UNIT No: 5 IDENTITY MANAGEMENT MODELS IN IoT

Identity Management Identity management is a combination of processes and technologies to manage and secure access to information and resources. IdM is oriented towards identity of either devices or user but in IoT mapping between the device identity and context identity is required.

The main purpose of identifier is to uniquely identify things, objects or devices.

Ways to construct identifiers 1. Using Random Data

2. Hierarchical identifiers 3. encoded identifiers (eg: timestamp)

4. Cryptographic identifiers (eg:Hash) 5. Hybrid identifiers

Identity Management Current IdM solutions are mainly concerned with identities that are used by end users, and services identify themselves in the networked world (eg: OpenID). These solutions provide user attributes & authentication as a service to relying parties. It is complex & dynamically developing area due to its importance in online communities. Main IdM solution focuses on definition of Idm lifecycle, definition of

Identity Management

service integration with identity providers, establishment of SSO mechanism to define identity federation & exchange of authentication information & attributes wrt end users and services. Internet players and Telco industry have been developing their IdM solutions in different paths to address different needs. In internet focus is more on providing solution for the end users to access the service In Telco world focus is more on identifiers, authentication since deciding which entity is allowed to connect to network is very important.

Convergence in Internet/telco are merging these paths. Eg:European projects like FIDELITY,SWIFT,SPICE.

Identifier format for things

Identifier format for things Nomadic devices can join to public or private IoT.

Need to assign ownership to these devices Should provide an easier way to identify whether the thing is RFID tag, sensor node, or PDA. This format for devices should have association with different attributes and these attributes are based on namespace in which these devices are used.

ORI - Object or Resource Identifier

Identifier format for things

Object type - differentiate between types of object it is representing. This field is linked to CID field of identifier format. Global Namespace - used to indicate global ownership or interface and is useful in mobility of the device.

Local Namespace - decide current status of the device UID - unique identifier for device or thing.

Identity Portrayal Identity portrayal is done through following phasesSubstance Content Use

Identity Portrayal 1.

2.

Substance : Identity is established i.e authenticated through identifier a.

In this phase credentialism and associated process of credentialism is considered.

b.

Credentialization consists of authentication,identification and assignment.

c.

Authentication is done by identifiers for identity establishment.

d.

Identification is done based on the identity attributes.

Content: Identification and communication a.

3.

This phase deals with how identity relates with communication.

Use: Appropriate identity is used in various context of IoT. a.

Explains how identity is expected to perform and how other objects perform towards a specific object.

Different Identity Management Models Need to derive taxonomy of different identity models depending upon scope of an identity as well as the local and global context in which an identity is used and represented. IoT devices/objects can have knowledge of other IoT devices/objects which can be identified. The scope and lifetime of these things and identities vary from context to context.

Different Identity Management Models Identity of an IoT object will be context aware and can be known locally, across the ubiquitous network or globally. Also IoT objects/devices can also be associated with multiple digital identities (virtual identities).

There is a need that these devices should be uniquely and unambiguously identified in multi context IoT. Each object is uniquely identified by a set of attributes.

Different Identity Management Models 1. Local Identity

2. Network Identity 3. Federated Identity

4. Global Identity

Local Identity In centralized architecture like smart home or client server paradigm, identity is local in nature. In centralized computing, a host system maintains and manages local database of identities.

In IoT context smart home is an example of centralized computing where all devices in smart home are registered in a local database and if external device or entity wishes to join the system, it is first required to acquire an identity from server and entry is to be made in registry.

Local Identity The system also checks for duplication of identity being issued in order to maintain uniqueness. In centralized computing, addition,deletion of identities is simple and independent of other operations. As shown in figure, a central object registry is maintained for all the terminals or devices connected to it. As in case of smart home, all devices in one context are registered with one central database and can be shared across the system.

Local Identity

Advantages of Local Identity Simplicity :

As one central entity is responsible for issuing and registering identity, manageability become easy. Generally flat addressing or naming mechanism is adopted in local identity model and identity establishment process depends on the credentials provided by the objects Theses credentials are then compared with the similar detail stored in object registry/database. Local scope of identity and flat addressing makes it simple.

Advantages of Local Identity Manageability As the central entity is responsible for assigning an identity, object registry can assign and store identities based on its capacity. But with increasing number of objects in scalable IoT networks, performance becomes bottleneck.

Flat Addressing: As the scope of identity in local identity is local, flat addressing is useful for such systems but it results into name collisions.

