SoK: Delegated Security in the Internet of Things
Abstract
:1. Introduction
1.1. Contributions of This Paper
- In this SoK paper, the following key contributions are presented:
- A review of existing works on security delegation in IoT, including the identification of common characteristics and the derivation of generalised architectures for four application domains.
- A flexible adversary model and a formalisation of security properties relevant to the identified application domains.
- An evaluation of the security of approaches described in the literature using the presented security models.
- An identification of the limitations of security delegation in IoT environments and suggestions for future research directions.
1.2. Organisation of This Paper
2. Application Domains of Security Delegation
- Resource-constrained (RC) System: This party wants to benefit from security delegation. It can be a single device (e.g., a light bulb, a smart vacuum cleaner, a sensor, etc.) or several networked IoT devices. It is assumed that the RC system does not have enough resources to perform some security functions on its own.
- Delegate: A device that has sufficient resources to perform resource-intensive cryptographic operations, maintain necessary security and communication protocols, etc. The delegate performs these operations on behalf of the RC system.
- Third Party: Any party that interacts with the RC system via the delegate is called a third party. For example, the RC system may want to access resources or services of the third party, or the third party requires access to the RC system.
2.1. Access Control and/or Authorisation Delegation
Example
2.2. Authentication Delegation
Example
2.3. Rights Delegation
Example
2.4. Computation Delegation
Example
3. Adversary Model
3.1. Adversary Characteristics
3.2. Adversary Goals
- Confidentiality: Unauthorised disclosure and misuse of the resources or information should be prevented.
- Integrity: Unauthorised changes, destruction, or loss of resources or information should be prevented.
- Availability: Authorised users should have timely and uninterrupted access to requested resources or information.
3.3. Mathematical Model of an Adversary
- Oracle :
- The delegation oracle allows the adversary to interact with the delegate :As input, receives the set of data that varies depending on the target of the adversary and application domain. It may include a party or resource , etc. The oracle either returns an access token or rejects the request by returning ⊥.
- Oracle :
- The corruption oracle allows the adversary to corrupt parties and learn their secrets :As input, receives an identifier of a party that the adversary wants to corrupt. The oracle will then return the secrets belonging to the party associated with this or ⊥, e.g., if no such party exists.
- Oracle :
- The observe oracle allows the adversary to observe the communication between system parties and the delegate :As input, receives , indicating which party is communicating with . The oracle will then return the transcript of the communication or ⊥, e.g., if no party associated with exists.
- Oracle :
- This oracle allows the adversary to interact with the third party :As input, receives , indicating which party delegates its rights, of the party which requested the rights, an identifier of desired resource and the proof of rights based on , and . The oracle will either return an access token or reject the request by returning ⊥.
4. Formalisation of the Security Properties
- is an Access Control/Authorisation delegation game.
- is an Authentication delegation game.
- is a Rights delegation game.
- is a Computation delegation game.
- is a list of all system participants.
- is a list of all system resources.
- denotes the access matrix. More precisely, if then party has access to resource . It contains all system participants.
- includes all which are accessible from outside of a system.
- includes all elements of a system that are expected in case the system operates without deviations. It can be parties, passwords, messages, etc.
- specifies all valid proofs of rights related to an owner party , a delegate with and a resource for each party involved in a system.
- contains all secrets of each party in a system.
4.1. Access Control and/or Authorisation Delegation
- 1.
- Initializing M, F, H, S.
- 2.
- receives as input the access matrix M or F.
- 3.
- is assigned identifier .
- 4.
- can query the following oracles:where is an identifier of a protocol party which wants to obtain access to an RC system resource .
- 5.
- wins if any of the following cases hold:
- Confidentiality: outputs a token and a resource identifier , such that
- (1)
- is not allowed to access according to M, but
- (2)
- grants access to when provided with .
- Integrity: outputs a party identifier , a resource identifier , and a modified item ] such that
- (1)
- there is a third party that is allowed to access according to M, and
- (2)
- is not allowed to access to according to M, but
- (3)
- that does not match its corresponding item ∈ H.
- Availability: outputs an identifier indicating party and a resource identifier , such that
- (1)
- has access to according to M, but
- (2)
- access using a valid token is not granted.
4.2. Authentication Delegation
- 1.
- Initialising M, F, H, S.
- 2.
- receives as input the access matrix M or F.
- 3.
- is assigned identifier .
- 4.
- can query the following oracles:where identifies an RC system party which wants to be authenticated to interact with resource of the third party .
- 5.
- wins if any of the following cases hold:
- Confidentiality: outputs a resource identifier and token , such that
- (1)
- is not allowed to access according to M, but
- (2)
- grants access to when provided with .
- Integrity: outputs a party identifier , a resource identifier , a token , and a modified item such that
- (1)
- is allowed to access according to M with provided token , and
- (2)
- is not allowed to access according to M, but
- (3)
- ∃ which does not match corresponding item ∈ H.
- Availability: outputs a party identifier and a resource identifier , such that
- (1)
- is allowed to access according to M, but
- (2)
- does not grants access to when provided with .
4.3. Rights Delegation
- 1.
- Initialising M, F, H, L, S.
- 2.
- receives as input the access matrix M or F.
- 3.
- is assigned identifier .
- 4.
- can query the following oracles:where identifies an RC system party which transfers its rights related to resource owned by , identifies a delegate which obtains rights by possessing proof of rights from .
- 5.
- wins if any of the following cases hold:
- Confidentiality: outputs a resource identifier and a token , such that
- (1)
- is not allowed to access according to M, and
- (2)
- with is not allowed to access according to L, but
- (3)
- grants access to when provided with and .
- Integrity: outputs a resource identifier , token , and a modified item such that
- (1)
- has access to , and
- (2)
- is not allowed to access according to M, and
- (3)
- with is not allowed to access according to L, but
- (4)
- does not match corresponding item ∈ H.
- Availability: outputs a resource identifier and token , such that
- (1)
- is allowed to access according to M, and
- (2)
- with is allowed to access according to L, but
- (3)
- does not grants access to when provided with and .
4.4. Computation Delegation
- 1.
- Initialising M, F, H, S.
- 2.
- receives as input the access matrix M or F.
- 3.
- is assigned identifier .
- 4.
- can query the following oracles:where identifies an RC system party , is an unprocessed message and is a processed message by a delegate , e.g., encrypted or decrypted.
- 5.
- wins if any of the following cases hold:
- Confidentiality: outputs a party identifier and a secret , such that
- (1)
- is not requested (), but
- (2)
- belongs to .
- Integrity: outputs a party identifier , a secret and a modified item such that
- (1)
- legitimately belongs to the interaction process, and
- (2)
- belongs to , but
- (3)
- ∃ does not match corresponding item ∈ H.
- Availability: outputs a party identifier and a secret , such that
- (1)
- legitimately belongs to the interaction process, and
- (2)
- belongs to , but
- (3)
- obtains either no result for its request or an incorrect one.
5. Security Evaluation of Existing Protocols
5.1. Adversary Types
- :
- An adversary belonging to this type is a “weak” one. They are external, have no corruption capability, and are able to perform attacks feasible within a concrete (typically short) time interval. can query the following oracles: , (see Table 2 (1)).
- :
- Adversaries in this group can be described as “medium” ones. They have External+ access to the system; hence, they can observe the communication between parties but have no corruption capability. However, may have accomplices within the system who may have a corruption capability. Their position allows more sophisticated attacks than . can query the following oracles: , , (see Table 2 (8)).
- :
- When an adversary is categorised as “strong”, it is assumed that they have direct access to the system, acting as insiders with full corruption capability. Combined with unlimited time, this enables them to carry out the most resource-intensive attacks. can query the following oracles: , , , (see Table 2 (18)).
5.2. Process and Results of Security Evaluation
5.2.1. Access Control and/or Authorisation Delegation
5.2.2. Authentication Delegation
5.2.3. Rights Delegation
5.2.4. Computation Delegation
6. Discussion
6.1. Access Control and/or Authorisation Delegation
6.1.1. Confidentiality
6.1.2. Integrity
6.1.3. Availability
6.2. Authentication Delegation
6.2.1. Confidentiality
6.2.2. Integrity
6.2.3. Availability
6.3. Rights Delegation
6.3.1. Confidentiality
6.3.2. Integrity
6.3.3. Availability
6.4. Computation Delegation
6.4.1. Confidentiality
6.4.2. Integrity
6.4.3. Availability
6.5. Common Vulnerabilities
6.6. Proposed Countermeasures and Mitigations
- Most existing studies do not provide formalised models of their proposed solutions, with the notable exception of those within the cryptographic delegation application domain.
- The security analysis of the proposed delegation solutions is often either completely absent or limited to a narrow scope, typically considering only a single type of adversary. In most cases, the evaluated adversary is weak and external, while stronger internal threats or more complex attack scenarios are largely overlooked.
- Most of the proposed solutions meet confidentiality and integrity requirements when evaluated against specific types of adversaries. However, they often do not provide sufficient system availability, especially under DoS attacks or in the presence of a potential SPoF.
- Solutions that provide robust and comprehensive security guarantees are frequently tailored for environments with ample computational and network resources. Consequently, their applicability to typical IoT scenarios, e.g., smart home, may be limited, as these scenarios often lack the necessary infrastructure, device density, or processing capabilities required to support such solutions effectively.
7. Potential Future Research Directions
- Comprehensive and lightweight delegation solutions: Investigate the feasibility of designing delegation-based security frameworks that provide comprehensive protection of confidentiality, integrity, and availability, even in the presence of strong and internal adversaries, while remaining suitable for deployment in small-scale and highly resource-constrained IoT environments.
- Formalisation of attacks: Explore whether common attack scenarios targeting delegation mechanisms in IoT systems can be generalised and expressed as formal mathematical models compatible with our security property definitions.
- Ensuring security of a delegate: Research techniques to enhance the security of delegates, which are often assumed to be trustworthy and robust components. However, as they frequently serve as main components in delegation models, they become attractive targets for adversaries and may be vulnerable to various attacks.
- Delegation in dynamic environments: Design adaptive delegation mechanisms that can respond to real-time contextual factors such as device failure, workload, trust levels, and network conditions, thereby improving both system robustness and efficiency in dynamic IoT environments.
- Standardisation and interoperability: Investigate the feasibility of designing interoperable and standardised delegation solutions capable of operating across heterogeneous IoT environments, addressing the current limitations of many existing approaches that are highly domain- or vendor-specific.
- Extended property evaluation: Explore the extension of the security evaluation model proposed in this paper to include additional security properties beyond those discussed, in order to support a more comprehensive assessment of system security.
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
CIA | Confidentiality, Integrity and Availability |
TLS | Transport Layer Security |
SoK | Systematisation of Knowledge |
ACM | Association for Computing Machinery |
IEEE | Institute of Electrical and Electronics Engineers |
RC | Resource-constrained |
DTLS | Datagram Transport Layer Security |
SP | Security Proxy |
ID | Identification Number |
SA | Security Agent |
LW-RHABE | Lightweight Revocable Hierarchical Attribute-based Encryption |
CA | Central Authority |
DA | Domain Authority |
CSP | Cloud Service Provider |
DoS | Denial-of-Service |
MitM | Man-in-the-Middle |
SPoF | Single Point of Failure |
Appendix A. Methodology for Selecting Papers Suitable for the Review
Appendix A.1. Selection Procedure
- Inclusion criteria:
- A paper provides a unique approach toward the definition, description, or classification of security delegating in IoT systems.
- A paper presents metrics or security models that allow for explaining or measuring security delegation.
- A paper introduces a specific approach to security delegation that can be applied in at least one sub-area of IoT.
- Exclusion criteria:
- A paper is not peer-reviewed.
- A paper does not present a novel security model or design.
