{"id":"https://openalex.org/W4390401766","doi":"https://doi.org/10.1109/itnac59571.2023.10368540","title":"Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks","display_name":"Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks","publication_year":2023,"publication_date":"2023-11-29","ids":{"openalex":"https://openalex.org/W4390401766","doi":"https://doi.org/10.1109/itnac59571.2023.10368540"},"language":"en","primary_location":{"id":"doi:10.1109/itnac59571.2023.10368540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac59571.2023.10368540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040711934","display_name":"Alessandro Pino","orcid":"https://orcid.org/0009-0002-1695-8902"},"institutions":[{"id":"https://openalex.org/I4210155299","display_name":"LINKS Foundation","ror":"https://ror.org/059r3nh67","country_code":"IT","type":"nonprofit","lineage":["https://openalex.org/I4210155299"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Alessandro Pino","raw_affiliation_strings":["LINKS Foundation-Cybersecurity Research Group,Torino,Italy,10138"],"affiliations":[{"raw_affiliation_string":"LINKS Foundation-Cybersecurity Research Group,Torino,Italy,10138","institution_ids":["https://openalex.org/I4210155299"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067515541","display_name":"Davide Margaria","orcid":"https://orcid.org/0000-0002-5275-2138"},"institutions":[{"id":"https://openalex.org/I4210155299","display_name":"LINKS Foundation","ror":"https://ror.org/059r3nh67","country_code":"IT","type":"nonprofit","lineage":["https://openalex.org/I4210155299"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Davide Margaria","raw_affiliation_strings":["LINKS Foundation-Cybersecurity Research Group,Torino,Italy,10138"],"affiliations":[{"raw_affiliation_string":"LINKS Foundation-Cybersecurity Research Group,Torino,Italy,10138","institution_ids":["https://openalex.org/I4210155299"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027881506","display_name":"Andrea Vesco","orcid":"https://orcid.org/0000-0001-7431-6655"},"institutions":[{"id":"https://openalex.org/I4210155299","display_name":"LINKS Foundation","ror":"https://ror.org/059r3nh67","country_code":"IT","type":"nonprofit","lineage":["https://openalex.org/I4210155299"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Vesco","raw_affiliation_strings":["LINKS Foundation-Cybersecurity Research Group,Torino,Italy,10138"],"affiliations":[{"raw_affiliation_string":"LINKS Foundation-Cybersecurity Research Group,Torino,Italy,10138","institution_ids":["https://openalex.org/I4210155299"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040711934"],"corresponding_institution_ids":["https://openalex.org/I4210155299"],"apc_list":null,"apc_paid":null,"fwci":1.5659,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.8693709,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"310","last_page":"317"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.8266286849975586},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7639167308807373},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5738962292671204},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5578697919845581},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5566020011901855},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.46443021297454834},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.44257110357284546},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4294095039367676},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42773890495300293},{"id":"https://openalex.org/keywords/proof-of-work-system","display_name":"Proof-of-work system","score":0.4152640104293823},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3360539674758911},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33239442110061646},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3274853527545929},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.18482312560081482},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11665332317352295}],"concepts":[{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.8266286849975586},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7639167308807373},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5738962292671204},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5578697919845581},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5566020011901855},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46443021297454834},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.44257110357284546},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4294095039367676},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42773890495300293},{"id":"https://openalex.org/C123436394","wikidata":"https://www.wikidata.org/wiki/Q7249984","display_name":"Proof-of-work system","level":3,"score":0.4152640104293823},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3360539674758911},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33239442110061646},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3274853527545929},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.18482312560081482},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11665332317352295},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac59571.2023.10368540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac59571.2023.10368540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.44999998807907104,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1565378600","https://openalex.org/W1587945298","https://openalex.org/W1589935812","https://openalex.org/W2135656098","https://openalex.org/W2163614799","https://openalex.org/W2164960664","https://openalex.org/W2172174332","https://openalex.org/W2270478131","https://openalex.org/W2343874908","https://openalex.org/W2907358544","https://openalex.org/W3023478445","https://openalex.org/W3029501235","https://openalex.org/W4308235632"],"related_works":["https://openalex.org/W4378651134","https://openalex.org/W4285428739","https://openalex.org/W4210740924","https://openalex.org/W4252684102","https://openalex.org/W2608983118","https://openalex.org/W2352307597","https://openalex.org/W1979633005","https://openalex.org/W4200362035","https://openalex.org/W2163724607","https://openalex.org/W2358945663"],"abstract_inverted_index":{"The":[0,46,81,111,121,158],"Self-Sovereign":[1,30],"Identity":[2,31],"(SSI)":[3],"is":[4,48,84,113],"a":[5,34,100,127,138,142,162,166],"decentralized":[6],"paradigm":[7],"enabling":[8],"full":[9],"control":[10],"over":[11],"the":[12,19,29,51,63,77,87,97,103,116,132,147],"data":[13],"used":[14],"to":[15,42,49,85,106],"build":[16],"and":[17,37,66,141,152,165],"prove":[18],"identity.":[20],"In":[21,58],"Internet":[22],"of":[23,92,99,118,149],"Things":[24],"networks":[25],"with":[26,40,54,60,96,161],"security":[27],"requirements,":[28],"can":[32],"play":[33],"key":[35,94],"role":[36],"bring":[38],"benefits":[39],"respect":[41],"centralized":[43],"identity":[44],"solutions.":[45],"challenge":[47],"make":[50],"SSI":[52],"compatible":[53],"resource-constraint":[55],"IoT":[56,74],"networks.":[57],"line":[59],"this":[61],"objective,":[62],"paper":[64,122,159],"proposes":[65],"discusses":[67],"an":[68,107],"alternative":[69],"(mutual)":[70],"authentication":[71],"process":[72],"for":[73],"nodes":[75],"under":[76],"same":[78],"administration":[79],"domain.":[80],"main":[82],"idea":[83],"combine":[86],"Decentralized":[88],"IDentifier":[89],"(DID)-based":[90],"verification":[91,98],"private":[93],"ownership":[95],"proof":[101,117],"that":[102],"DID":[104],"belongs":[105],"evolving":[108],"trusted":[109],"set.":[110],"solution":[112,129],"built":[114],"around":[115],"membership":[119,125],"notion.":[120],"analyzes":[123],"two":[124],"solutions,":[126],"novel":[128],"designed":[130],"by":[131],"Authors":[133],"using":[134],"Merkle":[135],"trees":[136],"as":[137],"building":[139],"block":[140],"second":[143],"one":[144],"based":[145],"on":[146],"adaptation":[148],"Boneh,":[150],"Boyen":[151],"Shacham":[153],"(BBS)":[154],"group":[155],"signature":[156],"scheme.":[157],"concludes":[160],"performance":[163],"estimation":[164],"comparative":[167],"analysis.":[168]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2023-12-30T00:00:00"}
