Identity Management in Internet of Things with Blockchain

217

Assigning and managing roles to identities

Creation of groups of identities for mass management and scalability

Applying policies of rules regarding all the above.

The second obligation of IAM is all about an entity’s interaction with IoT

and filtering which actions are allowed and which are not by the entity using its

corresponding identity. Consequently, access management is used for:

Allow or forbid access to services and resources

Activity monitoring for administrative transparency

Provisioning of data access for privacy

Delegating access to private data or restricted services.

2.3

The Four Principles of Managing Identities and Access

By now it must be clear that IAM is not a specific framework or protocol which can

be applied to a system and succeed in providing the services of the previous section,

rather it is an abstract description of the functionalities it must offer. Every IoT

environment has different needs, different kinds of entities that might interact with

using a wide variety of communication protocols. This makes IAM a system whose

architecture needs to be designed according to the respective IoT system’s abstract

architecture and functionality. So, in order to design a robust IAM architecture and

choose the most suitable frameworks and protocols, one must consider the following

features of IAM [17]:

The Authentication Services: Authentication is the process with which an entity

can verify itself using either something they know (e.g., password, seed phrase,

mnemonic etc.), either something they own (e.g., tokens, certificate etc.) or

something that characterizes them (e.g., biometric credentials, unique circuit

characteristics etc.) [18].

The Authorization Services: Authorization includes all the policies and rules

which dictate what services and applications can be accessed by whom. Entities

within a certain environment are assigned with roles and privileges that corre-

spond to respective authorization levels, allowing them (or forbidding them) the

access to resources.

Identity Management: The identity management is the combination of technolo-

gies and tools for defining the digital identity for each entity, storing the identities’

information and updating it when a change in an entity’s account occurs. The revo-

cation of a digital identity when necessary is also one of the tasks to be handled

by the identity management services.

Federated Identity (FId): When multiple applications or organizations must work

within the same environment, while each of them has its own rules and policies,

the use of a federated identity service can make things easier. Instead of the user

providing credentials directly to each application, the FId acts as an intermediate