DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things

@article{Fan2020DIAMIoTAD,
  title={DIAM-IoT: A Decentralized Identity and Access Management Framework for Internet of Things},
  author={Xinxin Fan and Qi Chai and Lei Xu and Dong Guo},
  journal={Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure},
  year={2020}
}
  • Xinxin Fan, Qi Chai, +1 author Dong Guo
  • Published 2020
  • Computer Science
  • Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure
With the exorbitant growth in the number of connected devices, the lack of proper identity and access management (IAM) mechanisms has become a major concern. The traditional IAM systems, which focus solely on managing people's digital identities, fail to accommodate billions of Internet of Things (IoT) devices. The emerging concepts such as decentralized identifiers (DIDs) and verifiable credentials (VCs) provide new perspectives on incorporating IAM capabilities into IoT ecosystems. In this… Expand

Figures from this paper

Decentralized IoT Data Authorization with Pebble Tracker
TLDR
This is the first real-world demo for enabling decentralized IoT data authorization with DIDs and VCs and demonstrates great flexibility and tremendous advantages towards building decentralized and global-scale IoT applications. Expand
DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities
TLDR
A FLaaS system: DID-eFed, where FL is facilitated by decentralized identities (DID) and a smart contract, which enables a more flexible and credible decentralized access management in the system, while the smart contract offers a frictionless and less error-prone process. Expand
Analysis on the Privacy of DID Service Properties in the DID Document
  • Kyung-Hoon Kim, Seungjoo Lim, DongYeop Hwang, Ki-Hyung Kim
  • Computer Science
  • 2021 International Conference on Information Networking (ICOIN)
  • 2021
TLDR
This paper analyzes the risks of leaking sensitive information that may be included in the DID authentication process through a scenario and suggests ways to address this problem. Expand

References

SHOWING 1-10 OF 24 REFERENCES
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users
TLDR
This study describes the life cycle of remote binding with a state-machine model which helps to demystify the complexity in various designs and systematically explore the attack surfaces and brings to light questionable practices in the designs of authentication and authorization. Expand
Improving the Privacy of IoT with Decentralised Identifiers (DIDs)
TLDR
The paper analyses the resource requirements of running DIDs on the IoT devices and finds that even quite small devices can successfully deploy DIDs and proposes that the most constrained devices could rely on a proxy approach. Expand
Decentralized IoT Data Authorization with Pebble Tracker
TLDR
This is the first real-world demo for enabling decentralized IoT data authorization with DIDs and VCs and demonstrates great flexibility and tremendous advantages towards building decentralized and global-scale IoT applications. Expand
Enabling Decentralised Identifiers and Verifiable Credentials for Constrained Internet-of-Things Devices using OAuth-based Delegation
Decentralised identifiers (DIDs) and verifiable credentials (VCs) are upcoming standards for self-sovereign privacypreserving identifiers and authorisation, respectively. This focus on privacy canExpand
Internet of Things (IoT)
TLDR
There is a need for coordinated efforts from the research community to address resulting concerns, such as those presented in this special section, as well as several potential research topics identified. Expand
Design and Implementation of an IoT Access Point for Smart Home
Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, andExpand
Tell the Device Password: Smart Device Wi-Fi Connection Based on Audio Waves
TLDR
This paper proposes a new Wi-Fi connection method based on MFSK (Multiple frequency-shift keying) and works well in short distance, which enables the correctness and efficiency and puts forward an encryption solution by using jamming signal, which can greatly improve the security of the transmission. Expand
Smart Contracts : Building Blocks for Digital Markets
The contract, a set of promises agreed to in a "meeting of the minds", is the traditional way to formalize a relationship. While contracts are primarily used in business relationships (the focus ofExpand
JSON-LD 1.1 – A JSON-based Serialization for Linked Data
TLDR
This specification defines JSON-LD, a JSON-based format to serialize Linked Data, which is primarily intended to be a way to use linked Data in Web-based programming environments, to build interoperable Web services, and to store Linked data inJSON-based storage engines. Expand
Decentralized Identifiers (DIDs) v1.0 - Core architecture, data model, and representations
  • 2020
...
1
2
3
...