Identity Management in Internet of Things with Blockchain
235
and communications workshops (PerCom workshops). Kona, HI, pp 618–623. https://doi.org/
10.1109/PERCOMW.2017.7917634
6. Novo O (2018) Blockchain meets IoT: an architecture for scalable access management in IoT.
IEEE Internet Things J 5(2):1184–1195. https://doi.org/10.1109/JIOT.2018.2812239
7. Huh S, Cho S, Kim S (2017) Managing IoT devices using blockchain platform. In: 2017 19th
international conference on advanced communication technology (ICACT). Bongpyeong, pp
464–467. https://doi.org/10.23919/ICACT.2017.7890132
8. Thakur MA, Gaikwad R (2015) User identity and access management trends in IT
infrastructure- an overview. In: 2015 International conference on pervasive computing (ICPC).
Pune, pp 1–4. https://doi.org/10.1109/PERVASIVE.2015.7086972
9. Chen J, Liu Y, Chai Y (2015) An identity management framework for Internet of Things.
In: 2015 IEEE 12th international conference on e-business engineering. Beijing, pp 360–364.
https://doi.org/10.1109/ICEBE.2015.67
10. Raikwar M, Gligoroski D, Kralevska K (2019) SoK of used cryptography in blockchain. IEEE
Access 7:148550–148575. https://doi.org/10.1109/ACCESS.2019.2946983
11. Kshetri N (2017) Can blockchain strengthen the Internet of Things? IT Prof 19(4):68–72.
https://doi.org/10.1109/MITP.2017.3051335
12. Rana R, Zaeem RN, Barber KS (2019) An assessment of blockchain identity solutions: mini-
mizing risk and liability of authentication. In: 2019 IEEE/WIC/ACM international conference
on web intelligence (WI). Thessaloniki, Greece, pp 26–33
13. Consensys, (2019) Welcome to uPortlandia, the future of data and identity management,
in medium. https://media.consensys.net/welcome-to-uportlandia-the-future-of-data-and-ide
ntity-management-53220ea4e5c. (Online)
14. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models.
Computer 29(2):38–47. https://doi.org/10.1109/2.485845
15. Hu V, Kuhn VD, Ferraiolo D (2015) Attribute-based access control. Computer 48(2):85–88
16. Kunz M, Puchta A, Groll S, Fuchs L, Pernul G (2019) Attribute quality management for
dynamic identity and access management. J Inf Secur Appl 44:64–79
17. Sharma A, Sharma S, Dave M (2015) Identity and access management- a comprehensive study.
In: 2015 International conference on green computing and Internet of Things (ICGCIoT).
Greater Noida, India, pp 1481–1485. https://doi.org/10.1109/ICGCIoT.2015.7380701
18. Conrad E, Misenar S, Feldman J (2016) Domain 5: identity and access management (controlling
access and managing identity). CISSP Study Guide 293–327
19. W3 (2021), Decentralized Identifiers (DIDs) v1.0. W3.org. https://www.w3.org/TR/did-core/.
(Online)
20. Hardt D (2021) RFC 6749—the OAuth 2.0 authorization framework. Tools.ietf.org. <https://
tools.ietf.org/html/rfc6749>. (Online)
21. Grüner A, Mühle A, Gayvoronskaya T, Meinel C (2019) A comparative analysis of trust
requirements in decentralized identity management. Adv Inf Netw Appl 200–213
22. Dib O, Toumi K (2020) Decentralized identity systems: architecture, challenges, solutions
and future directions. Ann Emerg Technol Comput 4(5):19–40. https://doi.org/10.33166/aetic.
2020.05.002
23. Kuperberg M (2020) Blockchain-based identity management: a survey from the enterprise and
ecosystem perspective. IEEE Trans Eng Manage 67(4):1008–1027. https://doi.org/10.1109/
tem.2019.2926471
24. Toth KC, Anderson-Priddy A (2019) Self-sovereign digital identity: a paradigm shift for
identity. IEEE Secur Priv 17(3):17–27. https://doi.org/10.1109/MSEC.2018.2888782
25. Allen C, The path for self-sovereign identity. http://www.lifewithalacrity.com/2016/04/the-
path-to-self-soverereign-identity.html
26. W3 (2021) Verifiable credentials data model 1.0. W3.org. https://www.w3.org/TR/vc-data-
model/. (Online)
27. FanX,ChaiQ,XuL,GuoD(2020)DIAM-IoT:adecentralizedidentityandaccessmanagement
framework for Internet of Things. In: Proceedings of the 2nd ACM international symposium
on blockchain and secure critical infrastructure. https://doi.org/10.1145/3384943.3409436