Integrity Verification for Streaming IoT Applications with a Minimalist Logging Scheme

Shuangsheng Lou, Nisha Panwar, Gagan Agrawal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With the emergence of Internet of Things (IoT) ecosystem, edge devices are deployed to collect, process, and forward data on the edge side of the network. Such edge or fog processing model is increasingly being used for critical applications, often in environments where devices can be compromised. This paper considers a number of attacks that can negatively impact streaming IoT applications, and develop solutions to verify the integrity of the applications. We focus on premature code execution and overwriting of devices generated outputs, and propose a minimalist logging scheme for periodic verification with the use of hash-chains and Merkle Hash Tree (MHT).

Original languageEnglish (US)
Title of host publicationProceedings - 2021 IEEE International Conference on Smart Computing, SMARTCOMP 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages197-202
Number of pages6
ISBN (Electronic)9781665412520
DOIs
StatePublished - Aug 2021
Event7th IEEE International Conference on Smart Computing, SMARTCOMP 2021 - Virtual, Irvine, United States
Duration: Aug 23 2021Aug 27 2021

Publication series

NameProceedings - 2021 IEEE International Conference on Smart Computing, SMARTCOMP 2021

Conference

Conference7th IEEE International Conference on Smart Computing, SMARTCOMP 2021
Country/TerritoryUnited States
CityVirtual, Irvine
Period8/23/218/27/21

Keywords

  • Internet of Things, integrity verification, IoT attacks, logging, Merkle Hash Tree

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Integrity Verification for Streaming IoT Applications with a Minimalist Logging Scheme'. Together they form a unique fingerprint.

Cite this