210

M. Polychronaki et al.

are, most of the time, sensitive and, therefore, must remain private identification and

access management of the devices or services that request to read or process them

is crucial to support the trust on the system and enhance its security and privacy

characteristics.

In fact, there is a significant amount of research, backed up with real-world exper-

iments, which agree on the importance of a robust identification system for IoT envi-

ronments. For example, in [13], the authors come to the conclusion that applying

a set of rules and using certain techniques for creating such a system strengthens

the defense of the overall environment from threats like a phishing attack, sniffing

attack, injections, data tampering, all kinds of unauthorized access from applica-

tions or users, Sybil Attacks and others. Because of these, the adaptation of the term

identity and access management (IAM) was created, which led to various efforts to

build IAM models to provide security and defense mechanisms for IoT over the last

decade.

At the same time, blockchain technology has established itself beginning with the

creation of Bitcoin [4], and then mainly via the decentralized finance (DeFi) sector

where a significant amount of crypto-coins have been approved as fiat and can be

usedinvariouseverydayeconomictransactions.Duetotherevolutionthatblockchain

has brought, both economically and technically, researchers are continuously trying

to find different ways of combining it with other technologies. There is no doubt,

as concluded in [57] among others, that while blockchain may introduce certain

performance delays, the benefits which are introduced in IoT’s identity management

surpass those.

In this chapter, we will study the ways in which utilizing blockchain can benefit

digital identity management in IoT systems. Specifically, we will discuss about

models, architectures and algorithms for blockchain-enhanced IAM implementa-

tions for IoT, focusing on key features of blockchain which are ideal for the imple-

mentation of safe and completely private IAM systems, such as the Zero-Knowledge

Proofs and Asymmetric Cryptography. In Sect. 1, the definition and the terminology

of IAM and blockchain are presented along with the benefits of the blockchain’s

role in IAM processes. In Sect. 2, the basic concepts of IAM are introduced along

with a presentation of the most known models on which modern IAM systems are

relied on. In Sect. 3, the techniques that bring decentralization of IAM are thoroughly

discussed, while in Sect. 4 the cryptographic tools of Zero-Knowledge Proofs (ZKP)

and Decentralized Public Key Infrastructure (DPKI) are introduced along with prac-

tical examples and implementations that highlight the significant role they play in

modern decentralized IAM applications. Last but not least, in Sect. 5 the significance,

as well as the combination of the aforementioned tools, is concluded and the topics

which need further research on decentralized IAM are briefly mentioned.