Abstract
In digital era of Internet of Things (IoT), internet-connected devices are becoming smart and autonomous. In this distributed world IoT device operate not only with the owner of the device but also need to operate with third parties, which leads to have identification for each IoT device. In the coming years, deploying IoT solutions at large scale will have to address complex issues of managing digital identity, security and identity ownership. Most of the current IoT solutions rely upon centralized client-server mechanism for providing connectivity and access to devices and services. However, when billions of devices will begin connecting simultaneously, then existing centralized solution will not suffice. Now days, we rely on federated identities however in this user need to depend on third party as users are not owner of their own identity, this leads to have Self-Sovereign Identities (SSI). In the sequel, there is a need of decentralized method for managing identities in near future. In this chapter, various identification methods are analyzed. Further, Decentralized Identifiers and Verifiable Credentials are discussed, the discussion focus on whether DID and VC are applicable to the IoT as IoT includes resource constrained devices at base level. It also presents smart home use case utilizing DID and VCs in order to evaluate its applicability. In the same line threat analysis is presented to analyze applicability of the DID and VC for the IoT applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Project CASAGRAS: CASAGRAS Final Report: RFID and the Inclusive Model for the Internet of Things. Scientific American. https://docbox.etsi.org/zArchive/TISPAN/Open/IoT/low resolution/www.rfidglobal.eu CASAGRAS IoT Final Report low resolution.pdf (2009). Accessed 28 Mar 2017
Soldatos, J.: Overview of the Internet of Things. International Telecommunication Union (ITU). https://www.itu.int/rec/T-REC-Y.2060 (2004). Accessed 28 Mar 2017
L. Gyu Myoung et al., The Internet of Things Concept and Problem Statement draft lee IoT problem statement Status. https://tools.ietf.org/html/draft-lee-iot-problem-statement-00 (2011). Accessed 28 Mar 2017
Dorsemaine, B., Gaulier, J.P., Wary, J.P., Kheir, N., Urien, P.: Internet of things: a definition and taxonomy. In: Proceedings—NGMAST 2015: The 9th International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 72–77 (2016)
Botterman, M.: Internet of Things: An Early Reality of the Future Internet. Report, European Commission Information Society and … http://cordis.europa.eu/pub/fp7/ict/docs/enet/iot-prague-workshop-report-vfinal-20090706_en.pdf (2009). Accessed 25 Mar 2017
Rayes, A., Salam, S.: Internet of things (IoT) overview. In: Internet of Things From Hype to Reality, pp. 1–34. Springer International Publishing, Cham (2017)
Park, H., JeeSook, E., Kim, S.-H.: Crop diseases diagnosing using image-based deep learning mechanism. In: Second International Conference on Computing and Network Communications (CoCoNet’18) (2018)
Xue, R., Wang, L., Chen, J.: Using the IOT to construct ubiquitous learning environment. In: 2011 Second International Conference on Mechanic Automation and Control Engineering (2011)
Fang, H., Hu, C.: Recognizing human activity in smart home using deep learning algorithms. In: Proceedings of the 33rd Chinese Control Conference, Nanjing, China, 28–30 July 2014
Ahamed, F., Farid, F.: Applying internet of things and machine-learning for personalize healthcare: issue and challenges. In: 2018 International Conference on Machine Learning and Data Engineering (iCMLDE) (2018)
Javed, A., Larijani, H., Wixted, A.: Improving Energy Consumption of a Commercial Building with IOT and Machine Learning. Published by the IEEE Computer Society 1520-9202/18/$33.00 ©2018 IEEE
Shanthamallu, U.S., Spanias, A., Tepedelenlioglu, C., Stanley, M.: A brief survey of machine learning methods and their sensor and IOT application. In: 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA) (2017)
Kanawaday, A., Sane, A.: Machine learning for predictive maintenance of Industrial machines using IOT sensor data. In: 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS) (2017)
Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy Approach to trust based access control in internet of things. In: Wireless VITAE 2013 (2013)
Crespo-Perez, G., Ojeda-Castro, A.: Convergence of cloud computing, internet of things, and machine learning: the future of decision support system. Int. J. Sci. Technol. Res. 6(07) (2017)
Ordonez, L.D., Schweitzer, M.E., Galinsky, A.D., Bazerman, M.H.: Executive Overview SAML 101 Executive. Academy of Management Perspectives. http://marcomconsultant.com/samples/pi-saml.pdf (2009). Accessed 09 May 2017
OpenID Connect | OpenID. http://openid.net/connect/. Accessed 14 Feb 2015
Allen, C.: The path to self-sovereign identity. In: Life With Alacrity. http://www.lifewithalacrity.com, Apr 2016
EU GDPR Report: A new era for data protection in the EU What changes after May 2018. https://ec.europa.eu/commission/sites/beta-political/files/data-protection-factsheet-changes_en.pdf
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)
Sporny, M., Burnett, D.C., Longley, D., Kellogg, G.: Verifiable Credentials Data Model 1.0—Expressing verifiable information on the Web. W3C Editor’s Draft, 7 Dec 2018. https://w3c.github.io/vc-data-model. Accessed 7 Dec 2018
Cazorla, L., Alcaraz, C., Lopez, J.: Cyber stealth attacks in critical information infrastructures. IEEE Syst. J. 12(2), 1778–1792 (2018)
Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C., Lopez, J.: A survey of IoT-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 20(4), 3453–3495 (2018) (Fourth quarter)
Lagutin, D., Kortesniemi, Y., Fotiou, N.: Enabling decentralised identifiers and verifiable credentials for constrained internet-of-things devices using OAuth-based Delegation. In: Proceedings of Workshop on Decentralized IoT Systems and Security (DISS) 2019, San Diego, CA, USA, 24 Feb 2019. ISBN 1-891562-56-8
Kortesniemi, Y., Lagutin, D., Elo, T., Fotiou, N.: Improving the privacy of IoT with decentralised identifiers (DIDs). J. Comput. Netw. Commun 2019(Article ID 8706760), 10 (2019)
Adina, P., Venkatnarayan, R.H., Shahzad, M.: Impacts & detection of network layer attacks on IoT networks. In: Mobile IoT SSP’18, Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy Article No. 2 Los Angeles, CA, USA, 26 June 2018
Sovrin Foundation: Identity for All, Sovrin Foundation, Northampton, MA, USA (2018). https://sovrin.org/
VeresOne: VeresOne: a globally interoperable blockchain for identity. https://veres.one/
Leach, P., Mealling, M., Salz, R.: A Universally Unique IDentifier (UUID) URN Namespace, RFC 4122, July 2005
Reyna, A., MartÃn, C., Chen, J., Soler, E., DÃaz, M.: On blockchain and its integration with IoT challenges and opportunities. Future Gener. Comput. Syst. 88, 173–190 (2018)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Technical Report
Ethereum Foundation: White paper: Ethereum. Technical Report (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Mahalle, P.N., Shinde, G., Shafi, P.M. (2020). Rethinking Decentralised Identifiers and Verifiable Credentials for the Internet of Things. In: Dey, N., Mahalle, P., Shafi, P., Kimabahune, V., Hassanien, A. (eds) Internet of Things, Smart Computing and Technology: A Roadmap Ahead. Studies in Systems, Decision and Control, vol 266. Springer, Cham. https://doi.org/10.1007/978-3-030-39047-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-39047-1_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39046-4
Online ISBN: 978-3-030-39047-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)