Abstract

Distributed identity technology provides solutions to many of the faults currently found in federated identity systems. Applying this technology to internet of things devices has many possible benefits in the realm of device authentication. However, this also provides new challenges not present in existing distributed identity systems. The large number of devices that would enter and leave the system means balancing sybil attack vulnerability and linkage attack vulnerability becomes challenging. Internet of things devices also have less memory and computing power than a standard personal computer or phone. This means any protocol to execute distributed identity in these devices must not be computationally taxing on the devices. As well, if the internet of things devices should provide data from their sensors to the chain, the protocol must have a method to verify the validity of the data. The existing protocols that have been developed each target these issues in different ways, but none design a protocol perfect for all desired use-cases.

Faculty Advisor/Mentor

Bouk Safdar

Document Type

Paper

Disciplines

Information Security

DOI

10.25776/7xhd-7668

Publication Date

2022

Upload File

wf_yes

Share

COinS
 

A Review of Distributed Identity Technology in IoT Devices

Distributed identity technology provides solutions to many of the faults currently found in federated identity systems. Applying this technology to internet of things devices has many possible benefits in the realm of device authentication. However, this also provides new challenges not present in existing distributed identity systems. The large number of devices that would enter and leave the system means balancing sybil attack vulnerability and linkage attack vulnerability becomes challenging. Internet of things devices also have less memory and computing power than a standard personal computer or phone. This means any protocol to execute distributed identity in these devices must not be computationally taxing on the devices. As well, if the internet of things devices should provide data from their sensors to the chain, the protocol must have a method to verify the validity of the data. The existing protocols that have been developed each target these issues in different ways, but none design a protocol perfect for all desired use-cases.