., and Molva, R. (2019, January 8\u201312). Privacy-preserving delegable authentication in the internet of things. Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing, Limassol, Cyprus.","DOI":"10.1145\/3297280.3297365"},{"key":"ref_17","unstructured":"Shafagh, H., Burkhalter, L., Ratnasamy, S., and Hithnawi, A. (2020, January 12\u201314). Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams. Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Zhou, X., Guan, J., Xing, L., and Qian, Z. (2022, January 7\u201311). Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA.","DOI":"10.1145\/3548606.3560590"},{"key":"ref_19","unstructured":"Mehmood, A., Khan, M.A., Maple, C., and Lloret, J. (2023, January 23\u201325). Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures. Proceedings of the 2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), San Antonio, TX, USA."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Porambage, P., Braeken, A., Kumar, P., Gurtov, A., and Ylianttila, M. (2015, January 8\u201312). Proxy-based end-to-end key establishment protocol for the Internet of Things. Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK.","DOI":"10.1109\/ICCW.2015.7247583"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1920","DOI":"10.1109\/TASE.2018.2855640","article-title":"A Group-Oriented DTLS Handshake for Secure IoT Applications","volume":"15","author":"Park","year":"2018","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Cho, E., Park, M., Lee, H., Choi, J., and Kwon, T.T. (2019, January 15\u201318). D2TLS: Delegation-based DTLS for cloud-based IoT services. Proceedings of the International Conference on Internet of Things Design and Implementation, Montreal, QC, Canada.","DOI":"10.1145\/3302505.3310081"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"3521","DOI":"10.1109\/TII.2019.2925898","article-title":"On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain","volume":"16","author":"Pal","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_24","first-page":"21","article-title":"The CIA strikes back: Redefining confidentiality, integrity and availability in security","volume":"10","author":"Samonas","year":"2014","journal-title":"J. Inf. Syst. Secur."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Lessa dos Santos, G., Guimar\u00e3es, V.T., da Cunha Rodrigues, G., Granville, L.Z., and Tarouco, L.M.R. (2015, January 6\u20139). A DTLS-based security architecture for the Internet of Things. Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus.","DOI":"10.1109\/ISCC.2015.7405613"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1109\/JIOT.2018.2812239","article-title":"Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT","volume":"5","author":"Novo","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Sabrina, F. (2019, January 14\u201317). Blockchain and Structural Relationship Based Access Control for IoT: A Smart City Use Case. Proceedings of the 2019 IEEE 44th Conference on Local Computer Networks (LCN), Osnabr\u00fcck, Germany.","DOI":"10.1109\/LCN44214.2019.8990757"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Sciancalepore, S., Piro, G., Caldarola, D., Boggia, G., and Bianchi, G. (2017, January 3\u20136). OAuth-IoT: An access control framework for the Internet of Things based on open standards. Proceedings of the 2017 IEEE symposium on computers and communications (ISCC), Heraklion, Greece.","DOI":"10.1109\/ISCC.2017.8024606"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez, F., Alonso, A., Marco, L., and Salvach\u00faa, J. (2017, January 7\u20139). A model to enable application-scoped access control as a service for IoT using OAuth 2.0. Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), Paris, France.","DOI":"10.1109\/ICIN.2017.7899433"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Solapurkar, P. (2016, January 14\u201317). Building secure healthcare services using OAuth 2.0 and JSON web token in IOT cloud scenario. Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), Greater Noida, India.","DOI":"10.1109\/IC3I.2016.7917942"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Pinno, O.J.A., Gregio, A.R.A., and De Bona, L.C.E. (2017, January 4\u20138). ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT. Proceedings of the GLOBECOM 2017\u20142017 IEEE Global Communications Conference, Singapore.","DOI":"10.1109\/GLOCOM.2017.8254521"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Ayoade, G., Karande, V., Khan, L., and Hamlen, K. (2018, January 6\u20139). Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment. Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration (IRI), Salt Lake City, UT, USA.","DOI":"10.1109\/IRI.2018.00011"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Siris, V., Dimopoulos, D., Fotiou, N., Voulgaris, S., and Polyzos, G. (2019, January 10\u201312). Trusted D2D-Based IoT Resource Access Using Smart Contracts. Proceedings of the 2019 IEEE 20th International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), Washington, DC, USA.","DOI":"10.1109\/WoWMoM.2019.8793041"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Bruneo, D., Distefano, S., Longo, F., Merlino, G., and Puliafito, A. (2016, January 12\u201314). IoT-cloud authorization and delegation mechanisms for ubiquitous sensing and actuation. Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA.","DOI":"10.1109\/WF-IoT.2016.7845494"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.jnca.2019.04.013","article-title":"Policy-based access control for constrained healthcare resources in the context of the Internet of Things","volume":"139","author":"Pal","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/s12243-018-00702-6","article-title":"Fine-grained multi-authority access control in IoT-enabled mHealth","volume":"74","author":"Li","year":"2019","journal-title":"Ann. Telecommun."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Pal, S., Hitchens, M., and Varadharajan, V. (2020). Access control for Internet of Things\u2014Enabled assistive technologies: An architecture, challenges and requirements. Assistive Technology for the Elderly, Elsevier.","DOI":"10.1016\/B978-0-12-818546-9.00001-4"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Park, J., and Kang, N. (2014, January 22\u201324). Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake. Proceedings of the 2014 International Conference on Information and Communication Technology Convergence (ICTC), Busan, Republic of Korea.","DOI":"10.1109\/ICTC.2014.6983078"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Emerson, S., Choi, Y.K., Hwang, D.Y., Kim, K.S., and Kim, K.H. (2015, January 28\u201330). An OAuth based authentication mechanism for IoT networks. Proceedings of the 2015 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea.","DOI":"10.1109\/ICTC.2015.7354740"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1224","DOI":"10.1109\/JSEN.2014.2361406","article-title":"IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios","volume":"15","author":"Cirani","year":"2015","journal-title":"IEEE Sens. J."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Hummen, R., Ziegeldorf, J.H., Shafagh, H., Raza, S., and Wehrle, K. (2013, January 19). Towards viable certificate-based authentication for the internet of things. Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, Budapest, Hungary. HotWiSec \u201913.","DOI":"10.1145\/2463183.2463193"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/j.procs.2015.05.013","article-title":"SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways","volume":"52","author":"Moosavi","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Gu, T., and Mohapatra, P. (2018, January 9\u201312). BF-IoT: Securing the IoT Networks via Fingerprinting-Based Device Authentication. Proceedings of the 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Chengdu, China.","DOI":"10.1109\/MASS.2018.00047"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"3196","DOI":"10.1109\/TDSC.2023.3323713","article-title":"Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure","volume":"21","author":"Yuan","year":"2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Kim, K., Han, Y.H., and Min, S.G. (2017). An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks. Sensors, 17.","DOI":"10.3390\/s17102170"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"102812","DOI":"10.1016\/j.jnca.2020.102812","article-title":"Master-slave chain based trusted cross-domain authentication mechanism in IoT","volume":"172","author":"Guo","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_47","unstructured":"Granjal, J., Monteiro, E., and Silva, J.S. (2013, January 22\u201324). End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication. Proceedings of the 2013 IFIP Networking Conference, Brooklyn, NY, USA."