Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions
Abstract
:1. Introduction
- Scalability: Internet of Things will comprise billions of individuals, collectives and everything in the cyber physical world, which demands highly scalable identity management. Apparently, using the traditional centralized IdM scheme where all IoT identities are maintained by one universal third party to build the highly scalable IdM solution becomes extremely unrealistic. Inevitably, there will be many different identity providers from different IdM systems. Albeit, the federated identity management solutions such as SAML [8] and Shibboleth [9], where different identities from different IdM systems can be managed, break the barriers between different IdM systems following the federation standards and successfully bring a silver lining of designing the IoT IdMS. However, in trustless networks, trust should be taken into account, that is how to build mutual trust relationships between different IdM systems. Consequently, identity management should be scalable and trusted in distributed trustless networks without a centralized control of any security authorities (i.e., identity providers, central access servers, etc.).
- Interoperability: The spectrum of objects makes them extremely heterogeneous with different communication, information and processing capabilities. Each object would be subjected to various technologies such wireless communication technologies (IEEE 802.15.4, WiFi, Bluetooth Low Energy, etc.), communication protocols (CoAP, LORA, MQTT, etc.), cellular communication technologies (GSM, UMTS, LTE, etc.) and hardware-dependent controllers (Arduino, Intel Edison, Raspberry, Eaglebone, etc.) [10]. Diversity and heterogeneity lead to interoperability problems, therefore, unifying all identities of IoT objects from different manufactures, vendors, communities and standard groups has been considered to be an impossible mission. Despite many recent initiatives, the emergence of standards remains highly fragmented, leading to divergence in vocabularies, methods and models (OneM2M [11], IoT reference architecture [12], etc.). The design of interoperable identity management of IoT objects remains balkanized without an integrative approach to make real progress in reducing software, hardware and communication heterogeneity.
- Mobility: The IoT is ubiquitous, which means IoT devices, such as vehicles or wearable devices, are subject to strong mobile capability. The mobility ensures users to connect services continuously even when moving [13]. No matter where these devices are located, we need to authenticate ourselves, get authorization and access controls to the corresponding device services [14]. Therefore, the identity management for the IoT should be characterized by mobility and provide a peer-to-peer authentication and authorization services.
2. The Law of Identity in the Philosophy of Logic
3. Traditional IdMS on the Internet
4. The Rise of Blockchain Identity Solutions
4.1. Blockchain Technology
4.2. Elucidation of Identity and Naming Systems
4.3. Blockchain-Based IdMS
- Identities of individuals (i.e., human beings) and collectives (e.g., companies, banks, governments, etc.) can be selectively stored in the blockchain without compromising privacy.
- Individuals and collectives issue claims to each other using these blockchain identities. Basically, claims are the endorsement by other individuals or collectives, which could be governments, banks, universities or even friends.
- The individual or collective, for instance Alice, could generate and add as many identity attributes (identifier, public and private key pairs, biometrics, etc.) as she wants.
- The individual or collective will create the blockchain identity through submitting identity related information such as public keys and the corresponding signatures.
- The individual or collective could use the public and private keypairs, which are correlated to the mined blockchain identity, to issue claims.
4.4. A Sliver of Light
5. Challenges in IdMS for IoT
5.1. Access Controls
- How can an effective access control mechanism be designed that could universally manage access permissions to various IoT entities (people, things, services, etc.) without worrying about the rapid growth of users, roles and policies?
- How can the access control mechanism in trustless IoT environment be built if the “trusted” third-party identity providers are removed using blockchain technology?
5.2. Privacy
- Identity information protection from identity providers
- Sensitive application data protection from service providers
5.3. Trust
5.4. Performance
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Telecommunication Standardization Sector—Overview of the Internet of Things. Available online: https://www.itu.int/rec/T-REC-Y.2060-201206-I (accessed on 31 August 2018).
- Gartner Says 6.4 Billion Connected “Things” Will Be in Use in 2016, Up 30 Percent from 2015. Available online: http://www.gartner.com/newsroom/id/3165317 (accessed on 31 August 2018).
- Zhu, X.; Badr, Y. A Survey on Blockchain-based Identity Management Systems for the Internet of Things. In Proceedings of the 2018 IEEE Symposium on Blockchain, Halifax, NS, Canada, 30 July–5 August 2018; pp. 1568–1573. [Google Scholar]
- Telecommunication Standardization Sector—NGN Identity Management Framework. Available online: https://www.itu.int/rec/T-REC-Y.2720-200901-I (accessed on 31 August 2018).
- Alpar, G.; Hoepman, J.H.; Siljee, J. The Identity Crisis Security, Privacy and Usability Issues in Identity Management. arXiv, 2011; arXiv:1101.0427. [Google Scholar]
- Senate Banking Committee Hearing on Equifax Data Breach. Available online: https://www.c-span.org/video/?434469-1/equifax-ceo-testifies-senate-banking-panel (accessed on 31 August 2018).
- Facebook Security Breach Exposes Accounts of 50 Million Users. Available online: https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html (accessed on 31 August 2018).
- Security Services Technical Committee of OASIS—Security Assertion Markup Language (SAML) v2.0. Available online: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=security (accessed on 31 August 2018).
- Cantor, S.; Scavo, T. Shibboleth Architecture. Protoc. Profiles 2005, 10, 16. [Google Scholar]
- Li, S.; Xu, L.D.; Zhao, S. The Internet of Things: A Survey. Inf. Syst. Front. 2014, 17, 243–259. [Google Scholar] [CrossRef]
- Swetina, J.; Lu, G.; Jacobs, P.; Ennesser, F.; Song, J. Toward a standardized common M2M service layer platform: Introduction to oneM2M. IEEE Wirel. Commun. 2014, 21, 20–26. [Google Scholar] [CrossRef]
- Bauer, M.; Bui, N.; Carrez, F.; Giacomin, P.; Haller, S.; Ho, E.; Jardak, C.; De Loof, J.; Magerkurth, C.; Serbanati, A.; et al. Introduction to the Architectural Reference Model for the Internet of Things. Available online: https://iotforum.org/wp-content/uploads/2014/09/120613-IoT-A-ARM-Book-Introduction-v7.pdf (accessed on 9 November 2018).
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Vasilomanolakis, E.; Daubert, J.; Luthra, M.; Gazis, V.; Wiesmaier, A.; Kikiras, P. On the Security and Privacy of Internet of Things Architectures and Systems. In Proceedings of the International Workshop on Secure Internet of Things (SIoT), Vienna, Austria, 21–25 September 2015. [Google Scholar]
- Thanh, D.V.; Jørstad, I. The Ambiguity of Identity. J. Identity Manag. 2007, 103, 3–10. [Google Scholar]
- The Stanford Encyclopedia of Philosophy (Winter 2016 Edition)—The Identity of Indiscernibles. Available online: https://plato.stanford.edu/archives/win2016/entries/identity-indiscernible (accessed on 31 August 2018).
- Hodgson, D. “Know Your Customer”: Marketing, Governmentality and the “New Consumer” of Financial Services. Manag. Decis. 2002, 40, 318–328. [Google Scholar] [CrossRef]
- Bertino, E.; Takahashi, K. Identity Management: Concepts, Technologies, and Systems; Artech House: Norwood, MA, USA, 2011. [Google Scholar]
- Jøsang, A.; Pope, S. User Centric Identity Management. In Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, Brisbane, Australia, 22–26 May 2005. [Google Scholar]
- Jøsang, A.; Zomai, M.A.; Suriadi, S. Usability and Privacy in Identity Management Architectures. In Proceedings of the Fifth Australasian Symposium on ACSW Frontiers, Ballarat, Australia, 30 January–2 February 2007. [Google Scholar]
- Maler, E.; Reed, D. The Venn of identity: Options and issues in federated identity management. IEEE Secur. Priv. 2008, 6, 16–23. [Google Scholar] [CrossRef]
- Angin, P.; Bhargava, B.; Ranchal, R.; Singh, N.; Linderman, M.; Othmane, L.B.; Lilien, L. An entity-centric approach for privacy and identity management in cloud computing. In Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS’10), New Delhi, India, 31 October–3 November 2010; pp. 177–183. [Google Scholar]
- Recordon, D.; Reed, D. OpenID 2.0: A Platform for User-centric Identity Management. In Proceedings of the Second ACM Workshop on Digital Identity Management, Alexandria, VA, USA, 3 November 2006. [Google Scholar]
- Hardt, D. The OAuth 2.0 Authorization Framework. 2012. Available online: https://tools.ietf.org/html/rfc6749 (accessed on 31 August 2018).[Green Version]
- Suriadi, S.; Foo, E.; Jøsang, A. A User-centric Federated Single Sign-on System. J. Netw. Comput. Appl. 2009, 32, 388–401. [Google Scholar] [CrossRef] [Green Version]
- Ahn, G.; Ko, M.; Shehab, M. Privacy-enhanced User-Centric Identity Management. In Proceedings of the IEEE International Conference on Communications, Dresden, Germany, 14–18 June 2009. [Google Scholar]
- PRIMELife—Privacy and Identity Management in Europe for Life. Available online: http://primelife.ercim.eu (accessed on 31 August 2018).
