The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Identity Identification and Management in the Internet of Things

Henceforth, users agreed on the necessity of continuous Internet connection independently of the place, the manner, and the time. Nowadays, several elite services are accessible by people over the Internet of Things (IoT), which is a heterogeneous network defined by machine-to-machine communication. Despite the fact that the devices are used to establish the communication, the users can be considered as the actual producers of input data and consumers of the output data. Consequently, the users should be viewed as a smart object in IoT; therefore, user identification, authentication, authorization are required. However, the user identification process is too complicated because the users are worried to share their confidential and private data. on the other hand, this private data should be used by some of their devices. Accordingly, an equitable mechanism to identify users and manage their identities is necessary. In addition, the user plays an extreme important role in the establishment of rules needed for identity identification and in ensuring the continuity of receptive services.The main purpose of this paper is to develop a new framework for Identity Management System (IdMS) for IoT. The primary contributions of this paper are: the proposition of a device recognition algorithm for user identification, the proposition of a new format for the identifier, and a theoretical framework for IdMS.


[1] Aboudagga N., Refae M., Eltoweissy M., DaSilva L., and Quisquater J., “Authentication Protocols for Ad Hoc Networks: Taxonomy and Research Issues,” in Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, Montreal, pp. 96-104, 2005.

[2] Ahmad K., Mohammad O., Atieh M. and Ramadan H., “Enhanced Performance and Faster Response using New IoT LiteTechnique,” The International Arab Journal of Information Technology, vol. 16, no. 3A, pp. 548-556, 2019.

[3] Alaba F., Othman M., Hashem I., and Alotaibi F., “Internet of Things Security: A Survey,” Journal of Network and Computer Applications, vol. 88, pp. 10-28, 2017.

[4] Arabsorkhi A., Haghighi M., and Ghorbanloo R., “A Conceptual Trust Model for the Internet of Things Interactions,” in Proceedings of 8th International Symposium on Telecommunications, Tehran, pp. 89-93, 2016.

[5] Bhargav-Spantzel A., Squicciarini A., and Bertino E., “Establishing and Protecting Digital Identity in Federation Systems,” in Proceedings of the workshop on Digital identity management, New York, pp. 11-19, 2005.

[6] Corner M. and Noble B., “Protecting Applications with Transient Authentication,” in Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, Mobile System, New York, pp. 57-70, 2003.

[7] De Luca A., Von Zezschwitz E., Nguyen N. D. H., Maurer M., Rubegni E., Scipioni M., and Langheinrich M., “Back-of-Device Authentication on Smartphones,” in Proceedings of SIGCHI Conference on Human Factors in Computing Systems, Paris, pp. 2389-2398, 2013.

[8] Feher C., Elovici Y., Moskovitch R., Rokach L. and Schclar A., “User Identity Verification Via Mouse Dynamics,” Information Sciences, vol. 201, pp. 19-36, 2012.

[9] Finjan Software I., “User Identification and Authentication,” 1996.

[10] Haddouti S. and El Kettani D., “Analysis of Identity Management Systems Using Blockchain Technology,” in Proceedings of the International Conference on Advanced Communication Technologies and Networking (CommNet), Rabat, pp. 1-7, 2019.

[11] Houhamdi Z. and Athamena B., “User Identification Algorithm based-on Devices Recognition,” in Proceedings of 20th International Arab Conference on Information Technology, Al Ain, pp. 267-274, 2019.

[12] Kumar V. and Bhardwaj A., “Identity Management Systems: A Comparative Analysis,” International Journal of Strategic Decision Sciences, vol. 9, no. 1, pp. 63-78, 2018.

[13] Lam K. and Chi C., “Identity in the Internet-of- Things (Iot): New Challenges and Opportunities,” in Proceedings of International Conference on Information and Communications Security, Singapore, pp. 18-26, 2016.

[14] Mahalle P., Babar S., Prasad N., and Prasad R., “Identity Management Framework Towards Internet of Things (Iot): Roadmap and Key Challenges,” Communications in Computer and Information Science, vol. 89, no. 2, pp. 430-439, 2010.

[15] Miorandi D., Sicari S., De Pellegrini F. and Chlamtac I., “Internet of Things: Vision, Applications and Research Challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497-1516, 2012.

[16] Rotondi D. and Piccione S., “Managing Access Control for Things: a Capability Based Approach,” in Proceedings of 7th International Conference on Body Area Networks, Brussels, 654 The International Arab Journal of Information Technology, Vol. 17, No. 4A, Special Issue 2020 pp. 263-268, 2012.

[17] Song J., Kunz A., Schmidt M., and Szczytowski P., “Connecting and Managing M2M Devices in the Future Internet,” Mobile Networks and Applications, vol. 19, no. 1, pp. 4-17, 2014.

[18] Todorov D., Mechanics of User Identification and Authentication : Fundamentals of Identity Management, Auerbach Publications, 2007.

[19] Trnka M., Cerny T., and Stickney N., “Survey of Authentication and Authorization for the Internet of Things,” Security and Communication Networks, vol. 2018, no. 7, pp. 1-17, 2018.

[20] Verma P., Verma R., Prakash A., Agrawal A., Naik K., Tripathi R., Alsabaan M., Khalifa T., Abdelkader T., and Abogharaf A., “Machine-to- Machine (M2M) Communications: A Survey,” Journal of Network and Computer Applications, vol. 66, pp. 83-105, 2016. Zina Houhamdi received her Ph.D. in Software Engineering. She is an Associate Professor at the Department of Software Engineering, College of Engineering, Al Ain University, UAE. Her research work has been published in several academic journals and has been presented at scientific conferences. Her research areas of interest are data quality, agent-oriented software engineering, software testing, goal-oriented methodology, software modeling and analysis, Petri nets, IoT, and formal methods. Belkacem Athamena holds a Ph.D. in System Analysis and Design. He is an Associate Professor in the Department of Business Administration, College of Business, Al Ain University, UAE. His main research interest is in system and software modeling and analysis, multi-agent, fuzzy logic, software testing, Petri nets, formal methods, data quality, IoT, and fault diagnosis. He has published many refereed journal articles, contributed chapters and presented papers at conferences.