2016 International Workshop on Secure Internet of Things (SIoT) 2016
DOI: 10.1109/siot.2016.011
|View full text |Cite
|
Sign up to set email alerts
|

Introducing Secure Provenance in IoT: Requirements and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(23 citation statements)
references
References 21 publications
0
23
0
Order By: Relevance
“…ProvThings solves unique challenges associated with building a general provenance framework for IoT platforms and further enables provenance-based applications in the domain of IoT platforms. Provenance solutions have been proposed in previous works [39], [32], [71] for IoT devices. However, these solutions are targeted towards IoT devices and cannot be directly applied to IoT platforms which is the main focus of this paper.…”
Section: Related Workmentioning
confidence: 99%
“…ProvThings solves unique challenges associated with building a general provenance framework for IoT platforms and further enables provenance-based applications in the domain of IoT platforms. Provenance solutions have been proposed in previous works [39], [32], [71] for IoT devices. However, these solutions are targeted towards IoT devices and cannot be directly applied to IoT platforms which is the main focus of this paper.…”
Section: Related Workmentioning
confidence: 99%
“…RPL is a standardized routing protocol for the IP-connected IoT. It creates a Destination-Oriented Directed Acyclic Graph (DODAG) and supports 2 modes of operation (1,2,5,6) in NT and also routing entries (5,6,8,9,10) in RT.…”
Section: Overview Of the Rpl Protocolmentioning
confidence: 99%
“…addition to these attacks, the untrustworthy data traversal across unattended sensor nodes may cause issues during data debugging, data verification and data authenticity [6].…”
mentioning
confidence: 99%
“…In [3], the authors have identified the requirements and challenges of implementing a secure provenance system for IoT based networks. They claim that if data traces of IoT devices are recorded then provenance can play a vital role as it solves many issues related to data trustworthiness, decisionmaking, data reconciliation and data replication.…”
Section: Related Workmentioning
confidence: 99%
“…The data received by these devices is vulnerable to attacks. The most critical attacks in the field of monitoring and surveillance are false data injection and the corruption of data [3]. For ensuring the data integrity and sender"s authentication, researchers have proposed data provenance mechanisms, which can identify a change in the data and provide a list of sender and forwarder of the data [6].…”
Section: Introductionmentioning
confidence: 99%