Appendix A.2. Results of the Selection Procedure
№ | Title | Y | T | Cn | h |
---|---|---|---|---|---|
Access Control and/or Authorisation Delegation | |||||
1 | Authorisation framework for the Internet-of-Things [110] | 2013 | C | 70 | / |
2 | A DTLS-based security architecture for the Internet of Things [25] | 2015 | C | 24 | / |
3 | A delegated authorisation solution for smart-city mobile applications [97] | 2016 | C | 4 | / |
4 | Access control framework for API-enabled devices in smart buildings [111] | 2016 | C | 18 | / |
5 | An overview on delegated authorisation for CoAP: Authentication and authorisation for … (ACE) [99] | 2016 | C | 8 | / |
6 | Building secure healthcare services using OAuth 2.0 and JSON web token in IOT cloud scenario [30] | 2016 | C | 23 | / |
7 | IoT Delegate: Smart Home Framework for Heterogeneous IoT Service Collaboration [112] | 2016 | J | 15 | 34 |
8 | IoT-cloud authorisation and delegation mechanisms for ubiquitous sensing and actuation [34] | 2016 | C | 8 | / |
9 | TACIoT: multidimensional trust-aware access control system for the Internet of Things [113] | 2016 | J | 109 | 102 |
10 | A Community-Driven Access Control Approach in Distributed IoT Environments [114] | 2017 | J | 55 | 272 |
11 | A model to enable application-scoped access control as a service for IoT using OAuth 2.0 [29] | 2017 | C | 24 | / |
12 | Achievable Multi-Security Levels for Lightweight IoT-Enabled Devices in …Communications [115] | 2017 | J | 24 | 204 |
13 | ControlChain: Blockchain as a Central Enabler for Access Control Authorisations in the IoT [31] | 2017 | C | 95 | / |
14 | OAuth-IoT: An access control framework for the Internet of Things based on open standards [28] | 2017 | C | 45 | / |
15 | User-centric access control for efficient security in smart cities [116] | 2017 | C | 11 | / |
16 | A Group-Oriented DTLS Handshake for Secure IoT Applications [21] | 2018 | J | 21 | 102 |
17 | Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT [26] | 2018 | J | 905 | 149 |
18 | Decentralised IoT Data Management Using BlockChain and Trusted Execution Environment [32] | 2018 | C | 98 | / |
19 | Group-Oriented Range-Bound Key Agreement for Internet of Things Scenarios [117] | 2018 | J | 18 | 149 |
20 | Heracles: Scalable, Fine-Grained Access Control for Internet-of-Things in Enterprise Environments [118] | 2018 | C | 14 | / |
21 | Validation of an Adaptive Risk-based Access Control Model for the Internet of Things [103] | 2018 | J | 59 | / |
22 | 5G-SSAAC: Slice-specific Authentication and Access Control in 5G [119] | 2019 | C | 5 | / |
23 | Blockchain and Structural Relationship-Based Access Control for IoT: A Smart City Use Case [27] | 2019 | C | 6 | / |
24 | Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things [120] | 2019 | C | 3 | / |
25 | Enabling Decentralised Identifiers and Verifiable Credentials for Constrained …Devices … [121] | 2019 | J | 33 | 4 |
26 | Fine-grained multi-authority access control in IoT-enabled mHealth [36] | 2019 | J | 24 | 43 |
27 | Policy-based access control for constrained healthcare resources in the context of the Internet of Things [35] | 2019 | J | 47 | 129 |
28 | Trusted D2D-Based IoT Resource Access Using Smart Contracts [33] | 2019 | C | 7 | / |
29 | A new scalable authentication and access control mechanism for 5G-based IoT [122] | 2020 | J | 29 | 151 |
30 | Access control for Internet of Things—enabled assistive technologies: … [37] | 2020 | J | 11 | / |
31 | BDSS-FA: A Blockchain-Based Data Security Sharing Platform With Fine-Grained Access Control [123] | 2020 | J | 41 | 204 |
32 | Droplet: Decentralized Authorisation and Access Control for Encrypted Data Streams [17] | 2020 | J | 30 | 4 |
33 | Reliable Task Management Based on a Smart Contract for Runtime Verification … [124] | 2020 | J | 34 | 219 |
34 | User-Managed Access Delegation for Blockchain-driven IoT Services [125] | 2020 | C | 4 | / |
35 | Delegated Device Attestation for IoT [96] | 2021 | C | 1 | / |
36 | A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks [126] | 2022 | J | 10 | 204 |
37 | Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT [18] | 2022 | C | 1 | / |
38 | Securing Smart Home IoT Systems with Attribute-Based Access Control [127] | 2022 | C | 5 | / |
39 | A Blockchain-Based Framework for Scalable and Trustless Delegation of Cyber Threat Intelligence [106] | 2023 | C | 1 | / |
40 | An access control scheme for distributed IoT based on adaptive trust evaluation and blockchain [128] | 2023 | J | 2 | 5 |
41 | An extended Attribute-based access control with controlled delegation in IoT [129] | 2023 | J | 1 | 54 |
42 | Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation … [130] | 2023 | J | 5 | 149 |
43 | Multi-tenant, Decentralized Access Control for the Internet of Things [131] | 2023 | C | 0 | / |
44 | Multilevel Subgranting by Power of Attorney and OAuth Authorisation Server … [132] | 2023 | J | 0 | 149 |
45 | Smart Blockchain-based Authorisation for Social Internet of Things [12] | 2023 | C | 0 | / |
46 | Flexible and Fine-grained Access Control for EHR in Blockchain-assisted E-healthcare Systems [133] | 2024 | J | 0 | 149 |
47 | Privacy-Preserving Fine-Grained Data Sharing With Dynamic Service for the Cloud-Edge IoT [134] | 2025 | C | 2 | / |
Authentication Delegation | |||||
48 | A Simple Delegation Scheme for RFID Systems (SiDeS) [49] | 2007 | C | 14 | / |
49 | End-to-end transport-layer security for Internet-integrated sensing applications with … [47] | 2013 | J | 11 | 9 |
50 | Towards viable certificate-based authentication for the Internet of Things [41] | 2013 | C | 91 | / |
51 | Delegation-based authentication and authorisation for the IP-based Internet of Things [100] | 2014 | C | 102 | / |
52 | Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS … [38] | 2014 | C | 21 | / |
53 | An OAuth based authentication mechanism for IoT networks [39] | 2015 | C | 39 | / |
54 | ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks [101] | 2015 | J | 20 | 65 |
55 | IoT-OAS: An OAuth-Based Authorisation Service Architecture for Secure Services in IoT Scenarios [40] | 2015 | J | 174 | 145 |
56 | SEA: A Secure and Efficient Authentication and Authorisation Architecture for IoT-Based Healthcare … [42] | 2015 | J | 222 | / |
57 | Toward a Lightweight Authentication and Authorisation Framework for Smart Objects [135] | 2015 | J | 111 | 251 |
58 | An Authentication and Key Management Mechanism for Resource Constrained Devices … [45] | 2017 | J | 22 | 219 |
59 | IoT–Cloud collaboration to establish a secure connection for lightweight devices [48] | 2017 | J | 25 | 98 |
60 | Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things [102] | 2017 | J | 9 | 219 |
61 | BF-IoT: Securing the IoT Networks via Fingerprinting-Based Device Authentication [43] | 2018 | C | 32 | / |
62 | A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services [136] | 2019 | J | 20 | 51 |
63 | D2TLS: delegation-based DTLS for cloud-based IoT services [22] | 2019 | C | 6 | / |
64 | Privacy-preserving delegable authentication in the Internet of Things [16] | 2019 | C | 11 | / |
65 | Master-slave chain based trusted cross-domain authentication mechanism in IoT [46] | 2020 | J | 31 | 129 |
66 | Cost-Efficient Anonymous Authentication Scheme Based on Set-Membership Zero-Knowledge Proof [14] | 2023 | C | 0 | / |
67 | Leakage of Authorisation-Data in IoT Device Sharing: New Attacks and Countermeasure [44] | 2023 | J | 0 | 92 |
68 | Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things … [19] | 2023 | C | 0 | / |
Rights Delegation | |||||
69 | Capability-based access control delegation model on the federated IoT network [93] | 2012 | J | 9 | 9 |
70 | A Hot-topic based Distribution and Notification of Events in Pub/Sub Mobile Brokers [137] | 2013 | J | 8 | / |
71 | A capability-based security approach to manage access control in the Internet of Things [57] | 2013 | J | 299 | 116 |
72 | Distributed Capability-based Access Control for the Internet of Things [138] | 2013 | J | 178 | 9 |
73 | DCapBAC: embedding authorisation logic into smart things through ECC optimisations [68] | 2016 | J | 125 | 54 |
74 | FairAccess: a new Blockchain?based access control framework for the Internet of Things [50] | 2016 | J | 650 | 58 |
75 | Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things [139] | 2017 | J | 173 | 35 |
76 | Offline Trusted Device and Proxy Architecture Based on a new TLS Switching Technique [92] | 2017 | C | 1 | / |
77 | RSPP: A reliable, searchable and privacy-preserving e-healthcare system … [140] | 2017 | C | 31 | / |
78 | ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability [141] | 2017 | C | 4 | / |
79 | BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs [52] | 2018 | C | 103 | / |
80 | BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control … [51] | 2018 | J | 121 | 32 |
81 | Blockchain-Based IoT-Cloud Authorisation and Delegation [142] | 2018 | C | 41 | / |
82 | CapChain: A Privacy Preserving Access Control Framework Based on Blockchain … [53] | 2018 | C | 29 | / |
83 | IoTChain: A blockchain security architecture for the Internet of Things [65] | 2018 | C | 146 | / |
84 | Pragmatic approach using OAuth mechanism for IoT device authorisation in cloud [62] | 2018 | C | 2 | / |
85 | A Novel Entitlement-based Blockchain-enabled Security Architecture for IoT [143] | 2019 | C | 17 | / |
86 | A Secure Key Delegation Mechanism for Fog Networking [144] | 2019 | C | 4 | / |
87 | Access Control Model Based on Dynamic Delegations and Privacy in a Health System … [63] | 2019 | C | 0 | / |
88 | Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy [145] | 2019 | C | 8 | / |
89 | Blockchain based permission delegation and access control in Internet of Things (BACI) [146] | 2019 | J | 70 | 112 |
90 | CA-ADP: Context-Aware Authorisation and Delegation Protocol for IoT-based healthcare smart systems [56] | 2019 | C | 2 | / |
91 | Context-aware pseudonymisation and authorisation model for IoT-based smart hospitals [147] | 2019 | J | 11 | 64 |
92 | DCACI: A Decentralized Lightweight Capability Based Access Control Framework using IOTA … [148] | 2019 | C | 18 | / |
93 | Design and implementation of a secure and flexible access-right delegation for … [58] | 2019 | J | 21 | 151 |
94 | Tc-PEDCKS: Towards time controlled public key encryption with …keyword search … [149] | 2019 | J | 22 | 129 |
95 | WAVE: A Decentralized Authorisation Framework with Transitive Delegation [61] | 2019 | J | 68 | 4 |
96 | A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT [150] | 2020 | J | 38 | 149 |
97 | Ciphertext-Policy Hierarchical Attribute-Based Encryption Against Key-Delegation Abuse … [64] | 2020 | J | 9 | 204 |
98 | Exploiting Smart Contracts for Capability-Based Access Control in the Internet of Things [151] | 2020 | J | 67 | 219 |
99 | On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain [23] | 2020 | J | 33 | 170 |
100 | On the Integration of Blockchain to the Internet of Things for Enabling Access Right Delegation [152] | 2020 | J | 42 | 149 |
101 | Proxy re-encryption with equality test for secure data sharing in IoT-based healthcare systems [69] | 2020 | J | 11 | / |
102 | Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs [153] | 2020 | C | 6 | / |
103 | xDBAuth: Blockchain Based Cross Domain Authentication and Authorisation Framework for IoT [154] | 2020 | J | 56 | 204 |
104 | A Secure and Privacy-Preserving Machine Learning Model Sharing Scheme for Edge-Enabled IoT [155] | 2021 | J | 13 | 204 |
105 | An Efficient Access Control Scheme With Outsourcing and Attribute Revocation … [156] | 2021 | J | 17 | 204 |
106 | Blockchain-Based DNS Root Zone Management Decentralisation for Internet of Things [157] | 2021 | J | 5 | 73 |
107 | Cost-Effective Proxy Signcryption Scheme for Internet of Things [158] | 2021 | J | 3 | 42 |
108 | Entitlement-Based Access Control for Smart Cities Using Blockchain [159] | 2021 | J | 10 | 219 |
109 | FogFrame: a framework for IoT application execution in the fog [160] | 2021 | J | 15 | 37 |
110 | On Designing Context-Aware Trust Model and Service Delegation for Social Internet of Things [66] | 2021 | J | 24 | 149 |
111 | A Bidirectional Trust Model for Service Delegation in Social Internet of Things [161] | 2022 | J | 6 | 4 |
112 | A Novel MQTT 5.0-Based Over-the-Air Updating Architecture Facilitating Stronger Security [162] | 2022 | J | 10 | 62 |
113 | A Proxy Re-Encryption Approach to Secure Data Sharing in the IoT Based on Blockchain [60] | 2022 | J | 58 | 98 |
114 | A Study on Vehicle Monitoring Service Using Attribute-Based Security Scheme … [163] | 2022 | J | 1 | 101 |
115 | A Traceable Capability-based Access Control for IoT [164] | 2022 | J | 3 | 51 |
116 | An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things [67] | 2022 | J | 39 | 170 |
117 | An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach … [165] | 2022 | J | 95 | 219 |
118 | Attribute-Based Data Sharing in Smart Healthcare Environment [70] | 2022 | C | 0 | / |
119 | BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots [166] | 2022 | C | 2 | / |
120 | Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme … [167] | 2022 | J | 9 | 149 |
121 | ConTrust: A Novel Context-Dependent Trust Management Model in Social Internet of Things [168] | 2022 | J | 10 | 204 |
122 | DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System [169] | 2022 | J | 4 | 204 |
123 | Delegated Anonymous Credentials With Revocation Capability for IoT …() [170] | 2022 | J | 2 | 149 |
124 | Dynamic Delegation-based Privacy Preserving in IoT Architectures [171] | 2022 | C | 4 | / |
125 | EDTP: Energy and Delay Optimized Trajectory Planning for UAV-IoT Environment [172] | 2022 | J | 18 | 150 |
126 | Efficient multi-tier, multiple entry PBFT consensus algorithm for IoT [173] | 2022 | C | 3 | / |
127 | How to divide a permission token in the delegation process of blockchain-based access control for IoT [174] | 2022 | C | 0 | / |
128 | Joint Content and Radio Access for the IoT: A Smart-Contract-Based Trusted Framework [59] | 2022 | J | 2 | 149 |
129 | Monitoring Provenance of Delegated Personal Data with Blockchain [175] | 2022 | C | 2 | / |
130 | Mutual-contained access delegation scheme for the Internet of Things user services [176] | 2022 | J | 29 | 45 |
131 | Omnes pro uno: Practical Multi-Writer Encrypted Database [177] | 2022 | J | 21 | 4 |
132 | Redefining the Trust Model for the Internet of Everything in the 6G era [178] | 2022 | C | 1 | / |
133 | Reliable Application Layer Routing Using Decentralized Identifiers [9] | 2022 | J | 1 | 49 |
134 | SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security [179] | 2022 | C | 0 | / |
135 | Scalable IoT Sensing Systems With Dynamic Sinks [180] | 2022 | J | 3 | 149 |
136 | Secure Trust-Based Delegated Consensus for Blockchain Frameworks … [181] | 2022 | J | 7 | 204 |
137 | Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things [182] | 2022 | J | 11 | 98 |
138 | Security and Privacy Service Level Agreement composition for Internet of Things systems … [183] | 2022 | J | 2 | 84 |
139 | Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things [10] | 2022 | J | 18 | 54 |
140 | A Fault-Tolerant Distributed Air-to-Ground Communication Architecture for Urban Air Mobility [184] | 2023 | C | 0 | / |
141 | A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things [185] | 2023 | J | 0 | 64 |
142 | Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security … [186] | 2023 | J | 4 | 219 |
143 | Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism … [54] | 2023 | J | 3 | 42 |
144 | Blend CAC: Integration for the Blockchain for Distributed Potential Network Access for the IoT [187] | 2023 | C | 1 | / |
