Building Trust in Data for IoT Systems (2403.02225v2)
Abstract: Nowadays, Internet of Things platforms are being deployed in a wide range of application domains. Some of these include use cases with security requirements, where the data generated by an IoT node is the basis for making safety-critical or liability-critical decisions at system level. The challenge is to develop a solution for data exchange while proving and verifying the authenticity of the data from end-to-end. In line with this objective, this paper proposes a novel solution with the proper protocols to provide Trust in Data, making use of two Roots of Trust that are the IOTA Distributed Ledger Technology and the Trusted Platform Module. The paper presents the design of the proposed solution and discusses the key design aspects and relevant trade-offs. The paper concludes with a Proof-of-Concept implementation and an experimental evaluation to confirm its feasibility and to assess the achievable performance.
- M. A. Amanullah, S. W. Loke, M. Baruwal Chhetri, and R. Doss, “A taxonomy and analysis of misbehaviour detection in cooperative intelligent transport systems: A systematic review,” ACM Computing Surveys, vol. 56, no. 1, August 2023.
- S. Sisinni, D. Margaria, I. Pedone, A. Lioy, and A. Vesco, “Integrity verification of distributed nodes in critical infrastructures,” Sensors, vol. 22, no. 18, 2022.
- J. Guo, H. Wang, W. Liu, G. Huang, J. Gui, and S. Zhang, “A lightweight verifiable trust based data collection approach for sensor–cloud systems,” Journal of Systems Architecture, vol. 119, p. 102219, 2021.
- Y. Ren, W. Liu, A. Liu, T. Wang, and A. Li, “A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning,” Future Generation Computer Systems, vol. 127, pp. 56–69, 2022.
- W. Mo, T. Wang, S. Zhang, and J. Zhang, “An active and verifiable trust evaluation approach for edge computing,” Journal of Cloud Computing, vol. 9, no. 1, p. 51, Sep 2020.
- N. Kannengießer, S. Lins, T. Dehling, and A. Sunyaev, “Trade-offs between distributed ledger technology characteristics,” ACM Computing Surveys, vol. 53, no. 2, pp. 1–37, May 2020.
- T. Alam, “Blockchain-based internet of things: Review, current trends, applications, and future challenges,” Computers, vol. 12, no. 1, 2023.
- R. Alajlan, N. Alhumam, and M. Frikha, “Cybersecurity for blockchain-based IoT systems: A review,” Applied Sciences, vol. 13, no. 13, 2023.
- A. N. Bikos and S. A. P. Kumar, “Securing digital ledger technologies-enabled IoT devices: Taxonomy, challenges, and solutions,” IEEE Access, vol. 10, pp. 46 238–46 254, 2022.
- T. Montanaro, I. Sergi, A. Quarta, E. Manrique, N. Bedoya, D. L. de Ipiña, G. de Artaza, and L. Patrono, “The combined use of IoT and blockchain in logistics: a comparative experiment,” in International Conference on Smart and Sustainable Technologies, 2023, pp. 1–6.
- H. Khelifi, S. Luo, B. Nour, H. Moungla, and S. Hassan Ahmed, “Reputation-based blockchain for secure NDN caching in vehicular networks,” in IEEE Conference on Standards for Communications and Networking, 2018, pp. 1–6.
- J. Wang, L. Wu, K.-K. R. Choo, and D. He, “Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure,” IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1984–1992, 2020.
- E. Rescorla, “The transport layer security (TLS) protocol,” Version 1.3, RFC 8446, August 2018. [Online]. Available: https://www.rfc-editor.org/info/rfc8446
- D. Margaria and A. Vesco, “Trusted GNSS-based time synchronization for industry 4.0 applications,” Applied Sciences, vol. 11, no. 18, 2021.
- S. Popov, “The Tangle,” Version 1.4.3, April 2018. [Online]. Available: https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf
- TCG, “Trusted platform module library specification,” November 2019. [Online]. Available: https://trustedcomputinggroup.org/resource/tpm-library-specification/
- Infineon Technologies AG, “OPTIGA™ TPM Application Note. Integration of an OPTIGA™ TPM SLx 9670 TPM2.0 with SPI Interface in a Raspberry Pi® 4 Linux environment,” July 2019. [Online]. Available: https://www.infineon.com/
- LINKS Foundation, “Wrapped Authenticated Messages – Library to interface with IOTA Tangle based on the Chrysalis protocol,” 2023. [Online]. Available: https://github.com/Cybersecurity-LINKS/WAM
- TCG, “TCG trusted attestation protocol (TAP) information model for TPM families 1.2 and 2.0 and DICE family 1.0,” September 2019. [Online]. Available: https://trustedcomputinggroup.org/wp-content/uploads/TNC_TAP_Information_Model_v1.00_r0.36-FINAL.pdf
- H. Birkholz, D. Thaler, M. Richardson, N. Smith, and W. Pan, “Remote ATtestation procedureS (RATS) Architecture,” RFC 9334, January 2023. [Online]. Available: https://www.rfc-editor.org/info/rfc9334
- R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, “Design and Implementation of a TCG-based Integrity Measurement Architecture,” in USENIX Security Symposium, San Diego, CA, August 2004.
- D. G. Berbecaru, S. Sisinni, A. Lioy, B. Rat, D. Margaria, and A. Vesco, “Mitigating software integrity attacks with trusted computing in a time distribution network,” IEEE Access, vol. 11, pp. 50 510–50 527, 2023.
- TCG, “TCG algorithm registry,” Family 2.0, Level 00, Revision 01.33, March 2023. [Online]. Available: https://trustedcomputinggroup.org/wp-content/uploads/TCG-Algorithm-Registry_R1.33_Pub.pdf
- Raspberry Pi® Trading Ltd, “Raspberry Pi® 4 Computer Model B, Product brief,” January 2021. [Online]. Available: https://datasheets.raspberrypi.org/rpi4/raspberry-pi-4-product-brief.pdf
- IOTA Foundation, “HORNET: IOTA fullnode software,” 2023. [Online]. Available: https://github.com/iotaledger/hornet
Sponsor
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.