sensors-logo

Journal Browser

Journal Browser

Advances in Blockchain Technologies towards Identity Management and Its Applications in ICT and IoT

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (28 February 2023) | Viewed by 25402

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Electrical Engineering and Computer Science, University of Maribor, 2000 Maribor, Slovenia
Interests: applied cryptography; big data; DLT; blockchain technology; smart contracts; dApps, Web3, security and privacy
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
1. School of Computer Science and Informatics, Cardiff University, Cardiff, CF10 3AT, UK
2. Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN 46556, USA
Interests: blockchain; open data access; web dashboards/APIs and workflow; big data applications; distributed scientific workflows and data distribution; with application areas ranging from audio; astrophysics and engineering to bioinformatics and healthcare

Special Issue Information

Dear Colleagues,

Blockchain, being the main representative of distributed ledger technology (DLT), is almost past the disillusionment part of its hype curve (indicated by Gartner) and slowly reaching the slope of enlightenment. From a practical standpoint, this means that we are finally beyond the point of false and inflated expectations, which is common with emerging technology and was notably the case with blockchain due to its relation to cryptocurrencies and the “gold-rush” phenomenon. The key to this process has been the continued high-quality research and development activities worldwide. By April 2020 approximately 26,000 scientific articles had been presented and published, in various forms and by various publishers and journals.   

Nevertheless, the research field is still in its infancy. We continue to face scalability, efficiency, and identity management challenges, as well as challenges with use in real-world applications. Often, ICT solutions use the technology but adjust it in such a manner that it loses positive features such as decentralization, immutability, and anonymity. The Internet of Things is already fully present and is, with each new development, more integrated in ICT solutions. Many researchers and developers saw the opportunity to combine these two technologies due to their similar topologies; however, this has yet to prove efficient. If not approached correctly, we may end up with the integration of two worlds, which will bring significant unneeded baggage. Furthermore, with the emergence of wireless technologies, such as 5G, the opportunity for full decentralization for trusted IoT data collection and processing could lead to numerous innovative research directions and applications.

This Special Issue, therefore, intends to address broad challenges and open questions, and answer questions related to distributed ledger technologies and their involvement in ICT and/or IOT applications. We are searching for original unpublished high-quality research articles on the latest advances and findings in theoretical or practical aspects of the field that can shed light on the challenges discussed above. We will accept review articles only if they provide readers with a thorough methodology and results that apply to a multitude of professionals in the industry as well as academia. They must also present quality insights and directions for possible future research.

The potential topics include, but are not limited to:

  • DLT or blockchain in IoT: architecture and applications;
  • Decentralized ICT solutions incorporating IoT;
  • Interoperable applications within IoT and DLT;
  • DLT platforms explicitly for IoT;
  • DLT or blockchain-based IoT device identity management, authentication, and authorization;
  • Identity management in IoT applications using self-sovereign-infrastructure;
  • Decentralized identifiers (DIDs) and verifiable credentials (VCs);
  • DLT or blockchain frameworks, tools, and platforms for IoT;
  • Optimization of IoT verticals using DLT;
  • DLT or blockchain-based solutions for edge and fog computing;
  • DLT or blockchain-based business models that include IoT;
  • Smart contracts for IoT;
  • Performance of DLT or blockchain features and functions applied to IoT devices.

Additionally:

  • Using IoT and DLT or blockchain for quality control or audit trail;
  • Object detection, classification, and tracking using IoT and DLT or blockchain;
  • Trusted sensors backed by DLT or blockchain;
  • Applications in supply chains backed by IoT and DLT or blockchain;
  • DLT or blockchain in industrial IoT applications;
  • DLT or blockchain-based access control for IoT;
  • Legal issues connected to the technology part of DLT or blockchain;
  • Biometric blockchain integration for IoT. 

Assis. Prof. Dr. Muhamed Turkanović
Prof. Dr. Ian Taylor
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (6 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

31 pages, 6192 KiB  
Article
DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices
by Kazi Masum Sadique, Rahim Rahmani and Paul Johannesson
Sensors 2023, 23(8), 4046; https://0-doi-org.brum.beds.ac.uk/10.3390/s23084046 - 17 Apr 2023
Cited by 5 | Viewed by 2083
Abstract
The Internet of Things (IoT) paradigm aims to enhance human society and living standards with the vast deployment of smart and autonomous devices, which requires seamless collaboration. The number of connected devices increases daily, introducing identity management requirements for edge IoT devices. Due [...] Read more.
The Internet of Things (IoT) paradigm aims to enhance human society and living standards with the vast deployment of smart and autonomous devices, which requires seamless collaboration. The number of connected devices increases daily, introducing identity management requirements for edge IoT devices. Due to IoT devices’ heterogeneity and resource-constrained configuration, traditional identity management systems are not feasible. As a result, identity management for IoT devices is still an open issue. Distributed Ledger Technology (DLT) and blockchain-based security solutions are becoming popular in different application domains. This paper presents a novel DLT-based distributed identity management architecture for edge IoT devices. The model can be adapted with any IoT solution for secure and trustworthy communication between devices. We have comprehensively reviewed popular consensus mechanisms used in DLT implementations and their connection to IoT research, specifically identity management for Edge IoT devices. Our proposed location-based identity management model is generic, distributed, and decentralized. The proposed model is verified using the Scyther formal verification tool for security performance measurement. SPIN model checker is employed for different state verification of our proposed model. The open-source simulation tool FobSim is used for fog and edge/user layer DTL deployment performance analysis. The results and discussion section represents how our proposed decentralized identity management solution should enhance user data privacy and secure and trustworthy communication in IoT. Full article
Show Figures

Figure 1

28 pages, 3170 KiB  
Article
An Efficient and Secure Energy Trading Approach with Machine Learning Technique and Consortium Blockchain
by Tehreem Ashfaq, Muhammad Irfan Khalid, Gauhar Ali, Mohammad El Affendi, Jawaid Iqbal, Saddam Hussain, Syed Sajid Ullah, Adamu Sani Yahaya, Rabiya Khalid and Abdul Mateen
Sensors 2022, 22(19), 7263; https://0-doi-org.brum.beds.ac.uk/10.3390/s22197263 - 25 Sep 2022
Cited by 11 | Viewed by 2139
Abstract
In this paper, a secure energy trading mechanism based on blockchain technology is proposed. The proposed model deals with energy trading problems such as insecure energy trading and inefficient charging mechanisms for electric vehicles (EVs) in a vehicular energy network (VEN). EVs face [...] Read more.
In this paper, a secure energy trading mechanism based on blockchain technology is proposed. The proposed model deals with energy trading problems such as insecure energy trading and inefficient charging mechanisms for electric vehicles (EVs) in a vehicular energy network (VEN). EVs face two major problems: finding an optimal charging station and calculating the exact amount of energy required to reach the selected charging station. Moreover, in traditional trading approaches, centralized parties are involved in energy trading, which leads to various issues such as increased computational cost, increased computational delay, data tempering and a single point of failure. Furthermore, EVs face various energy challenges, such as imbalanced load supply and fluctuations in voltage level. Therefore, a demand-response (DR) pricing strategy enables EV users to flatten load curves and efficiently adjust electricity usage. In this work, communication between EVs and aggregators is efficiently performed through blockchain. Moreover, a branching concept is involved in the proposed system, which divides EV data into two different branches: a Fraud Chain (F-chain) and an Integrity Chain (I-chain). The proposed branching mechanism helps solve the storage problem and reduces computational time. Moreover, an attacker model is designed to check the robustness of the proposed system against double-spending and replay attacks. Security analysis of the proposed smart contract is also given in this paper. Simulation results show that the proposed work efficiently reduces the charging cost and time in a VEN. Full article
Show Figures

Figure 1

19 pages, 2617 KiB  
Article
Modbus Access Control System Based on SSI over Hyperledger Fabric Blockchain
by Santiago Figueroa-Lorenzo, Javier Añorga Benito and Saioa Arrizabalaga
Sensors 2021, 21(16), 5438; https://0-doi-org.brum.beds.ac.uk/10.3390/s21165438 - 12 Aug 2021
Cited by 9 | Viewed by 3680
Abstract
Security is the main challenge of the Modbus IIoT protocol. The systems designed to provide security involve solutions that manage identity based on a centralized approach by introducing a single point of failure and with an ad hoc model for an organization, which [...] Read more.
Security is the main challenge of the Modbus IIoT protocol. The systems designed to provide security involve solutions that manage identity based on a centralized approach by introducing a single point of failure and with an ad hoc model for an organization, which handicaps the solution scalability. Our manuscript proposes a solution based on self-sovereign identity over hyperledger fabric blockchain, promoting a decentralized identity from which both authentication and authorization are performed on-chain. The implementation of the system promotes not only Modbus security, but also aims to ensure the simplicity, compatibility and interoperability claimed by Modbus. Full article
Show Figures

