Abstract
IoT has put a great impact on modern society and every industry, but there are still several technical issues to be resolved in realizing the vision of IoT. From these issues, Access Control (AC) is essential to make an IoT service successful because, in the IoT environment, people with different privileges will access the devices from multiple manufacturers under diverse situations. However, the existing centralized AC models have the underlying limitations from the centralized approach such as a single point of failure. The research proposes a decentralized access control model for IoT with Decentralized ID (DID) and explains how the proposed model authorizes access rights successfully without a centralized authority.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Da Xu L, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inform 10(4):2233–2243
Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inform Syst Front 17(2):243–259
Liu J, Xiao Y, Chen CP (2012) Authentication and access control in the internet of things. In: 32nd International Conference on Distributed Computing Systems Workshops. IEEE, pp 588–592
Ronald F (1978) On an authorization mechanism. ACM Trans Database Syst 3(3):310–319
Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things. Math Comput Model 58(5–6):1189–1205
Ouaddah A, Mousannif H, Elkalam AA, Ouahman AA (2017) Access control in the Internet of Things: Big challenges and new opportunities. Comput Netw 112:237–262
Bertin E, Hussein D, Sengul C, Frey V (2019) Access control in the Internet of Things: a survey of existing approaches and open research questions. Ann Telecommun 74(7–8):375–388
Drummond R, Manu S, Dave L, Christopher A, Ryan G, Markus S (2019) Decentralized identifiers (DIDs) v1.0 cord data model and syntaxes. W3C Working Draft 09 December 2019. https://www.w3.org/TR/did-core/. Last accessed 10 Feb 2020
Christopher A, Arthur B, Vitalik B, Jon C, Duke D, Christian L, Pavel K, Jude N, Drummond R, Markus S, Greg S, Noah T, Harlan TW (2015) Decentralized public key infrastructure. A White Paper from Rebooting the Web of Trust
Acknowledgements
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2018R1D1A1B07049930). Icons are made by Freepik from www.flaticon.com.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jung, E. (2021). A Decentralized Access Control Model for IoT with DID. In: Kim, H., Kim, K.J. (eds) IT Convergence and Security. Lecture Notes in Electrical Engineering, vol 712. Springer, Singapore. https://doi.org/10.1007/978-981-15-9354-3_14
Download citation
DOI: https://doi.org/10.1007/978-981-15-9354-3_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9353-6
Online ISBN: 978-981-15-9354-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)