Yiting Wang, Pedro Castillejo, José-Fernán Martínez-Ortega, Vicente Hernández Díaz
{"title":"未来物联网服务的身份和访问管理调查","authors":"Yiting Wang, Pedro Castillejo, José-Fernán Martínez-Ortega, Vicente Hernández Díaz","doi":"10.1016/j.comnet.2025.111718","DOIUrl":null,"url":null,"abstract":"<div><div>The explosive advancement of Artificial Intelligence (AI) and Edge Computing (EC) is accelerating the development of the future Internet of Things (IoT), which spans various application domains and has become an integral part of modern life. However, certain limitations of IoT introduce security and privacy challenges for users and enterprises, hindering its broader adoption. Identity and Access Management (IAM), capable of handling the massive scale of digital identities and permissions while ensuring that only authenticated entities can access authorized resources and interact securely, has been widely adopted as an entry point for securing IoT services. However, traditional IAM systems, primarily designed for cloud-based web services, face several challenges, such as scalability and privacy, when integrated into edge-native IoT architectures. This paper provides a systematic review of IAM solutions in IoT environments. It identifies four key requirements for future IoT services, analyzes IAM architecture and the state of the art of its six primary functionalities, namely storage, identity management, authentication, authorization, audit, and federation, and studies ten more comprehensive IAM solutions. A detailed evaluation of aspects such as functionality completeness, security, privacy, and scalability is carried out. Finally, based on the evaluation results, the missing points in the existing literature, as well as upcoming challenges and development trends, are pointed out. The study aims to inspire further research and development efforts towards building a comprehensive IAM solution for edge-enabled IoT systems.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111718"},"PeriodicalIF":4.6000,"publicationDate":"2025-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A survey on Identity and Access Management for future IoT services\",\"authors\":\"Yiting Wang, Pedro Castillejo, José-Fernán Martínez-Ortega, Vicente Hernández Díaz\",\"doi\":\"10.1016/j.comnet.2025.111718\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The explosive advancement of Artificial Intelligence (AI) and Edge Computing (EC) is accelerating the development of the future Internet of Things (IoT), which spans various application domains and has become an integral part of modern life. However, certain limitations of IoT introduce security and privacy challenges for users and enterprises, hindering its broader adoption. Identity and Access Management (IAM), capable of handling the massive scale of digital identities and permissions while ensuring that only authenticated entities can access authorized resources and interact securely, has been widely adopted as an entry point for securing IoT services. However, traditional IAM systems, primarily designed for cloud-based web services, face several challenges, such as scalability and privacy, when integrated into edge-native IoT architectures. This paper provides a systematic review of IAM solutions in IoT environments. It identifies four key requirements for future IoT services, analyzes IAM architecture and the state of the art of its six primary functionalities, namely storage, identity management, authentication, authorization, audit, and federation, and studies ten more comprehensive IAM solutions. A detailed evaluation of aspects such as functionality completeness, security, privacy, and scalability is carried out. Finally, based on the evaluation results, the missing points in the existing literature, as well as upcoming challenges and development trends, are pointed out. The study aims to inspire further research and development efforts towards building a comprehensive IAM solution for edge-enabled IoT systems.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"272 \",\"pages\":\"Article 111718\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-09-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S138912862500684X\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S138912862500684X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
A survey on Identity and Access Management for future IoT services
The explosive advancement of Artificial Intelligence (AI) and Edge Computing (EC) is accelerating the development of the future Internet of Things (IoT), which spans various application domains and has become an integral part of modern life. However, certain limitations of IoT introduce security and privacy challenges for users and enterprises, hindering its broader adoption. Identity and Access Management (IAM), capable of handling the massive scale of digital identities and permissions while ensuring that only authenticated entities can access authorized resources and interact securely, has been widely adopted as an entry point for securing IoT services. However, traditional IAM systems, primarily designed for cloud-based web services, face several challenges, such as scalability and privacy, when integrated into edge-native IoT architectures. This paper provides a systematic review of IAM solutions in IoT environments. It identifies four key requirements for future IoT services, analyzes IAM architecture and the state of the art of its six primary functionalities, namely storage, identity management, authentication, authorization, audit, and federation, and studies ten more comprehensive IAM solutions. A detailed evaluation of aspects such as functionality completeness, security, privacy, and scalability is carried out. Finally, based on the evaluation results, the missing points in the existing literature, as well as upcoming challenges and development trends, are pointed out. The study aims to inspire further research and development efforts towards building a comprehensive IAM solution for edge-enabled IoT systems.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.