128

A. Banerjee et al.

A Credential Definition can be made and saved in the Ledger by any Trust Anchor.

By and large, the issuer offers a credential. Then, the holder demands the credential,

providing the blinded connection secret that will tie it to them. At long last, the issuer

creates the accreditation and offers it to the holder.

3.3.2

Onboarding Process for a Drone (Entry into the Network)

The onboarding process is what new drones (say Dx) go through before joining

Network D, shown in Fig. 10. This is also the part where the presence of SSI

through DID shines. As mentioned earlier, SSI or self-sovereign identity allows for

partial disclosure without compromising trust. This means that details like a drone’s

company or its manufacturing technology can be kept under wraps even if it joins

the Network D. In our example, let’s assume that there is a composite network of

drones from various manufacturers, and these drones are commissioned by an Entity

“ABC” (this may be a Government Consortium in a real-world scenario or a single

individual). There are drones bought from three different companies—DJI (Dajiang)

Innovations, Ambarella, and Boeing (at the time of writing these are touted as three

of the biggest names in this field by Business Insider [31]). Network D is, thus,

a composite of different types of drones from different manufacturers wishing to

prevent technology theft on their part. Figure 10 shows the start of the onboarding

of a New Drone Dx made by Boeing into Network D.

Fig. 10 The onboarding process of drones