4.7 Article

Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey

期刊

COMPUTER SCIENCE REVIEW
卷 50, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.cosrev.2023.100590

关键词

Authentication; Access control; Networking applications; Distributed ledger technology; Blockchain; Smart contract; Security; Privacy; Taxonomy

向作者/读者索取更多资源

The accelerated growth of networking technologies emphasizes the significance of Authentication and Access Control (AAC) in protecting against associated attacks. The use of Distributed Ledger Technology (DLT) has gained interest in the AAA community due to its distributed nature and immutability, which offer potential solutions to challenges faced by conventional systems. This paper explores the deployment of authentication and access control approaches via DLT for various networking use cases, and proposes future directions to address existing limitations and meet future needs.
The accelerated growth of networking technologies highlights the importance of Authentication and Access Control (AAC) as protection against associated attacks. Controlling access to resources, facilitat-ing resource sharing, and managing user mobility are some of the notable capabilities provided by AAC methods. Centralized methods are the most common deployment architectures, that can be threatened by several attacks at their central points. Emerging Distributed Ledger Technology (DLT) has attracted significant interest in the AAA community. The distributed nature of DLT and its immutability can bring unprecedented opportunities to resolve many of the challenges of conventional systems. We survey the state-of-the-art in deploying authentication and access control approaches via DLT for several networking use cases. More precisely, we explore DLT applications in (1) Authentication; (2) Access Control; and (3) Comprehensive AAC solutions. First, we present the challenges of centralized solutions and discuss the capability of DLT for their resolution. Then, we propose a taxonomy to categorize the existing methods. Analysis, comparison, and discussion on the advantages and disadvantages of these methods have been provided regarding different parameters such as DLT types, AAC approaches, security, reliability, scalability, etc. While DLT provides various benefits, several challenges remain for the migration to DLT-based AAC. In light of these general limitations, we propose some future directions, targeting the current lacunae and future needs.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据