145 | Edge-Assisted Intelligent Device Authentication in Cyber–Physical Systems [188] | 2023 | J | 17 | 149 |
146 | Key-aggregate searchable encryption with multi-user authorisation and keyword untraceability … [189] | 2023 | J | 0 | / |
147 | SAMP-RPL: secure and adaptive multipath RPL for enhanced security and reliability … [190] | 2023 | J | 7 | 64 |
148 | SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems … [191] | 2023 | J | 6 | 149 |
149 | Blockchain-Enabled Key Aggregate Searchable Encryption Scheme … [105] | 2024 | J | 0 | 149 |
150 | Identity-Based Multiproxy Signature With Proxy Signing Key for Internet of Drones [77] | 2024 | J | 0 | 149 |
151 | Multi-objective cost-aware bag-of-tasks scheduling optimisation model for IoT applications … [192] | 2024 | J | 0 | 150 |
152 | Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing [55] | 2024 | J | 60 | 62 |
153 | Roll-DPoS: A Randomized Delegated Proof of Stake Scheme … [193] | 2018 | C | 40 | / |
154 | HyBloSE: hybrid blockchain for secure-by-design smart environments [194] | 2020 | C | 3 | / |
155 | Enabling machine learning-based side-chaining for improving QoS in blockchain-powered IoT networks [195] | 2021 | J | 2 | / |
156 | A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things [196] | 2022 | J | 9 | 219 |
157 | A Solution for Bilayer Energy-Trading Management in Microgrids Using Multiblockchain [197] | 2022 | J | 10 | 149 |
158 | A blockchain- and artificial intelligence-enabled smart IoT framework for sustainable city [198] | 2022 | J | 68 | 101 |
159 | Blockchain-Enhanced Federated Learning Market With Social Internet of Things [199] | 2022 | J | 7 | 251 |
160 | Blockchain-Governed Federated Transfer Learning for Secure Internet of Drones Networks [200] | 2022 | J | 0 | / |
161 | Cooperative Communication Method Based on Block Chain … [201] | 2022 | J | 3 | 204 |
162 | Delegated Proof of Accessibility (DPoAC): A Novel Consensus Protocol for Blockchain Systems [202] | 2022 | J | 12 | 55 |
163 | Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol … [203] | 2022 | J | 5 | / |
164 | Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting [204] | 2022 | C | 1 | / |
165 | Design of a Blockchain-based Security Algorithm for IoT in Healthcare [11] | 2022 | C | 1 | / |
166 | EdgeShare: A blockchain-based edge data-sharing framework for Industrial Internet of Things [205] | 2022 | J | 15 | 177 |
167 | Investigating Distance Bounding for Delegated Proof-of-Proximity Consensus within IIoT [206] | 2022 | C | 0 | / |
168 | Leveraging Blockchain for Multi-Operator Access Sharing Management in Internet of Vehicles [207] | 2022 | J | 9 | 204 |
169 | Preferential Delegated Proof of Stake (PDPoS)—Modified DPoS with Two Layers … [208] | 2022 | J | 14 | 76 |
170 | Secure and Efficient Data Sharing Among Vehicles Based on Consortium Blockchain [209] | 2022 | J | 61 | 182 |
171 | Sustainable Smart Industry: A Secure and Energy Efficient Consensus Mechanism … [210] | 2022 | J | 18 | 70 |
172 | A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue [211] | 2023 | J | 15 | 179 |
173 | Achieving a Decentralized and Secure Cab Sharing System Using Blockchain Technology [212] | 2023 | J | 19 | 182 |
174 | Authentication Technology in IoT and Privacy Security Issues in Typical Application Scenarios [213] | 2023 | J | 4 | 62 |
175 | Blockchain-Enabled Lightweight Fine-Grained Searchable Knowledge Sharing for Intelligent IoT [214] | 2023 | J | 1 | 149 |
176 | Efficient Internet-of-Things Cyberattack Depletion … [215] | 2023 | J | 33 | 219 |
177 | Enabling a Secure IoT Environment Using a Blockchain-Based Local-Global Consensus Manager [216] | 2023 | J | 2 | 62 |
178 | Improving Quality of Service for Users of Leaderless DAG-Based Distributed Ledgers [217] | 2023 | J | 1 | / |
179 | LightPoW: A trust based time-constrained PoW for blockchain in Internet of Things [218] | 2023 | J | 5 | 150 |
180 | Optimisation of a Consensus Protocol in Blockchain-IoT Convergence [219] | 2023 | C | 0 | / |
181 | pDPoSt+sPBFT: A High Performance Blockchain-Assisted Parallel Reinforcement Learning … [220] | 2023 | J | 1 | 65 |
182 | Safe and Efficient Delegated Proof of Stake Consensus Mechanism … [221] | 2023 | J | 1 | 25 |
183 | Secure Spectrum Sharing for Satellite Internet-of-Things Based on Blockchain [222] | 2023 | J | 0 | 75 |
184 | A novel blockchain-based digital forensics framework for preserving evidence … [223] | 2024 | J | 0 | 81 |
185 | Blockchain-enabled trust management for secure content caching in mobile edge computing … [107] | 2024 | J | 0 | 39 |
186 | Computing Power Networking Meets Blockchain: A Reputation-Enhanced Trading Framework … [224] | 2024 | J | 0 | 149 |
187 | Enhancing IoT Data Security with Lightweight Blockchain and … [225] | 2024 | J | 0 | 64 |
188 | On-Chain and Off-Chain Data Management for Blockchain-Internet of Things: A Multi-Agent … [226] | 2024 | J | 0 | 58 |
1890 | Optimized blockchain-based healthcare framework … [227] | 2024 | J | 2 | 129 |
190 | Resource Efficient Federated Learning and DAG Blockchain With Sharding … [228] | 2024 | J | 0 | 149 |
191 | LT-DBFT: A Hierarchical Blockchain Consensus Using Location and Trust in IoT [229] | 2025 | C | 0 | / |
Computations Delegation | |||||
192 | HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things [91] | 2012 | C | 9 | / |
193 | A federated architecture approach for Internet of Things security [230] | 2014 | C | 83 | / |
194 | C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things [71] | 2014 | C | 46 | / |
195 | Lightweight DTLS Implementation in CoAP-based IoT [72] | 2014 | J | 26 | 9 |
196 | Lightweight collaborative key establishment scheme for the Internet of Things [8] | 2014 | J | 79 | 150 |
197 | Mitigating loT Security Threats with a Trusted Network Element [98] | 2014 | C | 19 | / |
198 | Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach [231] | 2015 | C | 5 | / |
199 | Proxy-based end-to-end key establishment protocol for the Internet of Things [20] | 2015 | C | 18 | / |
200 | S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things [85] | 2016 | J | 80 | 102 |
201 | ScriptIoT: A Script Framework for and Internet-of-Things Applications [73] | 2016 | J | 13 | 149 |
202 | An Ontology-Based Approach for IoT Data Processing Using Semantic Rules [81] | 2017 | C | 6 | / |
203 | CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment … [90] | 2017 | J | 10 | 75 |
204 | Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT [232] | 2017 | J | 11 | 204 |
205 | DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices [233] | 2018 | J | 31 | 54 |
206 | Efficient Outsourced Data Access Control with User Revocation for Cloud-Based IoT [234] | 2018 | C | 3 | / |
207 | Secure and trusted telemedicine in Internet of Things IoT [86] | 2018 | C | 9 | / |
208 | Securely outsourcing the ciphertext-policy attribute-based encryption [235] | 2018 | J | 21 | 54 |
209 | Event driven and semantic based approach for data processing on IoT gateway devices [74] | 2019 | J | 17 | 64 |
210 | IoT meets distributed AI—Deployment scenarios of Bonseyes AI applications on FIWARE [236] | 2019 | C | 6 | / |
211 | JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT [87] | 2019 | J | 90 | 4 |
212 | On-Demand Computation Offloading Architecture in Fog Networks [89] | 2019 | J | 10 | 62 |
213 | Powering Smart Homes with Information-Centric Networking [80] | 2019 | J | 17 | 272 |
214 | A Layer-Partitioning Approach for Faster Execution of Neural Network-Based …Applications … [79] | 2020 | J | 5 | 204 |
215 | A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment [104] | 2020 | J | 36 | 204 |
216 | Identity-based encryption with authorized equivalence test for cloud-assisted IoT [237] | 2020 | J | 17 | 63 |
217 | Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things [15] | 2020 | J | 33 | 204 |
218 | Lightweighted Secure Searching Over Public-Key Ciphertexts for …Industrial IoT Devices [238] | 2020 | J | 27 | 170 |
219 | Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing [239] | 2020 | J | 43 | 92 |
220 | Privacy-Preserving Computation Offloading for Time-Series Activities Classification in eHealthcare [240] | 2020 | C | 9 | / |
221 | Reliable and secure data transfer in IoT networks [241] | 2020 | J | 20 | 98 |
222 | Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage [242] | 2020 | J | 33 | 204 |
223 | A Hybrid Artificial Neural Network for Task Offloading in Mobile Edge Computing [75] | 2022 | C | 5 | / |
224 | A Queueing Game Based Management Framework for Fog Computing … [243] | 2022 | J | 22 | 151 |
225 | Achieving reliable and anti-collusive outsourcing computation and verification … [244] | 2022 | J | 5 | 40 |
223 | An IoT Digital Twin for Cyber-Security Defence Based on Runtime Verification [245] | 2022 | C | 1 | / |
227 | Architecture Blueprints to Enable Scalable Vertical Integration of Assets with Digital Twins [84] | 2022 | C | 3 | / |
228 | Attribute-based searchable encryption with delegated equality test in cloud-assisted Internet of Things [78] | 2022 | C | 0 | / |
229 | Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing … [246] | 2022 | J | 1 | 73 |
230 | Edge-assisted Puncturable Fine-grained Task Distribution for the IoT-oriented Crowdsensing [247] | 2022 | C | 0 | / |
231 | Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain [248] | 2022 | J | 1 | 61 |
232 | Enabling secure mutual authentication and storage checking in cloud-assisted IoT [249] | 2022 | J | 4 | 53 |
233 | Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol … [95] | 2022 | C | 1 | / |
234 | Privacy-preserving CNN feature extraction and retrieval over medical images [250] | 2022 | J | 0 | / |
235 | SecDT: Privacy-Preserving Outsourced Decision Tree Classification … [251] | 2022 | J | 0 | 36 |
236 | Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms [82] | 2022 | J | 5 | 149 |
237 | Secure and Temporary Access Delegation With Equality Test for Cloud-Assisted IoV [252] | 2022 | J | 3 | 182 |
238 | Supporting AI Engineering on the IoT Edge through Model-Driven TinyML [13] | 2022 | C | 4 | / |
239 | A Fog-Based Architecture for Latency-Sensitive Monitoring Applications … [253] | 2023 | J | 2 | 149 |
240 | A Novel Multi-Party Authentication Scheme for FCN-based MIoT Systems … [254] | 2023 | J | 1 | 20 |
241 | A key-insulated secure multi-server authenticated key agreement protocol … [255] | 2023 | J | 4 | 39 |
242 | Computation Offloading for Industrial Internet of Things: A Cooperative Approach [256] | 2023 | C | 0 | / |
243 | Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing [257] | 2023 | J | 2 | 154 |
244 | Improving efficiency and security of IIoT communications … [258] | 2023 | J | 4 | 117 |
245 | LNGate2: Secure Bidirectional IoT Micro-Payments … [259] | 2023 | J | 0 | 151 |
246 | Novel proxy signature from lattice for the post-quantum Internet of Things [260] | 2023 | J | 13 | 64 |
247 | Outsourcing the Computation of Plaintext Encryption for Homomorphic Encryption [88] | 2023 | C | 0 | / |
248 | Management of IoT Devices Data Security Using Blockchain and Proxy Re-encryption Algorithm [83] | 2023 | C | 1 | / |
249 | Proxy-Based Re-Encryption Design for the IoT Ecosystem [261] | 2023 | C | 0 | / |
250 | Towards Fine-Grained Task Allocation With Bilateral Access Control … [262] | 2023 | J | 0 | 149 |
251 | A lightweight attribute-based signcryption scheme based on cloud-fog assisted in smart healthcare [263] | 2024 | J | 0 | 404 |
252 | Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based Encryption [264] | 2024 | C | 0 | / |
253 | QB-IMD: A Secure Medical Data Processing System With Privacy Protection … [265] | 2024 | J | 7 | 149 |
254 | REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT [76] | 2024 | J | 0 | 92 |
Appendix B. Results of the Security Evaluation
№ | Paper Title | C | I | A | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Access Control and/or Authorisation Delegation | ||||||||||
1 | Seitz et al. [110] (2013) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
2 | Lessa dos Santos et al. [25] (2015) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
3 | Sciarretta et al. [97] (2016) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ |
4 | Bandara et al. [111] (2016) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
5 | Beltran and Skarmeta [99] (2016) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
6 | Solapurkar [30] (2016) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
7 | Kum et al. [112] (2016) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
8 | Bruneo et al. [34] (2016) | ✓ | ✗ | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ |
9 | Bernal Bernabe et al. [113] (2016) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
10 | Hussein et al. [114] (2017) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
11 | Fernández et al. [29] (2017) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
12 | Dao et al. [115] (2017) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
13 | Pinno et al. [31] (2017) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
14 | Sciancalepore et al. [28] (2017) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
15 | Beltran et al. [116] (2017) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
16 | Park and Park [21] (2018) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
17 | Novo [26] (2018) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
18 | Ayoade et al. [32] (2018) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
19 | Chien [117] (2018) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
20 | Zhou et al. [118] (2018) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
21 | Atlam et al. [103] (2018) | ✓ | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ |
22 | Behrad et al. [119] (2019) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
23 | Sabrina [27] (2019) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
24 | Al-Aqrabi et al. [120] (2019) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
25 | Lagutin et al. [121] (2019) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
26 | Li et al. [36] (2019) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
27 | Pal et al. [35] (2019) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
28 | Siris et al. [33] (2019) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
29 | Behrad et al. [122] (2020) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
30 | Pal et al. [37] (2020) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
31 | Xu et al. [123] (2020) | ✓ | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
32 | Shafagh et al. [17] (2020) | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
33 | Hang and Kim [124] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
34 | Lin and Liao [125] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
35 | Julku et al. [96] (2021) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
36 | Abdel-Malek et al. [126] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ |
37 | Zhou et al. [18] (2022) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
38 | Goyal et al. [127] (2022) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
39 | Dunnett et al. [106] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
40 | Jiang et al. [128] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
41 | Tegane et al. [129] (2023) | ✓ | ✗ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
42 | Alshehri et al. [130] (2023) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
43 | Pittaras and Polyzos [131] (2023) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
44 | Vattaparambil Sudarsan et al. [132] (2023) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
