2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2022
DOI: 10.1109/icccnt54827.2022.9984498
|View full text |Cite
|
Sign up to set email alerts
|

Identity Management in IoT using Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…In 2019, Kettani et al [13][14][15][16][17][18][19], in an effort to build an access management system based on RFID, PKI and blockchain technologies, presented the four principles an IAM model should follow. The first three of these principles can be fulfilled efficiently using blockchain technology:…”
Section: Identity and Access Management-iammentioning
confidence: 99%
See 2 more Smart Citations
“…In 2019, Kettani et al [13][14][15][16][17][18][19], in an effort to build an access management system based on RFID, PKI and blockchain technologies, presented the four principles an IAM model should follow. The first three of these principles can be fulfilled efficiently using blockchain technology:…”
Section: Identity and Access Management-iammentioning
confidence: 99%
“…The exception lies on a relatively small number of papers, presenting a very high-level conceptualization, which, however, focus exclusively on meeting security needs on a customized way and measuring performance indicators. A common factor of these solutions is interfering with the authorization processes, as is indicated by [13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation