{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T04:54:21Z","timestamp":1771476861752,"version":"3.50.1"},"reference-count":99,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201504490005"],"award-info":[{"award-number":["201504490005"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet of Things aims at connecting everything, ranging from individuals, organizations, and companies to things in the physical and virtual world. The digital identity has always been considered as the keystone for all online services and the foundation for building security mechanisms such as authentication and authorization. However, the current literature still lacks a comprehensive study on the digital identity management for the Internet of Things (IoT). In this paper, we firstly identify the requirements of building identity management systems for IoT, which comprises scalability, interoperability, mobility, security and privacy. Then, we trace the identity problem back to the origin in philosophy, analyze the Internet digital identity management solutions in the context of IoT and investigate recent surging blockchain sovereign identity solutions. Finally, we point out the promising future research trends in building IoT identity management systems and elaborate challenges of building a complete identity management system for the IoT, including access control, privacy preserving, trust and performance respectively.<\/jats:p>","DOI":"10.3390\/s18124215","type":"journal-article","created":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T06:02:09Z","timestamp":1543816929000},"page":"4215","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":133,"title":["Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5112-122X","authenticated-orcid":false,"given":"Xiaoyang","family":"Zhu","sequence":"first","affiliation":[{"name":"INSA Lyon, University Lyon, LIRIS, UMR5205 Villeurbanne, France"}]},{"given":"Youakim","family":"Badr","sequence":"additional","affiliation":[{"name":"Big Data Lab, Engineering Division, The Pennsylvania State University, Malvern, PA 19355, USA"}]}],"member":"1968","published-online":{"date-parts":[[2018,12,1]]},"reference":[{"key":"ref_1","unstructured":"(2018, August 31). Telecommunication Standardization Sector\u2014Overview of the Internet of Things. Available online: https:\/\/www.itu.int\/rec\/T-REC-Y.2060-201206-I."},{"key":"ref_2","unstructured":"(2018, August 31). Gartner Says 6.4 Billion Connected \u201cThings\u201d Will Be in Use in 2016, Up 30 Percent from 2015. Available online: http:\/\/www.gartner.com\/newsroom\/id\/3165317."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Zhu, X., and Badr, Y. (August, January 30). A Survey on Blockchain-based Identity Management Systems for the Internet of Things. Proceedings of the 2018 IEEE Symposium on Blockchain, Halifax, NS, Canada.","DOI":"10.3390\/s18124215"},{"key":"ref_4","unstructured":"(2018, August 31). Telecommunication Standardization Sector\u2014NGN Identity Management Framework. Available online: https:\/\/www.itu.int\/rec\/T-REC-Y.2720-200901-I."},{"key":"ref_5","unstructured":"Alpar, G., Hoepman, J.H., and Siljee, J. (arXiv, 2011). The Identity Crisis Security, Privacy and Usability Issues in Identity Management, arXiv."},{"key":"ref_6","unstructured":"(2018, August 31). Senate Banking Committee Hearing on Equifax Data Breach. Available online: https:\/\/www.c-span.org\/video\/?434469-1\/equifax-ceo-testifies-senate-banking-panel."},{"key":"ref_7","unstructured":"(2018, August 31). Facebook Security Breach Exposes Accounts of 50 Million Users. Available online: https:\/\/www.nytimes.com\/2018\/09\/28\/technology\/facebook-hack-data-breach.html."},{"key":"ref_8","unstructured":"(2018, August 31). Security Services Technical Committee of OASIS\u2014Security Assertion Markup Language (SAML) v2.0. Available online: http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security."},{"key":"ref_9","first-page":"16","article-title":"Shibboleth Architecture","volume":"10","author":"Cantor","year":"2005","journal-title":"Protoc. Profiles"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","article-title":"The Internet of Things: A Survey","volume":"17","author":"Li","year":"2014","journal-title":"Inf. Syst. Front."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MWC.2014.6845045","article-title":"Toward a standardized common M2M service layer platform: Introduction to oneM2M","volume":"21","author":"Swetina","year":"2014","journal-title":"IEEE Wirel. Commun."},{"key":"ref_12","unstructured":"Bauer, M., Bui, N., Carrez, F., Giacomin, P., Haller, S., Ho, E., Jardak, C., De Loof, J., Magerkurth, C., and Serbanati, A. (2018, November 09). Introduction to the Architectural Reference Model for the Internet of Things. Available online: https:\/\/iotforum.org\/wp-content\/uploads\/2014\/09\/120613-IoT-A-ARM-Book-Introduction-v7.pdf."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications","volume":"17","author":"Guizani","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., and Kikiras, P. (2015, January 21\u201325). On the Security and Privacy of Internet of Things Architectures and Systems. Proceedings of the International Workshop on Secure Internet of Things (SIoT), Vienna, Austria.","DOI":"10.1109\/SIOT.2015.9"},{"key":"ref_15","first-page":"3","article-title":"The Ambiguity of Identity","volume":"103","author":"Thanh","year":"2007","journal-title":"J. Identity Manag."},{"key":"ref_16","unstructured":"(2018, August 31). The Stanford Encyclopedia of Philosophy (Winter 2016 Edition)\u2014The Identity of Indiscernibles. Available online: https:\/\/plato.stanford.edu\/archives\/win2016\/entries\/identity-indiscernible."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1108\/00251740210426312","article-title":"\u201cKnow Your Customer\u201d: Marketing, Governmentality and the \u201cNew Consumer\u201d of Financial Services","volume":"40","author":"Hodgson","year":"2002","journal-title":"Manag. Decis."},{"key":"ref_18","unstructured":"Bertino, E., and Takahashi, K. (2011). Identity Management: Concepts, Technologies, and Systems, Artech House."},{"key":"ref_19","unstructured":"J\u00f8sang, A., and Pope, S. (2005, January 22\u201326). User Centric Identity Management. Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, Brisbane, Australia."},{"key":"ref_20","unstructured":"J\u00f8sang, A., Zomai, M.A., and Suriadi, S. (February, January 30). Usability and Privacy in Identity Management Architectures. Proceedings of the Fifth Australasian Symposium on ACSW Frontiers, Ballarat, Australia."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2008.50","article-title":"The Venn of identity: Options and issues in federated identity management","volume":"6","author":"Maler","year":"2008","journal-title":"IEEE Secur. Priv."},{"key":"ref_22","unstructured":"Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Othmane, L.B., and Lilien, L. (November, January 31). An entity-centric approach for privacy and identity management in cloud computing. Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS\u201910), New Delhi, India."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Recordon, D., and Reed, D. (2006, January 3). OpenID 2.0: A Platform for User-centric Identity Management. Proceedings of the Second ACM Workshop on Digital Identity Management, Alexandria, VA, USA.","DOI":"10.1145\/1179529.1179532"},{"key":"ref_24","unstructured":"Hardt, D. (2018, August 31). The OAuth 2.0 Authorization Framework. Available online: https:\/\/tools.ietf.org\/html\/rfc6749."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1016\/j.jnca.2008.02.016","article-title":"A User-centric Federated Single Sign-on System","volume":"32","author":"Suriadi","year":"2009","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ahn, G., Ko, M., and Shehab, M. (2009, January 14\u201318). Privacy-enhanced User-Centric Identity Management. Proceedings of the IEEE International Conference on Communications, Dresden, Germany.","DOI":"10.1109\/ICC.2009.5199363"},{"key":"ref_27","unstructured":"(2018, August 31). PRIMELife\u2014Privacy and Identity Management in Europe for Life. Available online: http:\/\/primelife.ercim.eu."},{"key":"ref_28","unstructured":"(2018, August 31). SWIFT\u2014Secure Widespread Identities for Federated Telecommunications. Available online: https:\/\/www.swift.com."},{"key":"ref_29","unstructured":"(2018, August 31). DAIDALOS\u2014Designing Advanced Network Interfaces for the Delivery and Administration of Location Independent, Optimised Personal Services. Available online: https:\/\/www.tssg.org\/projects\/daidalos\/."},{"key":"ref_30","unstructured":"(2018, August 31). Kantara. Available online: http:\/\/kantarainitiative.org."},{"key":"ref_31","unstructured":"(2018, August 31). Liberty\u2014The Liberty Alliance Project. Available online: http:\/\/www.projectliberty.org."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Matyas, V., Fischer-H\u00fcbner, S., Cvrcek, D., and \u0160venda, P. (2009). The Future of Identity in the Information Society, Springer.","DOI":"10.1007\/978-3-642-03315-5"},{"key":"ref_33","unstructured":"(2018, August 31). Higgins\u2014Open Source Identity Framework. Available online: http:\/\/www.eclipse.org\/higgins."},{"key":"ref_34","unstructured":"(2018, August 31). STORK\u2014Secure idenTity acrOss boRders linKed. Available online: https:\/\/www.eid-stork.eu."},{"key":"ref_35","unstructured":"(2018, August 31). PICOS\u2014Privacy and Identity Management for Community Services. Available online: http:\/\/www.picos-project.eu."},{"key":"ref_36","unstructured":"Bertocci, V., Serack, G., and Baker, C. (2007). Understanding Windows Cardspace: An Introduction to the Concepts and Challenges of Digital Identities, Addison Wesley."},{"key":"ref_37","unstructured":"Nakamoto, S. (2018, August 31). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_38","unstructured":"(2018, August 31). Ethereum\u2014A Next-Generation Smart Contract and Decentralized Application Platform. Available online: https:\/\/github.com\/Ethereum\/wiki\/wiki\/White-Paper."},{"key":"ref_39","unstructured":"(2018, August 31). Security and Privacy Are Critical Issues Facing the Development of the Internet of Things. Available online: https:\/\/networkworld.com\/article\/3166106\/internet-of-things\/4-critical-security-challenges-facing-iot.html."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"5943","DOI":"10.1002\/sec.1748","article-title":"FairAccess: a new Blockchain based access control framework for the Internet of Things","volume":"9","author":"Ouaddah","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S., Jurdak, R., and Gauravaram, P. (2016, January 13\u201317). Blockchain for IoT Security and Privacy: The Case Study of a Smart Home. Proceedings of the 2017 IEEE International Conference on Security and Communication Workshops (PerCom Workshops), Kona, HI, USA.","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Zhu, X., Badr, Y., Pacheco, J., and Hariri, S. (2017, January 18\u201322). Autonomic Identity Framework for the Internet of Things. Proceedings of the 2017 International Conference on Cloud and Autonomic Computing (ICCAC), Tucson, AZ, USA.","DOI":"10.1109\/ICCAC.2017.14"},{"key":"ref_43","unstructured":"(2018, August 31). Namecoin. Available online: https:\/\/namecoin.org."},{"key":"ref_44","unstructured":"(2018, August 31). Zooko\u2019s Triangle. Available online: https:\/\/en.wikipedia.org\/wiki\/Zooko%27s_triangle."},{"key":"ref_45","unstructured":"Fromknecht, C., Dragos, V., and Sophia, Y. (2018, August 31). CertCoin: A NameCoin Based Decentralized Authentication System 6.857 Class Project. Available online: http:\/\/courses.csail.mit.edu\/6.857\/2014\/files\/19-fromknecht-velicann-yakoubov-certcoin.pdf."},{"key":"ref_46","unstructured":"Leiding, B., Cap, C.H., Mundt, T., and Samaneh, R. (2018, August 31). Authcoin: Validation and Authentication in Decentralized Networks. Available online: https:\/\/arxiv.org\/pdf\/1609.04955.pdf."},{"key":"ref_47","unstructured":"Muneeb, A., Nelson, J., Shea, R., and Freedman, M. (2016, January 22\u201324). Blockstack: A Global Naming and Storage System Secured by Blockchains. Proceedings of the 2016 USENIX Annual Technical Conference, Denver, CO, USA."},{"key":"ref_48","unstructured":"Fromknecht, C., Velicanu, D., and Yakoubov, S. (2018, August 31). A Decentralized Public Key Infrastructure with Identity Retention. Available online: http:\/\/eprint.iacr.org\/2014\/803.pdf."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Al-Bassam, M. (2017, January 2). SCPKI: A Smart Contract-based PKI and Identity System. Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, Abu Dhabi, UAE.","DOI":"10.1145\/3055518.3055530"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhao, Z., Guo, G., Wang, X., Tan, Z., and Wang, S. (2018, August 31). An Identity Management System Based on Blockchain. Available online: https:\/\/www.ucalgary.ca\/pst2017\/files\/pst2017\/paper-8.pdf.","DOI":"10.1109\/PST.2017.00016"},{"key":"ref_51","unstructured":"Axon, L. (2015). Privacy-Awareness in Blockchain-Based PKI, Oxford University Research Archive."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Augot, D., Chabanne, H., Cl\u00e9mot, O., and George, W. (2018, August 31). Transforming Face-to-Face Identity Proofing Into Anonymous Digital Identity Using the Bitcoin Blockchain. Available online: https:\/\/arxiv.org\/abs\/1710.02951.","DOI":"10.1109\/PST.2017.00014"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Augot, D., Chabanne, H., Chenevier, T., George, W., and Lambert, L. (2017). A User-Centric System for Verified Identities on the Bitcoin Blockchain. Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer.","DOI":"10.1007\/978-3-319-67816-0_22"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Brands, S. (2000). Rethinking Public Key Infrastructures and Digital Certificates, MIT Press.","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"ref_55","unstructured":"Hardjono, T., and Pentland, A. (2018, August 31). Verifiable Anonymous Identities and Access Control in Permissioned Blockchains. Available online: http:\/\/connection.mit.edu\/wp-content\/uploads\/sites\/29\/2014\/12\/ChainAnchor-Identities-04172016.pdf."},{"key":"ref_56","unstructured":"Halpin, H. (September, January 29). NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging. Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Azouvi, S., Al-Bassam, M., and Meiklejohn, S. (2017). Who am i? Secure identity registration on distributed ledgers. Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer.","DOI":"10.1007\/978-3-319-67816-0_21"},{"key":"ref_58","unstructured":"(2018, August 31). Uport: Open Identity System for the Decentralized Web. Available online: https:\/\/www.uport.me\/."},{"key":"ref_59","unstructured":"(2018, August 31). Shocard: Secure Enterprise Identity Authentication. Available online: https:\/\/shocard.com\/."},{"key":"ref_60","unstructured":"(2018, August 31). Bitnation: Governance 2.0. Available online: https:\/\/bitnation.co\/."},{"key":"ref_61","unstructured":"(2018, August 31). Civic Secure Identity Ecosystem\u2014Decentralized Identity & Reusable KYC. Available online: https:\/\/www.civic.com\/."},{"key":"ref_62","unstructured":"(2018, August 31). Decentralized Infrastructure for Self-Sovereign Identity. Available online: http:\/\/jolocom.io\/."},{"key":"ref_63","unstructured":"(2018, August 31). Sovrin-Identity for All. Available online: https:\/\/sovrin.org\/."},{"key":"ref_64","unstructured":"(2018, August 31). Self-Sovereign Identity. Available online: https:\/\/www.evernym.com\/."},{"key":"ref_65","unstructured":"(2018, August 31). An Alliance Commited to Improving Lives through Digital Identity. Available online: https:\/\/id2020.org\/."},{"key":"ref_66","unstructured":"(2018, November 09). Ethereum Identity Standard. Available online: https:\/\/github.com\/Ethereum\/EIPs\/issues\/725."},{"key":"ref_67","unstructured":"(2018, November 09). W3C Decentralized Identifiers Specification. Available online: https:\/\/w3c-ccg.github.io\/did-spec\/."},{"key":"ref_68","unstructured":"(2018, August 31). Harness the Power of Ethereum. Available online: https:\/\/new.consensys.net\/."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","article-title":"The Social Internet of Things (Siot)\u2014When Social Networks Meet the Internet of Things: Concept, Architecture and Network Characterization","volume":"56","author":"Atzori","year":"2012","journal-title":"Comput. Netw."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Zhu, X., and Badr, Y. (August, January 30). Fog Computing Security Architecture for the Internet of Things using Blockchain-based Social Networks. Proceedings of the 2018 IEEE Symposium on Blockchain, Halifax, NS, Canada.","DOI":"10.1109\/Cybermatics_2018.2018.00234"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-Based Access Control Models","volume":"29","author":"Sandhu","year":"1996","journal-title":"Computer"},{"key":"ref_72","first-page":"1","article-title":"Distributed Capability-Based Access Control for the Internet of Things","volume":"3","author":"Jara","year":"2013","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1016\/j.mcm.2013.02.006","article-title":"A Capability-Based Security Approach to Manage Access Control on the Internet of Things","volume":"58","author":"Gusmeroli","year":"2013","journal-title":"Math. Comput. Model."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/MCOM.2017.1600611CM","article-title":"A Community-Driven Access Control Approach in Distributed IoT Environments","volume":"55","author":"Hussein","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_75","first-page":"417","article-title":"Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things","volume":"8","author":"Outchakoucht","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_76","unstructured":"Maesa, D.D.F., Mori, P., and Ricci, L. (2017, January 19\u201322). Blockchain based Access Control. Proceedings of the IFIP International Conference on Distributed Applications and Interoperable Systems, Neuch\u00e2tel, Switzerland."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Evans, D., and Eyers, D. (2012, January 20\u201323). Efficient Data Tagging for Managing Privacy on the Internet of Things. Proceedings of the IEEE International Conference on Green Computing and Communications, Besancon, France.","DOI":"10.1109\/GreenCom.2012.45"},{"key":"ref_78","unstructured":"Huang, X., Fu, R., Chen, B., Zhang, T., and Roscoe, A. (2012, January 10\u201312). User Interactive Internet of Things Privacy Preserved Access Control. Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, London, UK."},{"key":"ref_79","unstructured":"Wang, Y., and Wen, Q. (2011, January 14\u201316). A Privacy Enhanced DNS Scheme for the Internet of Things. Proceedings of the IET International Conference on Communication Technology and Application, Beijing, China."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., and Papamanthou, C. (2016, January 2\u201326). Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA.","DOI":"10.1109\/SP.2016.55"},{"key":"ref_81","unstructured":"Hardjono, T., Smith, N., and Pentland, A.S. (2018, November 28). Anonymous Identities for Permissioned Blockchains. Available online: http:\/\/connection.mit.edu\/wp-content\/uploads\/sites\/29\/2014\/12\/Anonymous-Identities-for-Permissioned-Blockchains2.pdf."