Abstract
In the Internet of Things (IoT) epoch, the seamless communication of smart devices through autonomous collaboration demands real-time IoT networks to possess a high level of intelligence. However, the resource-constrained nature of IoT limits the adoption of traditional intuitive access control models for communication in dynamic, complex, and large-scale applications. The frequent changes in the IoT environment urge creating a secured autonomous dynamic access control system for device-to-device communication to secure device-sensitive data and detect abnormal access behaviors to ensure the smart infrastructure is free from cyberattacks. Smart Home infrastructure with various sensors and validation systems is used as the target application in the proposed system. Addressing the challenges, the novel design of an intelligent access control model to protect the privacy of device information and data is presented by integrating Artificial Intelligence and Blockchain. The attribute-based access policies are designed to create synthetic datasets by encompassing the if-then rule. Smart Home devices and transaction data are secured under the hashed storage structure IPFS. The Deep Learning-based ResNet model is employed in the design of intelligent contracts, and its execution is focused on the required device only. The authentic and immutable nature of the blockchain enforces the end-to-end security of the proposed system with an enhanced accuracy of 96.8% in access decisions to accommodate the Smart Home Infrastructure.











Similar content being viewed by others
Data Availability
The corresponding author can provide access to the dataset generated and analyzed in the current study upon reasonable request.
References
Bhatt S, Pham TK, Gupta M, Benson J, Park J, Sandhu R. Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future. IEEE Access. 2021;9(1):107200–23. https://doi.org/10.1109/access.2021.3101218.
Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B. A survey on Access Control in the Age of Internet of Things. IEEE Internet Things J. 2020;7(6):1–1. https://doi.org/10.1109/jiot.2020.2969326.
Carnley PR. and, H. Kettani Identity and Access Management for the Internet of Things, IJFCC Vol.8Dec. 2019, https://doi.org/10.18178/ijfcc.2019.8.4.554
Zhu X, Badr Y. Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions. Sensors. Dec. 2018;18(12):4215. https://doi.org/10.3390/s18124215.
Bernabe JB, Hernandez-Ramos JL, Gomez AFS. Holistic Privacy-Preserving Identity Management System for the Internet of Things. Mob Inform Syst. Jan. 2017;2017. https://doi.org/10.1155/2017/6384186.
Luu L, Chu D-H, Olickel H, Saxena P, Hobor A. Making Smart Contracts Smarter. Int Conf Blockchain Cryptocurrency (ICBC). 2016. https://doi.org/10.1145/2976749.2978309.
Cotrini C, Weghorn T, Basin D. Mining ABAC Rules from Sparse Logs. Apr. 2018. https://doi.org/10.1109/eurosp.2018.00011.
Raja G, Manaswini YH, Vivekanandan GD, Sampath H, Dev K, Bashir AK. AI-Powered Blockchain - A Decentralized Secure Multiparty Computation Protocol for IoV. Jul. 2020. https://doi.org/10.1109/infocomwkshps50562.2020.9162866.
Han D, Zhu Y, Li D, Liang W, Souri A, Li K-C, Blockchain-Based A. IEEE Trans Industr Inf. May 2022;18(5):3530–40. https://doi.org/10.1109/tii.2021.3114621. Auditable Access Control System for Private Data in Service-Centric IoT Environments.
Li Z, Hao J, Liu J, Wang H, Xian M. An IoT-Applicable Access Control Model Under Double-Layer Blockchain. IEEE Trans Circuits Syst II Express Briefs. Jun. 2021;68(6):2102–6. https://doi.org/10.1109/TCSII.2020.3045031.
Rouhani S, Belchior R, Cruz RS, Deters R. Distributed Attribute-Based Access Control System Using a Permissioned Blockchain, arXiv:2006.04384 [cs], Jun. 2020, Available: https://arxiv.org/abs/2006.04384
Wu N, Xu L, Zhu L. A blockchain based access control scheme with hidden policy and attribute, Future Generation Computer Systems, vol. 141, pp. 186–196, 2023. [Online]. Available: https://doi.org/10.1016/j.future.2022.11.006
Awan SM, Azad MA, Arshad J, Waheed U, Sharif T. A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT. Information. Feb. 2023;14(2):129. https://doi.org/10.3390/info14020129.
Zhang Y, Yutaka M, Sasabe M, Kasahara S. Attribute-Based Access Control for Smart Cities: A Smart Contract-Driven Framework. IEEE Internet Things J. 2020;1–1. https://doi.org/10.1109/jiot.2020.3033434.
Zhang Y, Li B, Liu B, Wu J, Wang Y, Yang X. An Attribute-Based Collaborative Access Control Scheme Using Blockchain for IoT Devices. Electronics. Feb. 2020;9(2):285. https://doi.org/10.3390/electronics9020285.
Song L. Attribute-Based Access Control Using Smart Contracts for the Attribute-Based Access Control Smart Contracts for the Internet of Using Things Internet Things, Procedia Computer Science, vol. 174, no. 2019, pp. 231–242, 2020. [Online]. Available: https://doi.org/10.1016/j.procs.2020.06.079
Liu H, Han D, Li D. Fabric-iot: A Blockchain-Based Access Control System in IoT. IEEE Access. 2020;8:18207–18. https://doi.org/10.1109/access.2020.2968492.
Zhang J, Xin Y, Gao Y, Lei X, Yang Y. Secure ABE Scheme for Access Management in Blockchain-Based IoT. IEEE Access. 2021;9:54840–9. https://doi.org/10.1109/ACCESS.2021.3071031.
Javier Martínez Llamas D, Preuveneers, Joosen W. Effective Machine Learning-based Access Control Administration through Unlearning. Jul. 2023. https://doi.org/10.1109/eurospw59978.2023.00011.
Aubet F, Pahl M. DS2OS traffic traces, 2018.
Shah D, Patel D, Adesara J, Hingu P, Shah M. Integrating machine learning and blockchain to develop a system to veto the forgeries and provide efficient results in education sector, Visual Computing for Industry, Biomedicine, and Art, vol. 4, no. 1, Jun. 2021, https://doi.org/10.1186/s42492-021-00084
OUTCHAKOUCHT A, ES-SAMAALI H, Philippe J. Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things. Int J Adv Comput Sci Appl. 2017;8(7). https://doi.org/10.14569/ijacsa.2017.080757.
Alkhresheh A, Elgazzar K, Hassanein HS. Adaptive Access Control Policies for IoT Deployments. IEEE Xplore Jun 01, 2020. https://ieeexplore.ieee.org/document/9148090
Mukhandi M, Damiao F, Granjal J, Vilela JP. Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices, 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Jan. 2022, https://doi.org/10.1109/ccnc49033.2022.9700534
Nobi MN, Krishnan R, Huang Y, Shakarami M, Sandhu R. Toward Deep Learning Based Access Control. arXiv org Apr 14, 2022. https://arxiv.org/abs/2203.15124
Sriramya P. Dynamic access control and security performance prediction for IoT networking using a novel deep learning technique. Europe PMC. 2021;3:947700-v1. https://europepmc.org/article/ppr/ppr404992.
Malik AK, et al. From Conventional to State-of-the-Art IoT Access Control Models. Electronics. Oct. 2020;9(10):1693. https://doi.org/10.3390/electronics9101693.
Liu H, Han D, Li D. Fabric-iot: A Blockchain-Based Access Control System in IoT. IEEE Access. 2020;8:18207–18. https://doi.org/10.1109/access.2020.2968492.
Albulayhi AS, Alsukayti IS, Blockchain-Centric A. Electronics. Jan. 2023;12(12):2564. https://doi.org/10.3390/electronics12122564. IoT Architecture for Effective Smart Contract-Based Management of IoT Data Communications.
Md R, Hasan, et al. Smart Contract-Based Access Control Framework for Internet of Things Devices. Computers. Nov. 2023;12(11):240–240. https://doi.org/10.3390/computers12110240.
Kumar S, Ramesh Naik B. Bilateral hashing model of ECG signal encryption system using downhill peak follow (DPF)-based encryption technique, Soft Computing, vol. 27, no. 16, pp. 11843–11851, Jun. 2023, https://doi.org/10.1007/s00500-023-08684
Karimi L, Aldairi M, Joshi J, Abdelhakim M. An Automatic Attribute Based Access Control Policy Extraction from Access Logs. arXiv (Cornell University) Mar. 2020. https://doi.org/10.48550/arxiv.2003.07270.
Karimi L, Abdelhakim M, Joshi J. Adaptive ABAC Policy Learning: A Reinforcement Learning Approach. arXiv (Cornell University). May 2021. https://doi.org/10.48550/arxiv.2105.08587.
Xu Z, Stoller SD. Mining Attribute-Based Access Control Policies. IEEE Trans Dependable Secur Comput. Sep. 2015;12(5):533–45. https://doi.org/10.1109/tdsc.2014.2369048.
Acknowledgements
The authors acknowledged Dr. Ambedkar Institute of Technology, Affiliated to Visvesvaraya Technological University, Bangalore, Karnataka, India for supporting the research work by providing the facilities.
Funding
No funding received for this research.
Author information
Authors and Affiliations
Contributions
The research outcomes were significantly shaped by the collaborative efforts and collective contributions of all authors involved in this endeavor.
Corresponding author
Ethics declarations
Conflict of interest
No conflict of interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Advanced Computing: Innovations and Applications” guest edited by Sanjay Madria, Parteek Bhatia, Priyanka Sharma and Deepak Garg.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rajesh, S.M., Prabha, R. ICDAC: Intelligent Contracts Driven Access Control Model for IoT Device Communication. SN COMPUT. SCI. 5, 1054 (2024). https://doi.org/10.1007/s42979-024-03406-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-03406-y