45 | Dallel et al. [12] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
46 | Chen et al. [133] (2024) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
47 | Sun et al. [134] (2025) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
Authentication Delegation | ||||||||||
48 | Fouladgar and Afifi [49] (2007) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
49 | Granjal et al. [47] (2013) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
50 | Hummen et al. [41] (2013) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
51 | Hummen et al. [100] (2014) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
52 | Park and Kang [38] (2014) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ |
53 | Emerson et al. [39] (2015) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
54 | Kang et al. [101] (2015) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ |
55 | Cirani et al. [40] (2015) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
56 | Moosavi et al. [42] (2015) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
57 | Hernandez-Ramos et al. [135] (2015) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
58 | Kim et al. [45] (2017) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ |
59 | Park et al. [48] (2017) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ |
60 | Van den Abeele et al. [102] (2017) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ |
61 | Gu and Mohapatra [43] (2018) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
62 | Kim et al. [136] (2019) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
63 | Cho et al. [22] (2019) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
64 | Gritti et al. [16] (2019) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
65 | Guo et al. [46] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
66 | Wiraatmaja and Kasahara [14] (2023) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
67 | Yuan et al. [44] (2023) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ |
68 | Rafiqullah et al. [19] (2023) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
Rights Delegation | ||||||||||
69 | Anggorojati et al. [93] (2012) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
70 | Morales et al. [137] (2013) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
71 | Gusmeroli et al. [57] (2013) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
72 | Hernández-Ramos et al. [138] (2013) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
73 | Hernández-Ramos et al. [68] (2016) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
74 | Ouaddah et al. [50] (2016) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
75 | Outchakoucht et al. [139] (2017) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
76 | Denis et al. [92] (2017) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
77 | Yang et al. [140] (2017) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
78 | Ko et al. [141] (2017) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
79 | Xu et al. [52] (2018) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
80 | Xu et al. [51] (2018) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
81 | Tapas et al. [142] (2018) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
82 | Le and Mutka [53] (2018) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
83 | Alphand et al. [65] (2018) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
84 | Chung et al. [62] (2018) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
85 | Sabrina [143] (2019) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
86 | Porwal and Mittal [144] (2019) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
87 | Mendy et al. [63] (2019) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
88 | Sun et al. [145] (2019) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
89 | Ali et al. [146] (2019) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
90 | Zemmoudj et al. [56] (2019) | ✓ | ✗ | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ |
91 | Zemmoudj et al. [147] (2019) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
92 | Pinjala and Sivalingam [148] (2019) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
93 | Rabehaja et al. [58] (2019) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
94 | Xu et al. [149] (2019) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
95 | Andersen et al. [61] (2019) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ |
96 | Deng et al. [150] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
97 | Chen et al. [64] (2020) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
98 | Nakamura et al. [151] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
99 | Pal et al. [23] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
100 | Pal et al. [152] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
101 | Li et al. [69] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
102 | Puggioni et al. [153] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
103 | Ali et al. [154] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
104 | Zhou et al. [155] (2021) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
105 | Zhao et al. [156] (2021) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
106 | Zhang et al. [157] (2021) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
107 | Ullah et al. [158] (2021) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
108 | Sabrina and Jang-Jaccard [159] (2021) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
109 | Skarlat and Schulte [160] (2021) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
110 | Wei et al. [66] (2021) | ✓ | ✗ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
111 | Lastname et al. [161] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
112 | Chien and Wang [162] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
113 | Agyekum et al. [60] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
114 | Cha et al. [163] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
115 | Li et al. [164] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
116 | Zhang et al. [67] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
117 | Ali et al. [165] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
118 | Kumar and Kumar [70] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
119 | Bayreuther et al. [166] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
120 | Xiong et al. [167] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
121 | Latif [168] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
122 | Xue [169] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
123 | Pinjala et al. [170] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
124 | Silva and Barraca [171] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
125 | Banerjee et al. [172] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
126 | Qushtom et al. [173] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
127 | Heo et al. [174] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
128 | Hu et al. [59] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
129 | Ju et al. [175] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
130 | Panneerselvam and Krithiga [176] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
131 | Wang and Chow [177] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
132 | Sama et al. [178] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
133 | Alsubhi et al. [9] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
134 | Shur et al. [179] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
135 | Tanyingyong et al. [180] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
136 | Goh et al. [181] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
137 | Qiao et al. [182] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
138 | Rios et al. [183] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
139 | Ali et al. [10] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
140 | Wanniarachchi and Turau [184] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
141 | Wang and Wu [185] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
142 | Alharbi [186] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
143 | Choksy et al. [54] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
144 | Malhotra [187] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
145 | Lu et al. [188] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
146 | Trivedi and Patel [189] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
147 | Sahraoui and Henni [190] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
148 | Hamad et al. [191] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
149 | Lee et al. [105] (2024) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
150 | Shin et al. [77] (2024) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
151 | Seifhosseini et al. [192] (2024) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
152 | Yan et al. [55] (2024) | ✓ | ✗ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
153 | Fan and Chai [193] (2018) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
154 | Maselli et al. [194] (2020) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
155 | Vairagade and Brahmananda [195] (2021) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
156 | Wang et al. [196] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
157 | Huang et al. [197] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
158 | Ahmed et al. [198] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
159 | Wang et al. [199] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
160 | Wang et al. [200] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
161 | Zhi et al. [201] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
162 | Kaur et al. [202] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
163 | Geng et al. [203] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
164 | Misic et al. [204] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
165 | Rastogi et al. [11] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
166 | Yang et al. [205] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
167 | Ledwaba et al. [206] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
168 | Hu et al. [207] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
169 | Bachani and Bhattacharjya [208] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
170 | Cui et al. [209] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
171 | Sasikumar et al. [210] (2022) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
172 | Wang et al. [211] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
173 | Namasudra and Sharma [212] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
174 | Zhao et al. [213] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
175 | Wang et al. [214] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
176 | Razaque et al. [215] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
177 | Alghamdi et al. [216] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
178 | Cullen et al. [217] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
179 | Qi et al. [218] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
180 | Kaur and Gupta [219] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
181 | Yang et al. [220] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
182 | Mingjie Zhao et al. [221] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
183 | Wang et al. [222] (2023) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
184 | Xiao et al. [223] (2024) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
185 | Bounaira et al. [107] (2024) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
186 | Lin et al. [224] (2024) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
187 | Mohammed and Wahab [225] (2024) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
188 | Tsang et al. [226] (2024) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
189 | Al-Marridi et al. [227] (2024) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
190 | Jiang et al. [228] (2024) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
191 | Wang et al. [229] (2025) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
Computations Delegation | ||||||||||
192 | Ben Saied and Olivereau [91] (2012) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
193 | Leo et al. [230] (2014) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
194 | Touati et al. [71] (2014) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
195 | Lakkundi and Singh [72] (2014) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
196 | Saied et al. [8] (2014) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ |
197 | Kuusijarvi [98] (2014) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
198 | Porambage et al. [231] (2015) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
199 | Porambage et al. [20] (2015) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ |
200 | Raza et al. [85] (2016) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
201 | Hsieh et al. [73] (2016) | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
202 | Bali et al. [81] (2017) | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
203 | Porambage et al. [90] (2017) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
204 | Xu et al. [232] (2017) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
205 | Huang et al. [233] (2018) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
206 | Hao et al. [234] (2018) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
207 | Albalawi and Joshi [86] (2018) | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
208 | Nguyen et al. [235] (2018) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
209 | Al-Osta et al. [74] (2019) | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
210 | Moor et al. [236] (2019) | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
211 | Kumar et al. [87] (2019) | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
212 | Jin and Lee [89] (2019) | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
213 | Xu et al. [80] (2019) | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
214 | Saguil and Azim [79] (2020) | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
215 | Luo et al. [104] (2020) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
216 | Elhabob et al. [237] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
217 | Ali et al. [15] (2020) | ✓ | ✗ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
218 | Wang et al. [238] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
219 | Xu et al. [239] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
220 | Zheng et al. [240] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
221 | Gochhayat et al. [241] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
222 | Tao et al. [242] (2020) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
223 | Hamadi et al. [75] (2022) | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
224 | Yi et al. [243] (2022) | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
225 | Wang et al. [244] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
226 | De Hoz Diego et al. [245] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
227 | Schnicke et al. [84] (2022) | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
228 | Hu et al. [78] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
229 | Kim et al. [246] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
230 | Jiang and Qin [247] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
231 | Zhou et al. [248] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
232 | Liu et al. [249] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
233 | Li et al. [95] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