Figure 1

25 pages, 525 KiB  
Article
IoT Data Qualification for a Logistic Chain Traceability Smart Contract
by Mohamed Ahmed, Chantal Taconet, Mohamed Ould, Sophie Chabridon and Amel Bouzeghoub
Sensors 2021, 21(6), 2239; https://0-doi-org.brum.beds.ac.uk/10.3390/s21062239 - 23 Mar 2021
Cited by 12 | Viewed by 2996
Abstract
In the logistic chain domain, the traceability of shipments in their entire delivery process from the shipper to the consignee involves many stakeholders. From the traceability data, contractual decisions may be taken such as incident detection, validation of the delivery or billing. The [...] Read more.
In the logistic chain domain, the traceability of shipments in their entire delivery process from the shipper to the consignee involves many stakeholders. From the traceability data, contractual decisions may be taken such as incident detection, validation of the delivery or billing. The stakeholders require transparency in the whole process. The combination of the Internet of Things (IoT) and the blockchain paradigms helps in the development of automated and trusted systems. In this context, ensuring the quality of the IoT data is an absolute requirement for the adoption of those technologies. In this article, we propose an approach to assess the data quality (DQ) of IoT data sources using a logistic traceability smart contract developed on top of a blockchain. We select the quality dimensions relevant to our context, namely accuracy, completeness, consistency and currentness, with a proposition of their corresponding measurement methods. We also propose a data quality model specific to the logistic chain domain and a distributed traceability architecture. The evaluation of the proposal shows the capacity of the proposed method to assess the IoT data quality and ensure the user agreement on the data qualification rules. The proposed solution opens new opportunities in the development of automated logistic traceability systems. Full article
Show Figures

Figure 1

Review

Jump to: Research

43 pages, 851 KiB  
Review
Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy
by Frederico Schardong and Ricardo Custódio
Sensors 2022, 22(15), 5641; https://0-doi-org.brum.beds.ac.uk/10.3390/s22155641 - 28 Jul 2022
Cited by 14 | Viewed by 4837
Abstract
Self-Sovereign Identity (SSI) is an identity model centered on the user. The user maintains and controls their data in this model. When a service provider requests data from the user, the user sends it directly to the service provider, bypassing third-party intermediaries. Thus, [...] Read more.
Self-Sovereign Identity (SSI) is an identity model centered on the user. The user maintains and controls their data in this model. When a service provider requests data from the user, the user sends it directly to the service provider, bypassing third-party intermediaries. Thus, SSI reduces identity providers’ involvement in the identification, authentication, and authorization, thereby increasing user privacy. Additionally, users can share portions of their personal information with service providers, significantly improving user privacy. This identity model has drawn the attention of researchers and organizations worldwide, resulting in an increase in both scientific and non-scientific literature on the subject. This study conducts a comprehensive and rigorous systematic review of the literature and a systematic mapping of theoretical and practical advances in SSI. We identified and analyzed evidence from reviewed materials to address four research questions, resulting in a novel SSI taxonomy used to categorize and review publications. Additionally, open challenges are discussed along with recommendations for future work. Full article
Show Figures

Figure 1

32 pages, 2839 KiB  
Review
Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy
by Rameez Asif, Kinan Ghanem and James Irvine
Sensors 2021, 21(1), 28; https://0-doi-org.brum.beds.ac.uk/10.3390/s21010028 - 23 Dec 2020
Cited by 28 | Viewed by 7809
Abstract
A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain that integrates hardware security primitives via PUFs to solve bandwidth, integration, scalability, latency, and energy requirements for [...] Read more.
A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain that integrates hardware security primitives via PUFs to solve bandwidth, integration, scalability, latency, and energy requirements for the Internet-of-Energy (IoE) systems. This hybrid approach, hereinafter termed as PUFChain, provides device and data provenance which records data origins, history of data generation and processing, and clone-proof device identification and authentication, thus possible to track the sources and reasons of any cyber attack. In addition to this, we review the key areas of design, development, and implementation, which will give us the insight on seamless integration with legacy IoE systems, reliability, cyber resilience, and future research challenges. Full article
Show Figures

Figure 1

Back to TopTop