2018 International Conference on Information Networking (ICOIN) 2018
DOI: 10.1109/icoin.2018.8343151
|View full text |Cite
|
Sign up to set email alerts
|

Data trustworthiness in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
18
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 14 publications
0
18
0
Order By: Relevance
“…In this subsection, we address the challenges and constraints of a Provenance-Aware IoT system keeping in view the provenance as overhead for IoT devices that are highly constrained in terms of physical size, available memory, CPU power, and battery life. We have also identified requirements and challenges for the integration of secure provenance with IoT in [6] and [16] thoroughly.…”
Section: Challenges and Constraints Of A Provenance-aware Iot Systemmentioning
confidence: 99%
See 4 more Smart Citations
“…In this subsection, we address the challenges and constraints of a Provenance-Aware IoT system keeping in view the provenance as overhead for IoT devices that are highly constrained in terms of physical size, available memory, CPU power, and battery life. We have also identified requirements and challenges for the integration of secure provenance with IoT in [6] and [16] thoroughly.…”
Section: Challenges and Constraints Of A Provenance-aware Iot Systemmentioning
confidence: 99%
“…Another way is to embed the node ID of each participating node in the packet traversal called as Provenance as ID (PID) [16]. However, it will increase the provenance size exponentially at each hop count.…”
Section: Pppt: Provenance Encodingmentioning
confidence: 99%
See 3 more Smart Citations