Tracking Data Trajectories in IoT

Chiara Bodei, Letterio Galletta

Abstract

The Internet of Things (IoT) devices access and process large amounts of data. Some of them are sensitive and can become a target for security attacks. As a consequence, it is crucial being able to trace data and to identify their paths. We start from the specification language IoT-LySa, and propose a Control Flow Analysis for statically predicting possible trajectories of data communicated in an IoT system and, consequently, for checking whether sensitive data can pass through possibly dangerous nodes. Paths are also interesting from an architectural point of view for deciding which are the points where data are collected, processed, communicated and stored and which are the suitable security mechanisms for guaranteeing a reliable transport from the raw data collected by the sensors to the aggregation nodes and to servers that decide actuations.

Download


Paper Citation


in Harvard Style

Bodei C. and Galletta L. (2019). Tracking Data Trajectories in IoT.In Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-359-9, pages 572-579. DOI: 10.5220/0007578305720579


in Bibtex Style

@conference{icissp19,
author={Chiara Bodei and Letterio Galletta},
title={Tracking Data Trajectories in IoT},
booktitle={Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2019},
pages={572-579},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007578305720579},
isbn={978-989-758-359-9},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Tracking Data Trajectories in IoT
SN - 978-989-758-359-9
AU - Bodei C.
AU - Galletta L.
PY - 2019
SP - 572
EP - 579
DO - 10.5220/0007578305720579