Disadvantages of Local IdM Decision and action are more time consuming

Increased dependency and vulnerability Greater number of objects that rely on one central registry causes problem of single point of failure. More delay in response towards identity assignment and establishment as one central system is responsible for it. Secrecy is hard to maintain as identities are stored at one central location.

Federated Identity Management Model Identity federation is known within the web security world and refers to management of a network/web objects identity across different domains. The main reason of enabling federation in network/web environment is that the work flow of system often requires an object for which identity is established in one domain to be established in other domain as well. Identity in the web based system refers to a users identity while in IoT, identity refers to a device or “thing”. Hence the interaction of identities in IoT is in the form of device to device communication.

Federated Identity Management Model An example of federated ioT network is shown in fig.

Federated Identity Management Model Three IoT domains are considered i.e private user, retail shop and goods producer network and two IoT federated networks are considered. There are different ways of accomplishing federated identity. In federated networks, devices undergo single registration process. If the registration is performed more than once, then redundancy of the profiles is to be avoided.

Different federation topologies Local Profiling

Distributed profiling Third party profiling

Local Profiling All devices are registered with the IdM infrastructure of the local networks.

Profiles of these devices are entirely managed by local network and local identity management model is used for local profiling. Eg- Smart home scenario.

Distributed Profiling In this scheme, devices complete the registration process with the home IdM infrastructure and when needed new profiles of the same devices can be created in new network. These profiles will be specific to new network due to need of new attributes.

Hence the profiles become distributed across multiple networks and attribute synchronization need needs to be taken care.

Third party profiling In this scheme, the trusted third party within established federation is involved for creating and managing profiles. This reduces the load from member networks from the registration. Trust management is an important issue to be taken care in third party profiling. Advantage of this scheme is that it is scalable in nature and more and more IoT networks can be connected to trusted third party.

Global Web Identity With the emergence of WWW and popularity of online social networks, global identity is a need today. Web identity is uniquely identified throughout WWW and it is identifiable via URI(Universal resource identifier). Due to increasing number of users on WWW and online social network, it is important to keep unique identity of users as well as services. In context of IoT networks, web identity is ubiquitous in nature and web identity information should be capable of uniquely resolving various IoT networks

Identity Management in IoT DEscribes how users interact with devices as well as devices interact with other devices. Users interact with their devices and consume services in Iot through verified identity. IoT users are able to discover and use devices that are public add things temporarily to their personal space, share their devices with others and devices that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with Iot, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges.

User centric Identity Management In user centric IdM models, full control is with the end user over his/her personal data.

Eg: OpenID OpenId consists of 4 layers Identifiers Discovery Authentication

Data Transport

User centric Identity Management The process to be completed involves three different entities The end-users Relying party Identity provider

OPenId allows relying party to redirect the client to the identity provider for authentication at identity provider site thus violating user control. The second problem with openID is that the URL that is used to identify the subject is recyclable. Since OpenID permiots URL based identification, it brings the issue of privacy.

Device centric identity management Eg: Higgins is a software infrastructure that supports consistent user experience that works with digital identity protocols Eg: WS-Trust, OpenID.

Main objective of Higgins project is to manage multiple contexts, interoperability, define common interface for an identity system. The HIggins framework does not provide support for quantitative measure identity strength and lacks the fulfillment of defining strength of identity.\

Issue with security

Hybrid Identity management DEals with hybrid identities like user as well as device identities.

In cloud computing, IdM is a hybrid cloud needed to deal with identities of both user and devices/services. Eg: Liberty Alliance project is a federated solution for guaranteeing interoperability, supporting privacy, promoting adoption for specifications and provides guidelines. It is a framework in which domains that belong to a federation may exchange identity information about their users and devices using federated identities

Thank You http://www.pavanjaiswal.com

Unit 5 Identity Management Models.pdf

Identity Management. Current IdM solutions are mainly concerned with identities that are used by end users,. and services identify themselves in the networked ...

445KB Sizes 1 Downloads 141 Views

Recommend Documents

Unit 5.pdf
Brindavan 13th c Govind Dev ... The 2 main components of the temple are : ... Whoops! There was a problem loading this page. Unit 5.pdf. Unit 5.pdf. Open.

Unit 5 Menu.pdf
2. Complete a paired “comunicación” section in the textbook. (5 pts each). Conversation Skill Builder. 3. Create Spanish dialogue between 2 or more characters ...

unit 5.pdf
A function code has been allocated to each service provided by INT ... (keyboard) and echoes (send) the character to the standard output device (monitor). It.

UNIT 5 VINODPADHYANI.pdf
Page 1 of 2. MADE BY A.K.PARMAR. विनोदऩधानी. બાલકન ુંનામ :-......................................................................................................ક ઱ ગણ :- ૨૦ ગણ. ઴ાલાન 

Unit-5.pdf
5.6 Targeted Public Distribution System (TPDS). 5.7 Food ... 5.8 Diversion from the PDS .... during 1951-2001. Page 3 of 44. Unit-5.pdf. Unit-5.pdf. Open. Extract.

Unit 5 Review.pdf
Page 1 of 2. Geometry - Unit 5 Review WS Name. Block ______. 1. Find the indicated trig ratios. a. tan A ______. b. sin C___________. c. cos C___________.

Unit 5 - Review.pdf
What is the percentile rank for a student finishing this test in 48 minutes? 5. The South Metro Fire Department claims to have collected information from 60 calls in a week and found response. times to be normally distributed with a mean of 6 minutes

Biometric Identity Management System - UNHCR
In February 2015, DPSM and the. Division of Information Systems and. Telecommunications (DIST) completed development of UNHCR's new biometric identity ...

Unit 5 FM3 Worksheet 5.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Unit 5 FM3 Worksheet 5.pdf. Unit 5 FM3 Worksheet 5.pdf. Open.

Unit 5 Advanced Tools & Technologies.pdf
Page 2 of 35. Make tools. ◦ make, nmake, cmake. AWK tool. Grep, egrep, fgrep. Sorting tools. UEFI boot. Case study of Fedora 19 EFI files.

ICS-Unit 5.pdf
Page 1 of 29. Introduction to Control Systems. Control System means any quantity of interest in a machine or mechanism is maintained or altered in. accordance ...

unit-22 5- BY Civildatas.blogspot.in.pdf
Define slenderness ratio. (MAY/JUNE 12). Slenderness ratio of a column is defined as the ratio of effective length to corresponding radius. of gyration of the section. Thus. Slenderness ratio=le/r. Where,. le=effective length. r=appropriate radius of

Unit 5 Biochemistry esrmnotes.in.pdf
Page 1 of 67. BT1004 Biochemistry. UNIT V. • Introduction. • Bioenergetics, High energy compounds,. Biological oxidation. • Electron transport chain, Oxidative. phospholyration, Chemiosmotic theory. • Shuttle pathway – Glycerol phosphate. S

Unit 5 World History Packet.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Unit 5 World ...

Unit 5 focus wall posters.pdf
Page 2 of 56. The Unsinkable. Wreck of the R.M.S.. Titanic. by Robert D. Ballard and Rick. Archbold. Expository Text. 5-2. Page 2 of 56 ...

MP Unit-5 SE-II.pdf
Debugging and Virtual 8086 Mode. Mr. Sumit Shinde. Assistant Professor. Computer Engineering Department. Pune Institute of Computer Technology.

unit 5 in mis perspective
5.5 Framework for Understanding Management Information Systems ... The very first application of computers in business was to create a transaction processing ...

RE GIS unit (5)_NoRestriction.pdf
Spatial Data. 16,What are the types of spatial data models? . Raster. Vector . lmage. l7.Whal are the major data sources of GIS? o . Conventional analog map ...

Unit 5 Hadoop Programming.pdf
Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps.

unit 5 note-taking -1 - eGyanKosh
1 Congenital heart disease (h.d.)present at birth, e.g., blue baby ... degenerative h.d. intake in diet. 4 Ischaemic h.d. blockage of arteries by cholesterol+angina, heart attacks. You will notice that the sentences and some of the words have ..... I

pfs unit 5 2marks_NoRestriction.pdf
l/)cv,vA MMA M.c) I fv. TWO MARKS: ... What are the different types of connections? 'fhere are tvvo ... What are the requirements ofioint!, (MAY/IuNE 2009, 2012).

Grade 4, Unit 5 Memoir.pdf
Page 1 of 15. 1. 4. th Grade. Writer's Workshop. Unit 5. 3-5 Book 6. Memoir: The Art of Writing Well. The heart of the CSISD Writers Workshop Units of Study stem ...

Unit 5 (Gueridon Service).pdfpppd.pdf
The diners of restaurants with. Gueridon service can see how they're food is prepared and cooked. The term Gueridon means a movable trolley which consists ...