128
A. Banerjee et al.
A Credential Definition can be made and saved in the Ledger by any Trust Anchor.
By and large, the issuer offers a credential. Then, the holder demands the credential,
providing the blinded connection secret that will tie it to them. At long last, the issuer
creates the accreditation and offers it to the holder.
3.3.2
Onboarding Process for a Drone (Entry into the Network)
The onboarding process is what new drones (say Dx) go through before joining
Network D, shown in Fig. 10. This is also the part where the presence of SSI
through DID shines. As mentioned earlier, SSI or self-sovereign identity allows for
partial disclosure without compromising trust. This means that details like a drone’s
company or its manufacturing technology can be kept under wraps even if it joins
the Network D. In our example, let’s assume that there is a composite network of
drones from various manufacturers, and these drones are commissioned by an Entity
“ABC” (this may be a Government Consortium in a real-world scenario or a single
individual). There are drones bought from three different companies—DJI (Dajiang)
Innovations, Ambarella, and Boeing (at the time of writing these are touted as three
of the biggest names in this field by Business Insider [31]). Network D is, thus,
a composite of different types of drones from different manufacturers wishing to
prevent technology theft on their part. Figure 10 shows the start of the onboarding
of a New Drone Dx made by Boeing into Network D.
Fig. 10 The onboarding process of drones