Research Article

A Secure and Efficient Access Control Scheme for Shared IoT Devices over Blockchain

Table 2

The summary of functions about some access control schemes in the IoT environment.

SchemesFSA1FSA2FSA3FSA4FSA5FSA6FSA7

[11]
[17]
[18]
[23]
[25]
[26]
[29]
[30]
[31]
Ours

FSAi (i = 1, …, 7) is the ith attribute. FSA1: whether mutual authentications occur with each other; FSA2: no need of a secure channel; FSA3: is it decentralized; FSA4: whether the key is negotiated; FSA5: whether to support mobility; FSA6: does the privacy be protected; FSA7: the gateway is not secure.