234 | Cai et al. [250] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
235 | Chen et al. [251] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
236 | Zhao et al. [82] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
237 | Li et al. [252] (2022) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
238 | Moin et al. [13] (2022) | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
239 | Benomar et al. [253] (2023) | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
240 | Meng et al. [254] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
241 | Yao et al. [255] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
242 | Chouikhi et al. [256] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
243 | Song et al. [257] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
244 | Atutxa et al. [258] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
245 | Kurt et al. [259] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
246 | Wang et al. [260] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
247 | Li et al. [88] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
248 | Mahamuni et al. [83] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
249 | Srikanth et al. [261] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
250 | Wu et al. [262] (2023) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
251 | Sun et al. [263] (2024) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
252 | Routray and Bera [264] (2024) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
253 | Qu et al. [265] (2024) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
254 | Li et al. [76] (2024) | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
References
- Statista. Internet of Things—Market Outlook Report; Statista. Juni 2024. Available online: https://de.statista.com/statistik/studie/id/109209/dokument/internet-der-dinge-market-outlook-report/ (accessed on 28 April 2025).
- Statista Market Insights. Annual Number of Cyberattacks Worldwide from 2016 to 2023 (In Millions); Graph: 2024. Available online: https://www.statista.com/forecasts/1485031/cyberattacks-annual-worldwide (accessed on 28 April 2025).
- Miorandi, D.; Sicari, S.; De Pellegrini, F.; Chlamtac, I. Internet of Things: Vision, applications and research challenges. Ad Hoc Netw. 2012, 10, 1497–1516. [Google Scholar] [CrossRef]
- Chacko, A.; Hayajneh, T. Security and Privacy Issues with IoT in Healthcare. EAI Endorsed Trans. Pervasive Health Technol. 2018, 4, e2. [Google Scholar] [CrossRef]
- Canavese, D.; Mannella, L.; Regano, L.; Basile, C. Security at the Edge for Resource-Limited IoT Devices. Sensors 2024, 24, 590. [Google Scholar] [CrossRef] [PubMed]
- Wang, Q.; Li, N.; Chen, H. On the Security of Delegation in Access Control Systems. In Proceedings of the Computer Security—ESORICS 2008, Málaga, Spain, 6–8 October 2008; Jajodia, S., Lopez, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2008; pp. 317–332. [Google Scholar]
- Chuat, L.; Abdou, A.; Sasse, R.; Sprenger, C.; Basin, D.; Perrig, A. SoK: Delegation and Revocation, the Missing Links in the Web’s Chain of Trust. In Proceedings of the 2020 IEEE European Symposium on Security and Privacy (EuroS&P), Genoa, Italy, 7–11 September 2020; pp. 624–638. [Google Scholar] [CrossRef]
- Saied, Y.B.; Olivereau, A.; Zeghlache, D.; Laurent, M. Lightweight collaborative key establishment scheme for the Internet of Things. Comput. Netw. 2014, 64, 273–295. [Google Scholar] [CrossRef]
- Alsubhi, K.; Alzahrani, B.; Fotiou, N.; Albeshri, A.; Alreshoodi, M. Reliable Application Layer Routing Using Decentralized Identifiers. Future Internet 2022, 14, 322. [Google Scholar] [CrossRef]
- Ali, M.; Sadeghi, M.R.; Liu, X.; Miao, Y.; Vasilakos, A.V. Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things. J. Inf. Secur. Appl. 2022, 65, 103101. [Google Scholar] [CrossRef]
- Rastogi, P.; Singh, D.; Singh Bedi, S. Design of a Blockcdhain based Security Algorithm for IoT in Healthcare. In Proceedings of the 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 28–29 April 2022. [Google Scholar] [CrossRef]
- Dallel, O.; Ayed, S.B.; Tahar, J.B.H. Smart Blockchain-based Authorization for Social Internet of Things. In Proceedings of the 2023 International Conference on Cyberworlds (CW), Sousse, Tunisia, 3–5 October 2023; pp. 440–447. [Google Scholar] [CrossRef]
- Moin, A.; Challenger, M.; Badii, A.; Gunnemann, S. Supporting AI Engineering on the IoT Edge through Model-Driven TinyML. In Proceedings of the 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC), Los Alamitos, CA, USA, 27 June–1 July 2022; pp. 884–893. [Google Scholar] [CrossRef]
- Wiraatmaja, C.; Kasahara, S. Cost-Efficient Anonymous Authentication Scheme Based on Set-Membership Zero-Knowledge Proof. In Proceedings of the 2023 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France, 11–13 October 2023; pp. 1–8. [Google Scholar] [CrossRef]
- Ali, M.; Sadeghi, M.R.; Liu, X. Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things. IEEE Access 2020, 8, 23951–23964. [Google Scholar] [CrossRef]
- Gritti, C.; Önen, M.; Molva, R. Privacy-preserving delegable authentication in the internet of things. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, Limassol, Cyprus, 8–12 April 2019; pp. 861–869. [Google Scholar] [CrossRef]
- Shafagh, H.; Burkhalter, L.; Ratnasamy, S.; Hithnawi, A. Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, 12–14 August 2020; pp. 2469–2486. [Google Scholar]
- Zhou, X.; Guan, J.; Xing, L.; Qian, Z. Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 7–11 November 2022; pp. 3285–3299. [Google Scholar] [CrossRef]
- Rafiqullah; Mehmood, A.; Khan, M.A.; Maple, C.; Lloret, J. Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures. In Proceedings of the 2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), San Antonio, TX, USA, 23–25 October 2023; pp. 8–14. [Google Scholar] [CrossRef]
- Porambage, P.; Braeken, A.; Kumar, P.; Gurtov, A.; Ylianttila, M. Proxy-based end-to-end key establishment protocol for the Internet of Things. In Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK, 8–12 June 2015; pp. 2677–2682. [Google Scholar] [CrossRef]
- Park, C.S.; Park, W.S. A Group-Oriented DTLS Handshake for Secure IoT Applications. IEEE Trans. Autom. Sci. Eng. 2018, 15, 1920–1929. [Google Scholar] [CrossRef]
- Cho, E.; Park, M.; Lee, H.; Choi, J.; Kwon, T.T. D2TLS: Delegation-based DTLS for cloud-based IoT services. In Proceedings of the International Conference on Internet of Things Design and Implementation, Montreal, QC, Canada, 15–18 April 2019; pp. 190–201. [Google Scholar] [CrossRef]
- Pal, S.; Rabehaja, T.; Hitchens, M.; Varadharajan, V.; Hill, A. On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain. IEEE Trans. Ind. Inform. 2020, 16, 3521–3530. [Google Scholar] [CrossRef]
- Samonas, S.; Coss, D. The CIA strikes back: Redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 2014, 10, 21–45. [Google Scholar]
- Lessa dos Santos, G.; Guimarães, V.T.; da Cunha Rodrigues, G.; Granville, L.Z.; Tarouco, L.M.R. A DTLS-based security architecture for the Internet of Things. In Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 809–815. [Google Scholar] [CrossRef]
- Novo, O. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet Things J. 2018, 5, 1184–1195. [Google Scholar] [CrossRef]
- Sabrina, F. Blockchain and Structural Relationship Based Access Control for IoT: A Smart City Use Case. In Proceedings of the 2019 IEEE 44th Conference on Local Computer Networks (LCN), Osnabrück, Germany, 14–17 October 2019; pp. 137–140. [Google Scholar] [CrossRef]
- Sciancalepore, S.; Piro, G.; Caldarola, D.; Boggia, G.; Bianchi, G. OAuth-IoT: An access control framework for the Internet of Things based on open standards. In Proceedings of the 2017 IEEE symposium on computers and communications (ISCC), Heraklion, Greece, 3–6 July 2017; pp. 676–681. [Google Scholar]
- Fernández, F.; Alonso, A.; Marco, L.; Salvachúa, J. A model to enable application-scoped access control as a service for IoT using OAuth 2.0. In Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), Paris, France, 7–9 March 2017; pp. 322–324. [Google Scholar] [CrossRef]
- Solapurkar, P. Building secure healthcare services using OAuth 2.0 and JSON web token in IOT cloud scenario. In Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), Greater Noida, India, 14–17 December 2016; pp. 99–104. [Google Scholar] [CrossRef]
- Pinno, O.J.A.; Gregio, A.R.A.; De Bona, L.C.E. ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Ayoade, G.; Karande, V.; Khan, L.; Hamlen, K. Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment. In Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration (IRI), Salt Lake City, UT, USA, 6–9 July 2018; pp. 15–22. [Google Scholar] [CrossRef]
- Siris, V.; Dimopoulos, D.; Fotiou, N.; Voulgaris, S.; Polyzos, G. Trusted D2D-Based IoT Resource Access Using Smart Contracts. In Proceedings of the 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Washington, DC, USA, 10–12 June 2019; pp. 1–9. [Google Scholar] [CrossRef]
- Bruneo, D.; Distefano, S.; Longo, F.; Merlino, G.; Puliafito, A. IoT-cloud authorization and delegation mechanisms for ubiquitous sensing and actuation. In Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 222–227. [Google Scholar] [CrossRef]
- Pal, S.; Hitchens, M.; Varadharajan, V.; Rabehaja, T. Policy-based access control for constrained healthcare resources in the context of the Internet of Things. J. Netw. Comput. Appl. 2019, 139, 57–74. [Google Scholar] [CrossRef]
- Li, Q.; Zhu, H.; Xiong, J.; Mo, R.; Ying, Z.; Wang, H. Fine-grained multi-authority access control in IoT-enabled mHealth. Ann. Telecommun. 2019, 74, 389–400. [Google Scholar] [CrossRef]
- Pal, S.; Hitchens, M.; Varadharajan, V. Access control for Internet of Things—Enabled assistive technologies: An architecture, challenges and requirements. In Assistive Technology for the Elderly; Elsevier: Cambridge, MA, USA, 2020; pp. 1–43. [Google Scholar] [CrossRef]
- Park, J.; Kang, N. Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake. In Proceedings of the 2014 International Conference on Information and Communication Technology Convergence (ICTC), Busan, Republic of Korea, 22–24 October 2014; pp. 28–33. [Google Scholar] [CrossRef]
- Emerson, S.; Choi, Y.K.; Hwang, D.Y.; Kim, K.S.; Kim, K.H. An OAuth based authentication mechanism for IoT networks. In Proceedings of the 2015 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 28–30 October 2015; pp. 1072–1074. [Google Scholar] [CrossRef]
- Cirani, S.; Picone, M.; Gonizzi, P.; Veltri, L.; Ferrari, G. IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios. IEEE Sens. J. 2015, 15, 1224–1234. [Google Scholar] [CrossRef]
- Hummen, R.; Ziegeldorf, J.H.; Shafagh, H.; Raza, S.; Wehrle, K. Towards viable certificate-based authentication for the internet of things. In Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, Budapest, Hungary, 19 April 2013; HotWiSec ’13. pp. 37–42. [Google Scholar] [CrossRef]
- Moosavi, S.R.; Gia, T.N.; Rahmani, A.M.; Nigussie, E.; Virtanen, S.; Isoaho, J.; Tenhunen, H. SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput. Sci. 2015, 52, 452–459. [Google Scholar] [CrossRef]
- Gu, T.; Mohapatra, P. BF-IoT: Securing the IoT Networks via Fingerprinting-Based Device Authentication. In Proceedings of the 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Chengdu, China, 9–12 October 2018; pp. 254–262. [Google Scholar] [CrossRef]
- Yuan, B.; Yang, M.; Xu, Z.; Chen, Q.; Song, Z.; Li, Z.; Zou, D.; Jin, H. Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure. IEEE Trans. Dependable Secur. Comput. 2023, 21, 3196–3210. [Google Scholar] [CrossRef]
- Kim, K.; Han, Y.H.; Min, S.G. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks. Sensors 2017, 17, 2170. [Google Scholar] [CrossRef]
- Guo, S.; Wang, F.; Zhang, N.; Qi, F.; Qiu, X. Master-slave chain based trusted cross-domain authentication mechanism in IoT. J. Netw. Comput. Appl. 2020, 172, 102812. [Google Scholar] [CrossRef]
- Granjal, J.; Monteiro, E.; Silva, J.S. End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication. In Proceedings of the 2013 IFIP Networking Conference, Brooklyn, NY, USA, 22–24 May 2013; pp. 1–9. [Google Scholar]
- Park, J.; Kwon, H.; Kang, N. IoT—Cloud Collaboration to Establish a Secure Connection for Lightweight Devices. Wirel. Netw. 2017, 23, 681–692. [Google Scholar] [CrossRef]
- Fouladgar, S.; Afifi, H. A Simple Delegation Scheme for RFID Systems (SiDeS). In Proceedings of the 2007 IEEE International Conference on RFID, Grapevine, TX, USA, 26–28 March 2007; pp. 1–6. [Google Scholar] [CrossRef]
- Ouaddah, A.; Abou Elkalam, A.; Ait Ouahman, A. FairAccess: A new Blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 2016, 9, 5943–5964. [Google Scholar] [CrossRef]
- Xu, R.; Chen, Y.; Blasch, E.; Chen, G. BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT. Computers 2018, 7, 39. [Google Scholar] [CrossRef]
- Xu, R.; Chen, Y.; Blasch, E.; Chen, G. BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1027–1034. [Google Scholar] [CrossRef]
- Le, T.; Mutka, M.W. CapChain: A Privacy Preserving Access Control Framework Based on Blockchain for Pervasive Environments. In Proceedings of the 2018 IEEE International Conference on Smart Computing (SMARTCOMP), Taormina, Italy, 18–20 June 2018; pp. 57–64. [Google Scholar] [CrossRef]
- Choksy, P.; Chaurasia, A.; Rao, U.P.; Kumar, S. Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare. Peer-to-Peer Netw. Appl. 2023, 16, 1445–1467. [Google Scholar] [CrossRef]
- Yan, L.; Qin, H.; Yang, K.; Xie, H.; Wang, X.A.; Liu, S. Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing. Electronics 2024, 13, 534. [Google Scholar] [CrossRef]
- Zemmoudj, S.; Bermad, N.; Omar, M. CA-ADP: Context-Aware Authorization and Delegation Protocol for IoT-based healthcare smart systems. In Proceedings of the 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), Tunis, Tunisia, 20–22 December 2019; pp. 203–208. [Google Scholar] [CrossRef]
- Gusmeroli, S.; Piccione, S.; Rotondi, D. A capability-based security approach to manage access control in the Internet of Things. Math. Comput. Model. 2013, 58, 1189–1205. [Google Scholar] [CrossRef]
- Rabehaja, T.; Pal, S.; Hitchens, M. Design and implementation of a secure and flexible access-right delegation for resource constrained environments. Future Gener. Comput. Syst. 2019, 99, 593–608. [Google Scholar] [CrossRef]
- Hu, Q.; Zheng, G.; Jiang, T. Joint Content and Radio Access for the Internet of Things: A Smart-Contract-Based Trusted Framework. IEEE Internet Things J. 2022, 9, 18142–18152. [Google Scholar] [CrossRef]
- Agyekum, K.O.B.O.; Xia, Q.; Sifah, E.B.; Cobblah, C.N.A.; Xia, H.; Gao, J. A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain. IEEE Syst. J. 2022, 16, 1685–1696. [Google Scholar] [CrossRef]
- Andersen, M.P.; Kumar, S.; AbdelBaky, M.; Fierro, G.; Kolb, J.; Kim, H.S.; Culler, D.E.; Popa, R.A. WAVE: A Decentralized Authorization Framework with Transitive Delegation. In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA, 14–16 August 2019; pp. 1375–1392. [Google Scholar]
- Chung, S.H.; Kim, J.H.; Kim, Y. Pragmatic approach using OAuth mechanism for IoT device authorization in cloud. In Proceedings of the 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, 12–13 October 2018; pp. 1–4. [Google Scholar] [CrossRef]
- Mendy, G.; Ouya, S.; Dioum, I.; Thiaré, O. (Eds.) e-Infrastructure and e-Services for Developing Countries: 10th EAI International Conference, AFRICOMM 2018, Dakar, Senegal, 29–30 November 2019, Proceedings; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer International Publishing: Cham, Switzerland, 2019; Volume 275. [Google Scholar] [CrossRef]
