Visible to the public Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network

TitleIdentity-of-Things Model using Composite Identity on Permissioned Blockchain Network
Publication TypeConference Paper
Year of Publication2020
AuthorsAmin, A. H. M., Abdelmajid, N., Kiwanuka, F. N.
Conference Name2020 Seventh International Conference on Software Defined Systems (SDS)
Date Published April 2020
ISBN Number978-1-7281-7219-4
KeywordsAccess Control, authorisation, collaborative participation, composite identity, contracts, cryptography, data privacy, device domains, Distributed databases, distributed identity management model, Focusing, growing prevalence, heterogeneous smart applications, Human Behavior, Identity management, identity spoofing, identity storage, Identity-of-Things (IDoT), Identity-of-Things approach, Identity-of-Things model, Internet of Things, Internet-of-Things technology, IoT devices, permissioned blockchain, permissioned blockchain implementation, Permissioned blockchain Network, pubcrawl, resilience, Resiliency, rogue devices, Scalability, smart contract, Software, tamper-proof identity, telecommunication security

The growing prevalence of Internet-of-Things (IoT) technology has led to an increase in the development of heterogeneous smart applications. Smart applications may involve a collaborative participation between IoT devices. Participation of IoT devices for specific application requires a tamper-proof identity to be generated and stored, in order to completely represent the device, as well as to eliminate the possibility of identity spoofing and presence of rogue devices in a network. In this paper, we present a composite Identity-of-Things (IDoT) approach on IoT devices with permissioned blockchain implementation for distributed identity management model. Our proposed approach considers both application and device domains in generating the composite identity. In addition, the use of permissioned blockchain for identity storage and verification allows the identity to be immutable. A simulation has been carried out to demonstrate the application of the proposed identity management model.

Citation Keyamin_identity–things_2020