A successful application of an Internet of Things (IoT) based network depends on the accurate and successful delivery of data collected from numerous sources. A significant concern in IoT systems arises when end-users do not have sufficient transparency and are unaware of any potential data manipulation and risk in each step involved in data propagation. One potential solution is to integrate security metadata in IoT-based security-aware provenance graphs that provides better transparency with security awareness at each step of data propagation. In this paper, we integrate security metadata into the provenance graph with predefined security policies. We design a hypothetical IoT-Health scenario with possible threats: node cloning, fault pac...
Abstract-Large-scale sensor networks are being deployed in numerous application domains, and often t...
IoT technologies are becoming pervasive in public and private sectors and represent presently an int...
The IoT is a rich and dynamic network of interconnected networks where various devices share informa...
The Internet of Things (IoT) is a network of heterogeneous networks encompassing various forms of co...
There is a need to create a trusted and secure IoT environment to share information, create knowledg...
There is a need to create a trusted and secure IoT environment to share information, create knowledg...
Internet of Things (IoT), as a typical representation of cyberization, enables the interconnection o...
A malicious foe may introduce additional nodes within the network or compromise existing ones. There...
The IoT is described as a smart interactive environment where devices communicate together ubiquitou...
The IoT is described as a smart interactive environment where devices communicate together ubiquitou...
The rise of the Internet of Things (IoT) has enabled a shift to a smart, remote, and more distribute...
The Internet of Things (IoT) is inspired by network interconnectedness of humans, objects, and cloud...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
The IoT is a rich and dynamic network of interconnected networks where various devices share informa...
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their poten...
Abstract-Large-scale sensor networks are being deployed in numerous application domains, and often t...
IoT technologies are becoming pervasive in public and private sectors and represent presently an int...
The IoT is a rich and dynamic network of interconnected networks where various devices share informa...
The Internet of Things (IoT) is a network of heterogeneous networks encompassing various forms of co...
There is a need to create a trusted and secure IoT environment to share information, create knowledg...
There is a need to create a trusted and secure IoT environment to share information, create knowledg...
Internet of Things (IoT), as a typical representation of cyberization, enables the interconnection o...
A malicious foe may introduce additional nodes within the network or compromise existing ones. There...
The IoT is described as a smart interactive environment where devices communicate together ubiquitou...
The IoT is described as a smart interactive environment where devices communicate together ubiquitou...
The rise of the Internet of Things (IoT) has enabled a shift to a smart, remote, and more distribute...
The Internet of Things (IoT) is inspired by network interconnectedness of humans, objects, and cloud...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
The IoT is a rich and dynamic network of interconnected networks where various devices share informa...
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their poten...
Abstract-Large-scale sensor networks are being deployed in numerous application domains, and often t...
IoT technologies are becoming pervasive in public and private sectors and represent presently an int...
The IoT is a rich and dynamic network of interconnected networks where various devices share informa...