Research Article
Holistic Privacy-Preserving Identity Management System for the Internet of Things
Table 1
Identity management systems comparison.
| Feature | Solution/technology | SAML | OpenID | OAuth | Shibboleth | U-Prove | Idemix | Keyrock | Our IdM |
| Confidentiality and integrity | ++ | ++ | ++ | ++ | ++ | ++ | ++ | ++ | Single Sign-On | ++ | ++ | ++ | ++ | + | + | ++ | ++ | Transparency | ++ | ++ | ++ | ++ | + | + | ++ | + | Strong authentication | + | + | + | + | ++ | ++ | + | ++ | Federation support | + | + | + | ++ | − | − | ++ | + | Intervention | − | ++ | ++ | ++ | ++ | ++ | ++ | ++ | Minimal disclosure information | − | ++ | + | + | ++ | ++ | + | ++ | Usability | ++ | ++ | ++ | ++ | + | + | ++ | + | Attribute revocation | ++ | ++ | + | ++ | + | + | + | + | Nonreputation | ++ | ++ | ++ | ++ | ++ | ++ | ++ | ++ | Offline M2M authentication | − | − | − | − | ++ | ++ | − | ++ | Pseudonymity | + | + | + | + | ++ | ++ | + | ++ | Unlikability | − | − | − | + | + | ++ | − | ++ | Zero-knowledge proofs | − | − | − | − | ++ | ++ | − | ++ | Attribute aggregation | − | − | − | + | + | + | − | + |
|
|