2019 IEEE 18th International Symposium on Network Computing and Applications (NCA) 2019
DOI: 10.1109/nca.2019.8935047
|View full text |Cite
|
Sign up to set email alerts
|

IoT Notary: Sensor Data Attestation in Smart Environment

Abstract: Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced -IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individuals' privacy or service integrity. To address such concerns, we propose IOT NOTARY, a framework to ensure trust in IoT systems and applications. IOT NOTARY provides… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 36 publications
(56 reference statements)
0
3
0
Order By: Relevance
“…Similarly, digital videos trustworthiness identification model is presented in [105], while a video authentication technique is presented in [106]. To enhance integrity of stored sensor logs, a verification technique is introduced in [107]. However, the efficacy of this approach is depended on the deployed instrument.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, digital videos trustworthiness identification model is presented in [105], while a video authentication technique is presented in [106]. To enhance integrity of stored sensor logs, a verification technique is introduced in [107]. However, the efficacy of this approach is depended on the deployed instrument.…”
Section: Related Workmentioning
confidence: 99%
“…Regardless of whether a video is procured, it is hard to use in open organizations because the video is not ensured to be an original video that it has not been manipulated. Panwar et al [33] proposed a structure to give sensor information confirmation through cryptographic algorithms implementing a log sealing system and creating permanent pieces of evidence utilized for log verification. The structure guarantees that sensor information and log-fixed data could be put away in untrusted storage with the proposed verification system ensuring its integrity.…”
Section: Related Workmentioning
confidence: 99%
“…However, this solution does not provide any proof of video integrity itself. Panwar et al [13] proposed a framework to provide sensor data attestation through cryptographic functions enforcing a logsealing mechanism and producing immutable proofs used for log verification. The framework ensures that sensor data and log-sealed information could be stored in an untrusted storage with the proposed attestation framework ensuring its integrity.…”
Section: Related Workmentioning
confidence: 99%