- Chen, X.; Liu, Y.; Chao, H.C.; Li, Y. Ciphertext-Policy Hierarchical Attribute-Based Encryption Against Key-Delegation Abuse for IoT-Connected Healthcare System. IEEE Access 2020, 8, 86630–86650. [Google Scholar] [CrossRef]
- Alphand, O.; Amoretti, M.; Claeys, T.; Dall’Asta, S.; Duda, A.; Ferrari, G.; Rousseau, F.; Tourancheau, B.; Veltri, L.; Zanichelli, F. IoTChain: A blockchain security architecture for the Internet of Things. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Wei, L.; Wu, J.; Long, C.; Li, B. On Designing Context-Aware Trust Model and Service Delegation for Social Internet of Things. IEEE Internet Things J. 2021, 8, 4775–4787. [Google Scholar] [CrossRef]
- Zhang, J.; Yang, Y.; Liu, X.; Ma, J. An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things. IEEE Trans. Ind. Inform. 2022, 18, 7139–7150. [Google Scholar] [CrossRef]
- Hernández-Ramos, J.L.; Jara, A.J.; Marín, L.; Skarmeta Gómez, A.F. DCapBAC: Embedding authorization logic into smart things through ECC optimizations. Int. J. Comput. Math. 2016, 93, 345–366. [Google Scholar] [CrossRef]
- Li, W.; Jin, C.; Kumari, S.; Xiong, H.; Kumar, S. Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems. Trans. Emerg. Telecommun. Technol. 2020, 33, e3986. [Google Scholar] [CrossRef]
- Kumar, D.; Kumar, M. Attribute-Based Data Sharing in Smart Healthcare Environment. In Proceedings of the 2021 4th International Conference on Recent Trends in Computer Science and Technology (ICRTCST), Jamshedpur, India, 11–12 February 2022; pp. 150–157. [Google Scholar] [CrossRef]
- Touati, L.; Challal, Y.; Bouabdallah, A. C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things. In Proceedings of the 2014 International Conference on Advanced Networking Distributed Systems and Applications, Bejaia, Algeria, 17–19 June 2014; pp. 64–69. [Google Scholar] [CrossRef]
- Lakkundi, V.; Singh, K. Lightweight DTLS implementation in CoAP-based Internet of Things. In Proceedings of the 20th Annual International Conference on Advanced Computing and Communications (ADCOM), Bangalore, India, 19–22 September 2014; pp. 7–11. [Google Scholar] [CrossRef]
- Hsieh, H.C.; Chang, K.D.; Wang, L.F.; Chen, J.L.; Chao, H.C. ScriptIoT: A Script Framework for and Internet-of-Things Applications. IEEE Internet Things J. 2016, 3, 628–636. [Google Scholar] [CrossRef]
- Al-Osta, M.; Bali, A.; Gherbi, A. Event driven and semantic based approach for data processing on IoT gateway devices. J. Ambient Intell. Humaniz. Comput. 2019, 10, 4663–4678. [Google Scholar] [CrossRef]
- Hamadi, R.; Khanfor, A.; Ghazzai, H.; Massoud, Y. A Hybrid Artificial Neural Network for Task Offloading in Mobile Edge Computing. In Proceedings of the 2022 IEEE 65th International Midwest Symposium on Circuits and Systems (MWSCAS), Fukuoka, Japan, 7–10 August 2022; pp. 1–4. [Google Scholar] [CrossRef]
- Li, C.; Chen, R.; Wang, Y.; Xing, Q.; Wang, B. REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT. IEEE Trans. Dependable Secur. Comput. 2024, 21, 4526–4542. [Google Scholar] [CrossRef]
- Shin, Y.A.; Jeong, I.R.; Byun, J.W. Identity-Based Multiproxy Signature with Proxy Signing Key for Internet of Drones. IEEE Internet Things J. 2024, 11, 4191–4205. [Google Scholar] [CrossRef]
- Hu, Y.; Niu, S.; Shao, H. Attribute-based searchable encryption with delegated equality test in cloud-assisted Internet of Things. In Proceedings of the 2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT), Sanya, China, 23–25 December 2022; pp. 328–333. [Google Scholar] [CrossRef]
- Saguil, D.; Azim, A. A Layer-Partitioning Approach for Faster Execution of Neural Network-Based Embedded Applications in Edge Networks. IEEE Access 2020, 8, 59456–59469. [Google Scholar] [CrossRef]
- Xu, K.; Wan, Y.; Xue, G. Powering Smart Homes with Information-Centric Networking. IEEE Commun. Mag. 2019, 57, 40–46. [Google Scholar] [CrossRef]
- Bali, A.; Al-Osta, M.; Abdelouahed, G. An Ontology-Based Approach for IoT Data Processing Using Semantic Rules. In SDL 2017: Model-Driven Engineering for Future Internet; Lecture Notes in Computer Science; Csöndes, T., Kovács, G., Réthy, G., Eds.; Springer International Publishing: Cham, Switzerland, 2017; Volume 10567, pp. 61–79. [Google Scholar] [CrossRef]
- Zhao, Z.; Guo, F.; Wu, G.; Susilo, W.; Wang, B. Secure Infectious Diseases Detection System with IoT-Based e-Health Platforms. IEEE Internet Things J. 2022, 9, 22595–22607. [Google Scholar] [CrossRef]
- Mahamuni, N.; Nikam, H.; Pattewar, G.; Loka, O.; Patil, R. Management of IoT Devices Data Security Using Blockchain and Proxy Re-encryption Algorithm. In Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems; Al-Sharafi, M.A., Al-Emran, M., Al-Kabi, M.N., Shaalan, K., Eds.; Springer International Publishing: Cham, Switzerland, 2023; pp. 551–558. [Google Scholar]
- Schnicke, F.; Haque, A.; Kuhn, T.; Espen, D.; Antonino, P.O. Architecture Blueprints to Enable Scalable Vertical Integration of Assets with Digital Twins. In Proceedings of the 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), Stuttgart, Germany, 6–9 September 2022; pp. 1–8. [Google Scholar] [CrossRef]
- Raza, S.; Seitz, L.; Sitenkov, D.; Selander, G. S3K: Scalable Security with Symmetric Keys—DTLS Key Establishment for the Internet of Things. IEEE Trans. Autom. Sci. Eng. 2016, 13, 1270–1280. [Google Scholar] [CrossRef]
- Albalawi, U.; Joshi, S. Secure and trusted telemedicine in Internet of Things IoT. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018; pp. 30–34. [Google Scholar] [CrossRef]
- Kumar, S.; Hu, Y.; Andersen, M.P.; Popa, R.A.; Culler, D.E. JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT. In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA, 14–16 August 2019; pp. 1519–1536. [Google Scholar]
- Li, X.; Li, R.; Bai, B.; Zhao, Y.; Liu, G.; Li, R. Outsourcing the Computation of Plaintext Encryption for Homomorphic Encryption. In Proceedings of the 2023 8th International Conference on Computer and Communication Systems (ICCCS), Guangzhou, China, 21–24 April 2023; pp. 408–413. [Google Scholar] [CrossRef]
- Jin, Y.; Lee, H. On-Demand Computation Offloading Architecture in Fog Networks. Electronics 2019, 8, 1076. [Google Scholar] [CrossRef]
- Porambage, P.; Braeken, A.; Kumar, P.; Gurtov, A.; Ylianttila, M. CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things. Wirel. Pers. Commun. 2017, 96, 421–440. [Google Scholar] [CrossRef]
- Ben Saied, Y.; Olivereau, A. HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things. In Proceedings of the Third International Conference on Communications and Networking, Hammamet, Tunisia, 29 March–1 April 2012; pp. 1–8. [Google Scholar] [CrossRef]
- Denis, M.; Johansen, C.; Jøsang, A. Offline Trusted Device and Proxy Architecture Based on a new TLS Switching Technique. In Proceedings of the 2017 International Workshop on Secure Internet of Things (SIoT), Oslo, Norway, 15 September 2017; pp. 10–19. [Google Scholar] [CrossRef]
- Anggorojati, B.; Mahalle, P.N.; Prasad, N.R.; Prasad, R. Capability-based access control delegation model on the federated IoT network. In Proceedings of the The 15th International Symposium on Wireless Personal Multimedia Communications, Taipei, Taiwan, 24–27 September 2012; pp. 604–608. [Google Scholar]
- Venkatesan, S.; Rajeshwari, K.R.; Ramakrishnan, M. A Lightweight Searchable Encryption and Delegation Mechanism with Forward Privacy for Improving the Security of Industrial Internet of Things-Cloud Systems. Res. Sq. 2022, preprint. [Google Scholar] [CrossRef]
- Li, H.; Kong, F.; Yu, J.; Zhang, H.; Diao, L.; Tao, Y. Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT. In Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, 9–11 December 2022; pp. 556–564. [Google Scholar] [CrossRef]
- Julku, J.; Suomalainen, J.; Kylanpaa, M. Delegated Device Attestation for IoT. In Proceedings of the 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Gandia, Spain, 6–9 December 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Sciarretta, G.; Carbone, R.; Ranise, S. A delegated authorization solution for smart-city mobile applications. In Proceedings of the 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), Bologna, Italy, 7–9 September 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Kuusijarvi, J. Mitigating loT Security Threats with a Trusted Network Element. In Proceedings of the The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, UK, 8–10 December 2014. [Google Scholar]
- Beltran, V.; Skarmeta, A.F. An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE). In Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 706–710. [Google Scholar] [CrossRef]
- Hummen, R.; Shafagh, H.; Raza, S.; Voig, T.; Wehrle, K. Delegation-based authentication and authorization for the IP-based Internet of Things. In Proceedings of the 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Singapore, 30 June–3 July 2014; pp. 284–292. [Google Scholar] [CrossRef]
- Kang, N.; Park, J.; Kwon, H.; Jung, S. ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2015, 11, 393754. [Google Scholar] [CrossRef]
- Van den Abeele, F.; Moerman, I.; Demeester, P.; Hoebeke, J. Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things. Sensors 2017, 17, 1609. [Google Scholar] [CrossRef]
- Atlam, H.F.; Alenezi, A.; Hussein, R.K.; Wills, G.B. Validation of an Adaptive Risk-based Access Control Model for the Internet of Things. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 2018, 10, 26–35. [Google Scholar] [CrossRef]
- Luo, X.; Yin, L.; Li, C.; Wang, C.; Fang, F.; Zhu, C.; Tian, Z. A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment. IEEE Access 2020, 8, 67192–67204. [Google Scholar] [CrossRef]
- Lee, J.; Oh, J.; Kwon, D.; Kim, M.; Kim, K.; Park, Y. Blockchain-Enabled Key Aggregate Searchable Encryption Scheme for Personal Health Record Sharing with Multi-Delegation. IEEE Internet Things J. 2024, 11, 17482–17494. [Google Scholar] [CrossRef]
- Dunnett, K.; Pal, S.; Jadidi, Z.; Jurdak, R. A Blockchain-Based Framework for Scalable and Trustless Delegation of Cyber Threat Intelligence. In Proceedings of the 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Dubai, United Arab Emirates, 1–5 May 2023; pp. 1–9. [Google Scholar] [CrossRef]
- Bounaira, S.; Alioua, A.; Souici, I. Blockchain-enabled trust management for secure content caching in mobile edge computing using deep reinforcement learning. Internet Things 2024, 25, 101081. [Google Scholar] [CrossRef]
- Kitchenham, B.; Brereton, O.P.; Budgen, D.; Turner, M.; Bailey, J.; Linkman, S. Systematic literature reviews in software engineering—A systematic literature review. Inf. Softw. Technol. 2009, 51, 7–15. [Google Scholar] [CrossRef]
- Wohlin, C.; Prikladniki, R. Systematic literature reviews in software engineering. Inf. Softw. Technol. 2013, 55, 919–920. [Google Scholar] [CrossRef]
- Seitz, L.; Selander, G.; Gehrmann, C. Authorization framework for the Internet-of-Things. In Proceedings of the 2013 IEEE 14th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Madrid, Spain, 4–7 June 2013; pp. 1–6. [Google Scholar] [CrossRef]
- Bandara, S.; Yashiro, T.; Koshizuka, N.; Sakamura, K. Access control framework for API-enabled devices in smart buildings. In Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), Yogyakarta, Indonesia, 25–27 August 2016; pp. 210–217. [Google Scholar] [CrossRef]
- Kum, S.W.; Kang, M.; Park, J.I. IoT Delegate: Smart Home Framework for Heterogeneous IoT Service Collaboration. KSII Trans. Internet Inf. Syst. 2016, 10, 3958–3971. [Google Scholar]
- Bernal Bernabe, J.; Hernandez Ramos, J.L.; Skarmeta Gomez, A.F. TACIoT: Multidimensional trust-aware access control system for the Internet of Things. Soft Comput. 2016, 20, 1763–1779. [Google Scholar] [CrossRef]
- Hussein, D.; Bertin, E.; Frey, V. A Community-Driven Access Control Approach in Distributed IoT Environments. IEEE Commun. Mag. 2017, 55, 146–153. [Google Scholar] [CrossRef]
- Dao, N.N.; Kim, Y.; Jeong, S.; Park, M.; Cho, S. Achievable Multi-Security Levels for Lightweight IoT-Enabled Devices in Infrastructureless Peer-Aware Communications. IEEE Access 2017, 5, 26743–26753. [Google Scholar] [CrossRef]
- Beltran, V.; Martinez, J.A.; Skarmeta, A.F. User-centric access control for efficient security in smart cities. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland, 6–9 June 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Chien, H.Y. Group-Oriented Range-Bound Key Agreement for Internet of Things Scenarios. IEEE Internet Things J. 2018, 5, 1890–1903. [Google Scholar] [CrossRef]
- Zhou, Q.; Elbadry, M.; Ye, F.; Yang, Y. Heracles: Scalable, Fine-Grained Access Control for Internet-of-Things in Enterprise Environments. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 15–19 April 2018; pp. 1772–1780. [Google Scholar] [CrossRef]
- Behrad, S.; Bertin, E.; Tuffin, S.; Crespi, N. 5G-SSAAC: Slice-specific Authentication and Access Control in 5G. In Proceedings of the 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France, 24–28 June 2019; pp. 281–285. [Google Scholar] [CrossRef]
- Al-Aqrabi, H.; Johnson, A.P.; Hill, R. Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things. In Proceedings of the 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Leicester, UK, 19–23 August 2019; pp. 21–28. [Google Scholar] [CrossRef]
- Lagutin, D.; Kortesniemi, Y.; Fotiou, N.; Siris, V. Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation. In Proceedings of the Workshop on Decentralized IoT Systems and Security, London, UK, 15 November 2019. [Google Scholar] [CrossRef]
- Behrad, S.; Bertin, E.; Tuffin, S.; Crespi, N. A new scalable authentication and access control mechanism for 5G-based IoT. Future Gener. Comput. Syst. 2020, 108, 46–61. [Google Scholar] [CrossRef]
- Xu, H.; He, Q.; Li, X.; Jiang, B.; Qin, K. BDSS-FA: A Blockchain-Based Data Security Sharing Platform with Fine-Grained Access Control. IEEE Access 2020, 8, 87552–87561. [Google Scholar] [CrossRef]
- Hang, L.; Kim, D.H. Reliable Task Management Based on a Smart Contract for Runtime Verification of Sensing and Actuating Tasks in IoT Environments. Sensors 2020, 20, 1207. [Google Scholar] [CrossRef]
- Lin, C.A.; Liao, C.F. User-Managed Access Delegation for Blockchain-driven IoT Services. In Proceedings of the 2020 International Computer Symposium (ICS), Tainan, Taiwan, 17–19 December 2020; pp. 462–467. [Google Scholar] [CrossRef]
- Abdel-Malek, M.A.; Akkaya, K.; Bhuyan, A.; Ibrahim, A.S. A Proxy Signature-Based Swarm Drone Authentication with Leader Selection in 5G Networks. IEEE Access 2022, 10, 57485–57498. [Google Scholar] [CrossRef]
- Goyal, G.; Liu, P.; Sural, S. Securing Smart Home IoT Systems with Attribute-Based Access Control. In Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Baltimore, MD, USA, 25–27 April 2022; pp. 37–46. [Google Scholar] [CrossRef]
- Jiang, W.; Lin, Z.; Tao, J. An access control scheme for distributed Internet of Things based on adaptive trust evaluation and blockchain. High-Confid. Comput. 2023, 3, 100104. [Google Scholar] [CrossRef]
- Tegane, S.; Semchedine, F.; Boudries, A. An extended Attribute-based access control with controlled delegation in IoT. J. Inf. Secur. Appl. 2023, 76, 103473. [Google Scholar] [CrossRef]
- Alshehri, S.; Bamasaq, O.; Alghazzawi, D.; Jamjoom, A. Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment. IEEE Internet Things J. 2023, 10, 4239–4256. [Google Scholar] [CrossRef]
- Pittaras, I.; Polyzos, G.C. Multi-tenant, Decentralized Access Control for the Internet of Things. In Proceedings of the 2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), Bali, Indonesia, 28–30 November 2023; pp. 28–34. [Google Scholar] [CrossRef]
