Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Change history:

    • draft 0.01    Ingo.Friese@telekom.deFriese
    • draft 0.02    Jeff Stollman
    • draft 0.03    Scott Shorter
    • draft 0.04    Ingo.Friese@telekom.deIngo.Friese
    • draft 0.05    Jeff Stollman
    • draft 0.06    Ingo Friese

...

Is the classic Domain Name Service (DNS) obsolete in the IoT?

What Why is special about privacy in the IoTa critical topic in IoT?

How to design a privacy ensured IoT system?

Anchor
1
1

What are the challenges of Identiy in the Internet of Things?

...

In most cases DNS (Domain Name Service) can't be used directly. DNS was designed to map between IP-addresses and human readable domain names. DNS is not able to handle identifier formats from various IoT protocols. It is also not possible to propagate changes in a very short time.But DNS has a outstanding governance process that ensures world-wide unique identifiers. So DNS is at least part of most mapping processes. In our example DNS might be used to find the company domain of the lamp management or the address of the REST API. 

Anchor
6

...

6

...


Why is

...

privacy a critical topic in

...

IoT?

Privacy and Trust becomes crucial in the Internet of Things because even an arbitrary data, like a temperature might be related to a user when it’s combined with other data like location or it is profiled over a certain time period. So it is possible to see whether a person is iat home or not. One extreme exemplary privacy issues is the ability to determine what kind of TV-Program a user is watching just from measuring the energy consumption with very frequent probes samples [ 1 ]. 

[1] Ulrich Greveler, Benjamin Justus, Dennis Loehr. Multimedia Content Identification Through Smart Meter Power Usage Profiles. Computer Security Lab Münster University of Applied Sciences D-48565 Steinfurt, Germany. Published on Electronic Privacy Information Center epic.org https://epic.org/privacy/smartgrid/smart_meter.pdf

Anchor
7
7

How to design a privacy ensured IoT system?

ltbd

ink to our IEEEP2413 activities ; aggregation, pseudonymistaion, etc.

How to design identity mechanisms in an IoT system?

Identifier vs. Identity

Seperate identity from service

seperate authentication from authorization

tbd

...

The are various design startegies and architecture concepts to ensure privacy in communication and during resource access control. The Identity of Thing Discussion Group supports IEEE P2413 IoT Architecture Working Group in writing a Privacy- and Trust Architecture View Point. This first draft of P2413 is (propably) published End of 2017.(we will publish here the privacy strategies and architecture concepts soon).

Anchor
8
8

What are key concepts for Identity in Kantara Initiative that can be also used in the IoT ?

User Managed Access (UMA): UMA is a profil on top of OAuth....tbd

...

For purposes of address-ability, it likely has only a single IP address. But from the perspective of its functionality, each separate capability can be accessed and used separately.  E.g., I could leave a smartphone at home and access it remotely as a webcam to watch a baby in a crib, as a microphone to listen to the sounds in my house, as a speaker to give a direction to the babysitter, etc.

 

Relationships and Identities

Ingo/Sal

 

Processes & identity

Frank/Ingo

Blockchain and Trust

tbd Matteo / Ingo

I suspect that IoT will merely obtain the same benefits that blockchain offers to Identity, in general.  It is unclear to me that there are unique benefits to "Identity within the Internet of Things" to be covered here.

Proof of knowledge

tbd Matteo/Ingo

Lifecycle

In user identity management (Classic IdM) we have rather long living lifecycles of an identity. In day to day service like e-mail, online shopping etc. a user account exists for months, years or even a lifetime. In the Internet of Things objects have very different lifetimes. This might range from years or decades down to days or minutes.

Example: A parcel might be shipped from one country to another. The parcel gets an RFID tag associated with an identifier. It moves from logistic center to another, crosses borders, it is tracked, controlled and routed. As soon as it arrives the identity of the parcel disappears.a single IP address. But from the perspective of its functionality, each separate capability can be accessed and used separately.  E.g., I could leave a smartphone at home and access it remotely as a webcam to watch a baby in a crib, as a microphone to listen to the sounds in my house, as a speaker to give a direction to the babysitter, etc.

 

Relationships and Identities

Ingo/Sal

 

 

 

 

 

 

 

 

 

 

 

Ownership and identity relationships

...