Potential Identity Resolution Systems for the Industrial Internet of Things: A Survey

被引:44
作者
Ren, Yuzheng [1 ]
Xie, Renchao [1 ,2 ]
Yu, F. Richard [3 ]
Huang, Tao [1 ,2 ]
Liu, Yunjie [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Purple Mt Labs, Dept Future Network, Nanjing 211111, Peoples R China
[3] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
关键词
IP networks; Digital twin; Tutorials; Standards; Distributed databases; Security; Physical layer; Blockstack naming system (BNS); decentralized identifiers (DID); electronic product code (EPC); GNU name system (GNS); handle; industrial Internet of Things (IIoT); identity resolution system; object identifier (OID); ubiquitous ID (UID); RESEARCH ISSUES; BLOCKCHAIN; NETWORKING; ARCHITECTURE; MANAGEMENT; STANDARDS; SECURITY; RESOURCE; ATTACKS; D2D;
D O I
10.1109/COMST.2020.3045136
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the Industrial Internet of Things (IIoT) came into being. IIoT connects sensors, industrial equipment, products, and staff in the factory, enabling context-awareness and industrial equipment automate control. The identity resolution system is a core infrastructure in IIoT. Similar to the role of Domain Name System (DNS) on the Internet, it is the entrance to the IIoT. The difference between them is their input and output. The input of the identity resolution system in IIoT is an identifier of an object. And the output is the mapping data attached to the identifier, including the product profile, a URL, or the identifier's surrounding environment. However, how to deploy an identity resolution system in IIoT has not yet been conclusive. In this article, we provide a comprehensive survey on the potential identity resolution systems that may be used in IIoT. Firstly, an overview of the identity resolution system is introduced, including a reference framework that can be used to evaluate an identity resolution system. Then we review some influential identity resolution systems based on this reference framework. After that, we make a comparison from the perspective of whether they can meet IIoT requirements and technology selection. Finally, some challenges and broader perspectives are discussed.
引用
收藏
页码:391 / 430
页数:40
相关论文
共 167 条
[41]   An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things [J].
Du, Miao ;
Wang, Kun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (01) :648-657
[42]  
Duan X., 2018, Proc., P1
[43]  
Engels D, 2003, REP
[44]   Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures [J].
Esposito, Christian ;
Castiglione, Aniello ;
Palmieri, Francesco ;
De Santis, Alfredo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3669-3678
[45]  
Euihyun Jung, 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT), P304
[46]   Distributed ONS and its impact on privacy [J].
Fabian, Benjamin ;
Guenther, Oliver .
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, :1223-1228
[47]   Security Challenges of the EPCglobal Network [J].
Fabian, Benjamin ;
Guenther, Oliver .
COMMUNICATIONS OF THE ACM, 2009, 52 (07) :121-125
[48]   A Survey of Green Information-Centric Networking: Research Issues and Challenges [J].
Fang, Chao ;
Yu, F. Richard ;
Huang, Tao ;
Liu, Jiang ;
Liu, Yunjie .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1455-1472
[49]   Locator/Identifier Split Networking: A Promising Future Internet Architecture [J].
Feng, Bohao ;
Zhang, Hongke ;
Zhou, Huachun ;
Yu, Shui .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04) :2927-2948
[50]   In Search of Self-Sovereign Identity Leveraging Blockchain Technology [J].
Ferdous, Md Sadek ;
Chowdhury, Farida ;
Alassafi, Madini O. .
IEEE ACCESS, 2019, 7 :103059-103079