Rethinking Decentralised Identifiers and Verifiable Credentials for the Internet of Things

In digital era of Internet of Things (IoT), internet-connected devices are becoming smart and autonomous. In this distributed world IoT device operate not only with the owner of the device but also need to operate with third parties, which leads to have identification for each IoT device. In the coming years, deploying IoT solutions at large scale will have to address complex issues of managing digital identity, security and identity ownership. Most of the current IoT solutions rely upon centralized client-server mechanism for providing connectivity and access to devices and services. However, when billions of devices will begin connecting simultaneously, then existing centralized solution will not suffice. Now days, we rely on federated identities however in this user need to depend on third party as users are not owner of their own identity, this leads to have Self-Sovereign Identities (SSI). In the sequel, there is a need of decentralized method for managing identities in near future. In this chapter, various identification methods are analyzed. Further, Decentralized Identifiers and Verifiable Credentials are discussed, the discussion focus on whether DID and VC are applicable to the IoT as IoT includes resource constrained devices at base level. It also presents smart home use case utilizing DID and VCs in order to evaluate its applicability. In the same line threat analysis is presented to analyze applicability of the DID and VC for the IoT applications.

[1]  Farnaz Farid,et al.  Applying Internet of Things and Machine-Learning for Personalized Healthcare: Issues and Challenges , 2018, 2018 International Conference on Machine Learning and Data Engineering (iCMLDE).

[2]  Nikos Fotiou,et al.  Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation , 2019, Proceedings 2019 Workshop on Decentralized IoT Systems and Security.

[3]  Aditya Sane,et al.  Machine learning for predictive maintenance of industrial machines using IoT sensor data , 2017, 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[4]  Andreas Spanias,et al.  A brief survey of machine learning methods and their sensor and IoT applications , 2017, 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA).

[5]  Manuel Díaz,et al.  On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[6]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[7]  Nikos Fotiou,et al.  Improving the Privacy of IoT with Decentralised Identifiers (DIDs) , 2019, J. Comput. Networks Commun..

[8]  Liang Wang,et al.  Using the IOT to construct ubiquitous learning environment , 2011, 2011 Second International Conference on Mechanic Automation and Control Engineering.

[9]  Chen Hu,et al.  Recognizing human activity in smart home using deep learning algorithm , 2014, Proceedings of the 33rd Chinese Control Conference.

[10]  Se-Han Kim,et al.  Crops Disease Diagnosing Using Image-Based Deep Learning Mechanism , 2018, 2018 International Conference on Computing and Network Communications (CoCoNet).

[11]  Gilberto Crespo-Perez,et al.  Convergence Of Cloud Computing, Internet Of Things, And Machine Learning: The Future Of Decision Support Systems , 2017 .

[12]  Raghav H. Venkatnarayan,et al.  Impacts & Detection of Network Layer Attacks on IoT Networks , 2018, Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy.

[13]  Cristina Alcaraz,et al.  Cyber Stealth Attacks in Critical Information Infrastructures , 2018, IEEE Systems Journal.

[14]  Pascal Urien,et al.  Internet of Things: A Definition & Taxonomy , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[15]  Cristina Alcaraz,et al.  A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services , 2018, IEEE Communications Surveys & Tutorials.