Skip to main content
Log in

ICDAC: Intelligent Contracts Driven Access Control Model for IoT Device Communication

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

In the Internet of Things (IoT) epoch, the seamless communication of smart devices through autonomous collaboration demands real-time IoT networks to possess a high level of intelligence. However, the resource-constrained nature of IoT limits the adoption of traditional intuitive access control models for communication in dynamic, complex, and large-scale applications. The frequent changes in the IoT environment urge creating a secured autonomous dynamic access control system for device-to-device communication to secure device-sensitive data and detect abnormal access behaviors to ensure the smart infrastructure is free from cyberattacks. Smart Home infrastructure with various sensors and validation systems is used as the target application in the proposed system. Addressing the challenges, the novel design of an intelligent access control model to protect the privacy of device information and data is presented by integrating Artificial Intelligence and Blockchain. The attribute-based access policies are designed to create synthetic datasets by encompassing the if-then rule. Smart Home devices and transaction data are secured under the hashed storage structure IPFS. The Deep Learning-based ResNet model is employed in the design of intelligent contracts, and its execution is focused on the required device only. The authentic and immutable nature of the blockchain enforces the end-to-end security of the proposed system with an enhanced accuracy of 96.8% in access decisions to accommodate the Smart Home Infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data Availability

The corresponding author can provide access to the dataset generated and analyzed in the current study upon reasonable request.

References

  1. Bhatt S, Pham TK, Gupta M, Benson J, Park J, Sandhu R. Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future. IEEE Access. 2021;9(1):107200–23. https://doi.org/10.1109/access.2021.3101218.

    Article  Google Scholar 

  2. Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B. A survey on Access Control in the Age of Internet of Things. IEEE Internet Things J. 2020;7(6):1–1. https://doi.org/10.1109/jiot.2020.2969326.

    Article  Google Scholar 

  3. Carnley PR. and, H. Kettani Identity and Access Management for the Internet of Things, IJFCC Vol.8Dec. 2019, https://doi.org/10.18178/ijfcc.2019.8.4.554

  4. Zhu X, Badr Y. Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions. Sensors. Dec. 2018;18(12):4215. https://doi.org/10.3390/s18124215.

  5. Bernabe JB, Hernandez-Ramos JL, Gomez AFS. Holistic Privacy-Preserving Identity Management System for the Internet of Things. Mob Inform Syst. Jan. 2017;2017. https://doi.org/10.1155/2017/6384186.

  6. Luu L, Chu D-H, Olickel H, Saxena P, Hobor A. Making Smart Contracts Smarter. Int Conf Blockchain Cryptocurrency (ICBC). 2016. https://doi.org/10.1145/2976749.2978309.

    Article  Google Scholar 

  7. Cotrini C, Weghorn T, Basin D. Mining ABAC Rules from Sparse Logs. Apr. 2018. https://doi.org/10.1109/eurosp.2018.00011.

    Article  Google Scholar 

  8. Raja G, Manaswini YH, Vivekanandan GD, Sampath H, Dev K, Bashir AK. AI-Powered Blockchain - A Decentralized Secure Multiparty Computation Protocol for IoV. Jul. 2020. https://doi.org/10.1109/infocomwkshps50562.2020.9162866.

    Article  Google Scholar 

  9. Han D, Zhu Y, Li D, Liang W, Souri A, Li K-C, Blockchain-Based A. IEEE Trans Industr Inf. May 2022;18(5):3530–40. https://doi.org/10.1109/tii.2021.3114621. Auditable Access Control System for Private Data in Service-Centric IoT Environments.

  10. Li Z, Hao J, Liu J, Wang H, Xian M. An IoT-Applicable Access Control Model Under Double-Layer Blockchain. IEEE Trans Circuits Syst II Express Briefs. Jun. 2021;68(6):2102–6. https://doi.org/10.1109/TCSII.2020.3045031.

  11. Rouhani S, Belchior R, Cruz RS, Deters R. Distributed Attribute-Based Access Control System Using a Permissioned Blockchain, arXiv:2006.04384 [cs], Jun. 2020, Available: https://arxiv.org/abs/2006.04384

  12. Wu N, Xu L, Zhu L. A blockchain based access control scheme with hidden policy and attribute, Future Generation Computer Systems, vol. 141, pp. 186–196, 2023. [Online]. Available: https://doi.org/10.1016/j.future.2022.11.006

  13. Awan SM, Azad MA, Arshad J, Waheed U, Sharif T. A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT. Information. Feb. 2023;14(2):129. https://doi.org/10.3390/info14020129.

  14. Zhang Y, Yutaka M, Sasabe M, Kasahara S. Attribute-Based Access Control for Smart Cities: A Smart Contract-Driven Framework. IEEE Internet Things J. 2020;1–1. https://doi.org/10.1109/jiot.2020.3033434.

  15. Zhang Y, Li B, Liu B, Wu J, Wang Y, Yang X. An Attribute-Based Collaborative Access Control Scheme Using Blockchain for IoT Devices. Electronics. Feb. 2020;9(2):285. https://doi.org/10.3390/electronics9020285.

