1. Application domains, evaluation data sets, and research challenges of iot: A systematic review;Lohiya;IEEE Internet Things J,2020
2. Centralized, distributed, and everything in between: Reviewing access control solutions for the iot;Dramé-Maigné;ACM Comput Surv,2022
3. Access control mechanism for the internet of things based on blockchain and inner product encryption;Han;J Inf Secur Appl,2023
4. Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. 2006, p. 89–98.
5. Multi-authority cp-abe-based user access control scheme with constant-size key and ciphertext for iot deployment;Banerjee;J Inf Secur Appl,2020