UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things

  title={UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things},
  author={Alberto Giaretta and Stefano Pepe and Nicola Dragoni},
The Internet of Things (IoT) has caused a revolutionary paradigm shift in computer networking. After decades of human-centered routines, where devices were merely tools that enabled human beings to authenticate themselves and perform activities, we are now dealing with a device-centered paradigm: the devices themselves are actors, not just tools for people. Conventional identity access management (IAM) frameworks were not designed to handle the challenges of IoT. Trying to use traditional IAM… 
Decentralized Identity and Trust Management Framework for Internet of Things
This research presents a new identity and trust framework for IoT devices, based on Distributed Ledger Technology (DLT), which provides a Web of Trust approach to enable automatic trust rating of arbitrary identities and uses the IOTA Tangle to access and store data.
The case for blockchain in IoT identity management
This paper describes the most relevant IdM systems focusing on privacy preserving with or without blockchain and evaluates them against ten selected features grouped into three categories: privacy, usability and IoT.
An Attack-Resilient Architecture for the Internet of Things
The goal of this work is to limit the ability of an attacker to exploit a vulnerable device on an IoT network and fabricate deceitful messages to co-opt other devices using device proxies that are used to retransmit and control network communications.


Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT
  • O. Novo
  • Computer Science
    IEEE Internet of Things Journal
  • 2018
This paper proposes a new architecture for arbitrating roles and permissions in IoT based on blockchain technology and shows that the blockchain technology could be used as access management technology in specific scalable IoT scenarios.
FairAccess: a new Blockchain-based access control framework for the Internet of Things
FairAccess is introduced as a fully decentralized pseudonymous and privacy preserving authorization management framework that enables users to own and control their data in IoT.
CapChain: A Privacy Preserving Access Control Framework Based on Blockchain for Pervasive Environments
  • Tam Le, M. Mutka
  • Computer Science
    2018 IEEE International Conference on Smart Computing (SMARTCOMP)
  • 2018
CapChain is proposed - an access control framework based on blockchain that allows users to share and delegate their access rights easily to IoT devices in public but still maintain privacy, and adapt multiple techniques from anonymous crypto-currency blockchain systems to hide sensitive information, including users' identities and related information about the capabilities.
Can Blockchain Strengthen the Internet of Things?
It is argued that blockchain’s decentralized nature is likely to result in a low susceptibility to manipulation and forgery by malicious participants, and could be superior to the current IoT ecosystem, which relies mainly on centralized cloud servers.
Bitcoin: A Peer-to-Peer Electronic Cash System
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.
The Hyperledger Project
This chapter talks about the current state of the Hyperledger Project, with a focus on the currently incubating projects, a summary of the project scope being implemented, and a review of the comprehensive set of technologies involved in creating an open source enterprise-grade blockchain.
Zerocash: Decentralized Anonymous Payments from Bitcoin
This paper formulate and construct decentralized anonymous payment schemes (DAP schemes) and builds Zero cash, a practical instantiation of the DAP scheme construction that is orders of magnitude more efficient than the less-anonymous Zero coin and competitive with plain Bit coin.
Hashcash - A Denial of Service Counter-Measure
This paper captures in one place the various applications, improvements suggested and related subsequent publications, and describes initial experience from experiments using hashcash.
Innovation diffusion and technology acceptance: The case of PKI technology