Skip to main content

Formulating A Global Identifier Based on Actor Relationship for the Internet of Things

  • Conference paper
  • First Online:
Interoperability, Safety and Security in IoT (SaSeIoT 2016, InterIoT 2016)

Abstract

The Internet of Things (IoT) promising a new generation of services been offered to a human being through a world of interconnected objects (called “things”) that may use different communication technologies. Objects, in IoT, are seamlessly connected on its owner/user behalf. To offer services, the service providers need to truly identify the effective actor/user rather than the communicated devices. Currently, users have relationships with multiple objects that can also be used to determine their user. These relationships between actors are changeable or may even vanish; however, they are important to distinguish the actual requester of the service. Hence, it is important to consider them when identifying the effective actor of the communicated object. This paper models these relationships, representing them in a general form, and proposes a new semantic identifier format that allows service providers to identify the service requester identity across domains based on those relationships.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 60.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)

    Article  Google Scholar 

  2. Fongen, A.: Identity management and integrity protection in the Internet of Things. In: 3rd International Conference on Emerging Security Technologies, pp. 111–114, IEEE Press (2012)

    Google Scholar 

  3. Alpár, G., Hoepman, J.-H., Siljee, J.: The Identity Crisis. Security, Privacy and Usability Issues in Identity Management (2011). arXiv Preprint arXiv1101.0427

  4. Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Othmane, L.B, Lilien, L.: An entity-centric approach for privacy and identity management in cloud computing. In: 29th IEEE Symposium on Reliable Distributed Systems, pp. 177–183. IEEE Press, New Delhi (2010)

    Google Scholar 

  5. Jøsang, A, Golbeck, J.: Challenges for robust trust and reputation systems. In: Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009), Saint Malo (2009)

    Google Scholar 

  6. Yeluri, R., Castro-Leon, E.: Identity management and control for clouds. In: Building the Infrastructure for Cloud Security, pp. 141–159. Apress (2014)

    Google Scholar 

  7. Mahalle, P.N., Railkar, P.N.: Identity Management for Internet of Things. River Publishers, Denmark (2015)

    Google Scholar 

  8. Gartner: The Identity of Things for the Internet of Things - (G00270277) (2015)

    Google Scholar 

  9. Forgerock: Whitepaper: The Identity of Things (IDoT): Access Management (IAM) Reference Architecture for The Internet of Things (IoT) (2015)

    Google Scholar 

  10. Liu, C.H., Yang, B., Liu, T.: Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw. 18, 85–101 (2014)

    Article  Google Scholar 

  11. Mahalle, P.N., Prasad, N.R., Prasad, R.: Novel context-aware clustering with hierarchical addressing (CCHA) for the Internet-of-Things (IoT). In: 5th International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013), pp. 267–274. IET, Bangalore (2013)

    Google Scholar 

  12. Batalla, J.M., Krawiec, P.: Conception of ID layer performance at the network level for Internet of Things. Pers. Ubiquit. Comput. 18(2), 465–480 (2014)

    Article  Google Scholar 

  13. Van Thuan, D., Butkus, P.: A user centric identity management for Internet of Things. In: International Conference on IT Convergence and Security (ICITCS), pp. 1–4. IEEE Publisher, Beijing (2014)

    Google Scholar 

  14. Zdravkova, V.: Identity management approach in Internet of Things. Aalborg University (2015)

    Google Scholar 

  15. Vujovic, V., Maksimovic, M., Kosmajac, D., Perisic, B.: Resource: a connection between Internet of Things and resource-oriented architecture. In: Proceedings of Smart SysTech 2015, European Conference on Smart Objects, Systems and Technologies, pp. 1–7. VDE Publisher, Aachen (2015)

    Google Scholar 

  16. Bello, O., Zeadally, S.: Intelligent device-to-device communication in the Internet of Things. IEEE Syst. J. 99, 1–11 (2015)

    Article  Google Scholar 

  17. Serbanati, A., Medaglia, C.M., Ceipidor, U.B.: Building Blocks of the Internet of Things: State of the Art and Beyond. INTECH Open Access Publisher, Rijeka (2011)

    Google Scholar 

  18. Bassi, A., Bauer, M., Fiedler, M., Kramp, T., Van Kranenburg, R., Lange, S., Meissner, S.: Enabling Things to Talk. Designing IoT Solutions with the IoT Architectural Reference Model, pp. 163–211. Springer, Heidelberg (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ausama Majeed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Majeed, A., Al-Yasiri, A. (2017). Formulating A Global Identifier Based on Actor Relationship for the Internet of Things. In: Mitton, N., Chaouchi, H., Noel, T., Watteyne, T., Gabillon, A., Capolsini, P. (eds) Interoperability, Safety and Security in IoT. SaSeIoT InterIoT 2016 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 190. Springer, Cham. https://doi.org/10.1007/978-3-319-52727-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-52727-7_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-52726-0

  • Online ISBN: 978-3-319-52727-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics