Identity Management in Internet of Things with Blockchain

223

The Issuer: Issues VCs by checking with the verifiable data registry for valid

identifiers and schemas to use

The Validator: Responsible for validating the identifiers and schemas used through

the verifiable data registry during the process of authorization or authentication

The Verifiable Data Registry: The system which is able to create and validate

identifiers, schemas, cryptographic keys or check the revocation list for a given

identity. Trusted databases, decentralized databases and distributed ledgers are

some of the examples of verifiable data registries.

The validity of a VC comes from the fact that it must contain certain information

regarding the issuers and identifiers which is correlated with, as well as the crypto-

graphic signatures which prove that the corresponding entity is the one unique holder

of the identity.

3.3

SSI Implementations for IoT

IoT has proven to be one of the technologies that will shape the next-generation

internet along with other technologies such as artificial intelligence and machine

learning. However, the scalability of larger IoT ecosystems is constrained due to

the performance issues which centralized architectures introduce, especially when

it comes to preserving security and privacy. Blockchain can bring the decentraliza-

tion of IoT and relieve the performance load allowing the ecosystems to scale both

horizontally by multiplying the number of devices they can support and vertically

by enhancing the functionality of each device, respectively.

In [27], the authors describe a framework for globally decentralized identity and

access management for IoT (DIAM-IoT), which leverages the benefits which smart

contracts and cryptographic wallets offer on a blockchain network. This framework

focuses on the lack of device-specific functionalities which should be considered

regarding the implementation of IAM systems for IoT. Thus, in the context of DIAM-

IoT, it is supposed that IoT device manufacturers provided the blockchain network

with their own specified smart contract in order to offer the end users the ability to

register their own devices if they are willing to do so. DIAM-IoT utilizes both DIDs

and VCs for binding devices with their owners using cryptographic keys and signed

documents while through these the visibility over a device’s data is also controlled

with the permission of the owner.

The authors in [28], conducting a comparative analysis on different identity

models and their implementation methods, presented the benefits of utilizing the

SSI model in IoT contrasting existing solutions for identification such as X.509

certificates [29] or Pretty Good Privacy (PGP) [30]. Similarly, with the DIAM-IoT

framework, the implementation of SSI is possible through the use of DID which is a

combination of DID documents and VCs, which introduces true privacy and layered

authentication across the users and devices of an IoT ecosystem.