Skip to main content

Self-Sovereign Identity for IoT Devices

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2019 (ICCSA 2019)

Abstract

This work is an overview of different approaches to the self-sovereign identity (SSI) concept. The idea of constructing of a digital passport for each and every person in the world is not unique, but with the growing interest and progress of distributed ledgers, a new way of dealing with existing problems appeared. On the other hand, in our point of view, a lot of development groups are working in parallel on the similar topics, yet it is not clear what is going on inside. In this paper we will try to define the differences and discuss both pros and cons of using such commonly known technologies as Sovrin based upon the Hyperledger Indy technology, Civic, Jolocom, uPort and some others. Besides, we’ll tackle the idea of using the SSI for inanimate object and how it can be constructed in this way.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and languages for privacy-preserving attribute-based authentication. In: Fischer-Hübner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IAICT, vol. 396, pp. 34–52. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37282-7_4

    Chapter  Google Scholar 

  2. https://w3c-ccg.github.io/did-spec/

  3. https://www.ethereum.org/

  4. https://bitcoin.org/en/

  5. https://www.iota.org/

  6. https://www.hyperledger.org/projects/hyperledger-indy

  7. Security Team, Computer Science Dept., IBM Research, Specification of the Identity Mixer Cryptographic Library, p. 49 (2010)

    Google Scholar 

  8. https://www.microsoft.com/en-us/research/project/u-prove/

  9. Veseli, F., Serna, J.: Evaluation of privacy-ABC technologies - a study on the computational efficiency. In: Habib, S.M.M., Vassileva, J., Mauw, S., Mühlhäuser, M. (eds.) IFIPTM 2016. IAICT, vol. 473, pp. 63–78. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41354-9_5

    Chapter  Google Scholar 

  10. Sanchez, J.L.C., Bernabe, J.B., Skarmeta, A.F.: Integration of Anonymous Credential Systems in IoT Constrained Environments, p. 11 (2018)

    Google Scholar 

  11. Wagner, K., Némethi, B., Renieris, E., Lang, P., Brunet, E., Holst, E.: Self-sovereign Identity. A position paper on blockchain enabled identity and the road ahead, p. 57 (2018)

    Google Scholar 

  12. https://github.com/WebOfTrustInfo/rwot4-paris/blob/master/topics-and-advance-readings/dkms-decentralized-key-mgmt-system.md

  13. SovrinTM: A Protocol and Token for Self-Sovereign Identity and Decentralized Trust, A White Paper from the Sovrin Foundation, p. 42 (2018). https://sovrin.org/wp-content/uploads/2018/03/Sovrin-Protocol-and-Token-White-Paper.pdf

  14. The Sovrin Trust Framework Working Group, Sovrin Provisional Trust Framework, p. 30 (2017). https://sovrin.org/wp-content/uploads/2018/03/Sovrin-Provisional-Trust-Framework-2017-06-28.pdf

  15. Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation, p. 24 (2004)

    Google Scholar 

  16. Camenisch, J., Drijvers, M., Lehmann, A.: Anonymous attestation using the strong Diffie Hellman assumption revisited. In: Franz, M., Papadimitratos, P. (eds.) Trust 2016. LNCS, vol. 9824, pp. 1–20. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45572-3_1

    Chapter  Google Scholar 

  17. Jhttps://ssimeetup.org/

  18. Garman, C., Green, M., Miers I.: Decentralized Anonymous Credentials, p. 21 (2013)

    Google Scholar 

  19. Fei, C., Lohkamp, J., Rusu, E., Szawan, K., Wagner, K., Wittenberg, N.: Self-Sovereign and Decentralised Identity By Design, Jolocom Technical White Paper, p. 10 (2018)

    Google Scholar 

  20. Rannenberg, K., Camenisch, J., Sabouri, A.: Attribute-Based Credentials for Trust, p. 395. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-14439-9

    Book  Google Scholar 

  21. Neven, G.: A Quick Introduction to Anonymous Credentials, p. 4 (2008)

    Google Scholar 

  22. https://www.uport.me

  23. https://www.civic.com/

  24. https://jolocom.io/

  25. https://veres.one

  26. https://ont.io

  27. https://remme.io/

  28. https://identity.foundation/

  29. https://w3c-ccg.github.io/did-method-registry/

  30. https://uniresolver.io/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nataliia Kulabukhova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kulabukhova, N., Ivashchenko, A., Tipikin, I., Minin, I. (2019). Self-Sovereign Identity for IoT Devices. In: Misra, S., et al. Computational Science and Its Applications – ICCSA 2019. ICCSA 2019. Lecture Notes in Computer Science(), vol 11620. Springer, Cham. https://doi.org/10.1007/978-3-030-24296-1_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24296-1_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24295-4

  • Online ISBN: 978-3-030-24296-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics