International audienceThe Internet of Things aims at connecting everything, ranging from individuals, organizations, and companies to things in the physical and virtual world. The digital identity has always been considered as the keystone for all online services and the foundation for building security mechanisms such as authentication and authorization. However, the current literature still lacks a comprehensive study on the digital identity management for the Internet of Things (IoT). In this paper, we firstly identify the requirements of building identity management systems for IoT, which comprises scalability, interoperability, mobility, security and privacy. Then, we trace the identity problem back to the origin in philosophy, analyze...
The Internet of Things is currently getting significant interest from the scientific community. Acad...
In the Internet of Things (IoT), objects are seamlessly interconnected by anyone, anywhere, and anyt...
A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriat...
With the rapid growth of the Internet of Things (IoT) and smart objects, security becomes an importa...
Industrial Internet of Things applications are distributed Cyber-Physical systems with long life-cyc...
An era ago, projecting artificial intelligence as the pillar of next-generation technology would hav...
The Internet today lacks an identity protocol for identifying people and organizations. As a result,...
Internet of things (IoT) network needs to accommodate billions of connected smart objects (things). ...
Although a safe exchange of information, services, and technologies are possible via centralized dig...
Although a safe exchange of information, services, and technologies are possible via centralized dig...
With the Internet of Things (IoT) evolving more and more, companies active within this area face new...
This paper discusses the application of identity and access management in Blockchain technology. It ...
This paper discusses the application of identity and access management in Blockchain technology. It ...
The Internet today lacks an identity protocol for identifying people and organizations. As a result,...
Digital identities represent who we are when engaging in online activities and transactions. The ra...
The Internet of Things is currently getting significant interest from the scientific community. Acad...
In the Internet of Things (IoT), objects are seamlessly interconnected by anyone, anywhere, and anyt...
A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriat...
With the rapid growth of the Internet of Things (IoT) and smart objects, security becomes an importa...
Industrial Internet of Things applications are distributed Cyber-Physical systems with long life-cyc...
An era ago, projecting artificial intelligence as the pillar of next-generation technology would hav...
The Internet today lacks an identity protocol for identifying people and organizations. As a result,...
Internet of things (IoT) network needs to accommodate billions of connected smart objects (things). ...
Although a safe exchange of information, services, and technologies are possible via centralized dig...
Although a safe exchange of information, services, and technologies are possible via centralized dig...
With the Internet of Things (IoT) evolving more and more, companies active within this area face new...
This paper discusses the application of identity and access management in Blockchain technology. It ...
This paper discusses the application of identity and access management in Blockchain technology. It ...
The Internet today lacks an identity protocol for identifying people and organizations. As a result,...
Digital identities represent who we are when engaging in online activities and transactions. The ra...
The Internet of Things is currently getting significant interest from the scientific community. Acad...
In the Internet of Things (IoT), objects are seamlessly interconnected by anyone, anywhere, and anyt...
A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriat...