Identity Identification and Management in the Internet of Things

أغسطس 01, 2020


/ zina houhamdi / Belkacem Athamena

Henceforth, users agreed on the necessity of continuous Internet connection independently of the place, the manner, and the time. Nowadays, several elite services are accessible by people over the Internet of Things (IoT), which is a heterogeneous network defined by machine-to-machine communication. Despite the fact that the devices are used to establish the communication, the users can be considered as the actual producers of input data and consumers of the output data. Consequently, the users should be viewed as a smart object in IoT; therefore, user identification, authentication, authorization are required. However, the user identification process is too complicated because the users are worried to share their confidential and private data. on the other hand, this private data should be used by some of their devices. Accordingly, an equitable mechanism to identify users and manage their identities is necessary. In addition, the user plays an extreme important role in the establishment of rules needed for identity identification and in ensuring the continuity of receptive services.The main purpose of this paper is to develop a new framework for Identity Management System (IdMS) for IoT. The primary contributions of this paper are: the proposition of a device recognition algorithm for user identification, the proposition of a new format for the identifier, and a theoretical framework for IdMS.

Other Researches

Managing asymmetric information effects in decision making: Task complexity-based model

This paper proposes a formal model to manage the impact of asymmetric information in decision-making by using principal-agent problems in which an agent (who has incomplete information) must decide to perform or not perform a task on behalf of the p...

Identity Management System Model in the Internet of Things

This paper describes the identity management system (IdMS) by defining system and user requirements. Additionally, it introduces the IdMS concept that approaches the things identity management. Moreover, the paper deeply describes the IdMS features ...