Research Article

Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach

Algorithm 1

Establishing access control policies with smart contracts.
Function: access()
Input: request()
Output: allow, block
(1)whiledo
(2)fordo
(3)  if is in ACL then
(4)   allow
(5)  else
(6)   block