Skip to main content

Rethinking Decentralised Identifiers and Verifiable Credentials for the Internet of Things

  • Chapter
  • First Online:
Internet of Things, Smart Computing and Technology: A Roadmap Ahead

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 266))

Abstract

In digital era of Internet of Things (IoT), internet-connected devices are becoming smart and autonomous. In this distributed world IoT device operate not only with the owner of the device but also need to operate with third parties, which leads to have identification for each IoT device. In the coming years, deploying IoT solutions at large scale will have to address complex issues of managing digital identity, security and identity ownership. Most of the current IoT solutions rely upon centralized client-server mechanism for providing connectivity and access to devices and services. However, when billions of devices will begin connecting simultaneously, then existing centralized solution will not suffice. Now days, we rely on federated identities however in this user need to depend on third party as users are not owner of their own identity, this leads to have Self-Sovereign Identities (SSI). In the sequel, there is a need of decentralized method for managing identities in near future. In this chapter, various identification methods are analyzed. Further, Decentralized Identifiers and Verifiable Credentials are discussed, the discussion focus on whether DID and VC are applicable to the IoT as IoT includes resource constrained devices at base level. It also presents smart home use case utilizing DID and VCs in order to evaluate its applicability. In the same line threat analysis is presented to analyze applicability of the DID and VC for the IoT applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Project CASAGRAS: CASAGRAS Final Report: RFID and the Inclusive Model for the Internet of Things. Scientific American. https://docbox.etsi.org/zArchive/TISPAN/Open/IoT/low resolution/www.rfidglobal.eu CASAGRAS IoT Final Report low resolution.pdf (2009). Accessed 28 Mar 2017

    Google Scholar 

  2. Soldatos, J.: Overview of the Internet of Things. International Telecommunication Union (ITU). https://www.itu.int/rec/T-REC-Y.2060 (2004). Accessed 28 Mar 2017

  3. L. Gyu Myoung et al., The Internet of Things Concept and Problem Statement draft lee IoT problem statement Status. https://tools.ietf.org/html/draft-lee-iot-problem-statement-00 (2011). Accessed 28 Mar 2017

  4. Dorsemaine, B., Gaulier, J.P., Wary, J.P., Kheir, N., Urien, P.: Internet of things: a definition and taxonomy. In: Proceedings—NGMAST 2015: The 9th International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 72–77 (2016)

    Google Scholar 

  5. Botterman, M.: Internet of Things: An Early Reality of the Future Internet. Report, European Commission Information Society and … http://cordis.europa.eu/pub/fp7/ict/docs/enet/iot-prague-workshop-report-vfinal-20090706_en.pdf (2009). Accessed 25 Mar 2017

  6. Rayes, A., Salam, S.: Internet of things (IoT) overview. In: Internet of Things From Hype to Reality, pp. 1–34. Springer International Publishing, Cham (2017)

    Google Scholar 

  7. Park, H., JeeSook, E., Kim, S.-H.: Crop diseases diagnosing using image-based deep learning mechanism. In: Second International Conference on Computing and Network Communications (CoCoNet’18) (2018)

    Google Scholar 

  8. Xue, R., Wang, L., Chen, J.: Using the IOT to construct ubiquitous learning environment. In: 2011 Second International Conference on Mechanic Automation and Control Engineering (2011)

    Google Scholar 

  9. Fang, H., Hu, C.: Recognizing human activity in smart home using deep learning algorithms. In: Proceedings of the 33rd Chinese Control Conference, Nanjing, China, 28–30 July 2014

    Google Scholar 

  10. Ahamed, F., Farid, F.: Applying internet of things and machine-learning for personalize healthcare: issue and challenges. In: 2018 International Conference on Machine Learning and Data Engineering (iCMLDE) (2018)

    Google Scholar 

  11. Javed, A., Larijani, H., Wixted, A.: Improving Energy Consumption of a Commercial Building with IOT and Machine Learning. Published by the IEEE Computer Society 1520-9202/18/$33.00 ©2018 IEEE

    Google Scholar 

  12. Shanthamallu, U.S., Spanias, A., Tepedelenlioglu, C., Stanley, M.: A brief survey of machine learning methods and their sensor and IOT application. In: 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA) (2017)