- Vattaparambil Sudarsan, S.; Schelén, O.; Bodin, U. Multilevel Subgranting by Power of Attorney and OAuth Authorization Server in Cyber–Physical Systems. IEEE Internet Things J. 2023, 10, 15266–15282. [Google Scholar] [CrossRef]
- Chen, D.; Zhang, L.; Liao, Z.; Dai, H.N.; Zhang, N.; Shen, X.; Pang, M. Flexible and Fine-Grained Access Control for EHR in Blockchain-Assisted E-Healthcare Systems. IEEE Internet Things J. 2024, 11, 10992–11007. [Google Scholar] [CrossRef]
- Sun, J.; Bao, Y.; Qiu, W.; Lu, R.; Zhang, S.; Guan, Y.; Cheng, X. Privacy-Preserving Fine-Grained Data Sharing with Dynamic Service for the Cloud-Edge IoT. IEEE Trans. Dependable Secur. Comput. 2025, 22, 1329–1346. [Google Scholar] [CrossRef]
- Hernandez-Ramos, J.L.; Pawlowski, M.P.; Jara, A.J.; Skarmeta, A.F.; Ladid, L. Toward a Lightweight Authentication and Authorization Framework for Smart Objects. IEEE J. Sel. Areas Commun. 2015, 33, 690–702. [Google Scholar] [CrossRef]
- Kim, D.Y.; Min, S.D.; Kim, S. A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services. Comput. Mater. Contin. 2019, 58, 1–14. [Google Scholar] [CrossRef]
- Morales, A.; Robles, T.; Alcarria, R.; Cedeño, E. A Hot-topic based Distribution and Notification of Events in Pub/Sub Mobile Brokers. Netw. Protoc. Algorithms 2013, 5, 90–110. [Google Scholar] [CrossRef]
- Hernández-Ramos, J.; Jara, A.J.; Marin, L.; Skarmeta, A. Distributed Capability-based Access Control for the Internet of Things. J. Internet Serv. Inf. Secur. (JISIS) 2013, 3, 1–16. [Google Scholar]
- Outchakoucht, A.; Es-Samaali, H.; Philippe, J. Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 417–424. [Google Scholar] [CrossRef]
- Yang, L.; Zheng, Q.; Fan, X. RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. In Proceedings of the IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar] [CrossRef]
- Ko, H.; Jin, J.; Keoh, S.L. ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability. In Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, Abu Dhabi, United Arab Emirates, 2 April 2017; pp. 69–80. [Google Scholar] [CrossRef]
- Tapas, N.; Merlino, G.; Longo, F. Blockchain-Based IoT-Cloud Authorization and Delegation. In Proceedings of the 2018 IEEE International Conference on Smart Computing (SMARTCOMP), Taormina, Sicily, Italy, 18–20 June 2018; pp. 411–416. [Google Scholar] [CrossRef]
- Sabrina, F. A Novel Entitlement-based Blockchain-enabled Security Architecture for IoT. In Proceedings of the 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Auckland, New Zealand, 27–29 November 2019; pp. 1–7. [Google Scholar] [CrossRef]
- Porwal, S.; Mittal, S. A Secure Key Delegation Mechanism for Fog Networking. In Proceedings of the 2019 Twelfth International Conference on Contemporary Computing (IC3), Noida, India, 8–10 August 2019; pp. 1–7. [Google Scholar] [CrossRef]
- Sun, S.; Chen, S.; Du, R.; Li, W.; Qi, D. Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy. In Proceedings of the 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC), Hangzhou, China, 23–25 June 2019; pp. 598–603. [Google Scholar] [CrossRef]
- Ali, G.; Ahmad, N.; Cao, Y.; Asif, M.; Cruickshank, H.; Ali, Q.E. Blockchain based permission delegation and access control in Internet of Things (BACI). Comput. Secur. 2019, 86, 318–334. [Google Scholar] [CrossRef]
- Zemmoudj, S.; Bermad, N.; Omar, M. Context-aware pseudonymization and authorization model for IoT-based smart hospitals. J. Ambient Intell. Humaniz. Comput. 2019, 10, 4473–4490. [Google Scholar] [CrossRef]
- Pinjala, S.K.; Sivalingam, K.M. DCACI: A Decentralized Lightweight Capability Based Access Control Framework using IOTA for Internet of Things. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 13–18. [Google Scholar] [CrossRef]
- Xu, L.; Li, J.; Chen, X.; Li, W.; Tang, S.; Wu, H.T. Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things. J. Netw. Comput. Appl. 2019, 128, 11–20. [Google Scholar] [CrossRef]
- Deng, H.; Qin, Z.; Sha, L.; Yin, H. A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT. IEEE Internet Things J. 2020, 7, 11601–11611. [Google Scholar] [CrossRef]
- Nakamura, Y.; Zhang, Y.; Sasabe, M.; Kasahara, S. Exploiting Smart Contracts for Capability-Based Access Control in the Internet of Things. Sensors 2020, 20, 1793. [Google Scholar] [CrossRef]
- Pal, S.; Rabehaja, T.; Hill, A.; Hitchens, M.; Varadharajan, V. On the Integration of Blockchain to the Internet of Things for Enabling Access Right Delegation. IEEE Internet Things J. 2020, 7, 2630–2639. [Google Scholar] [CrossRef]
- Puggioni, E.; Shaghaghi, A.; Doss, R.; Kanhere, S.S. Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs. In Proceedings of the 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 24–27 November 2020; pp. 1–10. [Google Scholar] [CrossRef]
- Ali, G.; Ahmad, N.; Cao, Y.; Khan, S.; Cruickshank, H.; Qazi, E.A.; Ali, A. xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things. IEEE Access 2020, 8, 58800–58816. [Google Scholar] [CrossRef]
- Zhou, X.; Xu, K.; Wang, N.; Jiao, J.; Dong, N.; Han, M.; Xu, H. A Secure and Privacy-Preserving Machine Learning Model Sharing Scheme for Edge-Enabled IoT. IEEE Access 2021, 9, 17256–17265. [Google Scholar] [CrossRef]
- Zhao, J.; Zeng, P.; Choo, K.K.R. An Efficient Access Control Scheme with Outsourcing and Attribute Revocation for Fog-Enabled E-Health. IEEE Access 2021, 9, 13789–13799. [Google Scholar] [CrossRef]
- Zhang, Y.; Liu, W.; Xia, Z.; Wang, Z.; Liu, L.; Zhang, W.; Zhang, H.; Fang, B. Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things. Wirel. Commun. Mob. Comput. 2021, 2021, 6620236. [Google Scholar] [CrossRef]
- Ullah, I.; Alkhalifah, A.; Khan, M.A.; Mostafa, S.M. Cost-Effective Proxy Signcryption Scheme for Internet of Things. Mob. Inf. Syst. 2021, 2021, 2427434. [Google Scholar] [CrossRef]
- Sabrina, F.; Jang-Jaccard, J. Entitlement-Based Access Control for Smart Cities Using Blockchain. Sensors 2021, 21, 5264. [Google Scholar] [CrossRef] [PubMed]
- Skarlat, O.; Schulte, S. FogFrame: A framework for IoT application execution in the fog. PeerJ Comput. Sci. 2021, 7, e588. [Google Scholar] [CrossRef]
- Lastname, F.; Lastname, F.; Lastname, F. A Bidirectional Trust Model for Service Delegation in Social Internet of Things. Future Internet 2022, 14, 135. [Google Scholar] [CrossRef]
- Chien, H.Y.; Wang, N.Z. A Novel MQTT 5.0-Based Over-the-Air Updating Architecture Facilitating Stronger Security. Electronics 2022, 11, 3899. [Google Scholar] [CrossRef]
- Cha, H.J.; Yang, H.K.; Song, Y.J. A Study on Vehicle Monitoring Service Using Attribute-Based Security Scheme in Cyber–Physical Systems. Appl. Sci. 2022, 12, 4300. [Google Scholar] [CrossRef]
- Li, C.; Li, F.; Huang, C.; Yin, L.; Luo, T.; Wang, B. A Traceable Capability-based Access Control for IoT. Comput. Mater. Contin. 2022, 72, 4967–4982. [Google Scholar] [CrossRef]
- Ali, A.; Almaiah, M.A.; Hajjej, F.; Pasha, M.F.; Fang, O.H.; Khan, R.; Teo, J.; Zakarya, M. An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. Sensors 2022, 22, 572. [Google Scholar] [CrossRef]
- Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T. BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots. In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, New York, NY, USA, 8–10 June 2022; pp. 185–194. [Google Scholar] [CrossRef]
- Xiong, H.; Wang, L.; Zhou, Z.; Zhao, Z.; Huang, X.; Kumari, S. Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message. IEEE Internet Things J. 2022, 9, 11248–11260. [Google Scholar] [CrossRef]
- Latif, R. ConTrust: A Novel Context-Dependent Trust Management Model in Social Internet of Things. IEEE Access 2022, 10, 46526–46537. [Google Scholar] [CrossRef]
- Xue, L. DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System. IEEE Access 2022, 10, 30779–30791. [Google Scholar] [CrossRef]
- Pinjala, S.K.; Vivek, S.S.; Sivalingam, K.M. Delegated Anonymous Credentials with Revocation Capability for IoT Service Chains (DANCIS). IEEE Internet Things J. 2022, 9, 3729–3742. [Google Scholar] [CrossRef]
- Silva, C.; Barraca, J.P. Dynamic Delegation-based Privacy Preserving in IoT Architectures. In Proceedings of the 2022 9th International Conference on Future Internet of Things and Cloud (FiCloud), Rome, Italy, 22–24 August 2022; pp. 46–54. [Google Scholar] [CrossRef]
- Banerjee, A.; Sufian, A.; Paul, K.K.; Gupta, S.K. EDTP: Energy and Delay Optimized Trajectory Planning for UAV-IoT Environment. Comput. Netw. 2022, 202, 108623. [Google Scholar] [CrossRef]
- Qushtom, H.; Misic, J.; Misic, V.B. Efficient multi-tier, multiple entry PBFT consensus algorithm for IoT. In Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 44–49. [Google Scholar] [CrossRef]
- Heo, J.; Jang, H.; Lee, H. How to divide a permission token in the delegation process of blockchain-based access control for IoT. In Proceedings of the 2022 IEEE International Systems Conference (SysCon), Montreal, QC, Canada, 25–28 April 2022; pp. 1–8. [Google Scholar] [CrossRef]
- Ju, C.; Tang, W.; Chenli, C.; Lee, G.; Seo, J.H.; Jung, T. Monitoring Provenance of Delegated Personal Data with Blockchain. In Proceedings of the 2022 IEEE International Conference on Blockchain (Blockchain), Espoo, Finland, 22–25 August 2022; pp. 11–20. [Google Scholar] [CrossRef]
- Panneerselvam, N.; Krithiga, S. Mutual-contained access delegation scheme for the Internet of Things user services. Distrib. Parallel Databases 2022, 40, 835–860. [Google Scholar] [CrossRef]
- Wang, J.; Chow, S.S.M. Omnes pro uno: Practical Multi-Writer Encrypted Database. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 2371–2388. [Google Scholar]
- Sama, M.R.; Kiess, W.; Guerzoni, R.; Thakolsri, S.; Jurjens, J. Redefining the Trust Model for the Internet of Everything in the 6G era. In Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Kyoto, Japan, 12–15 September 2022; pp. 1400–1406. [Google Scholar] [CrossRef]
- Shur, D.; Di Crescenzo, G.; Zhang, Q.; Chen, T.; Krishnan, R.; Lin, Y.J.; Patni, Z.; Alexander, S.; Tsudik, G. SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security. In Proceedings of the 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA, 10–13 April 2022; pp. 49–54. [Google Scholar] [CrossRef]
- Tanyingyong, V.; Olsson, R.; Hidell, M.; Sjodin, P. Scalable IoT Sensing Systems with Dynamic Sinks. IEEE Internet Things J. 2022, 9, 7211–7227. [Google Scholar] [CrossRef]
- Goh, Y.; Yun, J.; Jung, D.; Chung, J.M. Secure Trust-Based Delegated Consensus for Blockchain Frameworks Using Deep Reinforcement Learning. IEEE Access 2022, 10, 118498–118511. [Google Scholar] [CrossRef]
- Qiao, Z.; Zhou, Y.; Yang, B.; Zhang, M.; Wang, T.; Xia, Z. Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things. IEEE Syst. J. 2022, 16, 4719–4730. [Google Scholar] [CrossRef]
- Rios, E.; Higuero, M.; Larrucea, X.; Rak, M.; Casola, V.; Iturbe, E. Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls. Comput. Electr. Eng. 2022, 98, 107690. [Google Scholar] [CrossRef]
- Wanniarachchi, S.T.; Turau, V. A Fault-Tolerant Distributed Air-to-Ground Communication Architecture for Urban Air Mobility. In Proceedings of the 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Pafos, Cyprus, 19–21 June 2023; pp. 639–646. [Google Scholar] [CrossRef]
- Wang, C.; Wu, B. A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things. Comput. Model. Eng. Sci. 2023, 136, 1857–1878. [Google Scholar] [CrossRef]
- Alharbi, A. Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System. Sensors 2023, 23, 3020. [Google Scholar] [CrossRef] [PubMed]
- Malhotra, A. Blend CAC: Integration for the Blockchain for Distributed Potential Network Access for the Internet of Things. In Proceedings of the 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Greater Noida, India, 27–29 January 2023; pp. 1145–1149. [Google Scholar] [CrossRef]
- Lu, Y.; Wang, D.; Obaidat, M.S.; Vijayakumar, P. Edge-Assisted Intelligent Device Authentication in Cyber–Physical Systems. IEEE Internet Things J. 2023, 10, 3057–3070. [Google Scholar] [CrossRef]
- Trivedi, H.S.; Patel, S.J. Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems. Trans. Emerg. Telecommun. Technol. 2023, 34, e4734. [Google Scholar] [CrossRef]
- Sahraoui, S.; Henni, N. SAMP-RPL: Secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks. J. Ambient Intell. Humaniz. Comput. 2023, 14, 409–429. [Google Scholar] [CrossRef]
- Hamad, M.; Finkenzeller, A.; Liu, H.; Lauinger, J.; Prevelakis, V.; Steinhorst, S. SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation. IEEE Internet Things J. 2023, 10, 3384–3406. [Google Scholar] [CrossRef]
- Seifhosseini, S.; Hosseini Shirvani, M.; Ramzanpoor, Y. Multi-objective cost-aware bag-of-tasks scheduling optimization model for IoT applications running on heterogeneous fog environment. Comput. Netw. 2024, 240, 110161. [Google Scholar] [CrossRef]
- Fan, X.; Chai, Q. Roll-DPoS: A Randomized Delegated Proof of Stake Scheme for Scalable Blockchain-Based Internet of Things Systems. In Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, New York, NY, USA, 5–7 November 2018; pp. 482–484. [Google Scholar] [CrossRef]
- Maselli, G.; Piva, M.; Restuccia, F. HyBloSE: Hybrid blockchain for secure-by-design smart environments. In Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, London UK, 25 September 2020; pp. 23–28. [Google Scholar] [CrossRef]
- Vairagade, R.S.; Brahmananda, S.H. Enabling machine learning-based side-chaining for improving QoS in blockchain-powered IoT networks. Trans. Emerg. Telecommun. Technol. 2021, 33, e4433. [Google Scholar] [CrossRef]
- Wang, Y.; Che, T.; Zhao, X.; Zhou, T.; Zhang, K.; Hu, X. A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things. Sensors 2022, 22, 3426. [Google Scholar] [CrossRef]
- Huang, X.; Zhang, Y.; Li, D.; Han, L. A Solution for Bilayer Energy-Trading Management in Microgrids Using Multiblockchain. IEEE Internet Things J. 2022, 9, 13886–13900. [Google Scholar] [CrossRef]
- Ahmed, I.; Zhang, Y.; Jeon, G.; Lin, W.; Khosravi, M.R.; Qi, L. A blockchain- and artificial intelligence-enabled smart IoT framework for sustainable city. Int. J. Intell. Syst. 2022, 37, 6493–6507. [Google Scholar] [CrossRef]
- Wang, P.; Zhao, Y.; Obaidat, M.S.; Wei, Z.; Qi, H.; Lin, C.; Xiao, Y.; Zhang, Q. Blockchain-Enhanced Federated Learning Market with Social Internet of Things. IEEE J. Sel. Areas Commun. 2022, 40, 3405–3421. [Google Scholar] [CrossRef]
- Wang, H.; Jiang, H.; Wu, J.; Zhou, P.; Huang, H. Blockchain-Governed Federated Transfer Learning for Secure Internet of Drones Networks. IEEE Internet Things Mag. 2022, 5, 134–139. [Google Scholar] [CrossRef]
- Zhi, H.; Ge, H.; Wang, Y. Cooperative Communication Method Based on Block Chain for a Large Number of Distributed Terminals. IEEE Access 2022, 10, 11679–11695. [Google Scholar] [CrossRef]
- Kaur, M.; Gupta, S.; Kumar, D.; Verma, C.; Neagu, B.C.; Raboaca, M.S. Delegated Proof of Accessibility (DPoAC): A Novel Consensus Protocol for Blockchain Systems. Mathematics 2022, 10, 2336. [Google Scholar] [CrossRef]
- Geng, T.; Njilla, L.; Huang, C.T. Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment. Network 2022, 2, 66–80. [Google Scholar] [CrossRef]
- Misic, J.; Misic, V.B.; Chang, X. Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting. In Proceedings of the GLOBECOM 2022—2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 6253–6258. [Google Scholar] [CrossRef]
- Yang, L.; Zou, W.; Wang, J.; Tang, Z. EdgeShare: A blockchain-based edge data-sharing framework for Industrial Internet of Things. Neurocomputing 2022, 485, 219–232. [Google Scholar] [CrossRef]
- Ledwaba, L.P.; Hancke, G.P.; Isaac, S.J. Investigating Distance Bounding for Delegated Proof-of-Proximity Consensus within IIoT. In Proceedings of the 2022 IEEE 31st International Symposium on Industrial Electronics (ISIE), Anchorage, AK, USA, 1–3 June 2022; pp. 627–630. [Google Scholar] [CrossRef]
- Hu, D.; Chen, J.; Zhou, H.; Yu, K.; Qian, B.; Xu, W. Leveraging Blockchain for Multi-Operator Access Sharing Management in Internet of Vehicles. IEEE Trans. Veh. Technol. 2022, 71, 2774–2787. [Google Scholar] [CrossRef]
- Bachani, V.; Bhattacharjya, A. Preferential Delegated Proof of Stake (PDPoS)—Modified DPoS with Two Layers towards Scalability and Higher TPS. Symmetry 2022, 15, 4. [Google Scholar] [CrossRef]
- Cui, J.; Ouyang, F.; Ying, Z.; Wei, L.; Zhong, H. Secure and Efficient Data Sharing Among Vehicles Based on Consortium Blockchain. IEEE Trans. Intell. Transp. Syst. 2022, 23, 8857–8867. [Google Scholar] [CrossRef]
- Sasikumar, A.; Ravi, L.; Kotecha, K.; Saini, J.R.; Varadarajan, V.; Subramaniyaswamy, V. Sustainable Smart Industry: A Secure and Energy Efficient Consensus Mechanism for Artificial Intelligence Enabled Industrial Internet of Things. Comput. Intell. Neurosci. 2022, 2022, 1419360. [Google Scholar] [CrossRef]
- Wang, Y.; Su, Z.; Xu, Q.; Li, R.; Luan, T.H.; Wang, P. A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue. IEEE/ACM Trans. Netw. 2023, 31, 2422–2438. [Google Scholar] [CrossRef]
- Namasudra, S.; Sharma, P. Achieving a Decentralized and Secure Cab Sharing System Using Blockchain Technology. IEEE Trans. Intell. Transp. Syst. 2023, 24, 15568–15577. [Google Scholar] [CrossRef]
- Zhao, J.; Hu, H.; Huang, F.; Guo, Y.; Liao, L. Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios. Electronics 2023, 12, 1812. [Google Scholar] [CrossRef]
- Wang, J.; Lin, X.; Wu, Y.; Wu, J. Blockchain-Enabled Lightweight Fine-Grained Searchable Knowledge Sharing for Intelligent IoT. IEEE Internet Things J. 2023, 10, 21566–21579. [Google Scholar] [CrossRef]
- Razaque, A.; Yoo, J.; Bektemyssova, G.; Alshammari, M.; Chinibayeva, T.T.; Amanzholova, S.; Alotaibi, A.; Umutkulov, D. Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology. Sensors 2023, 23, 9690. [Google Scholar] [CrossRef]
- Alghamdi, S.; Albeshri, A.; Alhusayni, A. Enabling a Secure IoT Environment Using a Blockchain-Based Local-Global Consensus Manager. Electronics 2023, 12, 3721. [Google Scholar] [CrossRef]
- Cullen, A.; Zhao, L.; Vigneri, L.; Shorten, R. Improving Quality of Service for Users of Leaderless DAG-Based Distributed Ledgers. Distrib. Ledger Technol. Res. Pract. 2023, 2, 1–18. [Google Scholar] [CrossRef]
- Qi, L.; Tian, J.; Chai, M.; Cai, H. LightPoW: A trust based time-constrained PoW for blockchain in Internet of Things. Comput. Netw. 2023, 220, 109480. [Google Scholar] [CrossRef]
- Kaur, M.; Gupta, S. Optimization of a Consensus Protocol in Blockchain-IoT Convergence. In Proceedings of the 2023 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 1–3 March 2023; pp. 1–5. [Google Scholar]
- Yang, F.; Xu, F.; Feng, T.; Qiu, C.; Zhao, C. pDPoSt+sPBFT: A High Performance Blockchain-Assisted Parallel Reinforcement Learning in Industrial Edge-Cloud Collaborative Network. IEEE Trans. Netw. Serv. Manag. 2023, 20, 2744–2759. [Google Scholar] [CrossRef]
- Mingjie Zhao, M.Z.; Mingjie Zhao, C.D.; Cheng Dai, B.G. Safe and Efficient Delegated Proof of Stake Consensus Mechanism Based on Dynamic Credit in Electronic Transaction. J. Internet Technol. 2023, 24, 123–133. [Google Scholar] [CrossRef]
- Wang, L.; Zheng, Y.; Zhang, Y.; Li, F. Secure Spectrum Sharing for Satellite Internet-of-Things Based on Blockchain. Wirel. Pers. Commun. 2023, 131, 357–369. [Google Scholar] [CrossRef]
- Xiao, N.; Wang, Z.; Sun, X.; Miao, J. A novel blockchain-based digital forensics framework for preserving evidence and enabling investigation in industrial Internet of Things. Alex. Eng. J. 2024, 86, 631–643. [Google Scholar] [CrossRef]
- Lin, L.; Wu, J.; Zhou, Z.; Zhao, J.; Li, P.; Xiong, J. Computing Power Networking Meets Blockchain: A Reputation-Enhanced Trading Framework for Decentralized IoT Cloud Services. IEEE Internet Things J. 2024, 11, 17082–17096. [Google Scholar] [CrossRef]
- Mohammed, M.A.; Wahab, H.B.A. Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption. Comput. Model. Eng. Sci. 2024, 138, 1731–1748. [Google Scholar] [CrossRef]
- Tsang, Y.P.; Lee, C.K.M.; Zhang, K.; Wu, C.H.; Ip, W.H. On-Chain and Off-Chain Data Management for Blockchain-Internet of Things: A Multi-Agent Deep Reinforcement Learning Approach. J. Grid Comput. 2024, 22, 16. [Google Scholar] [CrossRef]
- Al-Marridi, A.Z.; Mohamed, A.; Erbad, A. Optimized blockchain-based healthcare framework empowered by mixed multi-agent reinforcement learning. J. Netw. Comput. Appl. 2024, 224, 103834. [Google Scholar] [CrossRef]
- Jiang, L.; Liu, Y.; Tian, H.; Tang, L.; Xie, S. Resource Efficient Federated Learning and DAG Blockchain with Sharding in Digital Twin Driven Industrial IoT. IEEE Internet Things J. 2024, 11, 17113–17127. [Google Scholar] [CrossRef]
- Wang, Y.; Xing, X.; Li, P.; Wang, G. LT-DBFT: A Hierarchical Blockchain Consensus Using Location and Trust in IoT. IEEE Internet Things J. 2025; early access. [Google Scholar] [CrossRef]
- Leo, M.; Battisti, F.; Carli, M.; Neri, A. A federated architecture approach for Internet of Things security. In Proceedings of the 2014 Euro Med Telco Conference (EMTC), Naples, Italy, 12–15 November 2014; pp. 1–5. [Google Scholar] [CrossRef]
- Porambage, P.; Braeken, A.; Kumar, P.; Gurtov, A.; Ylianttila, M. Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar] [CrossRef]
- Xu, P.; Tang, X.; Wang, W.; Jin, H.; Yang, L.T. Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT. IEEE Access 2017, 5, 24775–24784. [Google Scholar] [CrossRef]
- Huang, Q.; Wang, L.; Yang, Y. DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices. World Wide Web 2018, 21, 151–167. [Google Scholar] [CrossRef]
- Hao, J.; Huang, C.; Liu, J.; Xian, M.; Shen, X. Efficient Outsourced Data Access Control with User Revocation for Cloud-Based IoT. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Nguyen, K.T.; Oualha, N.; Laurent, M. Securely outsourcing the ciphertext-policy attribute-based encryption. World Wide Web 2018, 21, 169–183. [Google Scholar] [CrossRef]
- Moor, L.; Bitter, L.; Prado, M.D.; Pazos, N.; Ouerhani, N. IoT meets distributed AI—Deployment scenarios of Bonseyes AI applications on FIWARE. In Proceedings of the 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), London, UK, 29–31 October 2019; pp. 1–2. [Google Scholar] [CrossRef]
- Elhabob, R.; Zhao, Y.; Eltayieb, N.; Abdelgader, A.M.S.; Xiong, H. Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Clust. Comput. 2020, 23, 1085–1101. [Google Scholar] [CrossRef]
- Wang, W.; Xu, P.; Liu, D.; Yang, L.T.; Yan, Z. Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices. IEEE Trans. Ind. Inform. 2020, 16, 4221–4230. [Google Scholar] [CrossRef]
- Xu, S.; Ning, J.; Li, Y.; Zhang, Y.; Xu, G.; Huang, X.; Deng, R. Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. IEEE Trans. Dependable Secur. Comput. 2020, 19, 1064–1077. [Google Scholar] [CrossRef]
- Zheng, Y.; Lu, R.; Mamun, M. Privacy-Preserving Computation Offloading for Time-Series Activities Classification in eHealthcare. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Gochhayat, S.P.; Lal, C.; Sharma, L.; Sharma, D.P.; Gupta, D.; Saucedo, J.A.M.; Kose, U. Reliable and secure data transfer in IoT networks. Wirel. Netw. 2020, 26, 5689–5702. [Google Scholar] [CrossRef]
- Tao, Y.; Xu, P.; Jin, H. Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage. IEEE Access 2020, 8, 15963–15972. [Google Scholar] [CrossRef]
- Yi, C.; Cai, J.; Zhu, K.; Wang, R. A Queueing Game Based Management Framework for Fog Computing with Strategic Computing Speed Control. IEEE Trans. Mob. Comput. 2022, 21, 1537–1551. [Google Scholar] [CrossRef]
- Wang, L.; Tian, Y.; Xiong, J. Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT. Digit. Commun. Netw. 2022, 8, 644–653. [Google Scholar] [CrossRef]
- De Hoz Diego, J.D.; Temperekidis, A.; Katsaros, P.; Konstantinou, C. An IoT Digital Twin for Cyber-Security Defence Based on Runtime Verification. In Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles; Lecture Notes in Computer Science; Margaria, T., Steffen, B., Eds.; Springer International Publishing: Cham, Switzerland, 2022; Volume 13701, pp. 556–574. [Google Scholar] [CrossRef]
- Kim, W.B.; Kim, S.H.; Seo, D.; Lee, I.Y. Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs. Wirel. Commun. Mob. Comput. 2022, 2022, 1903197. [Google Scholar] [CrossRef]
- Jiang, L.; Qin, Z. Edge-assisted Puncturable Fine-grained Task Distribution for the IoT-oriented Crowdsensing. In Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Espoo, Finland, 22–25 August 2022; pp. 131–138. [Google Scholar] [CrossRef]
- Zhou, J.; Cao, Z.; Dong, X.; Choo, K.K.R. Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain. IEEE Trans. Cloud Comput. 2022, 10, 366–382. [Google Scholar] [CrossRef]
- Liu, D.; Li, Z.; Wang, C.; Ren, Y. Enabling secure mutual authentication and storage checking in cloud-assisted IoT. Math. Biosci. Eng. 2022, 19, 11034–11046. [Google Scholar] [CrossRef]
- Cai, G.; Wei, X.; Yao, L. Privacy-preserving CNN feature extraction and retrieval over medical images. Int. J. Intell. Syst. 2022, 37, 9267–9289. [Google Scholar] [CrossRef]
- Chen, Y.C.; Chang, C.C.; Hung, C.C.; Lin, J.F.; Hsu, S.Y. SecDT: Privacy-Preserving Outsourced Decision Tree Classification without Polynomial Forms in Edge-Cloud Computing. IEEE Trans. Signal Inf. Process. Netw. 2022, 8, 1037–1048. [Google Scholar] [CrossRef]
- Li, W.; Xia, C.; Wang, C.; Wang, T. Secure and Temporary Access Delegation with Equality Test for Cloud-Assisted IoV. IEEE Trans. Intell. Transp. Syst. 2022, 23, 20187–20201. [Google Scholar] [CrossRef]
- Benomar, Z.; Campobello, G.; Segreto, A.; Battaglia, F.; Longo, F.; Merlino, G.; Puliafito, A. A Fog-Based Architecture for Latency-Sensitive Monitoring Applications in Industrial Internet of Things. IEEE Internet Things J. 2023, 10, 1908–1918. [Google Scholar] [CrossRef]
- Meng, X.; Yang, C.; Qi, Y.; Liang, W.; Xu, Z.; Li, K.; Deng, H. A Novel Multi-Party Authentication Scheme for FCN-based MIoT Systems in Natural Language Processing Environment. In ACM Transactions on Asian and Low-Resource Language Information Processing; Association for Computing Machinery: New York, NY, USA, 2023; p. 3590149. [Google Scholar] [CrossRef]
- Yao, M.; Gan, Q.; Wang, X.; Yang, Y. A key-insulated secure multi-server authenticated key agreement protocol for edge computing-based VANETs. Internet Things 2023, 21, 100679. [Google Scholar] [CrossRef]
- Chouikhi, S.; Esseghir, M.; Merghem-Boulahia, L. Computation Offloading for Industrial Internet of Things: A Cooperative Approach. In Proceedings of the 2023 International Wireless Communications and Mobile Computing (IWCMC), Marrakesh, Morocco, 19–23 June 2023; pp. 626–631. [Google Scholar] [CrossRef]
- Song, Z.; Ma, H.; Zhang, R.; Xu, W.; Li, J. Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2234–2249. [Google Scholar] [CrossRef]
- Atutxa, A.; Astorga, J.; Barcelo, M.; Urbieta, A.; Jacob, E. Improving efficiency and security of IIoT communications using in-network validation of server certificate. Comput. Ind. 2023, 144, 103802. [Google Scholar] [CrossRef]
- Kurt, A.; Akkaya, K.; Yilmaz, S.; Mercan, S. LNGate2: Secure Bidirectional IoT Micro-Payments Using Bitcoin’s Lightning Network and Threshold Cryptography. IEEE Trans. Mob. Comput. 2023, 23, 6027–6044. [Google Scholar] [CrossRef]
- Wang, L.; Huang, C.; Cheng, H. Novel proxy signature from lattice for the post-quantum internet of things. J. Ambient Intell. Humaniz. Comput. 2023, 14, 9939–9946. [Google Scholar] [CrossRef]
- Srikanth, K.; Rajesh, P.G.; Prasad, N.D.; Asmathulla, M.; Reddy, T.P.K. Proxy-Based Re-Encryption Design for the IoT Ecosystem. In Proceedings of the 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), Chennai, India, 25–26 May 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Wu, T.; Ma, X.; Zhang, C.; Liu, X.; Yang, G.; Zhu, L. Towards Fine-Grained Task Allocation with Bilateral Access Control for Intelligent Transportation Systems. IEEE Internet Things J. 2023, 11, 14814–14828. [Google Scholar] [CrossRef]
- Sun, Y.; Du, X.; Niu, S.; Zhou, S. A lightweight attribute-based signcryption scheme based on cloud-fog assisted in smart healthcare. PLoS ONE 2024, 19, e0297002. [Google Scholar] [CrossRef] [PubMed]
- Routray, K.; Bera, P. Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based Encryption. In Proceedings of the 25th International Conference on Distributed Computing and Networking, Chennai, India, 4–7 January 2024; pp. 346–352. [Google Scholar] [CrossRef]
- Qu, Z.; Meng, Y.; Liu, B.; Muhammad, G.; Tiwari, P. QB-IMD: A Secure Medical Data Processing System with Privacy Protection Based on Quantum Blockchain for IoMT. IEEE Internet Things J. 2024, 11, 40–49. [Google Scholar] [CrossRef]
Characteristic | Explanation |
---|---|
Relation to the system () | |
External () | Adversary is located outside the system and has no accomplices who are immediate elements or participants in the system. They are therefore unable to observe processes inside the system. |
External+ () | Adversary is located outside the system but has resources or accomplices that allow them, within a limited area, to observe processes inside the system. |
Insider () | Adversary is a member of the system, so they may have access and knowledge of the protocols used and the processes taking place, as well as awareness of the communication between the objects. |
Corruption capabilities () | |
No () | Adversary has no physical access to the system and no opportunity to corrupt system parties. |
Yes () | Adversary has physical access to parts of the system and is able to corrupt desired parties. |
Time () | |
Concrete () | Adversary runs in time t and is capable of launching a successful attack with probability at least against the system. |
Asymptotic () | Adversary runs in polynomial-time and is capable of launching a successful attack against the system with probability at least , where is negligible in the security parameter and c is some constant (typically, ). |
Information- theoretic () | Adversary has unlimited computation time and is capable of succeeding in an attack against the system with non-negligible probability for security parameter . |
Characteristics | |||||||
---|---|---|---|---|---|---|---|
1 | N | C | ✓ | ✗ | ✗ | ✓ | |
2 | N | ✓ | ✗ | ✗ | ✓ | ||
3 | N | ✓ | ✗ | ✗ | ✓ | ||
4 | Y | C | ✓ | ✓ | ✗ | ✓ | |
5 | Y | ✓ | ✓ | ✗ | ✓ | ||
6 | Y | ✓ | ✓ | ✗ | ✓ | ||
7 | N | C | ✓ | ✗ | ✓ | ✓ | |
8 | N | ✓ | ✗ | ✓ | ✓ | ||
9 | N | ✓ | ✗ | ✓ | ✓ | ||
10 | Y | C | ✓ | ✓ | ✓ | ✓ | |
11 | Y | ✓ | ✓ | ✓ | ✓ | ||
12 | Y | ✓ | ✓ | ✓ | ✓ | ||
13 | N | C | ✓ | ✗ | ✓ | ✓ | |
14 | N | ✓ | ✗ | ✓ | ✓ | ||
15 | N | ✓ | ✗ | ✓ | ✓ | ||
16 | Y | C | ✓ | ✓ | ✓ | ✓ | |
17 | Y | ✓ | ✓ | ✓ | ✓ | ||
18 | Y | ✓ | ✓ | ✓ | ✓ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Geloczi, E.; Klement, F.; Struck, P.; Katzenbeisser, S. SoK: Delegated Security in the Internet of Things. Future Internet 2025, 17, 202. https://doi.org/10.3390/fi17050202
Geloczi E, Klement F, Struck P, Katzenbeisser S. SoK: Delegated Security in the Internet of Things. Future Internet. 2025; 17(5):202. https://doi.org/10.3390/fi17050202
Chicago/Turabian StyleGeloczi, Emiliia, Felix Klement, Patrick Struck, and Stefan Katzenbeisser. 2025. "SoK: Delegated Security in the Internet of Things" Future Internet 17, no. 5: 202. https://doi.org/10.3390/fi17050202
APA StyleGeloczi, E., Klement, F., Struck, P., & Katzenbeisser, S. (2025). SoK: Delegated Security in the Internet of Things. Future Internet, 17(5), 202. https://doi.org/10.3390/fi17050202