Introducing secure provenance in IoT: Requirements and challenges

Sabah Suhail, Choon Seong Hong, Zuhaib Uddin Ahmad, Faheem Zafar, Abid Khan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

25 Citations (Scopus)

Abstract

In current cyber-physical systems, IoT represents interconnection of highly heterogeneous networked entities, providing goods and services to a variety of domains including environment monitoring, energy management, health-care system, and industrial automation. However, in-spite of the advantages of global connectivity, the Internet of Things (IoT) encounter various security challenges and resource constraints including identity management, traceability, storing and processing of veracious sensory data. However, the security research in IoT so far have not focused on provenance and its usefulness in IoT. To keep data traces of IoT devices, provenance can play a vital role as it solves many issues related to data trustworthiness, decision-making, data reconciliation and data replication. In this paper, we have discussed the challenges on technical infrastructure of IP-based, WSN-based and RFID-based IoT. We have identified the possible ways to integrate secure provenance into IoT grounded on security issues and other resource constraints in IoT.

Original languageEnglish
Title of host publicationProceedings - 2016 International Workshop on Secure Internet of Things, SIoT 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages39-46
Number of pages8
ISBN (Electronic)9781509050918
DOIs
Publication statusPublished - 26 Apr 2017
Event2016 International Workshop on Secure Internet of Things, SIoT 2016 - Heraklion, Crete, Greece
Duration: 26 Sept 201630 Sept 2016

Publication series

NameProceedings - 2016 International Workshop on Secure Internet of Things, SIoT 2016

Conference

Conference2016 International Workshop on Secure Internet of Things, SIoT 2016
Country/TerritoryGreece
CityHeraklion, Crete
Period26/09/1630/09/16

Bibliographical note

Publisher Copyright:
© 2016 IEEE.

Keywords

  • IP-based IoT
  • Internet of Things
  • Provenance
  • RFID-based IoT
  • WSN-based IoT

Fingerprint

Dive into the research topics of 'Introducing secure provenance in IoT: Requirements and challenges'. Together they form a unique fingerprint.

Cite this