Abstract
Distributed identity technology provides solutions to many of the faults currently found in federated identity systems. Applying this technology to internet of things devices has many possible benefits in the realm of device authentication. However, this also provides new challenges not present in existing distributed identity systems. The large number of devices that would enter and leave the system means balancing sybil attack vulnerability and linkage attack vulnerability becomes challenging. Internet of things devices also have less memory and computing power than a standard personal computer or phone. This means any protocol to execute distributed identity in these devices must not be computationally taxing on the devices. As well, if the internet of things devices should provide data from their sensors to the chain, the protocol must have a method to verify the validity of the data. The existing protocols that have been developed each target these issues in different ways, but none design a protocol perfect for all desired use-cases.
Faculty Advisor/Mentor
Bouk Safdar
Document Type
Paper
Disciplines
Information Security
DOI
10.25776/7xhd-7668
Publication Date
2022
Upload File
wf_yes
Included in
A Review of Distributed Identity Technology in IoT Devices
Distributed identity technology provides solutions to many of the faults currently found in federated identity systems. Applying this technology to internet of things devices has many possible benefits in the realm of device authentication. However, this also provides new challenges not present in existing distributed identity systems. The large number of devices that would enter and leave the system means balancing sybil attack vulnerability and linkage attack vulnerability becomes challenging. Internet of things devices also have less memory and computing power than a standard personal computer or phone. This means any protocol to execute distributed identity in these devices must not be computationally taxing on the devices. As well, if the internet of things devices should provide data from their sensors to the chain, the protocol must have a method to verify the validity of the data. The existing protocols that have been developed each target these issues in different ways, but none design a protocol perfect for all desired use-cases.