A Survey on Identity Management for the Future Network

The Internet as a platform for ubiquitous communication has quickly advanced in the last years. New services have emphasized the limits of the current Internet and motivated the development of the Future Internet. Future communication infrastructures intend to be more distributed and, ideally, more secure, resulting in high complexity. Further, as new technologies emerge, new requirements and security issues are highlighted. These issues reinforce the importance of Identity Management systems for the network infrastructure in the Future Internet, termed Future Network, to provide adequate dynamic services in relation to user's personal data and requirements. Hence, this survey presents the state of the art of Identity Management systems for the Future Network. It highlights the existing architectures, specific devices applied, challenges and future perspectives.

[1]  R. Venkatesha Prasad,et al.  Cognitive functionality in next generation wireless networks: standardization efforts , 2008, IEEE Communications Magazine.

[2]  Ken Klingenstein,et al.  Federated Security: The Shibboleth Approach , 2004 .

[3]  Audun Jøsang,et al.  Trust Requirements in Identity Management , 2005, ACSW.

[4]  Identity Management Systems (IMS): Identification and Comparison Study Independent Centre for Privacy Protection (ICPP) / Unabhängiges Landeszentrum für Datenschutz (ULD) , 2004 .

[5]  Marit Hansen,et al.  Privacy and Identity Management , 2008, IEEE Security & Privacy.

[6]  K Bosworth,et al.  Entities, identities, identifiers and credentials — what does it all mean? , 2005 .

[7]  Chris J. Mitchell,et al.  Privacy in Identity and Access Management Systems , 2012 .

[8]  Michael Friedewald,et al.  Safeguards in a world of ambient intelligence , 2008 .

[9]  Steven M. Bellovin,et al.  Cybersecurity through an Identity Management System , 2009 .

[10]  Cédric Tabin,et al.  Liberty Alliance Project , 2007 .

[11]  Kumbesan Sandrasegaran,et al.  Network management challenges for next generation networks , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.

[12]  Qi Shi,et al.  Context-Aware Identity Management in Pervasive Ad-hoc Environments , 2009, Int. J. Adv. Pervasive Ubiquitous Comput..

[13]  Grossi Luigi,et al.  RFID Technologies: Emerging Issues, Challenges and Policy Options , 2007 .

[14]  Gabi Dreo Rodosek,et al.  TOPICS IN NETWORK AND SERVICE MANAGEMENT , 2009 .

[15]  Federico Alvarez,et al.  System architecture for enriched semantic personalized media search and retrieval in the future media internet , 2011, IEEE Communications Magazine.

[16]  J. Camenisch,et al.  Title: First Annual Research Report the Prime Project Receives Research Funding from the Community's Sixth Framework Programme and the Swiss Federal Office for Education and Science. Privacy and Identity Management for Europe Prime Privacy and Identity Management for Europe , 2005 .

[17]  Marco Conti,et al.  Modelling Social-Aware Forwarding in Opportunistic Networks , 2010, PERFORM.

[18]  Max Mühlhäuser,et al.  Towards Trustworthy Identity and Access Management for the Future Internet , 2010 .

[19]  Abbas Jamalipour,et al.  A network selection mechanism for next generation networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[20]  James Won-Ki Hong,et al.  Towards Management of Next Generation Networks , 2007, IEICE Trans. Commun..

[21]  Raj Jain,et al.  Architectures for the future networks and the next generation Internet: A survey , 2011, Comput. Commun..

[22]  Anastasius Gavras,et al.  The Future Internet.The Future Internet , 2013 .

[23]  Siu-Ming Yiu,et al.  SPECS: Secure and privacy enhancing communications schemes for VANETs , 2011, Ad Hoc Networks.

[24]  Ali Dehghantanha,et al.  A Review of Vulnerabilities in Identity Management Using Biometrics , 2010, 2010 Second International Conference on Future Networks.

[25]  Theodore S. Rappaport,et al.  Short-Range Wireless Communications for Next-Generation Networks: UWB, 60 GHz Millimeter-Wave WPAN, And ZigBee , 2007, IEEE Wireless Communications.

[26]  Jean-Marc Seigneur,et al.  A Survey of User-centric Identity Management Technologies , 2007, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007).

[27]  Jaap-Henk Hoepman,et al.  The Identity Crisis. Security, Privacy and Usability Issues in Identity Management , 2011, ArXiv.

[28]  Patrick Robertson,et al.  Pervasive Computing in Daidalos , 2011, IEEE Pervasive Computing.

[29]  Jozef Vyskoc,et al.  Future of Identity in the Information Society , 2009 .

[30]  Michael Kreutzer,et al.  Mobile Identity Management , 2002 .

[31]  Ning Wang,et al.  Curling: Content-ubiquitous resolution and delivery infrastructure for next-generation services , 2011, IEEE Communications Magazine.

[32]  Kishor S. Trivedi,et al.  Network survivability modeling , 2009, Comput. Networks.

[33]  L. Veltri,et al.  SIP-based mobility management in next generation networks , 2008, IEEE Wireless Communications.

[34]  Kevin Roebuck,et al.  Encryption: High-impact Strategies - What You Need to Know Definitions, Adoptions, Impact, Benefits, Maturity, Vendors , 2011 .

[35]  Gang Li,et al.  A Survey on Wireless Grids and Clouds , 2009, 2009 Eighth International Conference on Grid and Cooperative Computing.

[36]  V. Latora,et al.  Complex networks: Structure and dynamics , 2006 .

[37]  G. Roussos,et al.  MOBILE IDENTITY MANAGEMENT , 2002 .

[38]  James L. Wayman,et al.  Biometrics in Identity Management Systems , 2008, IEEE Security & Privacy.

[39]  Dirk Scheuermann,et al.  Security and privacy enablers for future Identity Management systems , 2010, 2010 Future Network & Mobile Summit.

[40]  Rachna Dhamija,et al.  The Seven Flaws of Identity Management: Usability and Security Challenges , 2008, IEEE Security & Privacy.

[41]  Virgílio A. F. Almeida,et al.  Characterizing user behavior in online social networks , 2009, IMC '09.

[42]  Elisa Bertino,et al.  Identity Management: Concepts, Technologies, and Systems , 2010 .

[43]  Christian Niephaus,et al.  User-centric identity enabled QoS policy management for Next Generation Internet , 2008 .

[44]  Uwe Glässer,et al.  Identity management architecture , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.

[45]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[46]  Bart van Delft,et al.  A Security Analysis of OpenID , 2010, IDMAN.

[47]  Kang G. Shin,et al.  In-band spectrum sensing in cognitive radio networks: energy detection or feature detection? , 2008, MobiCom '08.

[48]  Amardeo Sarma,et al.  Identities in the Future Internet of Things , 2009, Wirel. Pers. Commun..

[49]  Rong Zhang,et al.  Services in the Cloud Computing era: A survey , 2010, 2010 4th International Universal Communication Symposium.

[50]  Lin Yang,et al.  A survey of Identity Management technology , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[51]  Rui L. Aguiar,et al.  Pervasive Services for Next Generation Heterogeneous Networks , 2006 .

[52]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[53]  Debnath Bhattacharyya,et al.  Biometric Authentication: A Review , 2009 .

[54]  Yanghee Choi,et al.  A Survey on content-oriented networking for efficient content delivery , 2011, IEEE Communications Magazine.

[55]  Antonio F. Gómez-Skarmeta,et al.  Identity based architecture for secure communication in future internet , 2010, DIM '10.