- SWIFT—Secure Widespread Identities for Federated Telecommunications. Available online: https://www.swift.com (accessed on 31 August 2018).
- DAIDALOS—Designing Advanced Network Interfaces for the Delivery and Administration of Location Independent, Optimised Personal Services. Available online: https://www.tssg.org/projects/daidalos/ (accessed on 31 August 2018).
- Kantara. Available online: http://kantarainitiative.org (accessed on 31 August 2018).
- Liberty—The Liberty Alliance Project. Available online: http://www.projectliberty.org (accessed on 31 August 2018).
- Matyas, V.; Fischer-Hübner, S.; Cvrcek, D.; Švenda, P. The Future of Identity in the Information Society; Springer: Berlin, Germany, 2009. [Google Scholar]
- Higgins—Open Source Identity Framework. Available online: http://www.eclipse.org/higgins (accessed on 31 August 2018).
- STORK—Secure idenTity acrOss boRders linKed. Available online: https://www.eid-stork.eu (accessed on 31 August 2018).
- PICOS—Privacy and Identity Management for Community Services. Available online: http://www.picos-project.eu (accessed on 31 August 2018).
- Bertocci, V.; Serack, G.; Baker, C. Understanding Windows Cardspace: An Introduction to the Concepts and Challenges of Digital Identities; Addison Wesley: Boston, MA, USA, 2007. [Google Scholar]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 31 August 2018).
- Ethereum—A Next-Generation Smart Contract and Decentralized Application Platform. Available online: https://github.com/Ethereum/wiki/wiki/White-Paper (accessed on 31 August 2018).
- Security and Privacy Are Critical Issues Facing the Development of the Internet of Things. Available online: https://networkworld.com/article/3166106/internet-of-things/4-critical-security-challenges-facing-iot.html (accessed on 31 August 2018).
- Ouaddah, A.; Elkalam, A.; Ouahman, A. FairAccess: a new Blockchain based access control framework for the Internet of Things. Secur. Commun. Netw. 2016, 9, 5943–5964. [Google Scholar] [CrossRef]
- Dorri, A.; Kanhere, S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT Security and Privacy: The Case Study of a Smart Home. In Proceedings of the 2017 IEEE International Conference on Security and Communication Workshops (PerCom Workshops), Kona, HI, USA, 13–17 March 2016. [Google Scholar]
- Zhu, X.; Badr, Y.; Pacheco, J.; Hariri, S. Autonomic Identity Framework for the Internet of Things. In Proceedings of the 2017 International Conference on Cloud and Autonomic Computing (ICCAC), Tucson, AZ, USA, 18–22 September 2017; pp. 69–79. [Google Scholar]
- Namecoin. Available online: https://namecoin.org (accessed on 31 August 2018).
- Zooko’s Triangle. Available online: https://en.wikipedia.org/wiki/Zooko%27s_triangle (accessed on 31 August 2018).
- Fromknecht, C.; Dragos, V.; Sophia, Y. CertCoin: A NameCoin Based Decentralized Authentication System 6.857 Class Project. 2014. Available online: http://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubov-certcoin.pdf (accessed on 31 August 2018).
- Leiding, B.; Cap, C.H.; Mundt, T.; Samaneh, R. Authcoin: Validation and Authentication in Decentralized Networks. 2016. Available online: https://arxiv.org/pdf/1609.04955.pdf (accessed on 31 August 2018).
- Muneeb, A.; Nelson, J.; Shea, R.; Freedman, M. Blockstack: A Global Naming and Storage System Secured by Blockchains. In Proceedings of the 2016 USENIX Annual Technical Conference, Denver, CO, USA, 22–24 June 2016; pp. 181–194. [Google Scholar]
- Fromknecht, C.; Velicanu, D.; Yakoubov, S. A Decentralized Public Key Infrastructure with Identity Retention. IACR Cryptology ePrint Archive, Report 2014/803. 2014. Available online: http://eprint.iacr.org/2014/803.pdf (accessed on 31 August 2018).
