| Literature DB >> 30513733 |
Abstract
The Internet of Things aims at connecting everything, ranging from individuals, organizations, and companies to things in the physical and virtual world. The digital identity has always been considered as the keystone for all online services and the foundation for building security mechanisms such as authentication and authorization. However, the current literature still lacks a comprehensive study on the digital identity management for the Internet of Things (IoT). In this paper, we firstly identify the requirements of building identity management systems for IoT, which comprises scalability, interoperability, mobility, security and privacy. Then, we trace the identity problem back to the origin in philosophy, analyze the Internet digital identity management solutions in the context of IoT and investigate recent surging blockchain sovereign identity solutions. Finally, we point out the promising future research trends in building IoT identity management systems and elaborate challenges of building a complete identity management system for the IoT, including access control, privacy preserving, trust and performance respectively.Entities:
Keywords: access control; blockchain; decentralized; identity; privacy; security; trust
Year: 2018 PMID: 30513733 PMCID: PMC6308926 DOI: 10.3390/s18124215
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Stakeholders from the traditional IdMS model.
Identity management initiatives comparison.
| Scalability | Interoperability | Mobility | Security & Privacy | User-Centric | |
|---|---|---|---|---|---|
| PRIMELife(PRIME) | * | * | * | ||
| SWIFT(DAIDALOS) | * | * | * | * | |
| Kantara(Liberty) | * | * | * | * | |
| FIDIS | * | * | * | * | |
| SAML | * | ||||
| Higgins | * | * | * | ||
| OpenID | * | * | |||
| Shibboleth | * | ||||
| STORK | * | * | * | ||
| PICOS | * | * | * | * | * |
| Cardspace | * | * | * | * |
Blockchain identity management solutions.
| DNS | PKI | Storage | Bitcoin | Ethereum | Full | Reputation | Privacy | Year | |
|---|---|---|---|---|---|---|---|---|---|
| Namecoin | * | * | 2014 | ||||||
| Certcoin | * | * | * | 2014 | |||||
| Fromknecht | * | * | * | 2014 | |||||
| Uport | * | * | 2015 | ||||||
| Sovrin | * | * | * | * | 2016 | ||||
| Jolocom | * | * | 2016 | ||||||
| Blockstack | * | * | * | * | 2016 | ||||
| Authcoin | * | * | * | 2016 | |||||
| ChainAnchor | * | * | * | 2016 | |||||
| Liu et al | * | * | * | 2017 | |||||
| NEXTLEAP | * | * | 2017 | ||||||
| Azouvi | * | * | * | 2017 | |||||
| Axon | * | * | * | 2017 | |||||
| Augot | * | * | * | 2017 | |||||
| SCPKI | * | * | 2017 |
Figure 2Overview of blockchain based identity management solutions.