Research Article
A Secure and Efficient Access Control Scheme for Shared IoT Devices over Blockchain
Table 2
The summary of functions about some access control schemes in the IoT environment.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
FSAi (i = 1, …, 7) is the ith attribute. FSA1: whether mutual authentications occur with each other; FSA2: no need of a secure channel; FSA3: is it decentralized; FSA4: whether the key is negotiated; FSA5: whether to support mobility; FSA6: does the privacy be protected; FSA7: the gateway is not secure. |