UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things

  title={UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things},
  author={Alberto Giaretta and Stefano Pepe and Nicola Dragoni},
The Internet of Things (IoT) has caused a revolutionary paradigm shift in computer networking. After decades of human-centered routines, where devices were merely tools that enabled human beings to authenticate themselves and perform activities, we are now dealing with a device-centered paradigm: the devices themselves are actors, not just tools for people. Conventional identity access management (IAM) frameworks were not designed to handle the challenges of IoT. Trying to use traditional IAM… 
Decentralized Identity and Trust Management Framework for Internet of Things
This research presents a new identity and trust framework for IoT devices, based on Distributed Ledger Technology (DLT), which provides a Web of Trust approach to enable automatic trust rating of arbitrary identities and uses the IOTA Tangle to access and store data.
The case for blockchain in IoT identity management
This paper describes the most relevant IdM systems focusing on privacy preserving with or without blockchain and evaluates them against ten selected features grouped into three categories: privacy, usability and IoT.
An Attack-Resilient Architecture for the Internet of Things
The goal of this work is to limit the ability of an attacker to exploit a vulnerable device on an IoT network and fabricate deceitful messages to co-opt other devices using device proxies that are used to retransmit and control network communications.


Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT
  • O. Novo
  • Computer Science
    IEEE Internet of Things Journal
  • 2018
This paper proposes a new architecture for arbitrating roles and permissions in IoT based on blockchain technology and shows that the blockchain technology could be used as access management technology in specific scalable IoT scenarios.
FairAccess: a new Blockchain-based access control framework for the Internet of Things
FairAccess is introduced as a fully decentralized pseudonymous and privacy preserving authorization management framework that enables users to own and control their data in IoT.
CapChain: A Privacy Preserving Access Control Framework Based on Blockchain for Pervasive Environments
  • Tam Le, M. Mutka
  • Computer Science
    2018 IEEE International Conference on Smart Computing (SMARTCOMP)
  • 2018
CapChain is proposed - an access control framework based on blockchain that allows users to share and delegate their access rights easily to IoT devices in public but still maintain privacy, and adapt multiple techniques from anonymous crypto-currency blockchain systems to hide sensitive information, including users' identities and related information about the capabilities.
Can Blockchain Strengthen the Internet of Things?
It is argued that blockchain’s decentralized nature is likely to result in a low susceptibility to manipulation and forgery by malicious participants, and could be superior to the current IoT ecosystem, which relies mainly on centralized cloud servers.
On the features and challenges of security and privacy in distributed internet of things
The purpose of this paper is to show that the distributed approach has various challenges that need to be solved, but also various interesting properties and strengths.
Bitcoin: A Peer-to-Peer Electronic Cash System
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide
The Hyperledger Project
The Hyperledger Project is a Linux Foundation initiative to develop an open source ecosystem of blockchain development. The Linux Foundation aims to create an environment in which communities of
Zerocash: Decentralized Anonymous Payments from Bitcoin
This paper formulate and construct decentralized anonymous payment schemes (DAP schemes) and builds Zero cash, a practical instantiation of the DAP scheme construction that is orders of magnitude more efficient than the less-anonymous Zero coin and competitive with plain Bit coin.
Hashcash - A Denial of Service Counter-Measure
This paper captures in one place the various applications, improvements suggested and related subsequent publications, and describes initial experience from experiments using hashcash.
Innovation diffusion and technology acceptance: The case of PKI technology
Abstract This paper proposed a model for security technology adoption and implementation through the examination of factors affecting adoption and implementation of Public Key Infrastructure (PKI)