OAuth 2.0 meets Blockchain for Authorization in Constrained IoT Environments

Vasilios A. Siris,Dimitrios Dimopoulos,Nikos Fotiou,Spyros Voulgaris,George C. Polyzos
DOI: https://doi.org/10.48550/arXiv.1905.01665
2019-05-05
Abstract:We present models for utilizing blockchain and smart contract technology with the widely used OAuth 2.0 open authorization framework to provide delegated authorization for constrained IoT devices. The models involve different tradeoffs in terms of privacy, delay, and cost, while exploiting key advantages of blockchains and smart contracts. These include linking payments to authorization grants, immutably recording authorization information and policies in smart contracts, and offering resilience through the execution of smart contract code on all blockchain nodes.
Cryptography and Security,Networking and Internet Architecture
What problem does this paper attempt to address?