TY - GEN
T1 - A digital identity stack to improve privacy in the IoT
AU - Wilson, Stephen
AU - Moustafa, Nour
AU - Sitnikova, Elena
PY - 2018/5/4
Y1 - 2018/5/4
N2 - The Internet of Things increasingly involves collection, processing and transmission of a wide variety of data to services and other devices. Business and engineering considerations are both increasing the volumes and detail of IoT data flows. Reasonably obvious privacy risks result from IoT-connected devices when they emit identifiable information, for this can reveal the activities of device users. More subtle risks arise when bulk device data is available for analysis, and linkage to auxiliary data sets, because identification or re-identification of users can follow. At the same time, security engineers are now designing for the 'Identity of Things', exploiting embedded cryptography and SIM-like modules to help with the authentication and authorization of devices acting as independent agents in the IoT. To help protect privacy while allowing precise authentication, this paper sets out a new model for digital identity management, comprising a stack of identities, attributes, and attribute metadata. As with the familiar OSI network stack, the digital identity stack helps to decouple different layers of authentication technology, so that IoT data is shared on an explicit need-to-know basis, and extraneous disclosures are minimized.
AB - The Internet of Things increasingly involves collection, processing and transmission of a wide variety of data to services and other devices. Business and engineering considerations are both increasing the volumes and detail of IoT data flows. Reasonably obvious privacy risks result from IoT-connected devices when they emit identifiable information, for this can reveal the activities of device users. More subtle risks arise when bulk device data is available for analysis, and linkage to auxiliary data sets, because identification or re-identification of users can follow. At the same time, security engineers are now designing for the 'Identity of Things', exploiting embedded cryptography and SIM-like modules to help with the authentication and authorization of devices acting as independent agents in the IoT. To help protect privacy while allowing precise authentication, this paper sets out a new model for digital identity management, comprising a stack of identities, attributes, and attribute metadata. As with the familiar OSI network stack, the digital identity stack helps to decouple different layers of authentication technology, so that IoT data is shared on an explicit need-to-know basis, and extraneous disclosures are minimized.
KW - authentication
KW - digital signatures
KW - Internet of Things
KW - privacy
KW - public key infrastructure
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85050489354&partnerID=8YFLogxK
U2 - 10.1109/WF-IoT.2018.8355199
DO - 10.1109/WF-IoT.2018.8355199
M3 - Conference contribution
AN - SCOPUS:85050489354
T3 - IEEE World Forum on Internet of Things, WF-IoT 2018 - Proceedings
SP - 25
EP - 29
BT - IEEE World Forum on Internet of Things, WF-IoT 2018 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th IEEE World Forum on Internet of Things, WF-IoT 2018
Y2 - 5 February 2018 through 8 February 2018
ER -