Self-Sovereign Identity: Use-cases, Technologies, and Challenges for Industrial IoT

Industrial Internet of Things applications are distributed Cyber-Physical systems with long life-cycles, with strict security requirements, that are being pervasively adopted with the proliferation of Industry 4.0. A fundamental aspect of security, in such applications, is a trustworthy identity to avoid impersonation attacks. Classical approaches for identity management usually rely on some variation of a centralized system, either based in a Public Key Infrastructure or in a central identity database. These solutions have some well-known drawbacks, notably the single point of failure in the central node and the limited scalability. Self-Sovereign Identity is a novel paradigm for digital identity allowing individuals and devices to fully own and manage their digital identities. According to this paradigm, identity artifacts can be stored by their owners and freely presented whenever a transaction requires some proof of identity, without relying on a central entity. This paper provides a review and discussion of the use-cases, technologies, and challenges that Self-Sovereign Identity faces in the context of Industrial Internet of Things’ applications. The potential advantages of using this new paradigm are discussed in detail, together with the key challenges that still need to be addressed.

[1]  Salim Hariri,et al.  Autonomic Identity Framework for the Internet of Things , 2017, 2017 International Conference on Cloud and Autonomic Computing (ICCAC).

[2]  Xue Liu,et al.  Towards Secure Industrial IoT: Blockchain System With Credit-Based Consensus Mechanism , 2019, IEEE Transactions on Industrial Informatics.

[3]  Craig Valli,et al.  A Privacy-Preserving Lightweight Biometric System for Internet of Things Security , 2019, IEEE Communications Magazine.

[4]  Jim Groom,et al.  The Path to Self-Sovereign Identity , 2017 .

[5]  Claudio Soriente,et al.  An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials , 2009, IACR Cryptol. ePrint Arch..

[6]  Alireza Esfahani,et al.  A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment , 2019, IEEE Internet of Things Journal.

[7]  Tiago M. Fernández-Caramés,et al.  A Review on the Application of Blockchain to the Next Generation of Cybersecure Industry 4.0 Smart Factories , 2019, IEEE Access.

[8]  Julian Schütte,et al.  reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[9]  Tobias Schoenherr,et al.  Electronic Procurement: A Structured Literature Review and Directions for Future Research , 2007 .

[10]  Gorjan Alagic,et al.  #p , 2019, Quantum information & computation.

[11]  Stefan Jähnichen,et al.  Self-sovereign Identity - Opportunities and Challenges for the Digital Revolution , 2017, ArXiv.

[12]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[13]  Leszek Rutkowski,et al.  A new algorithm for identity verification based on the analysis of a handwritten dynamic signature , 2016, Appl. Soft Comput..

[14]  Shahid Mumtaz,et al.  Massive Internet of Things for Industrial Applications: Addressing Wireless IIoT Connectivity Challenges and Ecosystem Fragmentation , 2017, IEEE Industrial Electronics Magazine.

[15]  Dr. Andreas H. Glas,et al.  The Impact of Industry 4 . 0 on Procurement and Supply Management : A Conceptual and Qualitative Analysis , 2016 .

[16]  Lifeng Zhou,et al.  Industry 4.0: Towards future industrial opportunities and challenges , 2015, 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).

[17]  Song Han,et al.  Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.

[18]  Danna Zhou,et al.  d. , 1840, Microbial pathogenesis.

[19]  Christoph Meinel,et al.  A Survey on Essential Components of a Self-Sovereign Identity , 2018, Comput. Sci. Rev..

[20]  John Callahan,et al.  The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity , 2017, 2018 International Joint Conference on Neural Networks (IJCNN).

[21]  L. Cong,et al.  Blockchain Disruption and Smart Contracts , 2018, The Review of Financial Studies.

[22]  Michael A. Goodrich,et al.  Human-Robot Interaction: A Survey , 2008, Found. Trends Hum. Comput. Interact..

[23]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.