Back to Search
Start Over
DT-SSIM: A Decentralized Trustworthy Self-Sovereign Identity Management Framework
- Source :
- IEEE Internet of Things Journal. 9:7972-7988
- Publication Year :
- 2022
- Publisher :
- Institute of Electrical and Electronics Engineers (IEEE), 2022.
-
Abstract
- In a ubiquitous environment enclosing cooperative Internet of Things (IoT) devices, individuals, and entities, Digital Identity Management (DIM) becomes critical and challenging. DIM pertains to device identities authentication and verification to enable trustworthy service exchange, data collection, and decision making. DIM is the supporting pillar for all online services and the foundation for security and authentication mechanisms. Due to the extreme heterogeneity, scale, and configuration complexity of such environments, enabling trustworthy DIM is crucial and seriously challenging. In an IoT context, devices use local (Digital Identities) DIs stored within a tamper-proof unit and verified by a centralized authority for authentication. The recent attacks on IoT systems showed how vulnerable such a design is. It is also an inherent problem that influences humans. From that, Self-Sovereign Identity (SSI) has emerged as a decentralized DIM approach embracing the concept of portable selfpossession identity. SSI was presented to decouple the DI from the owner to enable large-scale cooperation. However, DI storage and verification still occur on the device and in a centralized manner. Utilizing a local single-point-of-failure storage memory for verifiable credentials is one of the considerable drawbacks in contemporary SSI. In this regard, this paper introduces DTSSIM, a novel Decentralized Trustworthy Self-Sovereign Identity Management framework. DT-SSIM integrates the secret share scheme with the Blockchain-based smart contracts technologies to provide transparent and trustworthy SSI-based digital identity management services for IoT. Storing IoT identity credentials outside the devices’ local storage preserves the identity credentials from being tampered with or misused. Evaluations and discussions show the resiliency assessment of the system and the cost and estimated running times for verification processes in DTSSIM.
- Subjects :
- Scheme (programming language)
Service (systems architecture)
Authentication
Computer Networks and Communications
Computer science
Context (language use)
Computer security
computer.software_genre
Identity management
Computer Science Applications
Digital identity
Hardware and Architecture
Signal Processing
Identity (object-oriented programming)
Verifiable secret sharing
computer
Information Systems
computer.programming_language
Subjects
Details
- ISSN :
- 23722541
- Volume :
- 9
- Database :
- OpenAIRE
- Journal :
- IEEE Internet of Things Journal
- Accession number :
- edsair.doi...........1ce6530d6da4b0fb54f379e7857c262f