2020
DOI: 10.1108/jeim-07-2018-0148
|View full text |Cite
|
Sign up to set email alerts
|

The case for blockchain in IoT identity management

Abstract: PurposeThe aim of this paper is to evaluate the use of blockchain for identity management (IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving approaches and its applications to healthcare scenarios.Design/methodology/approachThe paper describes the most relevant IdM systems focusing on privacy preserving with or without blockchain and evaluates them against ten selected features grouped into three categories: privacy, usability and IoT. Then, it is important to analyze whe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(17 citation statements)
references
References 69 publications
0
16
0
Order By: Relevance
“…• Lack of knowledge: Most users don't know best practices or how to use cryptocurrency and are therefore vulnerable to hackers. Crypto currency technology is rather complicated and therefore people need to gain knowledge because before using and / or investing [11]. • Volatility: Crypto currencies are very volatile & this is one of the reasons for slower adoption of cryptocurrency.…”
Section: B Rq2 What's Bad About Bitcoin?mentioning
confidence: 99%
See 1 more Smart Citation
“…• Lack of knowledge: Most users don't know best practices or how to use cryptocurrency and are therefore vulnerable to hackers. Crypto currency technology is rather complicated and therefore people need to gain knowledge because before using and / or investing [11]. • Volatility: Crypto currencies are very volatile & this is one of the reasons for slower adoption of cryptocurrency.…”
Section: B Rq2 What's Bad About Bitcoin?mentioning
confidence: 99%
“…On August 1, 2015, Mark Karpeles came out of his house in Tokyo under police escort. A few hours later, Mark was charged and jailed for faking computer data and embezzlement in connection with the loss of 850,000 Bitcoin, equivalent to half a million dollars [11]. • ICO Trust: ICO, or initial coin offering, is used by people who want to start their own crypto currency, aka altcoin.…”
Section: B Rq2 What's Bad About Bitcoin?mentioning
confidence: 99%
“…Usually, new transaction records are added randomly to the global ledger, which is called mining. Each transaction requires payment in the form of a transaction fee [11] [12]. A smart contract is an executable code that is used to store contracts and execute the rules specified in the contract without the involvement of a third party.…”
Section: Smart Contracts From Blockchainmentioning
confidence: 99%
“…sharing your customer base) via two modified versions of the tree. The pseudo version violates very detailed server log operations by entering, omitting [11] [17], or changing registry keys. Powerful adversaries who control certificate authorities and CBs can forge forged but valid certificates contained in infected CBs (showing two different versions and signing for different customer groups) Alabama [18].…”
Section: Figure 1 Threat Impersonationmentioning
confidence: 99%
“…The systems have a centralized databank for storing individual records [2]. The national identity management systems experience security instabilities subject to system downtime, attacking hackers and software up-gradation as well as network traffic restrictions [3]. Identification, authorization and authentication process of individuals must have mechanisms to manage the information about individual trustworthily.…”
Section: Introductionmentioning
confidence: 99%