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Hardjono, T., and Smith, N. (2016, January 30). Cloud-based Commissioning of Constrained Devices using Permissioned Blockchains. Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, Xi\u2019an, China.","DOI":"10.1145\/2899007.2899012"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Parno, B., Howell, J., Gentry, C., and Raykova, M. (2013, January 19\u201322). Pinocchio: Nearly practical verifiable computation. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA.","DOI":"10.1109\/SP.2013.47"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Jawurek, M., Kerschbaum, F., and Orlandi, C. (2013, January 4\u20138). Zero-knowledge using Garbled Circuits: How to Prove Non-algebraic Statements Efficiently. Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany.","DOI":"10.1145\/2508859.2516662"},{"key":"ref_85","unstructured":"Ben-Sasson, E., Chiesa, A., Tromer, E., and Virza, M. (2014, January 20\u201322). Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. Proceedings of the USENIX Security Symposium, San Diego, CA, USA."},{"key":"ref_86","unstructured":"Giacomelli, I., Madsen, J., and Orlandi, C. (2016, January 10\u201312). ZKBoo: Faster Zero-Knowledge for Boolean Circuits. Proceedings of the USENIX Security Symposium, Austin, TX, USA."},{"key":"ref_87","unstructured":"Ben-Sasson, E., Bentov, I., Horesh, Y., and Riabzev, M. (2018, November 28). Scalable, transparent, and post-quantum secure computational integrity. Available online: https:\/\/www.monoico.com\/wp-content\/uploads\/2018\/05\/046.pdf."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., and Maxwell, G. (2018, January 21\u201323). Bulletproofs: Short proofs for confidential transactions and more. Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, USA.","DOI":"10.1109\/SP.2018.00020"},{"key":"ref_89","unstructured":"Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., and Virza, M. (2014, January 18\u201321). Zerocash: Decentralized anonymous payments from bitcoin. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA."},{"key":"ref_90","unstructured":"(2018, September 11). Monero-Private Digital Currency. Available online: https:\/\/www.getmonero.org."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","article-title":"Security, privacy and trust in Internet of Things: The road ahead","volume":"76","author":"Sicari","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.2298\/CSIS110303056C","article-title":"TRM-IoT: A Trust Management Model based on Fuzzy Reputation for Internet of Things","volume":"8","author":"Chen","year":"2011","journal-title":"Comput. Sci. Inf. Syst."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Nitti, M., Girau, R., Atzori, L., Iera, A., and Morabito, G. (2012, January 9\u201312). A subjective model for trustworthiness evaluation in the social internet of things. Proceedings of the IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications, Sydney, Australia.","DOI":"10.1109\/PIMRC.2012.6362662"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1109\/TKDE.2013.105","article-title":"Trustworthiness management in the social internet of things","volume":"26","author":"Nitti","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1109\/TDSC.2015.2420552","article-title":"Trust-based service management for social internet of things systems","volume":"13","author":"Chen","year":"2016","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Bao, F., and Chen, I.R. (2012, January 17). Dynamic trust management for internet of things applications. Proceedings of the International Workshop on Self-Aware Internet of Things, San Jose, CA, USA.","DOI":"10.1145\/2378023.2378025"},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1109\/71.862209","article-title":"Evaluating the scalability of distributed systems","volume":"11","author":"Jogalekar","year":"2000","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., and Capkun, S. (2016, January 24\u201328). On the Security and Performance of Proof of Work Blockchains. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.","DOI":"10.1145\/2976749.2978341"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Dinh, T.T.A., Wang, J., Chen, G., Liu, R., Ooi, B.C., and Tan, K. (2017, January 14\u201319). Blockbench: A framework for analyzing private blockchains. Proceedings of the 2017 ACM International Conference on Management of Data, Chicago, IL, USA.","DOI":"10.1145\/3035918.3064033"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/12\/4215\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:33:47Z","timestamp":1760196827000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/12\/4215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,1]]},"references-count":99,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,12]]}},"alternative-id":["s18124215"],"URL":"https:\/\/doi.org\/10.3390\/s18124215","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,1]]}}}