Identity Management in Internet of Things with Blockchain

235

and communications workshops (PerCom workshops). Kona, HI, pp 618–623. https://doi.org/

10.1109/PERCOMW.2017.7917634

6. Novo O (2018) Blockchain meets IoT: an architecture for scalable access management in IoT.

IEEE Internet Things J 5(2):1184–1195. https://doi.org/10.1109/JIOT.2018.2812239

7. Huh S, Cho S, Kim S (2017) Managing IoT devices using blockchain platform. In: 2017 19th

international conference on advanced communication technology (ICACT). Bongpyeong, pp

464–467. https://doi.org/10.23919/ICACT.2017.7890132

8. Thakur MA, Gaikwad R (2015) User identity and access management trends in IT

infrastructure- an overview. In: 2015 International conference on pervasive computing (ICPC).

Pune, pp 1–4. https://doi.org/10.1109/PERVASIVE.2015.7086972

9. Chen J, Liu Y, Chai Y (2015) An identity management framework for Internet of Things.

In: 2015 IEEE 12th international conference on e-business engineering. Beijing, pp 360–364.

https://doi.org/10.1109/ICEBE.2015.67

10. Raikwar M, Gligoroski D, Kralevska K (2019) SoK of used cryptography in blockchain. IEEE

Access 7:148550–148575. https://doi.org/10.1109/ACCESS.2019.2946983

11. Kshetri N (2017) Can blockchain strengthen the Internet of Things? IT Prof 19(4):68–72.

https://doi.org/10.1109/MITP.2017.3051335

12. Rana R, Zaeem RN, Barber KS (2019) An assessment of blockchain identity solutions: mini-

mizing risk and liability of authentication. In: 2019 IEEE/WIC/ACM international conference

on web intelligence (WI). Thessaloniki, Greece, pp 26–33

13. Consensys, (2019) Welcome to uPortlandia, the future of data and identity management,

in medium. https://media.consensys.net/welcome-to-uportlandia-the-future-of-data-and-ide

ntity-management-53220ea4e5c. (Online)

14. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models.

Computer 29(2):38–47. https://doi.org/10.1109/2.485845

15. Hu V, Kuhn VD, Ferraiolo D (2015) Attribute-based access control. Computer 48(2):85–88

16. Kunz M, Puchta A, Groll S, Fuchs L, Pernul G (2019) Attribute quality management for

dynamic identity and access management. J Inf Secur Appl 44:64–79

17. Sharma A, Sharma S, Dave M (2015) Identity and access management- a comprehensive study.

In: 2015 International conference on green computing and Internet of Things (ICGCIoT).

Greater Noida, India, pp 1481–1485. https://doi.org/10.1109/ICGCIoT.2015.7380701

18. Conrad E, Misenar S, Feldman J (2016) Domain 5: identity and access management (controlling

access and managing identity). CISSP Study Guide 293–327

19. W3 (2021), Decentralized Identifiers (DIDs) v1.0. W3.org. https://www.w3.org/TR/did-core/.

(Online)

20. Hardt D (2021) RFC 6749—the OAuth 2.0 authorization framework. Tools.ietf.org. <https://

tools.ietf.org/html/rfc6749>. (Online)

21. Grüner A, Mühle A, Gayvoronskaya T, Meinel C (2019) A comparative analysis of trust

requirements in decentralized identity management. Adv Inf Netw Appl 200–213

22. Dib O, Toumi K (2020) Decentralized identity systems: architecture, challenges, solutions

and future directions. Ann Emerg Technol Comput 4(5):19–40. https://doi.org/10.33166/aetic.

2020.05.002

23. Kuperberg M (2020) Blockchain-based identity management: a survey from the enterprise and

ecosystem perspective. IEEE Trans Eng Manage 67(4):1008–1027. https://doi.org/10.1109/

tem.2019.2926471

24. Toth KC, Anderson-Priddy A (2019) Self-sovereign digital identity: a paradigm shift for

identity. IEEE Secur Priv 17(3):17–27. https://doi.org/10.1109/MSEC.2018.2888782

25. Allen C, The path for self-sovereign identity. http://www.lifewithalacrity.com/2016/04/the-

path-to-self-soverereign-identity.html

26. W3 (2021) Verifiable credentials data model 1.0. W3.org. https://www.w3.org/TR/vc-data-

model/. (Online)

27. FanX,ChaiQ,XuL,GuoD(2020)DIAM-IoT:adecentralizedidentityandaccessmanagement

framework for Internet of Things. In: Proceedings of the 2nd ACM international symposium

on blockchain and secure critical infrastructure. https://doi.org/10.1145/3384943.3409436