Dmitrij Lagutin, Yki Kortesniemi, Nikos Fotiou and Vasilios A. Siris

Decentralised identifiers (DIDs) and verifiable credentials (VCs) are upcoming standards for self-sovereign privacy preserving identifiers and authorisation, respectively. This focus on privacy can help improve many services and open up new business models, but using DIDs and VCs directly on constrained IoT devices can be problematic due to the management and resource overhead. This paper presents an OAuth-based method to delegate the processing and access policy management to the Authorisation Server thus allowing also systems with constrained IoT devices to benefit from DIDs and VCs.

View More Papers

Defending Against Consumer Drone Privacy Attacks: A Blueprint for...

Lanier Watkins, Shane Sartalamacchia, Richard Bradt, Karan Dhareshwar, Harsimar Bagga (Johns Hopkins University, USA); William H. Robinson (Vanderbilt University, USA); Aviel Rubin (Johns Hopkins University, USA)

Read More

Auction-based Shared Economy Resolution Markets for Blockchain Platforms

Alberto Sonnino, Michał Król, Argyrios Tasiopoulos and Ioannis Psaras

Read More

ADROIT: Detecting Spatio-Temporal Correlated Attack-Stages in IoT Networks

Dinil Mon Divakaran (Trustwave, Singapore); Rhishi Pratap Singh, Kushan Sudheera Kalupahana Liyanage, Mohan Gurusamy (National University of Singapore, Singapore); Vinay Sachidananda (Trustwave, Singapore)

Read More

Information Leaks in Sequential Federated Learning

Anastassiya Pustozerova and Rudolf Mayer (SBA Research, Austria)

Read More