IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Composite Identity of Things (CIDoT) on Permissioned Blockchain Network for Identity Management of IoT Devices

Composite Identity of Things (CIDoT) on Permissioned Blockchain Network for Identity Management of IoT Devices
View Sample PDF
Author(s): Anang Hudaya Muhamad Amin (Higher Colleges of Technology, UAE), Fred N. Kiwanuka (Higher Colleges of Technology, UAE), Nabih T. J. Abdelmajid (Higher Colleges of Technology, UAE), Saif Hamad AlKaabi (Higher Colleges of Technology, UAE)and Sultan Khalid Abdulqader Rashed Ahli (Higher Colleges of Technology, UAE)
Copyright: 2021
Pages: 22
Source title: Role of IoT in Green Energy Systems
Source Author(s)/Editor(s): Vasaki Ponnusamy (Universiti Tunku Abdul Rahman, Malaysia), Noor Zaman (Taylor's University, Malaysia), Low Tang Jung (Universiti Teknologi PETRONAS, Malaysia)and Anang Hudaya Muhamad Amin (Higher Colleges of Technology, UAE)
DOI: 10.4018/978-1-7998-6709-8.ch003

Purchase


Abstract

Internet of things (IoT) is in the forefront of many existing smart applications, including autonomous systems and green technology. IoT devices have been commonly used in the monitoring of energy efficiency and process automation. As the application spreads across different kinds of applications and technology, a large number of IoT devices need to be managed and configured, as they are capable of generating massive amount of sensory data. Looking from this perspective, there is a need for a proper mechanism to identify each IoT devices within the system and their respective applications. Participation of these IoT devices in complex systems requires a tamper-proof identity to be generated and stored for the purpose of device identification and verification. This chapter presents a comprehensive approach on identity management of IoT devices using a composite identity of things (CIDoT) with permissioned blockchain implementation. The proposed approach described in this chapter takes into account both physical and logical domains in generating the composite identity.

Related Content

Himanshi Srivastava, Pinki Saini, Anchal Singh, Sangeeta Yadav. © 2024. 38 pages.
Rakesh Dutta, Jayashri Dutta. © 2024. 16 pages.
Sudha Subburaj, A. Lakshmi Kanthan Bharathi. © 2024. 30 pages.
Hari Shankar Biswas, Sandeep Poddar. © 2024. 15 pages.
Mihaela Rosca, Petronela Cozma, Maria Gavrilescu. © 2024. 35 pages.
Indranee Changmai. © 2024. 28 pages.
Periasamy Palanisamy, M. Kumaresan, M. Maheswaran. © 2024. 19 pages.
Body Bottom