TY - GEN
T1 - Data verification and privacy in IoT architecture
AU - Lomotey, Richard
AU - Rickabaugh, Jacob
AU - Slivkanich, Natalia
AU - Orji, Rita
PY - 2019/7
Y1 - 2019/7
N2 - The Internet of Things (IoT) is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. As more devices communicate with each other via the Internet, it will be crucial to determine the origins of requests and responses; especially in situations where trust is paramount such as wearable IoT. It is however difficult to determine data origins in IoT ecosystems due to the inherent sporadic nature of wireless networks. Also, multiple IoT devices can be generating similar content and it is important to identify individual data sources transparently. Some previous works focus on the request perspective and employed provenance techniques to determine data sources. However, some of these solutions are not robust for a complete message and data exchanges; especially in a request-response scenario where IoT devices are involved. Thus, this paper proposes a combination of policy-based provenance and modelled the peer-to-peer IoT device communication as a graph network. Using Floyd's algorithm, we are able to determine data origins in shortest paths between interconnected IoT devices.
AB - The Internet of Things (IoT) is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. As more devices communicate with each other via the Internet, it will be crucial to determine the origins of requests and responses; especially in situations where trust is paramount such as wearable IoT. It is however difficult to determine data origins in IoT ecosystems due to the inherent sporadic nature of wireless networks. Also, multiple IoT devices can be generating similar content and it is important to identify individual data sources transparently. Some previous works focus on the request perspective and employed provenance techniques to determine data sources. However, some of these solutions are not robust for a complete message and data exchanges; especially in a request-response scenario where IoT devices are involved. Thus, this paper proposes a combination of policy-based provenance and modelled the peer-to-peer IoT device communication as a graph network. Using Floyd's algorithm, we are able to determine data origins in shortest paths between interconnected IoT devices.
UR - http://www.scopus.com/inward/record.url?scp=85072776159&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85072776159&partnerID=8YFLogxK
U2 - 10.1109/SERVICES.2019.00026
DO - 10.1109/SERVICES.2019.00026
M3 - Conference contribution
T3 - Proceedings - 2019 IEEE World Congress on Services, SERVICES 2019
SP - 66
EP - 71
BT - Proceedings - 2019 IEEE World Congress on Services, SERVICES 2019
A2 - Chang, Carl K.
A2 - Chen, Peter
A2 - Goul, Michael
A2 - Oyama, Katsunori
A2 - Reiff-Marganiec, Stephan
A2 - Sun, Yanchun
A2 - Wang, Shangguang
A2 - Wang, Zhongjie
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 IEEE World Congress on Services, SERVICES 2019
Y2 - 8 July 2019 through 13 July 2019
ER -