Research Article

A Secure and Efficient Access Control Scheme for Shared IoT Devices over Blockchain

Figure 3

A brief summary of the secure channel establishment process for a user and a device. Note: The upper content is carried out first, and the lower content is carried out later. The content between two dotted lines indicates local specific calculations or operations. For example, the sentence “Computes SK’ and SKV’” at the bottom left of Figure 3 represents the user’s need to compute SK’ and SKV’.