Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review

Omair Faraj,David Megias,Joaquin Garcia-Alfaro
2024-07-04
Abstract:The Internet of Things (IoT) relies on resource-constrained devices deployed in unprotected environments. Different types of risks may be faced during data transmission in single-hop and multi-hop scenarios. Addressing these vulnerabilities is crucial. A systematic literature review of data provenance in IoT is presented, exploring existing techniques, practical implementations, security requirements, and performance metrics. Respective contributions and shortcomings are compared. A taxonomy related to the development of data provenance in IoT is proposed. Open issues are identified, and future research directions are presented, providing useful insights for the evolution of data provenance research in the context of the IoT.
Cryptography and Security
What problem does this paper attempt to address?