9Dynamic Identity and Access Management in the IoT: Blockchain-based Approach

Léo MENDIBOURE1, Mohamed-Aymen CHALOUF2 and Francine KRIEF3

1 LaBRI, University of Bordeaux, Talence, France

2 IRISA, University of Rennes 1, Lannion, France

3 LaBRI, Bordeaux INP, Talence, France

9.1. Introduction

The Internet of Things (IoT) is developing today in many sectors such as energy, telecommunications, e-health or transport systems (Chen et al. 2014). This advent of the IoT has led to a significant increase of the number of connected objects: watches, cameras, lighting systems, electric meters, etc.

To guarantee the proper functioning of applications in the IoT, it is vital to make these connected objects secure (Xiao et al. 2018). Indeed, if these objects are compromised, it could lead to many types of attack: denial of service, ransomware, industrial espionage, etc. In this security process, identity and access management is an essential first step. By authenticating communicating objects and by controlling access to resources (storage, calculation and communication links), it could be possible to limit the risk of objects being compromised (Fang et al. 2020a).

However, classical authentication and access control solutions could be complex to apply in the IoT environment (Xiao et al. 2018). Indeed, many connected objects only have limited capabilities and it would not be possible to deploy cryptographic solutions that are costly in terms of bandwidth, energy and calculating capacity ...

Get Intelligent Security Management and Control in the IoT now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.