{"id":"https://openalex.org/W4285289117","doi":"https://doi.org/10.1109/tsc.2022.3179727","title":"A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things","display_name":"A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things","publication_year":2022,"publication_date":"2022-06-02","ids":{"openalex":"https://openalex.org/W4285289117","doi":"https://doi.org/10.1109/tsc.2022.3179727"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2022.3179727","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2022.3179727","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017362771","display_name":"Xiaohan Hao","orcid":"https://orcid.org/0000-0002-4770-7084"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]},{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaohan Hao","raw_affiliation_strings":["State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China","School of Computer Science, China University of Geosciences, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0002-4770-7084","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034031357","display_name":"Wei Ren","orcid":"https://orcid.org/0000-0001-8590-1737"},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Ren","raw_affiliation_strings":["School of Computer Science, China University of Geosciences, Wuhan, China","Yunnan Key Laboratory of Blockchain Application Technology, Kunming, China","Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-8590-1737","affiliations":[{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]},{"raw_affiliation_string":"Yunnan Key Laboratory of Blockchain Application Technology, Kunming, China","institution_ids":[]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015493634","display_name":"Yangyang Fei","orcid":"https://orcid.org/0000-0003-3209-821X"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yangyang Fei","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, Henan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","institution_ids":[]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, Henan, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101870553","display_name":"Tianqing Zhu","orcid":"https://orcid.org/0000-0003-0702-7102"},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianqing Zhu","raw_affiliation_strings":["School of Computer Science, China University of Geosciences, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0003-0702-7102","affiliations":[{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"raw_orcid":"https://orcid.org/0000-0001-9208-5336","affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017362771"],"corresponding_institution_ids":["https://openalex.org/I178232147","https://openalex.org/I3124059619"],"apc_list":null,"apc_paid":null,"fwci":17.864,"has_fulltext":false,"cited_by_count":58,"citation_normalized_percentile":{"value":0.99243612,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"16","issue":"2","first_page":"773","last_page":"786"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8302847146987915},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7531617879867554},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6781550645828247},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5779569149017334},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4905688166618347},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4819662272930145},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4714166820049286},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.46125802397727966},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.44865602254867554},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4130701720714569},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41125980019569397},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3551919460296631},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.13107484579086304},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1302891969680786}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8302847146987915},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7531617879867554},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6781550645828247},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5779569149017334},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4905688166618347},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4819662272930145},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4714166820049286},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.46125802397727966},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.44865602254867554},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4130701720714569},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41125980019569397},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3551919460296631},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.13107484579086304},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1302891969680786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2022.3179727","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2022.3179727","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1339902361","display_name":null,"funder_award_id":"61972366","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2480162961","https://openalex.org/W2523077978","https://openalex.org/W2729396025","https://openalex.org/W2765239986","https://openalex.org/W2787594205","https://openalex.org/W2795237615","https://openalex.org/W2892932356","https://openalex.org/W2945217779","https://openalex.org/W2945632727","https://openalex.org/W2953207480","https://openalex.org/W2964159515","https://openalex.org/W2980633110","https://openalex.org/W2982397416","https://openalex.org/W2998562842","https://openalex.org/W3002224656","https://openalex.org/W3010858269","https://openalex.org/W3022091783","https://openalex.org/W3034142408","https://openalex.org/W3108722340","https://openalex.org/W3120558584","https://openalex.org/W3124636507","https://openalex.org/W3161577794","https://openalex.org/W3168833844","https://openalex.org/W3170888612","https://openalex.org/W3201410046","https://openalex.org/W3205056089","https://openalex.org/W6682904396"],"related_works":["https://openalex.org/W2770657926","https://openalex.org/W2901729341","https://openalex.org/W2088642402","https://openalex.org/W2484790450","https://openalex.org/W2505244523","https://openalex.org/W4246289931","https://openalex.org/W2952052200","https://openalex.org/W3131327268","https://openalex.org/W4391037422","https://openalex.org/W4252020162"],"abstract_inverted_index":{"The":[0],"volume,":[1],"variety":[2],"and":[3,28,36,99,139,154,198,212,224],"value":[4],"of":[5,10,26,88,92,130,191],"data":[6,96,165],"generated":[7],"by":[8,122],"Internet":[9],"Things":[11],"(IoT)":[12],"devices":[13,35],"are":[14,44],"expected":[15],"to":[16,71,141,163,231],"increase":[17],"significantly":[18],"in":[19,237],"foreseeable":[20],"future,":[21],"hence,":[22],"reinforcing":[23],"the":[24,86,111,123,128,205,225,229,238],"importance":[25],"secure":[27],"efficient":[29],"access":[30,41,75,89,97,103,113,156,176],"control":[31,42,76,157,177],"solutions":[32,43],"for":[33,51,77,95,102,175,178],"these":[34],"their":[37],"networks.":[38],"However,":[39],"existing":[40],"not":[45,160],"generally":[46],"lightweight":[47,66],"or":[48],"scalable,":[49],"particularly":[50],"geographically":[52],"disperse,":[53],"inexpensive":[54],"resource":[55],"constrained":[56],"IoT":[57,78],"devices.":[58,79],"To":[59,126],"tackle":[60],"above":[61],"challenges,":[62],"we":[63,202],"propose":[64],"a":[65,132,152,220],"consortium":[67],"blockchain":[68,84,124,180],"based":[69],"architecture":[70],"enable":[72],"intelligent":[73,83],"autonomous":[74],"In":[80,150,200],"our":[81,185,188],"architecture,":[82],"facilitates":[85],"storing":[87],"policies,":[90],"provision":[91],"authentication":[93],"services":[94],"control,":[98],"trust":[100],"evaluation":[101],"request":[104,114],"nodes":[105],"through":[106],"token":[107],"accumulation":[108],"mechanism.":[109],"Specifically,":[110],"user's":[112],"is":[115,120,137,159,236],"approved":[116],"only":[117,161],"after":[118],"it":[119],"confirmed":[121],"network.":[125],"ensure":[127],"reliability":[129],"authenticity,":[131],"compromised":[133,148],"resistant":[134],"consensus":[135],"algorithm":[136],"adapted":[138],"implemented":[140],"defend":[142],"against":[143],"at":[144],"most":[145],"<inline-formula><tex-math":[146],"notation=\"LaTeX\">$1/3$</tex-math></inline-formula>":[147],"authenticators.":[149],"addition,":[151,201],"cross-domain":[153],"flexible":[155],"model":[158],"used":[162,174],"support":[164],"sharing":[166],"among":[167],"various":[168],"users":[169],"but":[170],"can":[171],"also":[172,203],"be":[173],"exceptional":[179],"situations.":[181],"We":[182],"explain":[183],"how":[184],"system":[186],"meets":[187],"design":[189],"goals":[190],"reliability,":[192],"availability,":[193],"confidentiality,":[194],"integrity,":[195],"lightweight,":[196],"security":[197],"scalability.":[199],"analyze":[204],"proposed":[206],"system's":[207],"performance":[208],"from":[209],"computational,":[210],"storage":[211],"network":[213],"overheads":[214],"(e.g.,":[215],"running":[216],"cryptographic":[217,234],"algorithms":[218,235],"on":[219],"Raspberry":[221],"Pi":[222],"4B),":[223],"findings":[226],"suggest":[227],"that":[228],"time":[230],"run":[232],"typical":[233],"microsecond":[239],"range.":[240]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":24},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
