Trustworthy Sensing in an Untrusted IoT Environment

Mamadou H. Diallo, Nisha Panwar, Sharad Mehrotra, Ardalan Amiri Sani

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Contemporary IoT environments, such as smart buildings, require end-users to trust data collection policies published by the systems. There are several reason why such a trust is misplaced - IoT systems may not be honest, may inadvertently collect data without user's knowledge, or may fall victim to cyberattacks that hijack IoT devices transferring user data to a malicious third-party leading to the loss of individual's privacy. To address such concerns, we are developing IoTtrust, a framework to ensure trust and confidence in IoT systems (and applications). textbfIoTtrust includes a simple yet powerful policy language, contracts between subjects and IoT space, and mechanisms to empower each party to undeniably attest the contract validity.

Original languageEnglish (US)
Title of host publication2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages468-471
Number of pages4
ISBN (Electronic)9781538632277
DOIs
StatePublished - Oct 2 2018
Externally publishedYes
Event2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018 - Athens, Greece
Duration: Mar 19 2018Mar 23 2018

Publication series

Name2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018

Conference

Conference2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018
Country/TerritoryGreece
CityAthens
Period3/19/183/23/18

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition

Fingerprint

Dive into the research topics of 'Trustworthy Sensing in an Untrusted IoT Environment'. Together they form a unique fingerprint.

Cite this