Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/7156
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMohamed Nafrees, Abdul Cader-
dc.contributor.authorSankavi, Gobalakirushnan-
dc.contributor.authorKaripper, R. K. A. R.-
dc.contributor.authorBharathi, B.-
dc.contributor.authorPrince Mary, S.-
dc.date.accessioned2024-10-02T06:42:57Z-
dc.date.available2024-10-02T06:42:57Z-
dc.date.issued2024-10-01-
dc.identifier.citationProceedings of World Conference on Artificial Intelligence: Advances and Applications pp. 41-53.en_US
dc.identifier.isbn978-981-97-4495-4-
dc.identifier.isbn978-981-97-4496-1-
dc.identifier.urihttp://ir.lib.seu.ac.lk/handle/123456789/7156-
dc.description.abstractThis paper explores the transformative impact of the IoT on device connectivity, emphasizing the critical role of Access Control (AC) in securing IoT and ensuring appropriate resource access. The study conducts a comprehensive survey, addressing challenges, requirements, and approaches in designing effective IoT AC, considering device diversity, resource constraints, and energy consumption complexities. The adaptation of traditional AC methods for IoT is examined, highlighting complications arising from device heterogeneity and advocating for suitable AC solutions aligned with global IoT policies. The focus shifts to two emerging technologies, Blockchain (BC) and Machine Learning (ML), as potential solutions for IoT AC challenges. BC’s decentralization, security, and transparency are explored, emphasizing their role in mitigating AC issues. ML techniques are investigated for real-time identification of suspicious activities, enhancing the adaptability of AC mechanisms. Integrating BC and ML in IoT AC is a key research question, with insights suggesting enhanced security, transparency, and efficiency. The survey employs a systematic review approach, utilizing NVIVO software and the CASP tool for data coding to ensure the validity of the information. The conclusion summarizes key findings, addressing how BC and ML can mitigate AC challenges in IoT. BC’s decentralized and tamper-resistant nature and ML’s dynamic learning capabilities contribute to enhanced security. Alternative technologies for IoT AC are explored, including smart contracts, attribute-based AC, and certificate-based schemes. The integration of BC and ML is identified as a means to deliver trusted IoT services, achieve fine-grained AC, and enable efficient data transfer methods.en_US
dc.language.isoen_USen_US
dc.publisherSpringer, Singaporeen_US
dc.titleAccess control in IOT: a comprehensive survey of challenges, approaches, and future directionsen_US
dc.typeArticleen_US
Appears in Collections:Research Articles

Files in This Item:
File Description SizeFormat 
Proceedings of World Conference.pdf80.07 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.