An IoT Data Communication Framework for Authenticity and Integrity

Internet of Things has been widely applied in everyday life, ranging from transportation, healthcare, to smart homes. As most IoT devices carry constrained resources and limited storage capacity, sensing data need to be transmitted to and stored at resource-rich platforms, such as a cloud. IoT applications retrieve sensing data from the cloud for analysis and decision-making purposes. Ensuring the authenticity and integrity of the sensing data is essential for the correctness and safety of IoT applications. We summarizethe new challenges of the IoT data communication framework with authenticity and integrity and argue that existing solutions cannot be easily adopted. We present two solutions, called Dynamic Tree Chaining (DTC) and Geometric Star Chaining (GSC) that provide authenticity, integrity, sampling uniformity, system efficiency, and application flexibility to IoT data communication. Extensive simulations and prototype emulation experiments driven by real IoT data show that the proposed system is more efficient than alternative solutions in terms of time and space.

[1]  Jeffrey Scott Vitter,et al.  Random sampling with a reservoir , 1985, TOMS.

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  Graham Cormode,et al.  Sampling for big data: a tutorial , 2014, KDD.

[4]  Li Lin,et al.  Smart Meters in Smart Grid: An Overview , 2013, 2013 IEEE Green Technologies Conference (GreenTech).

[5]  Christian Decker,et al.  goProbe: a scalable distributed network monitoring solution , 2015, 2015 IEEE International Conference on Peer-to-Peer Computing (P2P).

[6]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[7]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[8]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[9]  Ch. Ramesh Babu,et al.  Internet of Vehicles: From Intelligent Grid to Autonomous Cars and Vehicular Clouds , 2016 .

[10]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[11]  Qin Zhang,et al.  Continuous sampling from distributed streams , 2012, JACM.

[12]  Youngsoo Kim,et al.  Design of a fence surveillance system based on wireless sensor networks , 2008, Autonomics.

[13]  Lei Zhang,et al.  Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud , 2016, IEEE Transactions on Information Forensics and Security.

[14]  Ratul Mahajan,et al.  Bolt: Data Management for Connected Homes , 2014, NSDI.

[15]  Li Duan,et al.  Event-Driven SOA for IoT Services , 2014, 2014 IEEE International Conference on Services Computing.

[16]  Ratul Mahajan,et al.  Digital neighborhood watch: investigating the sharing of camera data amongst neighbors , 2013, CSCW.

[17]  Sawan Kumar,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[18]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, Inf. Comput..

[19]  K. Hata,et al.  A stretchable carbon nanotube strain sensor for human-motion detection. , 2011, Nature nanotechnology.

[20]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[21]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[22]  Srinath T. V. Setty,et al.  Depot: Cloud Storage with Minimal Trust , 2010, TOCS.

[23]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[24]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[25]  John Krumm,et al.  PreHeat: controlling home heating using occupancy prediction , 2011, UbiComp '11.