Recommendation ITU-T Y.4811 (11/2021) Reference framework of converged service for identification and authentication for IoT devices in decentralized environment
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Introduction of CSIADE
     6.1 Identifier and corresponding identity object
     6.2 Converged identification and authentication
7 Common characteristics and general requirements of CSIADE
     7.1 Common characteristics
          7.1.1  Supporting self-resolving identifier and corresponding identity object
          7.1.2 Supporting independent end-to-end identification and authentication in decentralized environment
          7.1.3  Supporting self-controllable storages for identifiers and corresponding identity objects
          7.1.4 Supporting online and offline endorsement for the identity
          7.1.5 Supporting multiple solutions of identification and authentication
     7.2 General requirements
          7.2.1  Self-resolving identifier and corresponding identity object
          7.2.2 Independent end-to-end identification and authentication
          7.2.3  Self-controllable storages for identifiers and corresponding identity objects
          7.2.4 Online and offline endorsement for the identity
          7.2.5 Multiple solutions of identification and authentication
          7.2.6 Synchronisation and scalability
          7.2.7 Security and PII protection
8 Functional architecture of CSIADE
     8.1 Identity resolving agent (IDR agent)
     8.2 Identity object storage agent (IOS agent)
     8.3 Functional component of identity resolution (IR-FC)
     8.4 Functional component of authentication management (AM-FC)
     8.5 Functional component of policy management (PM-FC)
     8.6 Service agent
     8.7 Device agent
     8.8 External systems
          8.8.1 Attestation system
          8.8.2 Decentralized system
          8.8.3 Cloud
          8.8.4 IoT service, IoT device and IoT gateway
     8.9 Reference points
9 Main procedures of CSIADE
     9.1 Creating and endorsing identifiers and corresponding identity objects
     9.2 Issuing and validating identifiers and corresponding identity objects
          9.2.1 Issuing
          9.2.2 Validating and invalidating
     9.3 Identification and authentication between IoT devices and IoT services
10 Security consideration
Appendix I  Use cases of CSIADE for IoT devices
     I.1 Use case: Supporting one IoT device to access to multiple IoT services of one service operator
     I.2 Use case: Supporting one IoT device to access to IoT services of multiple service operators
Appendix II  Abstract model of identifier and corresponding identity object  for IoT device and IoT service
     II.1  Identifier
     II.2  Identifier package
     II.3  Corresponding identity object
Appendix III  Business roles and models of CSIADE
     III.1  Business roles of CSIADE
          III.1.1  Device providers
          III.1.2  Application providers
          III.1.3  Platform providers
     III.2  Business models of CSIADE
Bibliography
<\pre>