- Al-Bassam, M. SCPKI: A Smart Contract-based PKI and Identity System. In Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, Abu Dhabi, UAE, 2 April 2017; pp. 35–40. [Google Scholar]
- Liu, Y.; Zhao, Z.; Guo, G.; Wang, X.; Tan, Z.; Wang, S. An Identity Management System Based on Blockchain. 2017. Available online: https://www.ucalgary.ca/pst2017/files/pst2017/paper-8.pdf (accessed on 31 August 2018).
- Axon, L. Privacy-Awareness in Blockchain-Based PKI; Oxford University Research Archive: Oxford, UK, 2015. [Google Scholar]
- Augot, D.; Chabanne, H.; Clémot, O.; George, W. Transforming Face-to-Face Identity Proofing Into Anonymous Digital Identity Using the Bitcoin Blockchain. 2017. Available online: https://arxiv.org/abs/1710.02951 (accessed on 31 August 2018).
- Augot, D.; Chabanne, H.; Chenevier, T.; George, W.; Lambert, L. A User-Centric System for Verified Identities on the Bitcoin Blockchain. In Data Privacy Management, Cryptocurrencies and Blockchain Technology; Springer: Berlin, Germany, 2017; pp. 390–407. [Google Scholar]
- Brands, S. Rethinking Public Key Infrastructures and Digital Certificates; MIT Press: Cambridge, MA, USA, 2000. [Google Scholar]
- Hardjono, T.; Pentland, A. Verifiable Anonymous Identities and Access Control in Permissioned Blockchains. 2016. Available online: http://connection.mit.edu/wp-content/uploads/sites/29/2014/12/ChainAnchor-Identities-04172016.pdf (accessed on 31 August 2018).
- Halpin, H. NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging. In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 August–1 September 2017; p. 92. [Google Scholar]
- Azouvi, S.; Al-Bassam, M.; Meiklejohn, S. Who am i? Secure identity registration on distributed ledgers. In Data Privacy Management, Cryptocurrencies and Blockchain Technology; Springer: Berlin, Germany, 2017; pp. 373–389. [Google Scholar]
- Uport: Open Identity System for the Decentralized Web. Available online: https://www.uport.me/ (accessed on 31 August 2018).
- Shocard: Secure Enterprise Identity Authentication. Available online: https://shocard.com/ (accessed on 31 August 2018).
- Bitnation: Governance 2.0. Available online: https://bitnation.co/ (accessed on 31 August 2018).
- Civic Secure Identity Ecosystem—Decentralized Identity & Reusable KYC. Available online: https://www.civic.com/ (accessed on 31 August 2018).
- Decentralized Infrastructure for Self-Sovereign Identity. Available online: http://jolocom.io/ (accessed on 31 August 2018).
- Sovrin-Identity for All. Available online: https://sovrin.org/ (accessed on 31 August 2018).
- Self-Sovereign Identity. Available online: https://www.evernym.com/ (accessed on 31 August 2018).
- An Alliance Commited to Improving Lives through Digital Identity. Available online: https://id2020.org/ (accessed on 31 August 2018).
- Ethereum Identity Standard. Available online: https://github.com/Ethereum/EIPs/issues/725 (accessed on 9 Novemver 2018).
- W3C Decentralized Identifiers Specification. Available online: https://w3c-ccg.github.io/did-spec/ (accessed on 9 Novemver 2018).
- Harness the Power of Ethereum. Available online: https://new.consensys.net/ (accessed on 31 August 2018).
- Atzori, L.; Iera, A.; Morabito, G.; Nitti, M. The Social Internet of Things (Siot)—When Social Networks Meet the Internet of Things: Concept, Architecture and Network Characterization. Comput. Netw. 2012, 56, 3594–3608. [Google Scholar] [CrossRef]
- Zhu, X.; Badr, Y. Fog Computing Security Architecture for the Internet of Things using Blockchain-based Social Networks. In Proceedings of the 2018 IEEE Symposium on Blockchain, Halifax, NS, Canada, 30 July–5 August 2018; pp. 1361–1366. [Google Scholar]
- Sandhu, R.S.; Coyne, E.J.; Feinstein, H.L.; Youman, C.E. Role-Based Access Control Models. Computer 1996, 29, 38–47. [Google Scholar] [CrossRef]
- Hernandez-Ramos, J.L.; Jara, A.J.; Marın, L.; Skarmeta, A.F. Distributed Capability-Based Access Control for the Internet of Things. J. Internet Serv. Inf. Secur. (JISIS) 2013, 3, 1–16. [Google Scholar]
- Gusmeroli, S.; Piccione, S.; Rotondi, D. A Capability-Based Security Approach to Manage Access Control on the Internet of Things. Math. Comput. Model. 2013, 58, 1189–1205. [Google Scholar] [CrossRef]
- Hussein, D.; Bertin, E.; Frey, V. A Community-Driven Access Control Approach in Distributed IoT Environments. IEEE Commun. Mag. 2017, 55, 146–153. [Google Scholar] [CrossRef]
- Outchakoucht, A.; Hamza, E.S.; Leroy, J.P. Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 417–424. [Google Scholar] [CrossRef]
- Maesa, D.D.F.; Mori, P.; Ricci, L. Blockchain based Access Control. In Proceedings of the IFIP International Conference on Distributed Applications and Interoperable Systems, Neuchâtel, Switzerland, 19–22 June 2017; pp. 206–220. [Google Scholar]
- Evans, D.; Eyers, D. Efficient Data Tagging for Managing Privacy on the Internet of Things. In Proceedings of the IEEE International Conference on Green Computing and Communications, Besancon, France, 20–23 November 2012; pp. 244–248. [Google Scholar]
- Huang, X.; Fu, R.; Chen, B.; Zhang, T.; Roscoe, A. User Interactive Internet of Things Privacy Preserved Access Control. In Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, London, UK, 10–12 December 2012; pp. 597–602. [Google Scholar]
- Wang, Y.; Wen, Q. A Privacy Enhanced DNS Scheme for the Internet of Things. In Proceedings of the IET International Conference on Communication Technology and Application, Beijing, China, 14–16 October 2011; pp. 699–702. [Google Scholar]
- Kosba, A.; Miller, A.; Shi, E.; Wen, Z.; Papamanthou, C. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA, 2–26 May 2016; pp. 839–858. [Google Scholar]
- Hardjono, T.; Smith, N.; Pentland, A.S. Anonymous Identities for Permissioned Blockchains. Available online: http://connection.mit.edu/wp-content/uploads/sites/29/2014/12/Anonymous-Identities-for-Permissioned-Blockchains2.pdf (accessed on 28 November 2018).
- Hardjono, T.; Smith, N. Cloud-based Commissioning of Constrained Devices using Permissioned Blockchains. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, Xi’an, China, 30 May 2016; pp. 29–36. [Google Scholar]
- Parno, B.; Howell, J.; Gentry, C.; Raykova, M. Pinocchio: Nearly practical verifiable computation. In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 19–22 May 2013; pp. 238–252. [Google Scholar]
- Jawurek, M.; Kerschbaum, F.; Orlandi, C. Zero-knowledge using Garbled Circuits: How to Prove Non-algebraic Statements Efficiently. In Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, 4–8 November 2013; pp. 955–966. [Google Scholar]
- Ben-Sasson, E.; Chiesa, A.; Tromer, E.; Virza, M. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. In Proceedings of the USENIX Security Symposium, San Diego, CA, USA, 20–22 August 2014; pp. 781–796. [Google Scholar]
- Giacomelli, I.; Madsen, J.; Orlandi, C. ZKBoo: Faster Zero-Knowledge for Boolean Circuits. In Proceedings of the USENIX Security Symposium, Austin, TX, USA, 10–12 August 2016; pp. 1069–1083. [Google Scholar]
- Ben-Sasson, E.; Bentov, I.; Horesh, Y.; Riabzev, M. Scalable, transparent, and post-quantum secure computational integrity. Available online: https://www.monoico.com/wp-content/uploads/2018/05/046.pdf (accessed on 28 November 2018).
- Bünz, B.; Bootle, J.; Boneh, D.; Poelstra, A.; Wuille, P.; Maxwell, G. Bulletproofs: Short proofs for confidential transactions and more. In Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 21–23 May 2018; pp. 319–338. [Google Scholar]
- Sasson, E.B.; Chiesa, A.; Garman, C.; Green, M.; Miers, I.; Tromer, E.; Virza, M. Zerocash: Decentralized anonymous payments from bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 18–21 May 2014; pp. 459–474. [Google Scholar]
- Monero-Private Digital Currency. Available online: https://www.getmonero.org (accessed on 11 September 2018).
