UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things

@article{Giaretta2019UniquIDAQ,
  title={UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things},
  author={Alberto Giaretta and Stefano Pepe and Nicola Dragoni},
  journal={ArXiv},
  year={2019},
  volume={abs/1905.04021}
}
The Internet of Things (IoT) has caused a revolutionary paradigm shift in computer networking. After decades of human-centered routines, where devices were merely tools that enabled human beings to authenticate themselves and perform activities, we are now dealing with a device-centered paradigm: the devices themselves are actors, not just tools for people. Conventional identity access management (IAM) frameworks were not designed to handle the challenges of IoT. Trying to use traditional IAM… 

Decentralized Identity and Trust Management Framework for Internet of Things

This research presents a new identity and trust framework for IoT devices, based on Distributed Ledger Technology (DLT), which provides a Web of Trust approach to enable automatic trust rating of arbitrary identities and uses the IOTA Tangle to access and store data.

The case for blockchain in IoT identity management

This paper describes the most relevant IdM systems focusing on privacy preserving with or without blockchain and evaluates them against ten selected features grouped into three categories: privacy, usability and IoT.

Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey

An extensive literature review of state-of-the-art academic publications as well as commercial market offerings regarding the applicability of BC-based SSI solutions and a detailed preliminary regarding the building blocks of blockchain technology and a progressive roadmap of IDMS solutions are presented.

An Attack-Resilient Architecture for the Internet of Things

The goal of this work is to limit the ability of an attacker to exploit a vulnerable device on an IoT network and fabricate deceitful messages to co-opt other devices using device proxies that are used to retransmit and control network communications.

Blockchain-Empowered Space-Air-Ground Integrated Networks: Opportunities, Challenges, and Solutions

This article presents a comprehensive survey of the integration of blockchain technologies for securing SAG-IoT applications, and discusses the architecture, characteristics, and security threats of SAG,air-ground IoT systems, as well as focusing on the promising blockchain-based solutions for S AG-IioT security.

References

SHOWING 1-10 OF 19 REFERENCES

Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT

  • O. Novo
  • Computer Science
    IEEE Internet of Things Journal
  • 2018
This paper proposes a new architecture for arbitrating roles and permissions in IoT based on blockchain technology and shows that the blockchain technology could be used as access management technology in specific scalable IoT scenarios.

FairAccess: a new Blockchain-based access control framework for the Internet of Things

FairAccess is introduced as a fully decentralized pseudonymous and privacy preserving authorization management framework that enables users to own and control their data in IoT.

CapChain: A Privacy Preserving Access Control Framework Based on Blockchain for Pervasive Environments

  • Tam LeM. Mutka
  • Computer Science
    2018 IEEE International Conference on Smart Computing (SMARTCOMP)
  • 2018
CapChain is proposed - an access control framework based on blockchain that allows users to share and delegate their access rights easily to IoT devices in public but still maintain privacy, and adapt multiple techniques from anonymous crypto-currency blockchain systems to hide sensitive information, including users' identities and related information about the capabilities.

Can Blockchain Strengthen the Internet of Things?

It is argued that blockchain’s decentralized nature is likely to result in a low susceptibility to manipulation and forgery by malicious participants, and could be superior to the current IoT ecosystem, which relies mainly on centralized cloud servers.

Bitcoin: A Peer-to-Peer Electronic Cash System

This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.

The Hyperledger Project

This chapter talks about the current state of the Hyperledger Project, with a focus on the currently incubating projects, a summary of the project scope being implemented, and a review of the comprehensive set of technologies involved in creating an open source enterprise-grade blockchain.

Zerocash: Decentralized Anonymous Payments from Bitcoin

This paper formulate and construct decentralized anonymous payment schemes (DAP schemes) and builds Zero cash, a practical instantiation of the DAP scheme construction that is orders of magnitude more efficient than the less-anonymous Zero coin and competitive with plain Bit coin.

Hashcash - A Denial of Service Counter-Measure

This paper captures in one place the various applications, improvements suggested and related subsequent publications, and describes initial experience from experiments using hashcash.

Walking the Web of trust

  • G. Caronni
  • Computer Science
    Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)
  • 2000
The paper concludes with the presentation of an efficient, sub-exponential algorithm that allows heuristic computations of trust paths in a web of trust.