  16. Song L. Attribute-Based Access Control Using Smart Contracts for the Attribute-Based Access Control Smart Contracts for the Internet of Using Things Internet Things, Procedia Computer Science, vol. 174, no. 2019, pp. 231–242, 2020. [Online]. Available: https://doi.org/10.1016/j.procs.2020.06.079

  17. Liu H, Han D, Li D. Fabric-iot: A Blockchain-Based Access Control System in IoT. IEEE Access. 2020;8:18207–18. https://doi.org/10.1109/access.2020.2968492.

    Article  Google Scholar 

  18. Zhang J, Xin Y, Gao Y, Lei X, Yang Y. Secure ABE Scheme for Access Management in Blockchain-Based IoT. IEEE Access. 2021;9:54840–9. https://doi.org/10.1109/ACCESS.2021.3071031.

    Article  Google Scholar 

  19. Javier Martínez Llamas D, Preuveneers, Joosen W. Effective Machine Learning-based Access Control Administration through Unlearning. Jul. 2023. https://doi.org/10.1109/eurospw59978.2023.00011.

    Article  Google Scholar 

  20. Aubet F, Pahl M. DS2OS traffic traces, 2018.

  21. Shah D, Patel D, Adesara J, Hingu P, Shah M. Integrating machine learning and blockchain to develop a system to veto the forgeries and provide efficient results in education sector, Visual Computing for Industry, Biomedicine, and Art, vol. 4, no. 1, Jun. 2021, https://doi.org/10.1186/s42492-021-00084

  22. OUTCHAKOUCHT A, ES-SAMAALI H, Philippe J. Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things. Int J Adv Comput Sci Appl. 2017;8(7). https://doi.org/10.14569/ijacsa.2017.080757.

  23. Alkhresheh A, Elgazzar K, Hassanein HS. Adaptive Access Control Policies for IoT Deployments. IEEE Xplore Jun 01, 2020. https://ieeexplore.ieee.org/document/9148090

  24. Mukhandi M, Damiao F, Granjal J, Vilela JP. Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices, 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Jan. 2022, https://doi.org/10.1109/ccnc49033.2022.9700534

  25. Nobi MN, Krishnan R, Huang Y, Shakarami M, Sandhu R. Toward Deep Learning Based Access Control. arXiv org Apr 14, 2022. https://arxiv.org/abs/2203.15124

  26. Sriramya P. Dynamic access control and security performance prediction for IoT networking using a novel deep learning technique. Europe PMC. 2021;3:947700-v1. https://europepmc.org/article/ppr/ppr404992.

  27. Malik AK, et al. From Conventional to State-of-the-Art IoT Access Control Models. Electronics. Oct. 2020;9(10):1693. https://doi.org/10.3390/electronics9101693.

  28. Liu H, Han D, Li D. Fabric-iot: A Blockchain-Based Access Control System in IoT. IEEE Access. 2020;8:18207–18. https://doi.org/10.1109/access.2020.2968492.

    Article  Google Scholar 

  29. Albulayhi AS, Alsukayti IS, Blockchain-Centric A. Electronics. Jan. 2023;12(12):2564. https://doi.org/10.3390/electronics12122564. IoT Architecture for Effective Smart Contract-Based Management of IoT Data Communications.

  30. Md R, Hasan, et al. Smart Contract-Based Access Control Framework for Internet of Things Devices. Computers. Nov. 2023;12(11):240–240. https://doi.org/10.3390/computers12110240.

  31. Kumar S, Ramesh Naik B. Bilateral hashing model of ECG signal encryption system using downhill peak follow (DPF)-based encryption technique, Soft Computing, vol. 27, no. 16, pp. 11843–11851, Jun. 2023, https://doi.org/10.1007/s00500-023-08684

  32. Karimi L, Aldairi M, Joshi J, Abdelhakim M. An Automatic Attribute Based Access Control Policy Extraction from Access Logs. arXiv (Cornell University) Mar. 2020. https://doi.org/10.48550/arxiv.2003.07270.

    Article  Google Scholar 

  33. Karimi L, Abdelhakim M, Joshi J. Adaptive ABAC Policy Learning: A Reinforcement Learning Approach. arXiv (Cornell University). May 2021. https://doi.org/10.48550/arxiv.2105.08587.

  34. Xu Z, Stoller SD. Mining Attribute-Based Access Control Policies. IEEE Trans Dependable Secur Comput. Sep. 2015;12(5):533–45. https://doi.org/10.1109/tdsc.2014.2369048.

Download references

Acknowledgements

The authors acknowledged Dr. Ambedkar Institute of Technology, Affiliated to Visvesvaraya Technological University, Bangalore, Karnataka, India for supporting the research work by providing the facilities.

Funding

No funding received for this research.

Author information

Authors and Affiliations

Authors

Contributions

The research outcomes were significantly shaped by the collaborative efforts and collective contributions of all authors involved in this endeavor.

Corresponding author

Correspondence to S. M. Rajesh.

Ethics declarations

Conflict of interest

No conflict of interest.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Advanced Computing: Innovations and Applications” guest edited by Sanjay Madria, Parteek Bhatia, Priyanka Sharma and Deepak Garg.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajesh, S.M., Prabha, R. ICDAC: Intelligent Contracts Driven Access Control Model for IoT Device Communication. SN COMPUT. SCI. 5, 1054 (2024). https://doi.org/10.1007/s42979-024-03406-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-03406-y

Keywords