IEEE Systems, Man and Cybernetics Magazine - October 2023 - 14
attributes linked to identity, and access management
involves evaluating these attributes and making decisions
based on policies to manage access to other
objects or services. Authentication, authorization, and
access control collectively represent
identity access management.
Through a compar ison of
diverse ways in practice, we want
to first investigate the notion of
the Identity of Things and analyze
why it is so different from the
concept of the Identity of Users/
Identity of Devices in traditional
networks and systems. We have
revisited the identity formats,
identity models, and IDM architectures
used in traditional and
current IoT applications. Through
a comparison, we concluded to
have identity-based authentication,
authorization, and access
control by keeping a balance between memory and computational
overhead.
Introduction
IDM, often called identity and access management (IAM),
is a group of policies and technologies that guarantees that
only authorized users have access to authorized resources.
From an industry/enterprise perspective, resources are the
networks, things, services, products, and applications hosted
by the organization, including even entry at different
infrastructural buildings.
An IDM system should manage, secure, and preserve
the identities of resources and their clients (where applicable),
and methods for identity verification, resource
access control, and usage data privacy protection
should all be in place [1]. In a nutshell, rules specify
which devices and users are permitted on the network
as well as what a user is permitted to do, based on
device type, location, and other factors [2]. Authentication,
authorization, and auditing are the terms used to
describe these procedures [27]. The auditing operation
monitors the authentication and authorization processes
by keeping track of them in a log. The audit is beneficial
in discouraging attempts at violations, analyzing
user behavior, and tracking potential access control
model defects [3].
In this article, the " Related Work " section provides a
summary of the thorough literature review on identity
components and formation and IDM systems models.
The " Research Gaps in the Existing Identification Formats
and IDM System Models " section highlights
research gaps. The " Challenges in Identification Method
in IoT " section deliberates on the challenges. The " Motivation
Toward a Secured IoT for Maintaining Privacy
and Security " section illustrates the motivation for
14 IEEE SYSTEMS, MAN, & CYBERNETICS MAGAZINE October 2023
secured IoT to maintain privacy and security. The " Current
Work and Its Limitations " section discusses current
research and limitations. The " Discussions on Tradeoffs
in Current IDM Architectures " section explores tradeoffs
in current IDM architectures.
This article concludes in the
" Conclusion " section.
We have revisited
the identity formats,
identity models, and
IDM architectures
used in traditional
and current IoT
applications.
Related Work
Introduction of Identity
Components of an Identity
A digital depiction of a person is
formed from a sequence of claims
called an identity [3]. Each identity
is tied to a certain subject but not
the other way around. Furthermore,
identities might be permanent
or temporary depending on
the application's settings. Identifiers,
characteristics, and credentials are the three components
of an identity, according to the International
Telecommunication Union-Telecommunication standardization
sector (ITU-T) regulation (Y.2720).
◆ Identifiers: Identifiers are " a set of integers, letters,
symbols, or other particulars which is used to recognize
an individual " [4].
◆ Credentials: Credentials are " a bundle of facts that
supports assertions about various aspects of our
identities " [4].
◆ Attributes: Attributes are " a collection of facts that characterize
the characteristics of a topic. " Identity is
defined as " the depiction of a reality (or set of realities)
expressed as information components that enable the
reality (or realities) to be specifically recognized within
an operational environment " as per the ITU-X.1250 recommendation
[4].
Identity Formation
The procedure of validating a user's identity using some
identification components is known as identity formation.
Something the user knows (a knowledge factor), something
the user has (a possession factor), and something the
user is (an inherence factor) are the most common factors.
In addition, the context-aware factor is a fourth distinguishing
element [5].
User Identification Factors
1) Knowledge factor: Usernames, passwords, Personal
Identification Numbers, and answers to secret questions
are examples of information that a user recalls and uses
to log in.
2) Possession factor: The user carries something to sign in,
for example, a security token, a one-time password
token, a staff identification card, or a mobile number.
IEEE Systems, Man and Cybernetics Magazine - October 2023
Table of Contents for the Digital Edition of IEEE Systems, Man and Cybernetics Magazine - October 2023
Contents
IEEE Systems, Man and Cybernetics Magazine - October 2023 - Cover1
IEEE Systems, Man and Cybernetics Magazine - October 2023 - Cover2
IEEE Systems, Man and Cybernetics Magazine - October 2023 - Contents
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 2
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 3
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 4
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 5
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 6
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 7
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 8
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 9
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 10
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 11
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 12
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 13
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 14
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 15
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 16
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 17
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 18
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 19
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 20
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 21
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 22
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 23
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 24
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 25
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 26
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 27
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 28
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 29
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 30
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 31
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 32
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 33
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 34
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 35
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 36
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 37
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 38
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 39
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 40
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 41
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 42
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 43
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 44
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 45
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 46
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 47
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 48
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 49
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 50
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 51
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 52
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 53
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 54
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 55
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 56
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 57
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 58
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 59
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 60
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 61
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 62
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 63
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 64
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 65
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 66
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 67
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 68
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 69
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 70
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 71
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 72
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 73
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 74
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 75
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 76
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 77
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 78
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 79
IEEE Systems, Man and Cybernetics Magazine - October 2023 - 80
IEEE Systems, Man and Cybernetics Magazine - October 2023 - Cover3
IEEE Systems, Man and Cybernetics Magazine - October 2023 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/smc_202310
https://www.nxtbook.com/nxtbooks/ieee/smc_202307
https://www.nxtbook.com/nxtbooks/ieee/smc_202304
https://www.nxtbook.com/nxtbooks/ieee/smc_202301
https://www.nxtbook.com/nxtbooks/ieee/smc_202210
https://www.nxtbook.com/nxtbooks/ieee/smc_202207
https://www.nxtbook.com/nxtbooks/ieee/smc_202204
https://www.nxtbook.com/nxtbooks/ieee/smc_202201
https://www.nxtbook.com/nxtbooks/ieee/smc_202110
https://www.nxtbook.com/nxtbooks/ieee/smc_202107
https://www.nxtbook.com/nxtbooks/ieee/smc_202104
https://www.nxtbook.com/nxtbooks/ieee/smc_202101
https://www.nxtbook.com/nxtbooks/ieee/smc_202010
https://www.nxtbook.com/nxtbooks/ieee/smc_202007
https://www.nxtbook.com/nxtbooks/ieee/smc_202004
https://www.nxtbook.com/nxtbooks/ieee/smc_202001
https://www.nxtbook.com/nxtbooks/ieee/smc_201910
https://www.nxtbook.com/nxtbooks/ieee/smc_201907
https://www.nxtbook.com/nxtbooks/ieee/smc_201904
https://www.nxtbook.com/nxtbooks/ieee/smc_201901
https://www.nxtbook.com/nxtbooks/ieee/smc_201810
https://www.nxtbook.com/nxtbooks/ieee/smc_201807
https://www.nxtbook.com/nxtbooks/ieee/smc_201804
https://www.nxtbook.com/nxtbooks/ieee/smc_201801
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1017
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0717
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0417
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0117
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1016
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0716
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0416
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0116
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1015
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0715
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0415
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0115
https://www.nxtbookmedia.com