2023
DOI: 10.1007/s10207-023-00688-w
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing and comparing the security of self-sovereign identity management systems through threat modeling

Abstract: The concept of Self-Sovereign Identity (SSI) promises to strengthen the security and user-centricity of identity management. Since any secure online service relies on secure identity management, we comparatively analyze the intrinsic security of SSI. Thus, we adopt a hybrid threat modeling approach comprising STRIDE, attack trees, and ratings towards this unique context. Data flow diagrams of the isolated, centralized and the SSI model serve as the foundation for the assessment. The evolution of the paradigms … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Since Rayhan Ahmed et al [33] mainly describe the current state of blockchain and SSI and outline ten attacks on the consensus and network layers, we described in Sections 6.4 and 6.6, we disregard the publication in this section. Hence, we focus on Naik et al [32] and Grüner et al [34]. Naik et al [32] first identify assets and potential attacks before generating an attack tree for each identified attack.…”
Section: Results Of the Ssi Surveymentioning
confidence: 99%
See 4 more Smart Citations
“…Since Rayhan Ahmed et al [33] mainly describe the current state of blockchain and SSI and outline ten attacks on the consensus and network layers, we described in Sections 6.4 and 6.6, we disregard the publication in this section. Hence, we focus on Naik et al [32] and Grüner et al [34]. Naik et al [32] first identify assets and potential attacks before generating an attack tree for each identified attack.…”
Section: Results Of the Ssi Surveymentioning
confidence: 99%
“…Naik et al [32] first identify assets and potential attacks before generating an attack tree for each identified attack. Grüner et al [34] apply STRIDE to the various components of SSI. In the following, we summarize and combine the results of both approaches.…”
Section: Results Of the Ssi Surveymentioning
confidence: 99%
See 3 more Smart Citations