2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020
DOI: 10.1109/trustcom50675.2020.00183
|View full text |Cite
|
Sign up to set email alerts
|

Prov-IoT: A Security-Aware IoT Provenance Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(20 citation statements)
references
References 12 publications
0
20
0
Order By: Relevance
“…There is also a lot of research being done on using metadata to ensure the security, reliability, and privacy of IoT systems [16], [38], [40], [41]. To ensure stronger security, [16], [38], [40] propose the use of blockchain as a way to combine and store collected sensing data and metadata, taking advantage of blockchain's features to achieve highly secure and robust management of IoT systems.…”
Section: Related Workmentioning
confidence: 99%
“…There is also a lot of research being done on using metadata to ensure the security, reliability, and privacy of IoT systems [16], [38], [40], [41]. To ensure stronger security, [16], [38], [40] propose the use of blockchain as a way to combine and store collected sensing data and metadata, taking advantage of blockchain's features to achieve highly secure and robust management of IoT systems.…”
Section: Related Workmentioning
confidence: 99%
“…Encouraged by the above discussion, in this paper, we aim to provide transparency in IoT data propagation by identifying relevant risks using a security-aware data provenancebased approach [16]. Different studies have been carried out to explore the relationship between data provenance and IoT networks [17], [18], [19].…”
Section: Introductionmentioning
confidence: 99%
“…Documenting this information along with data lineage history (data provenance) would provide transparency from security viewpoints. To extend data provenance graphs with security information, the authors proposed a novel security-aware IoT provenance model named Prov-IoT in [16]. It includes evidence on security-aware features (denoted as security metadata) in data provenance graphs considering all processing steps of data propagation.…”
Section: Introductionmentioning
confidence: 99%
“…The electric Internet of Things can be divided into perception layer, network layer, platform layer and application layer. At present, relatively mature security protection schemes have been proposed for network layer, platform layer and application layer, and the data security has been basically guaranteed [8][9][10]. However, most terminal devices at the perception layer transmit data in plaintext mode and access the IoT management platform through the APN private network or Ethernet.…”
Section: Introductionmentioning
confidence: 99%