Tracking Data Trajectories in IoT
Chiara Bodei, Letterio Galletta
2019
Abstract
The Internet of Things (IoT) devices access and process large amounts of data. Some of them are sensitive and can become a target for security attacks. As a consequence, it is crucial being able to trace data and to identify their paths. We start from the specification language IoT-LySa, and propose a Control Flow Analysis for statically predicting possible trajectories of data communicated in an IoT system and, consequently, for checking whether sensitive data can pass through possibly dangerous nodes. Paths are also interesting from an architectural point of view for deciding which are the points where data are collected, processed, communicated and stored and which are the suitable security mechanisms for guaranteeing a reliable transport from the raw data collected by the sensors to the aggregation nodes and to servers that decide actuations.
DownloadPaper Citation
in Harvard Style
Bodei C. and Galletta L. (2019). Tracking Data Trajectories in IoT.In Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-359-9, pages 572-579. DOI: 10.5220/0007578305720579
in Bibtex Style
@conference{icissp19,
author={Chiara Bodei and Letterio Galletta},
title={Tracking Data Trajectories in IoT},
booktitle={Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2019},
pages={572-579},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007578305720579},
isbn={978-989-758-359-9},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 5th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Tracking Data Trajectories in IoT
SN - 978-989-758-359-9
AU - Bodei C.
AU - Galletta L.
PY - 2019
SP - 572
EP - 579
DO - 10.5220/0007578305720579