Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network
Title | Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Amin, A. H. M., Abdelmajid, N., Kiwanuka, F. N. |
Conference Name | 2020 Seventh International Conference on Software Defined Systems (SDS) |
Date Published | April 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-7219-4 |
Keywords | Access Control, authorisation, collaborative participation, composite identity, contracts, cryptography, data privacy, device domains, Distributed databases, distributed identity management model, Focusing, growing prevalence, heterogeneous smart applications, Human Behavior, Identity management, identity spoofing, identity storage, Identity-of-Things (IDoT), Identity-of-Things approach, Identity-of-Things model, Internet of Things, Internet-of-Things technology, IoT devices, permissioned blockchain, permissioned blockchain implementation, Permissioned blockchain Network, pubcrawl, resilience, Resiliency, rogue devices, Scalability, smart contract, Software, tamper-proof identity, telecommunication security |
Abstract | The growing prevalence of Internet-of-Things (IoT) technology has led to an increase in the development of heterogeneous smart applications. Smart applications may involve a collaborative participation between IoT devices. Participation of IoT devices for specific application requires a tamper-proof identity to be generated and stored, in order to completely represent the device, as well as to eliminate the possibility of identity spoofing and presence of rogue devices in a network. In this paper, we present a composite Identity-of-Things (IDoT) approach on IoT devices with permissioned blockchain implementation for distributed identity management model. Our proposed approach considers both application and device domains in generating the composite identity. In addition, the use of permissioned blockchain for identity storage and verification allows the identity to be immutable. A simulation has been carried out to demonstrate the application of the proposed identity management model. |
URL | https://ieeexplore.ieee.org/document/9143887 |
DOI | 10.1109/SDS49854.2020.9143887 |
Citation Key | amin_identity–things_2020 |
- pubcrawl
- Identity-of-Things approach
- Identity-of-Things model
- Internet of Things
- Internet-of-Things technology
- IoT devices
- permissioned blockchain
- permissioned blockchain implementation
- Permissioned blockchain Network
- Identity-of-Things (IDoT)
- resilience
- Resiliency
- rogue devices
- Scalability
- smart contract
- Software
- tamper-proof identity
- telecommunication security
- distributed identity management model
- authorisation
- collaborative participation
- composite identity
- contracts
- Cryptography
- data privacy
- device domains
- Distributed databases
- Access Control
- Focusing
- growing prevalence
- heterogeneous smart applications
- Human behavior
- Identity management
- identity spoofing
- identity storage