Data provenance and trust establishment in the Internet of Things

被引:14
作者
Elkhodr, Mahmoud [1 ]
Alsinglawi, Belal [2 ]
机构
[1] Cent Queensland Univ, Sch Engn & Technol, Sydney, NSW, Australia
[2] Western Sydney Univ, Sch Engn Comp & Math, Sydney, NSW, Australia
关键词
Internet of Things; data provenance; privacy; trust; MANAGEMENT; REPUTATION; IOT;
D O I
10.1002/spy2.99
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a network of heterogeneous networks encompassing various forms of communications form the current traditional communication models to ubiquitous and pervasive machine to machine communications. In such an ever expanding, dynamic, and complex environment, it becomes vital to know the origin or the source of data and whether this data can be trusted or no. This requires not only accurate, secure, and correct data collection processes; but also provisioning of data provenance throughout the life-cycle of an IoT device and the data it produces. To this end, this work introduces a provenance-based trust management solution, which provides a trust establishment mechanism amongst communicating devices in the IoT. It provides a way to quantitatively assess the trustworthiness of data supplied by a given IoT device. Thus, providing a novel solution to preserve data provenance of IoT devices. This IoT data provenance solution extends the capabilities of our previously proposed IoT platform known as the IoT-management platform, which aimed at preserving the privacy of users in the IoT.
引用
收藏
页数:11
相关论文
共 30 条
[1]   IoT Data Provenance Implementation Challenges [J].
Alkhalil, Adel ;
Ramadan, Rabie A. .
8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017), 2017, 109 :1134-1139
[2]  
Alsinglawi B, 2017, ARXIV PREPRINT ARXIV
[3]  
Aman M.N., 2017, ACM IoTPTS, P11
[4]  
[Anonymous], 2013, EU PROJ COMPOSE C 20
[5]   Case-Based Trust Evaluation from Provenance Information [J].
Bai, Quan ;
Su, Xing ;
Liu, Qing ;
Terhorst, Andrew ;
Zhang, Minjie ;
Mu, Yi .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :336-343
[6]  
Bao F, 2012, IEEE WOWMOM, P1, DOI [DOI 10.1109/WOWMOM.2012.6263792, DOI 10.1145/2378023.2378025]
[7]   Trust management system designs for the Internet of Things: A context-aware and multi-service approach [J].
Ben Saied, Yosra ;
Olivereau, Alexis ;
Zeghlache, Djamal ;
Laurent, Maryline .
COMPUTERS & SECURITY, 2013, 39 :351-365
[8]   TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things [J].
Chen, Dong ;
Chang, Guiran ;
Sun, Dawei ;
Li, Jiajia ;
Jia, Jie ;
Wang, Xingwei .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) :1207-1228
[9]   Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection [J].
Chen, Ing-Ray ;
Guo, Jia .
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, :49-56
[10]  
Crosby GV, 2006, DSSNS 2006: SECOND IEEE WORKSHOP ON DEPENDABILITY AND SECURITY IN SENSOR NETWORKS AND SYSTEMS, P13