Proceedings 2018 Workshop on Decentralized IoT Security and Standards 2018
DOI: 10.14722/diss.2018.23001
|View full text |Cite
|
Sign up to set email alerts
|

SOFIE: Secure Open Federation for Internet Everywhere

Abstract: According to some studies, there are well over 300 different Internet of Things (IoT) platforms and several dozens of (so-called) standards. In practice, this has led to a situation where most of the deployed IoT systems are closed and largely incapable of communicating with other IoT systems. Furthermore, it is likely that at least a few different basic IoT communication protocols will co-exist, including the Constrained Application Protocol (CoAP), Message Queue Telemetry Transport (MQTT), and HTTP. In this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Currently, various IoT applications are being envisaged and prototyped to allow decentralized IoT-based supply chains to guarantee various properties and to support transaction non-repudiation. One such application using blockchains to secure a ''field-to-fork'' food-chain is being prototyped by project SOFIE 30 (Secure Open Federation for Internet Everywhere) [58]. The information recorded in blockchains includes food production and storage data, acquired through diverse types of sensors.…”
Section: Discussionmentioning
confidence: 99%
“…Currently, various IoT applications are being envisaged and prototyped to allow decentralized IoT-based supply chains to guarantee various properties and to support transaction non-repudiation. One such application using blockchains to secure a ''field-to-fork'' food-chain is being prototyped by project SOFIE 30 (Secure Open Federation for Internet Everywhere) [58]. The information recorded in blockchains includes food production and storage data, acquired through diverse types of sensors.…”
Section: Discussionmentioning
confidence: 99%
“…Several techniques exist, and are being researched, on how to perform interledger operations securely with full guarantees of transaction completion across multiple ledgers. For example, [61] defines six different categories of interledger techniques: atomic cross-chain transactions, sidechains, bridging, ledger-of-ledgers, payment channels, and layered value transfer protocols. In other cases, the interledger operations may carry financial risks, but the protocol is designed to make any nonconformance auditable [62].…”
Section: B An Indirect Approach: Interledgermentioning
confidence: 99%