    Google Scholar 

  13. Kanawaday, A., Sane, A.: Machine learning for predictive maintenance of Industrial machines using IOT sensor data. In: 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS) (2017)

    Google Scholar 

  14. Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy Approach to trust based access control in internet of things. In: Wireless VITAE 2013 (2013)

    Google Scholar 

  15. Crespo-Perez, G., Ojeda-Castro, A.: Convergence of cloud computing, internet of things, and machine learning: the future of decision support system. Int. J. Sci. Technol. Res. 6(07) (2017)

    Google Scholar 

  16. Ordonez, L.D., Schweitzer, M.E., Galinsky, A.D., Bazerman, M.H.: Executive Overview SAML 101 Executive. Academy of Management Perspectives. http://marcomconsultant.com/samples/pi-saml.pdf (2009). Accessed 09 May 2017

  17. OpenID Connect | OpenID. http://openid.net/connect/. Accessed 14 Feb 2015

  18. Allen, C.: The path to self-sovereign identity. In: Life With Alacrity. http://www.lifewithalacrity.com, Apr 2016

  19. EU GDPR Report: A new era for data protection in the EU What changes after May 2018. https://ec.europa.eu/commission/sites/beta-political/files/data-protection-factsheet-changes_en.pdf

  20. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)

    Google Scholar 

  21. Sporny, M., Burnett, D.C., Longley, D., Kellogg, G.: Verifiable Credentials Data Model 1.0—Expressing verifiable information on the Web. W3C Editor’s Draft, 7 Dec 2018. https://w3c.github.io/vc-data-model. Accessed 7 Dec 2018

  22. Cazorla, L., Alcaraz, C., Lopez, J.: Cyber stealth attacks in critical information infrastructures. IEEE Syst. J. 12(2), 1778–1792 (2018)

    Article  Google Scholar 

  23. Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C., Lopez, J.: A survey of IoT-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 20(4), 3453–3495 (2018) (Fourth quarter)

    Article  Google Scholar 

  24. Lagutin, D., Kortesniemi, Y., Fotiou, N.: Enabling decentralised identifiers and verifiable credentials for constrained internet-of-things devices using OAuth-based Delegation. In: Proceedings of Workshop on Decentralized IoT Systems and Security (DISS) 2019, San Diego, CA, USA, 24 Feb 2019. ISBN 1-891562-56-8

    Google Scholar 

  25. Kortesniemi, Y., Lagutin, D., Elo, T., Fotiou, N.: Improving the privacy of IoT with decentralised identifiers (DIDs). J. Comput. Netw. Commun 2019(Article ID 8706760), 10 (2019)

    Google Scholar 

  26. Adina, P., Venkatnarayan, R.H., Shahzad, M.: Impacts & detection of network layer attacks on IoT networks. In: Mobile IoT SSP’18, Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy Article No. 2 Los Angeles, CA, USA, 26 June 2018

    Google Scholar 

  27. Sovrin Foundation: Identity for All, Sovrin Foundation, Northampton, MA, USA (2018). https://sovrin.org/

  28. VeresOne: VeresOne: a globally interoperable blockchain for identity. https://veres.one/

  29. Leach, P., Mealling, M., Salz, R.: A Universally Unique IDentifier (UUID) URN Namespace, RFC 4122, July 2005

    Google Scholar 

  30. Reyna, A., Martín, C., Chen, J., Soler, E., Díaz, M.: On blockchain and its integration with IoT challenges and opportunities. Future Gener. Comput. Syst. 88, 173–190 (2018)

    Article  Google Scholar 

  31. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Technical Report

    Google Scholar 

  32. Ethereum Foundation: White paper: Ethereum. Technical Report (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pathan Mohd Shafi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mahalle, P.N., Shinde, G., Shafi, P.M. (2020). Rethinking Decentralised Identifiers and Verifiable Credentials for the Internet of Things. In: Dey, N., Mahalle, P., Shafi, P., Kimabahune, V., Hassanien, A. (eds) Internet of Things, Smart Computing and Technology: A Roadmap Ahead. Studies in Systems, Decision and Control, vol 266. Springer, Cham. https://doi.org/10.1007/978-3-030-39047-1_16

Download citation

Publish with us

Policies and ethics