677 research outputs found
Towards Blockchain-based Auditable Storage and Sharing of IoT Data
International audienceToday the cloud plays a central role in storing, processing , and distributing data. Despite contributing to the rapid development of various applications, including the IoT, the current centralized storage architecture has led into a myriad of isolated data silos and is preventing the full potential of holistic data-driven analytics for IoT data. In this abstract, we advocate a data-centric design for IoT with focus on resilience, sharing, and auditable protection of information. We introduce the initial design of our blockchain-based end-to-end encrypted data storage system. We enable a secure and persistent data management, by utilizing the blockchain as an auditable access control layer to a decentralized storage layer
On Using Blockchains for Safety-Critical Systems
Innovation in the world of today is mainly driven by software. Companies need
to continuously rejuvenate their product portfolios with new features to stay
ahead of their competitors. For example, recent trends explore the application
of blockchains to domains other than finance. This paper analyzes the
state-of-the-art for safety-critical systems as found in modern vehicles like
self-driving cars, smart energy systems, and home automation focusing on
specific challenges where key ideas behind blockchains might be applicable.
Next, potential benefits unlocked by applying such ideas are presented and
discussed for the respective usage scenario. Finally, a research agenda is
outlined to summarize remaining challenges for successfully applying
blockchains to safety-critical cyber-physical systems
Trust and Reputation Management for Blockchain-enabled IoT
In recent years, there has been an increasing interest in incorporating
blockchain for the Internet of Things (IoT) to address the inherent issues of
IoT, such as single point of failure and data silos. However, blockchain alone
cannot ascertain the authenticity and veracity of the data coming from IoT
devices. The append-only nature of blockchain exacerbates this issue, as it
would not be possible to alter the data once recorded on-chain. Trust and
Reputation Management (TRM) is an effective approach to overcome the
aforementioned trust issues. However, designing TRM frameworks for
blockchain-enabled IoT applications is a non-trivial task, as each application
has its unique trust challenges with their unique features and requirements. In
this paper, we present our experiences in designing TRM framework for various
blockchain-enabled IoT applications to provide insights and highlight open
research challenges for future opportunities.Comment: COMSNETS 2023 Invited Pape
Using Blockchain to Improve Security of the Internet of Things
The Internet of Things has increased in popularity in recent years, with daily life now being surrounded by “smart devices.” This network of smart devices, such as thermostats, refrigerators, and even stationary bikes affords us convenience, but at a cost. Security measures are typically inferior on these devices; considering that they collect our data around the clock, this is a big reason for concern. Recent research shows that blockchain technology may be one way to address these security concerns. This paper discusses the Internet of Things and the current issues with how security is handled, discusses how blockchain can shore up some of these shortcomings, and goes in depth into examples of how blockchain has been implemented to improve the security of the Internet of Things
Droplet: Decentralized Authorization for IoT Data Streams
This paper presents Droplet, a decentralized data access control service,
which operates without intermediate trust entities. Droplet enables data owners
to securely and selectively share their encrypted data while guaranteeing data
confidentiality against unauthorized parties. Droplet's contribution lies in
coupling two key ideas: (i) a new cryptographically-enforced access control
scheme for encrypted data streams that enables users to define fine-grained
stream-specific access policies, and (ii) a decentralized authorization service
that handles user-defined access policies. In this paper, we present Droplet's
design, the reference implementation of Droplet, and experimental results of
three case-study apps atop of Droplet: Fitbit activity tracker, Ava health
tracker, and ECOviz smart meter dashboard
A Distributed Audit Trail for the Internet of Things
Sharing Internet of Things (IoT) data over open-data platforms and digital data
marketplaces can reduce infrastructure investments, improve sustainability by
reducing the required resources, and foster innovation. However, due to the
inability to audit the authenticity, integrity, and quality of IoT data, third-party
data consumers cannot assess the trustworthiness of received data. Therefore,
it is challenging to use IoT data obtained from third parties for quality-relevant
applications. To overcome this limitation, the IoT data must be auditable. Distributed
Ledger Technology (DLT) is a promising approach for building auditable
systems. However, the existing solutions do not integrate authenticity,
integrity, data quality, and location into an all-encompassing auditable model
and only focus on specific parts of auditability.
This thesis aims to provide a distributed audit trail that makes the IoT auditable
and enables sharing of IoT data between multiple organizations for
quality relevant applications. Therefore, we designed and evaluated the Veritaa
framework. The Veritaa framework comprises the Graph of Trust (GoT) as
distributed audit trail and a DLT to immutably store the transactions that build
the GoT. The contributions of this thesis are summarized as follows. First, we
designed and evaluated the GoT a DLT-based Distributed Public Key Infrastructure
(DPKI) with a signature store. Second, we designed a Distributed
Calibration Certificate Infrastructure (DCCI) based on the GoT, which makes
quality-relevant maintenance information of IoT devices auditable. Third, we
designed an Auditable Positioning System (APS) to make positions in the IoT
auditable. Finally, we designed an Location Verification System (LVS) to verify
location claims and prevent physical layer attacks against the APS. All these
components are integrated into the GoT and build the distributed audit trail.
We implemented a real-world testbed to evaluate the proposed distributed audit
trail. This testbed comprises several custom-built IoT devices connectable
over Long Range Wide Area Network (LoRaWAN) or Long-Term Evolution
Category M1 (LTE Cat M1), and a Bluetooth Low Energy (BLE)-based Angle
of Arrival (AoA) positioning system. All these low-power devices can manage
their identity and secure their data on the distributed audit trail using the IoT
client of the Veritaa framework. The experiments suggest that a distributed
audit trail is feasible and secure, and the low-power IoT devices are capable
of performing the required cryptographic functions. Furthermore, the energy
overhead introduced by making the IoT auditable is limited and reasonable
for quality-relevant applications
- …