S. Suhail, C. Hong, M. Lodhi, Faheem Zafar, Abid Khan, Faisal Bashir Hussain
{"title":"Data trustworthiness in IoT","authors":"S. Suhail, C. Hong, M. Lodhi, Faheem Zafar, Abid Khan, Faisal Bashir Hussain","doi":"10.1109/ICOIN.2018.8343151","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) is deployed in numerous pervasive application areas, for instance, environment monitoring, energy management, health-care system and industrial automation. Data are streamed from multiple sources and is traversed through intermediate nodes until it arrives at sink node which performs decision-making for critical infrastructures. Malicious or compromised nodes may forge data or inject false data. Therefore, assuring high data trustworthiness is crucial for precise decision-making. Data provenance play an important role in evaluating the trustworthiness of data. However, provenance management for resource-constrained devices introduces several challenging requirements, such as network overhead, energy consumption, and efficient storage. In this paper, we formulate the problem of binding IoT with a provenance-aware system to enable it to track the data flow across the networked entities and data transformations applied to data by nodes. We propose a lightweight scheme to transmit provenance for IoT sensor data. The proposed technique relies on the hash chain scheme to encode provenance as the packet traversed from each participating node while the provenance verification is done at the sink node. Furthermore, we evaluate our technique with respect to energy consumption by the constrained nodes.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"22","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Information Networking (ICOIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN.2018.8343151","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 22
Abstract
Internet of Things (IoT) is deployed in numerous pervasive application areas, for instance, environment monitoring, energy management, health-care system and industrial automation. Data are streamed from multiple sources and is traversed through intermediate nodes until it arrives at sink node which performs decision-making for critical infrastructures. Malicious or compromised nodes may forge data or inject false data. Therefore, assuring high data trustworthiness is crucial for precise decision-making. Data provenance play an important role in evaluating the trustworthiness of data. However, provenance management for resource-constrained devices introduces several challenging requirements, such as network overhead, energy consumption, and efficient storage. In this paper, we formulate the problem of binding IoT with a provenance-aware system to enable it to track the data flow across the networked entities and data transformations applied to data by nodes. We propose a lightweight scheme to transmit provenance for IoT sensor data. The proposed technique relies on the hash chain scheme to encode provenance as the packet traversed from each participating node while the provenance verification is done at the sink node. Furthermore, we evaluate our technique with respect to energy consumption by the constrained nodes.