Reference Hub1
Composite Identity of Things (CIDoT) on Permissioned Blockchain Network for Identity Management of IoT Devices

Composite Identity of Things (CIDoT) on Permissioned Blockchain Network for Identity Management of IoT Devices

Anang Hudaya Muhamad Amin, Fred N. Kiwanuka, Nabih T. J. Abdelmajid, Saif Hamad AlKaabi, Sultan Khalid Abdulqader Rashed Ahli
ISBN13: 9781668471326|ISBN10: 1668471329|EISBN13: 9781668471333
DOI: 10.4018/978-1-6684-7132-6.ch023
Cite Chapter Cite Chapter

MLA

Amin, Anang Hudaya Muhamad, et al. "Composite Identity of Things (CIDoT) on Permissioned Blockchain Network for Identity Management of IoT Devices." Research Anthology on Convergence of Blockchain, Internet of Things, and Security, edited by Information Resources Management Association, IGI Global, 2023, pp. 382-401. https://doi.org/10.4018/978-1-6684-7132-6.ch023

APA

Amin, A. H., Kiwanuka, F. N., Abdelmajid, N. T., AlKaabi, S. H., & Khalid Abdulqader Rashed Ahli, S. (2023). Composite Identity of Things (CIDoT) on Permissioned Blockchain Network for Identity Management of IoT Devices. In I. Management Association (Ed.), Research Anthology on Convergence of Blockchain, Internet of Things, and Security (pp. 382-401). IGI Global. https://doi.org/10.4018/978-1-6684-7132-6.ch023

Chicago

Amin, Anang Hudaya Muhamad, et al. "Composite Identity of Things (CIDoT) on Permissioned Blockchain Network for Identity Management of IoT Devices." In Research Anthology on Convergence of Blockchain, Internet of Things, and Security, edited by Information Resources Management Association, 382-401. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-7132-6.ch023

Export Reference

Mendeley
Favorite

Abstract

Internet of things (IoT) is in the forefront of many existing smart applications, including autonomous systems and green technology. IoT devices have been commonly used in the monitoring of energy efficiency and process automation. As the application spreads across different kinds of applications and technology, a large number of IoT devices need to be managed and configured, as they are capable of generating massive amount of sensory data. Looking from this perspective, there is a need for a proper mechanism to identify each IoT devices within the system and their respective applications. Participation of these IoT devices in complex systems requires a tamper-proof identity to be generated and stored for the purpose of device identification and verification. This chapter presents a comprehensive approach on identity management of IoT devices using a composite identity of things (CIDoT) with permissioned blockchain implementation. The proposed approach described in this chapter takes into account both physical and logical domains in generating the composite identity.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.