{"title":"具有极简日志方案的流物联网应用程序的完整性验证","authors":"Shuangsheng Lou, Nisha Panwar, G. Agrawal","doi":"10.1109/SMARTCOMP52413.2021.00047","DOIUrl":null,"url":null,"abstract":"With the emergence of Internet of Things (IoT) ecosystem, edge devices are deployed to collect, process, and forward data on the edge side of the network. Such edge or fog processing model is increasingly being used for critical applications, often in environments where devices can be compromised. This paper considers a number of attacks that can negatively impact streaming IoT applications, and develop solutions to verify the integrity of the applications. We focus on premature code execution and overwriting of devices generated outputs, and propose a minimalist logging scheme for periodic verification with the use of hash-chains and Merkle Hash Tree (MHT).","PeriodicalId":330785,"journal":{"name":"2021 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"2009 5","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Integrity Verification for Streaming IoT Applications with a Minimalist Logging Scheme\",\"authors\":\"Shuangsheng Lou, Nisha Panwar, G. Agrawal\",\"doi\":\"10.1109/SMARTCOMP52413.2021.00047\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the emergence of Internet of Things (IoT) ecosystem, edge devices are deployed to collect, process, and forward data on the edge side of the network. Such edge or fog processing model is increasingly being used for critical applications, often in environments where devices can be compromised. This paper considers a number of attacks that can negatively impact streaming IoT applications, and develop solutions to verify the integrity of the applications. We focus on premature code execution and overwriting of devices generated outputs, and propose a minimalist logging scheme for periodic verification with the use of hash-chains and Merkle Hash Tree (MHT).\",\"PeriodicalId\":330785,\"journal\":{\"name\":\"2021 IEEE International Conference on Smart Computing (SMARTCOMP)\",\"volume\":\"2009 5\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Smart Computing (SMARTCOMP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SMARTCOMP52413.2021.00047\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Smart Computing (SMARTCOMP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMARTCOMP52413.2021.00047","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrity Verification for Streaming IoT Applications with a Minimalist Logging Scheme
With the emergence of Internet of Things (IoT) ecosystem, edge devices are deployed to collect, process, and forward data on the edge side of the network. Such edge or fog processing model is increasingly being used for critical applications, often in environments where devices can be compromised. This paper considers a number of attacks that can negatively impact streaming IoT applications, and develop solutions to verify the integrity of the applications. We focus on premature code execution and overwriting of devices generated outputs, and propose a minimalist logging scheme for periodic verification with the use of hash-chains and Merkle Hash Tree (MHT).