Open Access Open Access  Restricted Access Subscription or Fee Access

Data Provenance for Multi-Hop Internet of Things

J. Gowthami, K. Aishwariya, P. Divya, M. Kavin Kumar, A. Elangovan


Security protocols for Internet of Things (IoT) need to be light weighted due to limited resources and scalability are available in the internet. Small and low-energy devices are suitable for cryptographic solution because of their energy and space limitations. The Received Signal Strength Indicator (RSSI) is used to generate link fingerprints for communicating IoT nodes. Correlation Coefficient is used for matching the link fingerprint. Co-relation Coefficient is used to communicating secured data transfer. Adversarial Node can be detected foe specific link in between the two nodes. Data Provenance has achieved by comparison of packet header.


Light Weight, Data Provenance, Fingerprint, Adversarial Node, Received Signal Strength Indicator (RSSI)

Full Text:



Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258, Oct 2017.

S. Satpathy, S. Mathew, V. Suresh, and R. Krishnamurthy, “Ultra-low energy security circuits for IoT applications,” in IEEE 34th International Conference on Computer Design (ICCD), 2016, pp. 682–685.

M. N. Aman, K. C. Chua, and B. Sikdar, “Mutual authentication in IOT systems using physical unclonable functions,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1327–1340, Oct 2017.

T. Idriss, H. Idriss, and M. Bayoumi, “A puf-based paradigm for IoT security,” in IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, pp. 700–705.

S.-R. Oh and Y.-G. Kim, “Security requirements analysis for the IoT,” in International Conference on Platform Technology and Service (PlatCon), 2017, pp. 1–6.

M. I. M. Saad, K. A. Jalil, and M. Manaf, “Achieving trust in cloud computing using secure data provenance,” in IEEE Conference on Open Systems (ICOS), 2014, pp. 84–88.

S. T. Ali, V. Sivaraman, D. Ostry, G. Tsudik, and S. Jha, “Securing first-hop data provenance for bodyworn devices using wireless link fingerprints,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 12, pp. 2193–2204, Dec 2014.

K. Zhang, X. Liang, R. Lu and X. Shen, “Sybil attacks and their defenses in the internet of things,” IEEE Internet of Things Journal, vol. 1, no. 5, pp. 372–383, Oct 2014.

G. Kecskemeti, G. Casale, D. N. Jha, J. Lyon, and R. Ranjan, “Modelling and simulation challenges in internet of things,” IEEE Cloud Computing, vol. 4, no. 1, pp. 62–69, Jan 2017.

J. Pacheco and S. Hariri, “IoT security framework for smart cyber infrastructures,” in IEEE International Workshops on Foundations and Applications of Self* Systems, 2016, pp. 242–247.

Z. Bohan, W. Xu, Z. Kaili, and Z. Xueyuan, “Encryption node de- sign in internet of things based on fingerprint features and cc2530,” in IEEE International Conference on Green Computing and Communications (GreenCom), Internet of Things, and IEEE Cyber, Physical and Social Computing (IoT/CPSCom), 2013, pp. 1454–1457.

J. Qian, H. Xu, and P. Li, “A novel secure architecture for the internet of things.” IEEE, Sep 2016, pp. 398–401.

Y. Xie and D. Wang, “An item-level access control framework for inter- system security in the internet of things,” vol. 548-549, Apr 2014, pp. 1430–1432.

Wang, D. Chen, N. Zhang, Z. Qin and Z. Qin, “Lacs: A lightweight label-based access control scheme in IoT-based 5g caching context,” IEEE Access, vol. 5, pp. 4018–4027, 2017.

Z. Zhou, C. Gao, C. Xu, Y. Zhang, S. Mumtaz, and J. Rodriguez, “Social big-data-based content dissemination in internet of vehicles,” IEEE Transactions on Industrial Informatics, vol. 14, no. 2, pp. 768–777, Feb 2018.

Z. Zhou, K. Ota, M. Dong, and C. Xu, “Energy-efficient matching for resource allocation in d2d enabled cellular networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 6, pp. 5256–5268, Jun 2017.

Z. Zhou, H. Yu, C. Xu, Y. Zhang, S. Mumtaz, and J. Rodriguez, “Dependable content distribution in d2d-based cooperative vehicular networks: A big data-integrated coalition game approach,” IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 3, pp. 953–964, Mar 2018.

Micaz-Wireless Measurement System, Crossbow Technology, 4 2007.

C.-L. Wu and C.-H. Hu, “Computational complexity theoretical analyses on cryptographic algorithms for computer security application,” in IEEE

J.-Y. Lee, W.-C. Lin, and Y.-H. Huang, “A lightweight authentication protocol for internet of things,” in International Symposium on Next- Generation Electronics (ISNE), 2014, pp. 1–2.

M. N. Aman, K. C. Chua, and B. Sikdar, “Secure data provenance for the internet of things.” ACM Press, 2017, pp. 11–14.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.