- Sicari, S.; Rizzardi, A.; Grieco, L.A.; Coen-Porisini, A. Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. 2015, 76, 146–164. [Google Scholar] [CrossRef]
- Chen, D.; Chang, G.; Sun, D.; Li, J.; Jia, J.; Wang, X. TRM-IoT: A Trust Management Model based on Fuzzy Reputation for Internet of Things. Comput. Sci. Inf. Syst. 2011, 8, 1207–1228. [Google Scholar] [CrossRef]
- Nitti, M.; Girau, R.; Atzori, L.; Iera, A.; Morabito, G. A subjective model for trustworthiness evaluation in the social internet of things. In Proceedings of the IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications, Sydney, Australia, 9–12 September 2012; pp. 18–23. [Google Scholar]
- Nitti, M.; Girau, R.; Atzori, L. Trustworthiness management in the social internet of things. IEEE Trans. Knowl. Data Eng. 2014, 26, 1253–1266. [Google Scholar] [CrossRef]
- Chen, R.; Bao, F.; Guo, J. Trust-based service management for social internet of things systems. IEEE Trans. Dependable Secur. Comput. 2016, 13, 684–696. [Google Scholar] [CrossRef]
- Bao, F.; Chen, I.R. Dynamic trust management for internet of things applications. In Proceedings of the International Workshop on Self-Aware Internet of Things, San Jose, CA, USA, 17 September 2012; pp. 1–6. [Google Scholar]
- Jogalekar, P.; Woodside, M. Evaluating the scalability of distributed systems. IEEE Trans. Parallel Distrib. Syst. 2000, 11, 589–603. [Google Scholar] [CrossRef] [Green Version]
- Gervais, A.; Karame, G.O.; Wüst, K.; Glykantzis, V.; Ritzdorf, H.; Capkun, S. On the Security and Performance of Proof of Work Blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 3–16. [Google Scholar]
- Dinh, T.T.A.; Wang, J.; Chen, G.; Liu, R.; Ooi, B.C.; Tan, K. Blockbench: A framework for analyzing private blockchains. In Proceedings of the 2017 ACM International Conference on Management of Data, Chicago, IL, USA, 14–19 May 2017; pp. 1085–1100. [Google Scholar]
Scalability | Interoperability | Mobility | Security & Privacy | User-Centric | |
---|---|---|---|---|---|
PRIMELife(PRIME) | * | * | * | ||
SWIFT(DAIDALOS) | * | * | * | * | |
Kantara(Liberty) | * | * | * | * | |
FIDIS | * | * | * | * | |
SAML | * | ||||
Higgins | * | * | * | ||
OpenID | * | * | |||
Shibboleth | * | ||||
STORK | * | * | * | ||
PICOS | * | * | * | * | * |
Cardspace | * | * | * | * |
DNS | PKI | Storage | Bitcoin Based | Ethereum Based | Full Stack | Reputation | Privacy | Year | |
---|---|---|---|---|---|---|---|---|---|
Namecoin | * | * | 2014 | ||||||
Certcoin | * | * | * | 2014 | |||||
Fromknecht | * | * | * | 2014 | |||||
Uport | * | * | 2015 | ||||||
Sovrin | * | * | * | * | 2016 | ||||
Jolocom | * | * | 2016 | ||||||
Blockstack | * | * | * | * | 2016 | ||||
Authcoin | * | * | * | 2016 | |||||
ChainAnchor | * | * | * | 2016 | |||||
Liu et al | * | * | * | 2017 | |||||
NEXTLEAP | * | * | 2017 | ||||||
Azouvi | * | * | * | 2017 | |||||
Axon | * | * | * | 2017 | |||||
Augot | * | * | * | 2017 | |||||
SCPKI | * | * | 2017 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhu, X.; Badr, Y. Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions. Sensors 2018, 18, 4215. https://doi.org/10.3390/s18124215
Zhu X, Badr Y. Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions. Sensors. 2018; 18(12):4215. https://doi.org/10.3390/s18124215
Chicago/Turabian StyleZhu, Xiaoyang, and Youakim Badr. 2018. "Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions" Sensors 18, no. 12: 4215. https://doi.org/10.3390/s18124215
APA StyleZhu, X., & Badr, Y. (2018). Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions. Sensors, 18(12), 4215. https://doi.org/10.3390/s18124215