Dmitrij Lagutin, Yki Kortesniemi, Nikos Fotiou and Vasilios A. Siris

Decentralised identifiers (DIDs) and verifiable credentials (VCs) are upcoming standards for self-sovereign privacy preserving identifiers and authorisation, respectively. This focus on privacy can help improve many services and open up new business models, but using DIDs and VCs directly on constrained IoT devices can be problematic due to the management and resource overhead. This paper presents an OAuth-based method to delegate the processing and access policy management to the Authorisation Server thus allowing also systems with constrained IoT devices to benefit from DIDs and VCs.

View More Papers

IoT Security Solution Distribution via DLT

Le Su (Nanyang Technological University, Singapore); Dinil Mon Divakaran (Trustwave, Singapore); Sze Ling Yeo (Institute for Infocomm Research, Singapore); Jiqiang Lu (Beihang University, China); Vrizlynn Thing (National University of Singapore, Singapore)

Read More

Designing a Secure IoT System Architecture from a Virtual...

Vida Ahmadi Mehri, Dragos Ilie and Kurt Tutschku

Read More

Bridging the Cyber and Physical Worlds using Blockchains and...

Nikos Fotiou, Vasilios A. Siris, Spyros Voulgaris, George C. Polyzos and Dmitrij Lagutin

Read More