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1007\/s11276-015-1182-y","article-title":"IoT\u2014Cloud Collaboration to Establish a Secure Connection for Lightweight Devices","volume":"23","author":"Park","year":"2017","journal-title":"Wirel. Netw."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Fouladgar, S., and Afifi, H. (2007, January 26\u201328). A Simple Delegation Scheme for RFID Systems (SiDeS). Proceedings of the 2007 IEEE International Conference on RFID, Grapevine, TX, USA.","DOI":"10.1109\/RFID.2007.346142"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"5943","DOI":"10.1002\/sec.1748","article-title":"FairAccess: A new Blockchain-based access control framework for the Internet of Things","volume":"9","author":"Ouaddah","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Xu, R., Chen, Y., Blasch, E., and Chen, G. (2018). BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT. Computers, 7.","DOI":"10.20944\/preprints201805.0079.v1"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Xu, R., Chen, Y., Blasch, E., and Chen, G. (August, January 30). BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs. Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada.","DOI":"10.1109\/Cybermatics_2018.2018.00191"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Le, T., and Mutka, M.W. (2018, January 18\u201320). CapChain: A Privacy Preserving Access Control Framework Based on Blockchain for Pervasive Environments. Proceedings of the 2018 IEEE International Conference on Smart Computing (SMARTCOMP), Taormina, Italy.","DOI":"10.1109\/SMARTCOMP.2018.00074"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1007\/s12083-023-01486-w","article-title":"Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare","volume":"16","author":"Choksy","year":"2023","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Yan, L., Qin, H., Yang, K., Xie, H., Wang, X.A., and Liu, S. (2024). Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing. Electronics, 13.","DOI":"10.3390\/electronics13030534"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Zemmoudj, S., Bermad, N., and Omar, M. (2019, January 20\u201322). CA-ADP: Context-Aware Authorization and Delegation Protocol for IoT-based healthcare smart systems. Proceedings of the 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), Tunis, Tunisia.","DOI":"10.1109\/IINTEC48298.2019.9112119"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1016\/j.mcm.2013.02.006","article-title":"A capability-based security approach to manage access control in the Internet of Things","volume":"58","author":"Gusmeroli","year":"2013","journal-title":"Math. Comput. Model."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1016\/j.future.2019.04.035","article-title":"Design and implementation of a secure and flexible access-right delegation for resource constrained environments","volume":"99","author":"Rabehaja","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"18142","DOI":"10.1109\/JIOT.2022.3163239","article-title":"Joint Content and Radio Access for the Internet of Things: A Smart-Contract-Based Trusted Framework","volume":"9","author":"Hu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1109\/JSYST.2021.3076759","article-title":"A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain","volume":"16","author":"Agyekum","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_61","unstructured":"Andersen, M.P., Kumar, S., AbdelBaky, M., Fierro, G., Kolb, J., Kim, H.S., Culler, D.E., and Popa, R.A. (2019, January 14\u201316). WAVE: A Decentralized Authorization Framework with Transitive Delegation. Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Chung, S.H., Kim, J.H., and Kim, Y. (2018, January 12\u201313). Pragmatic approach using OAuth mechanism for IoT device authorization in cloud. Proceedings of the 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India.","DOI":"10.1109\/ICACCCN.2018.8748856"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Mendy, G., Ouya, S., Dioum, I., and Thiar\u00e9, O. (2019). e-Infrastructure and e-Services for Developing Countries: 10th EAI International Conference, AFRICOMM 2018, Dakar, Senegal, 29\u201330 November 2019, Proceedings, Springer International Publishing. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.","DOI":"10.1007\/978-3-030-16042-5"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"86630","DOI":"10.1109\/ACCESS.2020.2986381","article-title":"Ciphertext-Policy Hierarchical Attribute-Based Encryption Against Key-Delegation Abuse for IoT-Connected Healthcare System","volume":"8","author":"Chen","year":"2020","journal-title":"IEEE Access"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Alphand, O., Amoretti, M., Claeys, T., Dall\u2019Asta, S., Duda, A., Ferrari, G., Rousseau, F., Tourancheau, B., Veltri, L., and Zanichelli, F. (2018, January 15\u201318). IoTChain: A blockchain security architecture for the Internet of Things. Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain.","DOI":"10.1109\/WCNC.2018.8377385"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"4775","DOI":"10.1109\/JIOT.2020.3028380","article-title":"On Designing Context-Aware Trust Model and Service Delegation for Social Internet of Things","volume":"8","author":"Wei","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"7139","DOI":"10.1109\/TII.2022.3145851","article-title":"An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things","volume":"18","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1080\/00207160.2014.915316","article-title":"DCapBAC: Embedding authorization logic into smart things through ECC optimizations","volume":"93","author":"Jara","year":"2016","journal-title":"Int. J. Comput. Math."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"e3986","DOI":"10.1002\/ett.3986","article-title":"Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems","volume":"33","author":"Li","year":"2020","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Kumar, D., and Kumar, M. (2022, January 11\u201312). Attribute-Based Data Sharing in Smart Healthcare Environment. Proceedings of the 2021 4th International Conference on Recent Trends in Computer Science and Technology (ICRTCST), Jamshedpur, India.","DOI":"10.1109\/ICRTCST54752.2022.9781833"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Touati, L., Challal, Y., and Bouabdallah, A. (2014, January 17\u201319). C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things. Proceedings of the 2014 International Conference on Advanced Networking Distributed Systems and Applications, Bejaia, Algeria.","DOI":"10.1109\/INDS.2014.19"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Lakkundi, V., and Singh, K. (2014, January 19\u201322). Lightweight DTLS implementation in CoAP-based Internet of Things. Proceedings of the 20th Annual International Conference on Advanced Computing and Communications (ADCOM), Bangalore, India.","DOI":"10.1109\/ADCOM.2014.7103240"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1109\/JIOT.2015.2483023","article-title":"ScriptIoT: A Script Framework for and Internet-of-Things Applications","volume":"3","author":"Hsieh","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"4663","DOI":"10.1007\/s12652-018-0843-y","article-title":"Event driven and semantic based approach for data processing on IoT gateway devices","volume":"10","author":"Bali","year":"2019","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Hamadi, R., Khanfor, A., Ghazzai, H., and Massoud, Y. (2022, January 7\u201310). A Hybrid Artificial Neural Network for Task Offloading in Mobile Edge Computing. Proceedings of the 2022 IEEE 65th International Midwest Symposium on Circuits and Systems (MWSCAS), Fukuoka, Japan.","DOI":"10.1109\/MWSCAS54063.2022.9859520"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"4526","DOI":"10.1109\/TDSC.2024.3353811","article-title":"REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT","volume":"21","author":"Li","year":"2024","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"4191","DOI":"10.1109\/JIOT.2023.3300299","article-title":"Identity-Based Multiproxy Signature with Proxy Signing Key for Internet of Drones","volume":"11","author":"Shin","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Hu, Y., Niu, S., and Shao, H. (2022, January 23\u201325). Attribute-based searchable encryption with delegated equality test in cloud-assisted Internet of Things. Proceedings of the 2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT), Sanya, China.","DOI":"10.1109\/CECIT58139.2022.00064"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"59456","DOI":"10.1109\/ACCESS.2020.2981411","article-title":"A Layer-Partitioning Approach for Faster Execution of Neural Network-Based Embedded Applications in Edge Networks","volume":"8","author":"Saguil","year":"2020","journal-title":"IEEE Access"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MCOM.2019.1800732","article-title":"Powering Smart Homes with Information-Centric Networking","volume":"57","author":"Xu","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_81","first-page":"61","article-title":"An Ontology-Based Approach for IoT Data Processing Using Semantic Rules","volume":"Volume 10567","year":"2017","journal-title":"SDL 2017: Model-Driven Engineering for Future Internet"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"22595","DOI":"10.1109\/JIOT.2022.3181582","article-title":"Secure Infectious Diseases Detection System with IoT-Based e-Health Platforms","volume":"9","author":"Zhao","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Al-Sharafi, M.A., Al-Emran, M., Al-Kabi, M.N., and Shaalan, K. (2023). Management of IoT Devices Data Security Using Blockchain and Proxy Re-encryption Algorithm. Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems, Springer International Publishing.","DOI":"10.1007\/978-3-031-25274-7"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Schnicke, F., Haque, A., Kuhn, T., Espen, D., and Antonino, P.O. (2022, January 6\u20139). Architecture Blueprints to Enable Scalable Vertical Integration of Assets with Digital Twins. Proceedings of the 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), Stuttgart, Germany.","DOI":"10.1109\/ETFA52439.2022.9921728"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1109\/TASE.2015.2511301","article-title":"S3K: Scalable Security with Symmetric Keys\u2014DTLS Key Establishment for the Internet of Things","volume":"13","author":"Raza","year":"2016","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Albalawi, U., and Joshi, S. (2018, January 5\u20138). Secure and trusted telemedicine in Internet of Things IoT. Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore.","DOI":"10.1109\/WF-IoT.2018.8355206"},{"key":"ref_87","unstructured":"Kumar, S., Hu, Y., Andersen, M.P., Popa, R.A., and Culler, D.E. (2019, January 14\u201316). JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT. Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Li, X., Li, R., Bai, B., Zhao, Y., Liu, G., and Li, R. (2023, January 21\u201324). Outsourcing the Computation of Plaintext Encryption for Homomorphic Encryption. Proceedings of the 2023 8th International Conference on Computer and Communication Systems (ICCCS), Guangzhou, China.","DOI":"10.1109\/ICCCS57501.2023.10151259"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Jin, Y., and Lee, H. (2019). On-Demand Computation Offloading Architecture in Fog Networks. Electronics, 8.","DOI":"10.3390\/electronics8101076"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/s11277-017-4176-5","article-title":"CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things","volume":"96","author":"Porambage","year":"2017","journal-title":"Wirel. Pers. Commun."},{"key":"ref_91","unstructured":"Ben Saied, Y., and Olivereau, A. (April, January 29). HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things. Proceedings of the Third International Conference on Communications and Networking, Hammamet, Tunisia."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Denis, M., Johansen, C., and J\u00f8sang, A. (2017, January 15). Offline Trusted Device and Proxy Architecture Based on a new TLS Switching Technique. Proceedings of the 2017 International Workshop on Secure Internet of Things (SIoT), Oslo, Norway.","DOI":"10.1109\/SIoT.2017.00007"},{"key":"ref_93","unstructured":"Anggorojati, B., Mahalle, P.N., Prasad, N.R., and Prasad, R. (2012, January 24\u201327). Capability-based access control delegation model on the federated IoT network. Proceedings of the The 15th International Symposium on Wireless Personal Multimedia Communications, Taipei, Taiwan."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Venkatesan, S., Rajeshwari, K.R., and Ramakrishnan, M. (2022). A Lightweight Searchable Encryption and Delegation Mechanism with Forward Privacy for Improving the Security of Industrial Internet of Things-Cloud Systems. Res. Sq., preprint.","DOI":"10.21203\/rs.3.rs-1384533\/v1"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Li, H., Kong, F., Yu, J., Zhang, H., Diao, L., and Tao, Y. (2022, January 9\u201311). Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT. Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China.","DOI":"10.1109\/TrustCom56396.2022.00082"},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Julku, J., Suomalainen, J., and Kylanpaa, M. (2021, January 6\u20139). Delegated Device Attestation for IoT. Proceedings of the 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Gandia, Spain.","DOI":"10.1109\/IOTSMS53705.2021.9704959"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Sciarretta, G., Carbone, R., and Ranise, S. (2016, January 7\u20139). A delegated authorization solution for smart-city mobile applications. Proceedings of the 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), Bologna, Italy.","DOI":"10.1109\/RTSI.2016.7740623"},{"key":"ref_98","unstructured":"Kuusijarvi, J. (2014, January 8\u201310). Mitigating loT Security Threats with a Trusted Network Element. Proceedings of the The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, UK."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Beltran, V., and Skarmeta, A.F. (2016, January 12\u201314). An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE). Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA.","DOI":"10.1109\/WF-IoT.2016.7845482"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Hummen, R., Shafagh, H., Raza, S., Voig, T., and Wehrle, K. (July, January 30). Delegation-based authentication and authorization for the IP-based Internet of Things. Proceedings of the 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Singapore.","DOI":"10.1109\/SAHCN.2014.6990364"},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"393754","DOI":"10.1155\/2015\/393754","article-title":"ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks","volume":"11","author":"Kang","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Van den Abeele, F., Moerman, I., Demeester, P., and Hoebeke, J. (2017). Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things. Sensors, 17.","DOI":"10.3390\/s17071609"},{"key":"ref_103","first-page":"26","article-title":"Validation of an Adaptive Risk-based Access Control Model for the Internet of Things","volume":"10","author":"Atlam","year":"2018","journal-title":"Int. J. Comput. Netw. Inf. Secur. (IJCNIS)"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"67192","DOI":"10.1109\/ACCESS.2020.2978525","article-title":"A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment","volume":"8","author":"Luo","year":"2020","journal-title":"IEEE Access"},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"17482","DOI":"10.1109\/JIOT.2024.3357802","article-title":"Blockchain-Enabled Key Aggregate Searchable Encryption Scheme for Personal Health Record Sharing with Multi-Delegation","volume":"11","author":"Lee","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Dunnett, K., Pal, S., Jadidi, Z., and Jurdak, R. (2023, January 1\u20135). A Blockchain-Based Framework for Scalable and Trustless Delegation of Cyber Threat Intelligence. Proceedings of the 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Dubai, United Arab Emirates.","DOI":"10.1109\/ICBC56567.2023.10174885"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"101081","DOI":"10.1016\/j.iot.2024.101081","article-title":"Blockchain-enabled trust management for secure content caching in mobile edge computing using deep reinforcement learning","volume":"25","author":"Bounaira","year":"2024","journal-title":"Internet Things"},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","article-title":"Systematic literature reviews in software engineering\u2014A systematic literature review","volume":"51","author":"Kitchenham","year":"2009","journal-title":"Inf. Softw. Technol."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1016\/j.infsof.2013.02.002","article-title":"Systematic literature reviews in software engineering","volume":"55","author":"Wohlin","year":"2013","journal-title":"Inf. Softw. Technol."},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Seitz, L., Selander, G., and Gehrmann, C. (2013, January 4\u20137). Authorization framework for the Internet-of-Things. Proceedings of the 2013 IEEE 14th International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), Madrid, Spain.","DOI":"10.1109\/WoWMoM.2013.6583465"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Bandara, S., Yashiro, T., Koshizuka, N., and Sakamura, K. (2016, January 25\u201327). Access control framework for API-enabled devices in smart buildings. Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), Yogyakarta, Indonesia.","DOI":"10.1109\/APCC.2016.7581479"},{"key":"ref_112","first-page":"3958","article-title":"IoT Delegate: Smart Home Framework for Heterogeneous IoT Service Collaboration","volume":"10","author":"Kum","year":"2016","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"1763","DOI":"10.1007\/s00500-015-1705-6","article-title":"TACIoT: Multidimensional trust-aware access control system for the Internet of Things","volume":"20","year":"2016","journal-title":"Soft Comput."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/MCOM.2017.1600611CM","article-title":"A Community-Driven Access Control Approach in Distributed IoT Environments","volume":"55","author":"Hussein","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"26743","DOI":"10.1109\/ACCESS.2017.2777443","article-title":"Achievable Multi-Security Levels for Lightweight IoT-Enabled Devices in Infrastructureless Peer-Aware Communications","volume":"5","author":"Dao","year":"2017","journal-title":"IEEE Access"},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Beltran, V., Martinez, J.A., and Skarmeta, A.F. (2017, January 6\u20139). User-centric access control for efficient security in smart cities. Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland.","DOI":"10.1109\/GIOTS.2017.8016287"},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"1890","DOI":"10.1109\/JIOT.2018.2817075","article-title":"Group-Oriented Range-Bound Key Agreement for Internet of Things Scenarios","volume":"5","author":"Chien","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Elbadry, M., Ye, F., and Yang, Y. (2018, January 15\u201319). Heracles: Scalable, Fine-Grained Access Control for Internet-of-Things in Enterprise Environments. Proceedings of the IEEE INFOCOM 2018\u2014IEEE Conference on Computer Communications, Honolulu, HI, USA.","DOI":"10.1109\/INFOCOM.2018.8485944"},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Behrad, S., Bertin, E., Tuffin, S., and Crespi, N. (2019, January 24\u201328). 5G-SSAAC: Slice-specific Authentication and Access Control in 5G. Proceedings of the 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France.","DOI":"10.1109\/NETSOFT.2019.8806667"},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Al-Aqrabi, H., Johnson, A.P., and Hill, R. (2019, January 19\u201323). Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things. Proceedings of the 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), Leicester, UK.","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00049"},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Lagutin, D., Kortesniemi, Y., Fotiou, N., and Siris, V. (2019, January 15). Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation. Proceedings of the Workshop on Decentralized IoT Systems and Security, London, UK.","DOI":"10.14722\/diss.2019.230005"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.future.2020.02.014","article-title":"A new scalable authentication and access control mechanism for 5G-based IoT","volume":"108","author":"Behrad","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"87552","DOI":"10.1109\/ACCESS.2020.2992649","article-title":"BDSS-FA: A Blockchain-Based Data Security Sharing Platform with Fine-Grained Access Control","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Hang, L., and Kim, D.H. (2020). Reliable Task Management Based on a Smart Contract for Runtime Verification of Sensing and Actuating Tasks in IoT Environments. Sensors, 20.","DOI":"10.3390\/s20041207"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Lin, C.A., and Liao, C.F. (2020, January 17\u201319). User-Managed Access Delegation for Blockchain-driven IoT Services. Proceedings of the 2020 International Computer Symposium (ICS), Tainan, Taiwan.","DOI":"10.1109\/ICS51289.2020.00097"},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"57485","DOI":"10.1109\/ACCESS.2022.3178121","article-title":"A Proxy Signature-Based Swarm Drone Authentication with Leader Selection in 5G Networks","volume":"10","author":"Akkaya","year":"2022","journal-title":"IEEE Access"},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Goyal, G., Liu, P., and Sural, S. (2022, January 25\u201327). Securing Smart Home IoT Systems with Attribute-Based Access Control. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Baltimore, MD, USA.","DOI":"10.1145\/3510547.3517920"},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"100104","DOI":"10.1016\/j.hcc.2023.100104","article-title":"An access control scheme for distributed Internet of Things based on adaptive trust evaluation and blockchain","volume":"3","author":"Jiang","year":"2023","journal-title":"High-Confid. Comput."},{"key":"ref_129","first-page":"103473","article-title":"An extended Attribute-based access control with controlled delegation in IoT","volume":"76","author":"Tegane","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"4239","DOI":"10.1109\/JIOT.2022.3217087","article-title":"Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment","volume":"10","author":"Alshehri","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Pittaras, I., and Polyzos, G.C. (2023, January 28\u201330). Multi-tenant, Decentralized Access Control for the Internet of Things. Proceedings of the 2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), Bali, Indonesia.","DOI":"10.1109\/IoTaIS60147.2023.10346081"},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"15266","DOI":"10.1109\/JIOT.2023.3265407","article-title":"Multilevel Subgranting by Power of Attorney and OAuth Authorization Server in Cyber\u2013Physical Systems","volume":"10","author":"Bodin","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"10992","DOI":"10.1109\/JIOT.2023.3328382","article-title":"Flexible and Fine-Grained Access Control for EHR in Blockchain-Assisted E-Healthcare Systems","volume":"11","author":"Chen","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"1329","DOI":"10.1109\/TDSC.2024.3432650","article-title":"Privacy-Preserving Fine-Grained Data Sharing with Dynamic Service for the Cloud-Edge IoT","volume":"22","author":"Sun","year":"2025","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1109\/JSAC.2015.2393436","article-title":"Toward a Lightweight Authentication and Authorization Framework for Smart Objects","volume":"33","author":"Pawlowski","year":"2015","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_136","first-page":"1","article-title":"A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services","volume":"58","author":"Kim","year":"2019","journal-title":"Comput. Mater. Contin."},{"key":"ref_137","first-page":"90","article-title":"A Hot-topic based Distribution and Notification of Events in Pub\/Sub Mobile Brokers","volume":"5","author":"Morales","year":"2013","journal-title":"Netw. Protoc. Algorithms"},{"key":"ref_138","first-page":"1","article-title":"Distributed Capability-based Access Control for the Internet of Things","volume":"3","author":"Jara","year":"2013","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"ref_139","first-page":"417","article-title":"Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things","volume":"8","author":"Outchakoucht","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Yang, L., Zheng, Q., and Fan, X. (2017, January 1\u20134). RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. Proceedings of the IEEE INFOCOM 2017\u2014IEEE Conference on Computer Communications, Atlanta, GA, USA.","DOI":"10.1109\/INFOCOM.2017.8056954"},{"key":"ref_141","doi-asserted-by":"crossref","unstructured":"Ko, H., Jin, J., and Keoh, S.L. (2017, January 2). ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability. Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, Abu Dhabi, United Arab Emirates.","DOI":"10.1145\/3055186.3055194"},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Tapas, N., Merlino, G., and Longo, F. (2018, January 18\u201320). Blockchain-Based IoT-Cloud Authorization and Delegation. Proceedings of the 2018 IEEE International Conference on Smart Computing (SMARTCOMP), Taormina, Sicily, Italy.","DOI":"10.1109\/SMARTCOMP.2018.00038"},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Sabrina, F. (2019, January 27\u201329). A Novel Entitlement-based Blockchain-enabled Security Architecture for IoT. Proceedings of the 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Auckland, New Zealand.","DOI":"10.1109\/ITNAC46935.2019.9077971"},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Porwal, S., and Mittal, S. (2019, January 8\u201310). A Secure Key Delegation Mechanism for Fog Networking. Proceedings of the 2019 Twelfth International Conference on Contemporary Computing (IC3), Noida, India.","DOI":"10.1109\/IC3.2019.8844905"},{"key":"ref_145","doi-asserted-by":"crossref","unstructured":"Sun, S., Chen, S., Du, R., Li, W., and Qi, D. (2019, January 23\u201325). Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy. Proceedings of the 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC), Hangzhou, China.","DOI":"10.1109\/DSC.2019.00097"},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1016\/j.cose.2019.06.010","article-title":"Blockchain based permission delegation and access control in Internet of Things (BACI)","volume":"86","author":"Ali","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_147","doi-asserted-by":"crossref","first-page":"4473","DOI":"10.1007\/s12652-018-1129-0","article-title":"Context-aware pseudonymization and authorization model for IoT-based smart hospitals","volume":"10","author":"Zemmoudj","year":"2019","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Pinjala, S.K., and Sivalingam, K.M. (2019, January 15\u201318). DCACI: A Decentralized Lightweight Capability Based Access Control Framework using IOTA for Internet of Things. Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland.","DOI":"10.1109\/WF-IoT.2019.8767356"},{"key":"ref_149","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.jnca.2018.12.003","article-title":"Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things","volume":"128","author":"Xu","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"11601","DOI":"10.1109\/JIOT.2020.2999350","article-title":"A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT","volume":"7","author":"Deng","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_151","doi-asserted-by":"crossref","unstructured":"Nakamura, Y., Zhang, Y., Sasabe, M., and Kasahara, S. (2020). Exploiting Smart Contracts for Capability-Based Access Control in the Internet of Things. Sensors, 20.","DOI":"10.3390\/s20061793"},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"2630","DOI":"10.1109\/JIOT.2019.2952141","article-title":"On the Integration of Blockchain to the Internet of Things for Enabling Access Right Delegation","volume":"7","author":"Pal","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_153","doi-asserted-by":"crossref","unstructured":"Puggioni, E., Shaghaghi, A., Doss, R., and Kanhere, S.S. (2020, January 24\u201327). Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs. Proceedings of the 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA.","DOI":"10.1109\/NCA51143.2020.9306689"},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"58800","DOI":"10.1109\/ACCESS.2020.2982542","article-title":"xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things","volume":"8","author":"Ali","year":"2020","journal-title":"IEEE Access"},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"17256","DOI":"10.1109\/ACCESS.2021.3051945","article-title":"A Secure and Privacy-Preserving Machine Learning Model Sharing Scheme for Edge-Enabled IoT","volume":"9","author":"Zhou","year":"2021","journal-title":"IEEE Access"},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"13789","DOI":"10.1109\/ACCESS.2021.3052247","article-title":"An Efficient Access Control Scheme with Outsourcing and Attribute Revocation for Fog-Enabled E-Health","volume":"9","author":"Zhao","year":"2021","journal-title":"IEEE Access"},{"key":"ref_157","doi-asserted-by":"crossref","first-page":"6620236","DOI":"10.1155\/2021\/6620236","article-title":"Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things","volume":"2021","author":"Zhang","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_158","first-page":"2427434","article-title":"Cost-Effective Proxy Signcryption Scheme for Internet of Things","volume":"2021","author":"Ullah","year":"2021","journal-title":"Mob. Inf. Syst."},{"key":"ref_159","doi-asserted-by":"crossref","unstructured":"Sabrina, F., and Jang-Jaccard, J. (2021). Entitlement-Based Access Control for Smart Cities Using Blockchain. Sensors, 21.","DOI":"10.3390\/s21165264"},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"e588","DOI":"10.7717\/peerj-cs.588","article-title":"FogFrame: A framework for IoT application execution in the fog","volume":"7","author":"Skarlat","year":"2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref_161","doi-asserted-by":"crossref","unstructured":"Lastname, F., Lastname, F., and Lastname, F. (2022). A Bidirectional Trust Model for Service Delegation in Social Internet of Things. Future Internet, 14.","DOI":"10.3390\/fi14050135"},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Chien, H.Y., and Wang, N.Z. (2022). A Novel MQTT 5.0-Based Over-the-Air Updating Architecture Facilitating Stronger Security. Electronics, 11.","DOI":"10.3390\/electronics11233899"},{"key":"ref_163","doi-asserted-by":"crossref","unstructured":"Cha, H.J., Yang, H.K., and Song, Y.J. (2022). A Study on Vehicle Monitoring Service Using Attribute-Based Security Scheme in Cyber\u2013Physical Systems. Appl. Sci., 12.","DOI":"10.3390\/app12094300"},{"key":"ref_164","first-page":"4967","article-title":"A Traceable Capability-based Access Control for IoT","volume":"72","author":"Li","year":"2022","journal-title":"Comput. Mater. Contin."},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Ali, A., Almaiah, M.A., Hajjej, F., Pasha, M.F., Fang, O.H., Khan, R., Teo, J., and Zakarya, M. (2022). An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. Sensors, 22.","DOI":"10.3390\/s22020572"},{"key":"ref_166","doi-asserted-by":"crossref","unstructured":"Bayreuther, S., Jacob, F., Grotz, M., Kartmann, R., Peller-Konrad, F., Paus, F., Hartenstein, H., and Asfour, T. (2022, January 8\u201310). BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots. Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, New York, NY, USA.","DOI":"10.1145\/3532105.3535018"},{"key":"ref_167","doi-asserted-by":"crossref","first-page":"11248","DOI":"10.1109\/JIOT.2021.3126230","article-title":"Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message","volume":"9","author":"Xiong","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_168","doi-asserted-by":"crossref","first-page":"46526","DOI":"10.1109\/ACCESS.2022.3169788","article-title":"ConTrust: A Novel Context-Dependent Trust Management Model in Social Internet of Things","volume":"10","author":"Latif","year":"2022","journal-title":"IEEE Access"},{"key":"ref_169","doi-asserted-by":"crossref","first-page":"30779","DOI":"10.1109\/ACCESS.2022.3153120","article-title":"DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System","volume":"10","author":"Xue","year":"2022","journal-title":"IEEE Access"},{"key":"ref_170","doi-asserted-by":"crossref","first-page":"3729","DOI":"10.1109\/JIOT.2021.3099089","article-title":"Delegated Anonymous Credentials with Revocation Capability for IoT Service Chains (DANCIS)","volume":"9","author":"Pinjala","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Silva, C., and Barraca, J.P. (2022, January 22\u201324). Dynamic Delegation-based Privacy Preserving in IoT Architectures. Proceedings of the 2022 9th International Conference on Future Internet of Things and Cloud (FiCloud), Rome, Italy.","DOI":"10.1109\/FiCloud57274.2022.00014"},{"key":"ref_172","doi-asserted-by":"crossref","first-page":"108623","DOI":"10.1016\/j.comnet.2021.108623","article-title":"EDTP: Energy and Delay Optimized Trajectory Planning for UAV-IoT Environment","volume":"202","author":"Banerjee","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_173","doi-asserted-by":"crossref","unstructured":"Qushtom, H., Misic, J., and Misic, V.B. (2022, January 16\u201320). Efficient multi-tier, multiple entry PBFT consensus algorithm for IoT. Proceedings of the ICC 2022\u2014IEEE International Conference on Communications, Seoul, Republic of Korea.","DOI":"10.1109\/ICC45855.2022.9838616"},{"key":"ref_174","doi-asserted-by":"crossref","unstructured":"Heo, J., Jang, H., and Lee, H. (2022, January 25\u201328). How to divide a permission token in the delegation process of blockchain-based access control for IoT. Proceedings of the 2022 IEEE International Systems Conference (SysCon), Montreal, QC, Canada.","DOI":"10.1109\/SysCon53536.2022.9773848"},{"key":"ref_175","doi-asserted-by":"crossref","unstructured":"Ju, C., Tang, W., Chenli, C., Lee, G., Seo, J.H., and Jung, T. (2022, January 22\u201325). Monitoring Provenance of Delegated Personal Data with Blockchain. Proceedings of the 2022 IEEE International Conference on Blockchain (Blockchain), Espoo, Finland.","DOI":"10.1109\/Blockchain55522.2022.00013"},{"key":"ref_176","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1007\/s10619-021-07359-6","article-title":"Mutual-contained access delegation scheme for the Internet of Things user services","volume":"40","author":"Panneerselvam","year":"2022","journal-title":"Distrib. Parallel Databases"},{"key":"ref_177","unstructured":"Wang, J., and Chow, S.S.M. (2022, January 10\u201312). Omnes pro uno: Practical Multi-Writer Encrypted Database. Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA."},{"key":"ref_178","doi-asserted-by":"crossref","unstructured":"Sama, M.R., Kiess, W., Guerzoni, R., Thakolsri, S., and Jurjens, J. (2022, January 12\u201315). Redefining the Trust Model for the Internet of Everything in the 6G era. Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Kyoto, Japan.","DOI":"10.1109\/PIMRC54779.2022.9977941"},{"key":"ref_179","doi-asserted-by":"crossref","unstructured":"Shur, D., Di Crescenzo, G., Zhang, Q., Chen, T., Krishnan, R., Lin, Y.J., Patni, Z., Alexander, S., and Tsudik, G. (2022, January 10\u201313). SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security. Proceedings of the 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA.","DOI":"10.1109\/WCNC51071.2022.9771654"},{"key":"ref_180","doi-asserted-by":"crossref","first-page":"7211","DOI":"10.1109\/JIOT.2021.3094275","article-title":"Scalable IoT Sensing Systems with Dynamic Sinks","volume":"9","author":"Tanyingyong","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_181","doi-asserted-by":"crossref","first-page":"118498","DOI":"10.1109\/ACCESS.2022.3220852","article-title":"Secure Trust-Based Delegated Consensus for Blockchain Frameworks Using Deep Reinforcement Learning","volume":"10","author":"Goh","year":"2022","journal-title":"IEEE Access"},{"key":"ref_182","doi-asserted-by":"crossref","first-page":"4719","DOI":"10.1109\/JSYST.2021.3131589","article-title":"Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things","volume":"16","author":"Qiao","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_183","doi-asserted-by":"crossref","first-page":"107690","DOI":"10.1016\/j.compeleceng.2022.107690","article-title":"Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls","volume":"98","author":"Rios","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_184","doi-asserted-by":"crossref","unstructured":"Wanniarachchi, S.T., and Turau, V. (2023, January 19\u201321). A Fault-Tolerant Distributed Air-to-Ground Communication Architecture for Urban Air Mobility. Proceedings of the 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Pafos, Cyprus.","DOI":"10.1109\/DCOSS-IoT58021.2023.00102"},{"key":"ref_185","first-page":"1857","article-title":"A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things","volume":"136","author":"Wang","year":"2023","journal-title":"Comput. Model. Eng. Sci."},{"key":"ref_186","doi-asserted-by":"crossref","unstructured":"Alharbi, A. (2023). Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System. Sensors, 23.","DOI":"10.3390\/s23063020"},{"key":"ref_187","doi-asserted-by":"crossref","unstructured":"Malhotra, A. (2023, January 27\u201329). Blend CAC: Integration for the Blockchain for Distributed Potential Network Access for the Internet of Things. Proceedings of the 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Greater Noida, India.","DOI":"10.1109\/AISC56616.2023.10085656"},{"key":"ref_188","doi-asserted-by":"crossref","first-page":"3057","DOI":"10.1109\/JIOT.2022.3151828","article-title":"Edge-Assisted Intelligent Device Authentication in Cyber\u2013Physical Systems","volume":"10","author":"Lu","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_189","doi-asserted-by":"crossref","first-page":"e4734","DOI":"10.1002\/ett.4734","article-title":"Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems","volume":"34","author":"Trivedi","year":"2023","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_190","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/s12652-021-03303-9","article-title":"SAMP-RPL: Secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks","volume":"14","author":"Sahraoui","year":"2023","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_191","doi-asserted-by":"crossref","first-page":"3384","DOI":"10.1109\/JIOT.2022.3221857","article-title":"SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation","volume":"10","author":"Hamad","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_192","doi-asserted-by":"crossref","first-page":"110161","DOI":"10.1016\/j.comnet.2023.110161","article-title":"Multi-objective cost-aware bag-of-tasks scheduling optimization model for IoT applications running on heterogeneous fog environment","volume":"240","author":"Seifhosseini","year":"2024","journal-title":"Comput. Netw."},{"key":"ref_193","doi-asserted-by":"crossref","unstructured":"Fan, X., and Chai, Q. (2018, January 5\u20137). Roll-DPoS: A Randomized Delegated Proof of Stake Scheme for Scalable Blockchain-Based Internet of Things Systems. Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, New York, NY, USA.","DOI":"10.1145\/3286978.3287023"},{"key":"ref_194","doi-asserted-by":"crossref","unstructured":"Maselli, G., Piva, M., and Restuccia, F. (2020, January 25). HyBloSE: Hybrid blockchain for secure-by-design smart environments. Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, London UK.","DOI":"10.1145\/3410699.3413793"},{"key":"ref_195","doi-asserted-by":"crossref","first-page":"e4433","DOI":"10.1002\/ett.4433","article-title":"Enabling machine learning-based side-chaining for improving QoS in blockchain-powered IoT networks","volume":"33","author":"Vairagade","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_196","doi-asserted-by":"crossref","unstructured":"Wang, Y., Che, T., Zhao, X., Zhou, T., Zhang, K., and Hu, X. (2022). A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things. Sensors, 22.","DOI":"10.3390\/s22093426"},{"key":"ref_197","doi-asserted-by":"crossref","first-page":"13886","DOI":"10.1109\/JIOT.2022.3142815","article-title":"A Solution for Bilayer Energy-Trading Management in Microgrids Using Multiblockchain","volume":"9","author":"Huang","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_198","doi-asserted-by":"crossref","first-page":"6493","DOI":"10.1002\/int.22852","article-title":"A blockchain- and artificial intelligence-enabled smart IoT framework for sustainable city","volume":"37","author":"Ahmed","year":"2022","journal-title":"Int. J. Intell. Syst."},{"key":"ref_199","doi-asserted-by":"crossref","first-page":"3405","DOI":"10.1109\/JSAC.2022.3213314","article-title":"Blockchain-Enhanced Federated Learning Market with Social Internet of Things","volume":"40","author":"Wang","year":"2022","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_200","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/IOTM.001.2100230","article-title":"Blockchain-Governed Federated Transfer Learning for Secure Internet of Drones Networks","volume":"5","author":"Wang","year":"2022","journal-title":"IEEE Internet Things Mag."},{"key":"ref_201","doi-asserted-by":"crossref","first-page":"11679","DOI":"10.1109\/ACCESS.2022.3145444","article-title":"Cooperative Communication Method Based on Block Chain for a Large Number of Distributed Terminals","volume":"10","author":"Zhi","year":"2022","journal-title":"IEEE Access"},{"key":"ref_202","doi-asserted-by":"crossref","unstructured":"Kaur, M., Gupta, S., Kumar, D., Verma, C., Neagu, B.C., and Raboaca, M.S. (2022). Delegated Proof of Accessibility (DPoAC): A Novel Consensus Protocol for Blockchain Systems. Mathematics, 10.","DOI":"10.3390\/math10132336"},{"key":"ref_203","doi-asserted-by":"crossref","first-page":"66","DOI":"10.3390\/network2010005","article-title":"Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment","volume":"2","author":"Geng","year":"2022","journal-title":"Network"},{"key":"ref_204","doi-asserted-by":"crossref","unstructured":"Misic, J., Misic, V.B., and Chang, X. (2022, January 4\u20138). Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting. Proceedings of the GLOBECOM 2022\u20142022 IEEE Global Communications Conference, Rio de Janeiro, Brazil.","DOI":"10.1109\/GLOBECOM48099.2022.10001051"},{"key":"ref_205","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.neucom.2021.01.147","article-title":"EdgeShare: A blockchain-based edge data-sharing framework for Industrial Internet of Things","volume":"485","author":"Yang","year":"2022","journal-title":"Neurocomputing"},{"key":"ref_206","doi-asserted-by":"crossref","unstructured":"Ledwaba, L.P., Hancke, G.P., and Isaac, S.J. (2022, January 1\u20133). Investigating Distance Bounding for Delegated Proof-of-Proximity Consensus within IIoT. Proceedings of the 2022 IEEE 31st International Symposium on Industrial Electronics (ISIE), Anchorage, AK, USA.","DOI":"10.1109\/ISIE51582.2022.9831631"},{"key":"ref_207","doi-asserted-by":"crossref","first-page":"2774","DOI":"10.1109\/TVT.2021.3136364","article-title":"Leveraging Blockchain for Multi-Operator Access Sharing Management in Internet of Vehicles","volume":"71","author":"Hu","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_208","doi-asserted-by":"crossref","unstructured":"Bachani, V., and Bhattacharjya, A. (2022). Preferential Delegated Proof of Stake (PDPoS)\u2014Modified DPoS with Two Layers towards Scalability and Higher TPS. Symmetry, 15.","DOI":"10.3390\/sym15010004"},{"key":"ref_209","doi-asserted-by":"crossref","first-page":"8857","DOI":"10.1109\/TITS.2021.3086976","article-title":"Secure and Efficient Data Sharing Among Vehicles Based on Consortium Blockchain","volume":"23","author":"Cui","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_210","doi-asserted-by":"crossref","first-page":"1419360","DOI":"10.1155\/2022\/1419360","article-title":"Sustainable Smart Industry: A Secure and Energy Efficient Consensus Mechanism for Artificial Intelligence Enabled Industrial Internet of Things","volume":"2022","author":"Sasikumar","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_211","doi-asserted-by":"crossref","first-page":"2422","DOI":"10.1109\/TNET.2022.3226458","article-title":"A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue","volume":"31","author":"Wang","year":"2023","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_212","doi-asserted-by":"crossref","first-page":"15568","DOI":"10.1109\/TITS.2022.3186361","article-title":"Achieving a Decentralized and Secure Cab Sharing System Using Blockchain Technology","volume":"24","author":"Namasudra","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_213","doi-asserted-by":"crossref","unstructured":"Zhao, J., Hu, H., Huang, F., Guo, Y., and Liao, L. (2023). Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios. Electronics, 12.","DOI":"10.3390\/electronics12081812"},{"key":"ref_214","doi-asserted-by":"crossref","first-page":"21566","DOI":"10.1109\/JIOT.2023.3306606","article-title":"Blockchain-Enabled Lightweight Fine-Grained Searchable Knowledge Sharing for Intelligent IoT","volume":"10","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_215","doi-asserted-by":"crossref","unstructured":"Razaque, A., Yoo, J., Bektemyssova, G., Alshammari, M., Chinibayeva, T.T., Amanzholova, S., Alotaibi, A., and Umutkulov, D. (2023). Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology. Sensors, 23.","DOI":"10.3390\/s23249690"},{"key":"ref_216","doi-asserted-by":"crossref","unstructured":"Alghamdi, S., Albeshri, A., and Alhusayni, A. (2023). Enabling a Secure IoT Environment Using a Blockchain-Based Local-Global Consensus Manager. Electronics, 12.","DOI":"10.3390\/electronics12173721"},{"key":"ref_217","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3604942","article-title":"Improving Quality of Service for Users of Leaderless DAG-Based Distributed Ledgers","volume":"2","author":"Cullen","year":"2023","journal-title":"Distrib. Ledger Technol. Res. Pract."},{"key":"ref_218","doi-asserted-by":"crossref","first-page":"109480","DOI":"10.1016\/j.comnet.2022.109480","article-title":"LightPoW: A trust based time-constrained PoW for blockchain in Internet of Things","volume":"220","author":"Qi","year":"2023","journal-title":"Comput. Netw."},{"key":"ref_219","doi-asserted-by":"crossref","unstructured":"Kaur, M., and Gupta, S. (2023, January 1\u20133). Optimization of a Consensus Protocol in Blockchain-IoT Convergence. Proceedings of the 2023 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India.","DOI":"10.1109\/ESCI56872.2023.10100031"},{"key":"ref_220","doi-asserted-by":"crossref","first-page":"2744","DOI":"10.1109\/TNSM.2022.3230208","article-title":"pDPoSt+sPBFT: A High Performance Blockchain-Assisted Parallel Reinforcement Learning in Industrial Edge-Cloud Collaborative Network","volume":"20","author":"Yang","year":"2023","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_221","doi-asserted-by":"crossref","first-page":"123","DOI":"10.53106\/160792642023012401012","article-title":"Safe and Efficient Delegated Proof of Stake Consensus Mechanism Based on Dynamic Credit in Electronic Transaction","volume":"24","year":"2023","journal-title":"J. Internet Technol."},{"key":"ref_222","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s11277-023-10433-0","article-title":"Secure Spectrum Sharing for Satellite Internet-of-Things Based on Blockchain","volume":"131","author":"Wang","year":"2023","journal-title":"Wirel. Pers. Commun."},{"key":"ref_223","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1016\/j.aej.2023.12.021","article-title":"A novel blockchain-based digital forensics framework for preserving evidence and enabling investigation in industrial Internet of Things","volume":"86","author":"Xiao","year":"2024","journal-title":"Alex. Eng. J."},{"key":"ref_224","doi-asserted-by":"crossref","first-page":"17082","DOI":"10.1109\/JIOT.2024.3358379","article-title":"Computing Power Networking Meets Blockchain: A Reputation-Enhanced Trading Framework for Decentralized IoT Cloud Services","volume":"11","author":"Lin","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_225","first-page":"1731","article-title":"Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption","volume":"138","author":"Mohammed","year":"2024","journal-title":"Comput. Model. Eng. Sci."},{"key":"ref_226","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s10723-023-09739-x","article-title":"On-Chain and Off-Chain Data Management for Blockchain-Internet of Things: A Multi-Agent Deep Reinforcement Learning Approach","volume":"22","author":"Tsang","year":"2024","journal-title":"J. Grid Comput."},{"key":"ref_227","doi-asserted-by":"crossref","first-page":"103834","DOI":"10.1016\/j.jnca.2024.103834","article-title":"Optimized blockchain-based healthcare framework empowered by mixed multi-agent reinforcement learning","volume":"224","author":"Mohamed","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_228","doi-asserted-by":"crossref","first-page":"17113","DOI":"10.1109\/JIOT.2024.3357827","article-title":"Resource Efficient Federated Learning and DAG Blockchain with Sharding in Digital Twin Driven Industrial IoT","volume":"11","author":"Jiang","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_229","doi-asserted-by":"crossref","unstructured":"Wang, Y., Xing, X., Li, P., and Wang, G. (IEEE Internet Things J., 2025). LT-DBFT: A Hierarchical Blockchain Consensus Using Location and Trust in IoT, IEEE Internet Things J., early access.","DOI":"10.1109\/JIOT.2025.3542377"},{"key":"ref_230","doi-asserted-by":"crossref","unstructured":"Leo, M., Battisti, F., Carli, M., and Neri, A. (2014, January 12\u201315). A federated architecture approach for Internet of Things security. Proceedings of the 2014 Euro Med Telco Conference (EMTC), Naples, Italy.","DOI":"10.1109\/EMTC.2014.6996632"},{"key":"ref_231","doi-asserted-by":"crossref","unstructured":"Porambage, P., Braeken, A., Kumar, P., Gurtov, A., and Ylianttila, M. (2015, January 6\u201310). Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach. Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA.","DOI":"10.1109\/GLOCOM.2015.7417094"},{"key":"ref_232","doi-asserted-by":"crossref","first-page":"24775","DOI":"10.1109\/ACCESS.2017.2771301","article-title":"Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT","volume":"5","author":"Xu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_233","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s11280-017-0462-0","article-title":"DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices","volume":"21","author":"Huang","year":"2018","journal-title":"World Wide Web"},{"key":"ref_234","doi-asserted-by":"crossref","unstructured":"Hao, J., Huang, C., Liu, J., Xian, M., and Shen, X. (2018, January 9\u201313). Efficient Outsourced Data Access Control with User Revocation for Cloud-Based IoT. Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/GLOCOM.2018.8647659"},{"key":"ref_235","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s11280-017-0473-x","article-title":"Securely outsourcing the ciphertext-policy attribute-based encryption","volume":"21","author":"Nguyen","year":"2018","journal-title":"World Wide Web"},{"key":"ref_236","doi-asserted-by":"crossref","unstructured":"Moor, L., Bitter, L., Prado, M.D., Pazos, N., and Ouerhani, N. (2019, January 29\u201331). IoT meets distributed AI\u2014Deployment scenarios of Bonseyes AI applications on FIWARE. Proceedings of the 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), London, UK.","DOI":"10.1109\/IPCCC47392.2019.8958742"},{"key":"ref_237","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1007\/s10586-019-02979-1","article-title":"Identity-based encryption with authorized equivalence test for cloud-assisted IoT","volume":"23","author":"Elhabob","year":"2020","journal-title":"Clust. Comput."