Next Article in Journal
The Influence of Public Transport Delays on Mobility on Demand Services
Next Article in Special Issue
Fusion Chain: A Decentralized Lightweight Blockchain for IoT Security and Privacy
Previous Article in Journal
Detection of Removed Objects in 3D Meshes Using Up-to-Date Images for Mixed-Reality Applications
Previous Article in Special Issue
A Review on Edge Computing in Smart Energy by means of a Systematic Mapping Study
Article

Identity and Access Management Resilience against Intentional Risk for Blockchain-Based IOT Platforms

by 1,*,†, 2,† and 2,†
1
Department of Applied Mathematics, International Doctoral School, Rey Juan Carlos University, 28933 Móstoles, Madrid, Spain
2
Department of Applied Mathematics, Rey Juan Carlos University, 28933 Móstoles, Madrid, Spain
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Academic Editor: Davide Brunelli
Electronics 2021, 10(4), 378; https://doi.org/10.3390/electronics10040378
Received: 31 December 2020 / Revised: 22 January 2021 / Accepted: 26 January 2021 / Published: 4 February 2021
(This article belongs to the Special Issue IoT Security and Privacy through the Blockchain)
Some Internet of Things (IoT) platforms use blockchain to transport data. The value proposition of IoT is the connection to the Internet of a myriad of devices that provide and exchange data to improve people’s lives and add value to industries. The blockchain technology transfers data and value in an immutable and decentralised fashion. Security, composed of both non-intentional and intentional risk management, is a fundamental design requirement for both IoT and blockchain. We study how blockchain answers some of the IoT security requirements with a focus on intentional risk. The review of a sample of security incidents impacting public blockchains confirm that identity and access management (IAM) is a key security requirement to build resilience against intentional risk. This fact is also applicable to IoT solutions built on a blockchain. We compare the two IoT platforms based on public permissionless distributed ledgers with the highest market capitalisation: IOTA, run on an alternative to a blockchain, which is a directed acyclic graph (DAG); and IoTeX, its contender, built on a blockchain. Our objective is to discover how we can create IAM resilience against intentional risk in these IoT platforms. For that, we turn to complex network theory: a tool to describe and compare systems with many participants. We conclude that IoTeX and possibly IOTA transaction networks are scale-free. As both platforms are vulnerable to attacks, they require resilience against intentional risk. In the case of IoTeX, DIoTA provides a resilient IAM solution. Furthermore, we suggest that resilience against intentional risk requires an IAM concept that transcends a single blockchain. Only with the interplay of edge and global ledgers can we obtain data integrity in a multi-vendor and multi-purpose IoT network. View Full-Text
Keywords: IoT; blockchain; decentralised ledger; complex networks; identity and access management; data authentication; data integrity; intentional risk IoT; blockchain; decentralised ledger; complex networks; identity and access management; data authentication; data integrity; intentional risk
Show Figures

Figure 1

MDPI and ACS Style

Partida, A.; Criado, R.; Romance, M. Identity and Access Management Resilience against Intentional Risk for Blockchain-Based IOT Platforms. Electronics 2021, 10, 378. https://doi.org/10.3390/electronics10040378

AMA Style

Partida A, Criado R, Romance M. Identity and Access Management Resilience against Intentional Risk for Blockchain-Based IOT Platforms. Electronics. 2021; 10(4):378. https://doi.org/10.3390/electronics10040378

Chicago/Turabian Style

Partida, Alberto; Criado, Regino; Romance, Miguel. 2021. "Identity and Access Management Resilience against Intentional Risk for Blockchain-Based IOT Platforms" Electronics 10, no. 4: 378. https://doi.org/10.3390/electronics10040378

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop