Internet of Things (IoT) is composed of physical devices, communication networks, and services provided by edge systems and over-the-top applications. IoT connects billions of devices that collect data from the physical environment, which are pre-processed at the edge and then forwarded to processing services at the core of the infrastructure, on top of which cloud-based applications are built and provided to mobile end users. IoT comes with important advantages in terms of applications and added value for its users, making their world smarter and simpler. These advantages, however, are mitigated by the difficulty of guaranteeing IoT trustworthiness, which is still in its infancy. IoT trustworthiness is a must especially in critical domains (e.g., health, transportation) where humans become new components of an IoT system and their life is put at risk by system malfunctioning or breaches. In this article, we put forward the idea that trust in IoT can be boosted if and only if its automation and adaptation processes are based on trustworthy data. We therefore depart from a scenario that considers the quality of a single decision as the main goal of an IoT system and consider the trustworthiness of collected data as a fundamental requirement at the basis of a trustworthy IoT environment. We therefore define a methodology for data collection that filters untrusted data out according to trust rules evaluating the status of the devices collecting data and the collected data themselves. Our approach is based on blockchain and smart contracts and collects data whose trustworthiness and integrity are proven over time. The methodology balances trustworthiness and privacy and is experimentally evaluated in real-world and simulated scenarios using Hyperledger fabric blockchain.

From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain / C.A. Ardagna, R. Asal, E. Damiani, N.E. Ioini, M. Elahi, C. Pahl. - In: ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS. - ISSN 2378-962X. - 5:1(2020 Dec), pp. 11.1-11.26. [10.1145/3418686]

From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain

C.A. Ardagna
Primo
;
E. Damiani;
2020

Abstract

Internet of Things (IoT) is composed of physical devices, communication networks, and services provided by edge systems and over-the-top applications. IoT connects billions of devices that collect data from the physical environment, which are pre-processed at the edge and then forwarded to processing services at the core of the infrastructure, on top of which cloud-based applications are built and provided to mobile end users. IoT comes with important advantages in terms of applications and added value for its users, making their world smarter and simpler. These advantages, however, are mitigated by the difficulty of guaranteeing IoT trustworthiness, which is still in its infancy. IoT trustworthiness is a must especially in critical domains (e.g., health, transportation) where humans become new components of an IoT system and their life is put at risk by system malfunctioning or breaches. In this article, we put forward the idea that trust in IoT can be boosted if and only if its automation and adaptation processes are based on trustworthy data. We therefore depart from a scenario that considers the quality of a single decision as the main goal of an IoT system and consider the trustworthiness of collected data as a fundamental requirement at the basis of a trustworthy IoT environment. We therefore define a methodology for data collection that filters untrusted data out according to trust rules evaluating the status of the devices collecting data and the collected data themselves. Our approach is based on blockchain and smart contracts and collects data whose trustworthiness and integrity are proven over time. The methodology balances trustworthiness and privacy and is experimentally evaluated in real-world and simulated scenarios using Hyperledger fabric blockchain.
Computer systems organization; Information systems
Settore INF/01 - Informatica
   Cyber security cOmpeteNce fOr Research anD Innovation (CONCORDIA)
   CONCORDIA
   EUROPEAN COMMISSION
   H2020
   830927

   PIANO DI SOSTEGNO ALLA RICERCA 2015-2017 - LINEA 2 "DOTAZIONE ANNUALE PER ATTIVITA' ISTITUZIONALE"
   UNIVERSITA' DEGLI STUDI DI MILANO
dic-2020
Article (author)
File in questo prodotto:
File Dimensione Formato  
ArdagnaetAl.pdf

accesso aperto

Tipologia: Pre-print (manoscritto inviato all'editore)
Dimensione 871.55 kB
Formato Adobe PDF
871.55 kB Adobe PDF Visualizza/Apri
3418686.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 1.02 MB
Formato Adobe PDF
1.02 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/804900
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 11
  • ???jsp.display-item.citation.isi??? 7
social impact