},{"key":"ref_238","doi-asserted-by":"crossref","first-page":"4221","DOI":"10.1109\/TII.2019.2950295","article-title":"Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices","volume":"16","author":"Wang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_239","first-page":"1064","article-title":"Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing","volume":"19","author":"Xu","year":"2020","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_240","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Lu, R., and Mamun, M. (2020, January 7\u201311). Privacy-Preserving Computation Offloading for Time-Series Activities Classification in eHealthcare. Proceedings of the ICC 2020\u20142020 IEEE International Conference on Communications (ICC), Dublin, Ireland.","DOI":"10.1109\/ICC40277.2020.9148875"},{"key":"ref_241","doi-asserted-by":"crossref","first-page":"5689","DOI":"10.1007\/s11276-019-02036-0","article-title":"Reliable and secure data transfer in IoT networks","volume":"26","author":"Gochhayat","year":"2020","journal-title":"Wirel. Netw."},{"key":"ref_242","doi-asserted-by":"crossref","first-page":"15963","DOI":"10.1109\/ACCESS.2019.2962600","article-title":"Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage","volume":"8","author":"Tao","year":"2020","journal-title":"IEEE Access"},{"key":"ref_243","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1109\/TMC.2020.3026194","article-title":"A Queueing Game Based Management Framework for Fog Computing with Strategic Computing Speed Control","volume":"21","author":"Yi","year":"2022","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_244","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1016\/j.dcan.2022.05.012","article-title":"Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT","volume":"8","author":"Wang","year":"2022","journal-title":"Digit. Commun. Netw."},{"key":"ref_245","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1007\/978-3-031-19849-6_31","article-title":"An IoT Digital Twin for Cyber-Security Defence Based on Runtime Verification","volume":"Volume 13701","author":"Margaria","year":"2022","journal-title":"Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles"},{"key":"ref_246","doi-asserted-by":"crossref","first-page":"1903197","DOI":"10.1155\/2022\/1903197","article-title":"Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs","volume":"2022","author":"Kim","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_247","doi-asserted-by":"crossref","unstructured":"Jiang, L., and Qin, Z. (2022, January 22\u201325). Edge-assisted Puncturable Fine-grained Task Distribution for the IoT-oriented Crowdsensing. Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Espoo, Finland.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00058"},{"key":"ref_248","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1109\/TCC.2019.2948012","article-title":"Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain","volume":"10","author":"Zhou","year":"2022","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_249","doi-asserted-by":"crossref","first-page":"11034","DOI":"10.3934\/mbe.2022514","article-title":"Enabling secure mutual authentication and storage checking in cloud-assisted IoT","volume":"19","author":"Liu","year":"2022","journal-title":"Math. Biosci. Eng."},{"key":"ref_250","doi-asserted-by":"crossref","first-page":"9267","DOI":"10.1002\/int.22991","article-title":"Privacy-preserving CNN feature extraction and retrieval over medical images","volume":"37","author":"Cai","year":"2022","journal-title":"Int. J. Intell. Syst."},{"key":"ref_251","first-page":"1037","article-title":"SecDT: Privacy-Preserving Outsourced Decision Tree Classification without Polynomial Forms in Edge-Cloud Computing","volume":"8","author":"Chen","year":"2022","journal-title":"IEEE Trans. Signal Inf. Process. Netw."},{"key":"ref_252","doi-asserted-by":"crossref","first-page":"20187","DOI":"10.1109\/TITS.2022.3174716","article-title":"Secure and Temporary Access Delegation with Equality Test for Cloud-Assisted IoV","volume":"23","author":"Li","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_253","doi-asserted-by":"crossref","first-page":"1908","DOI":"10.1109\/JIOT.2021.3138691","article-title":"A Fog-Based Architecture for Latency-Sensitive Monitoring Applications in Industrial Internet of Things","volume":"10","author":"Benomar","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_254","doi-asserted-by":"crossref","unstructured":"Meng, X., Yang, C., Qi, Y., Liang, W., Xu, Z., Li, K., and Deng, H. (2023). A Novel Multi-Party Authentication Scheme for FCN-based MIoT Systems in Natural Language Processing Environment. ACM Transactions on Asian and Low-Resource Language Information Processing, Association for Computing Machinery.","DOI":"10.1145\/3590149"},{"key":"ref_255","doi-asserted-by":"crossref","first-page":"100679","DOI":"10.1016\/j.iot.2023.100679","article-title":"A key-insulated secure multi-server authenticated key agreement protocol for edge computing-based VANETs","volume":"21","author":"Yao","year":"2023","journal-title":"Internet Things"},{"key":"ref_256","doi-asserted-by":"crossref","unstructured":"Chouikhi, S., Esseghir, M., and Merghem-Boulahia, L. (2023, January 19\u201323). Computation Offloading for Industrial Internet of Things: A Cooperative Approach. Proceedings of the 2023 International Wireless Communications and Mobile Computing (IWCMC), Marrakesh, Morocco.","DOI":"10.1109\/IWCMC58020.2023.10183071"},{"key":"ref_257","doi-asserted-by":"crossref","first-page":"2234","DOI":"10.1109\/TIFS.2023.3266164","article-title":"Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing","volume":"18","author":"Song","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_258","doi-asserted-by":"crossref","first-page":"103802","DOI":"10.1016\/j.compind.2022.103802","article-title":"Improving efficiency and security of IIoT communications using in-network validation of server certificate","volume":"144","author":"Atutxa","year":"2023","journal-title":"Comput. Ind."},{"key":"ref_259","doi-asserted-by":"crossref","first-page":"6027","DOI":"10.1109\/TMC.2023.3317704","article-title":"LNGate2: Secure Bidirectional IoT Micro-Payments Using Bitcoin\u2019s Lightning Network and Threshold Cryptography","volume":"23","author":"Kurt","year":"2023","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_260","doi-asserted-by":"crossref","first-page":"9939","DOI":"10.1007\/s12652-021-03661-4","article-title":"Novel proxy signature from lattice for the post-quantum internet of things","volume":"14","author":"Wang","year":"2023","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_261","doi-asserted-by":"crossref","unstructured":"Srikanth, K., Rajesh, P.G., Prasad, N.D., Asmathulla, M., and Reddy, T.P.K. (2023, January 25\u201326). Proxy-Based Re-Encryption Design for the IoT Ecosystem. Proceedings of the 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), Chennai, India.","DOI":"10.1109\/ACCAI58221.2023.10200337"},{"key":"ref_262","doi-asserted-by":"crossref","first-page":"14814","DOI":"10.1109\/JIOT.2023.3344577","article-title":"Towards Fine-Grained Task Allocation with Bilateral Access Control for Intelligent Transportation Systems","volume":"11","author":"Wu","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_263","doi-asserted-by":"crossref","unstructured":"Sun, Y., Du, X., Niu, S., and Zhou, S. (2024). A lightweight attribute-based signcryption scheme based on cloud-fog assisted in smart healthcare. PLoS ONE, 19.","DOI":"10.1371\/journal.pone.0297002"},{"key":"ref_264","doi-asserted-by":"crossref","unstructured":"Routray, K., and Bera, P. (2024, January 4\u20137). Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based Encryption. Proceedings of the 25th International Conference on Distributed Computing and Networking, Chennai, India.","DOI":"10.1145\/3631461.3631466"},{"key":"ref_265","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/JIOT.2023.3285388","article-title":"QB-IMD: A Secure Medical Data Processing System with Privacy Protection Based on Quantum Blockchain for IoMT","volume":"11","author":"Qu","year":"2024","journal-title":"IEEE Internet Things J."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/5\/202\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:25:08Z","timestamp":1760030708000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/5\/202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,30]]},"references-count":265,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["fi17050202"],"URL":"https:\/\/doi.org\/10.3390\/fi17050202","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,30]]}}}