Decentralized Identifiers and Self-sovereign Identity in 6G

12/17/2021
by   Sandro Rodriguez Garzon, et al.
0

One of the key challenges for mobile network operators in the future will be to bring together a wide range of new players in the mobile network market under a common umbrella and to orchestrate their innovative technologies to provide economically viable and seamless mobile connectivity to the mobile subscribers. With each new player, be it a cloud, edge or hardware provider, the need for interfaces with secure authentication and authorization mechanisms increases, as does the complexity and operational costs of the public key infrastructures required for the associated identity and key management. While today's centralized public key infrastructures have proven themselves to be technically feasible in confined and trusted spaces, they do not provide the required security once centralized identity providers must be avoided, e.g., because of limited cross-domain interoperability or national data protection legislation, and state-dependent certification authorities can't be commonly trusted, e.g., because of geopolitical reasons. Recent decentralized identity management concepts, such as the W3C proposed recommendation of Decentralized Identifiers, provide a secure, tamper-proof, and cross-domain identity management alternative for future multitenancy 6G networks without relying on identity provider or certification authorities. This article introduces the concept of Decentralized Identifiers together with the principles of Self-sovereign Identity and discusses opportunities and potential benefits of their application and usage for cross-actor and privacy-preserving identity and key management in the next mobile network generation 6G.

READ FULL TEXT

page 1

page 2

page 4

page 5

page 6

research
03/01/2022

Towards Decentralized Identity Management in Multi-stakeholder 6G Networks

Trust-building mechanisms among network entities of different administra...
research
06/08/2020

Distributed-Ledger-based Authentication with Decentralized Identifiers and Verifiable Credentials

Authentication with username and password is becoming an inconvenient pr...
research
07/26/2020

Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-resistance in Proof of Personhood Protocols

Most current self-sovereign identity systems may be categorized as stric...
research
08/22/2020

Proverum: A Hybrid Public Verifiability and Decentralized Identity Management

Trust in electoral processes is fundamental for democracies. Further, th...
research
03/21/2023

Leveraging Self-Sovereign Identity in Decentralized Data Aggregation

Data aggregation has been widely implemented as an infrastructure of dat...
research
08/14/2018

Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark

Practical solutions to bootstrap security in today's information and com...
research
09/23/2022

Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases

Self-Sovereign Identity (SSI) is projected to become part of every perso...

Please sign up or login with your details

Forgot password? Click here to reset