Skip to main content
Top
Published in: World Wide Web 1/2018

01-05-2017

Traceability and visual analytics for the Internet-of-Things (IoT) architecture

Authors: Richard K. Lomotey, Joseph C. Pry, Chenshean Chai

Published in: World Wide Web | Issue 1/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

There are several billion network-oriented devices in use today that are facilitated to inter-communicate; thereby forming a giant neural-like architecture known as the Internet-of-Things (IoT). The benefits of the IoT cut across all spectrums of our individual lives, corporate culture, and societal co-existence. This is because IoT devices support health tracking, security monitoring, consumer tracking, forecasting, and so on. However, the huge interconnectedness in IoT architectures complicates traceability and faulty data propagation is not easily detected since there are challenges with data origin authentication. Thus, this research proposes a provenance technique to deal with these issues. The technique is based on associative rules and lexical chaining methodologies, which enable traceability through the identification of propagation routes of data and object-to-object communications. Through visualization tools, the proposed methodologies also enabled us to determine linkability and unlinkability between IoT devices in a network which further leads to mechanisms to check correctness in sensor data propagation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Al-Azez, Z.T., Lawey, A.Q., El-Gorashi, T.E.H., Elmirghani, J.M.H.: Virtualization framework for energy efficient IoT networks, cloud networking (CloudNet), 2015 I.E. 4th International Conference on, pp. 74–77. Niagara Falls, ON (2015). doi:10.1109/CloudNet.2015.7335284 CrossRef Al-Azez, Z.T., Lawey, A.Q., El-Gorashi, T.E.H., Elmirghani, J.M.H.: Virtualization framework for energy efficient IoT networks, cloud networking (CloudNet), 2015 I.E. 4th International Conference on, pp. 74–77. Niagara Falls, ON (2015). doi:10.​1109/​CloudNet.​2015.​7335284 CrossRef
2.
go back to reference Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials. 17(4), 2347–2376. ISSN 1553-877x (2015). doi:10.1109/COMST.2015.2444095 CrossRef Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials. 17(4), 2347–2376. ISSN 1553-877x (2015). doi:10.​1109/​COMST.​2015.​2444095 CrossRef
6.
go back to reference Banda, G., Chaitanya, K. and Mohan, H.: An IoT protocol and framework for OEMs to make IoT-enabled devices forward compatible, 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Bangkok, (2015), pp. 824–832, doi:10.1109/SITIS.2015.106. Banda, G., Chaitanya, K. and Mohan, H.: An IoT protocol and framework for OEMs to make IoT-enabled devices forward compatible, 2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Bangkok, (2015), pp. 824–832, doi:10.​1109/​SITIS.​2015.​106.
7.
go back to reference Bauer, S., & Schreckling, D.:Data provenance in the internet of things. EU Project COMPOSE, Conference Seminar (2013) Bauer, S., & Schreckling, D.:Data provenance in the internet of things. EU Project COMPOSE, Conference Seminar (2013)
8.
go back to reference Boman, J., Taylor, J., Ngu, A. H., Flexible IoT middleware for integration of things and applications, collaborative computing: networking, applications and Worksharing (CollaborateCom), 2014 International Conference on, Miami, FL, (2014), pp. 481–488, doi: 10.4108/icst.collaboratecom.2014.257533. Boman, J., Taylor, J., Ngu, A. H., Flexible IoT middleware for integration of things and applications, collaborative computing: networking, applications and Worksharing (CollaborateCom), 2014 International Conference on, Miami, FL, (2014), pp. 481–488, doi: 10.​4108/​icst.​collaboratecom.​2014.​257533.
10.
go back to reference Cui, Z., Lv, H., Yin, C., Gao, G., Zhou, C.: Efficient key management for IOT owner in the cloud, big data and cloud computing (BDCloud), 2015 I.E. fifth International Conference on, Dalian, (2015), pp. 56–61, doi:10.1109/BDCloud.2015.40. Cui, Z., Lv, H., Yin, C., Gao, G., Zhou, C.: Efficient key management for IOT owner in the cloud, big data and cloud computing (BDCloud), 2015 I.E. fifth International Conference on, Dalian, (2015), pp. 56–61, doi:10.​1109/​BDCloud.​2015.​40.
11.
go back to reference Davidson, S. B., and Freire, J. Provenance and scientific workflows: challenges and opportunities. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD '08, pages 1345–1350, 09 (2008). doi: 10.1145/1376616.1376772. Davidson, S. B., and Freire, J. Provenance and scientific workflows: challenges and opportunities. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD '08, pages 1345–1350, 09 (2008). doi: 10.​1145/​1376616.​1376772.
12.
go back to reference Farris, I., Militano, L., Nitti, M., Atzori, L. and Iera, A.: Federated edge-assisted mobile clouds for service provisioning in heterogeneous IoT environments, Internet of Things (WF-IoT), 2015 I.E. 2nd World Forum on, Milan, (2015), pp. 591–596, doi: 10.1109/WF-IoT.2015.7389120. Farris, I., Militano, L., Nitti, M., Atzori, L. and Iera, A.: Federated edge-assisted mobile clouds for service provisioning in heterogeneous IoT environments, Internet of Things (WF-IoT), 2015 I.E. 2nd World Forum on, Milan, (2015), pp. 591–596, doi: 10.​1109/​WF-IoT.​2015.​7389120.
13.
go back to reference Genquan, R. Li, Z., Jianmin, W., and Yinbo, L.: One method for provenance tracking of product lifecycle data in collaborative service environment. Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2011 International Conference on, pp.347–356, 10–12 (2011) Genquan, R. Li, Z., Jianmin, W., and Yinbo, L.: One method for provenance tracking of product lifecycle data in collaborative service environment. Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2011 International Conference on, pp.347–356, 10–12 (2011)
14.
go back to reference Georgakopoulos, D., Jayaraman, P. P., Zhang, M., Ranjan, R.: Discovery-driven service oriented IoT architecture, 2015 I.E. Conference on Collaboration and Internet Computing (CIC), Hangzhou, (2015), pp. 142–149, doi:10.1109/CIC.2015.34. Georgakopoulos, D., Jayaraman, P. P., Zhang, M., Ranjan, R.: Discovery-driven service oriented IoT architecture, 2015 I.E. Conference on Collaboration and Internet Computing (CIC), Hangzhou, (2015), pp. 142–149, doi:10.​1109/​CIC.​2015.​34.
15.
16.
go back to reference Lawabni, A. E., Changjin H., Du, D. H. C., Tewfik, A. H.: A novel update propagation module for the data provenance problem: a contemplating vision on realizing data provenance from models to storage. In Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies, CIKM '11, pages 61–69, 11–14 (2005). doi: 10.1109/MSST.2005.2. Lawabni, A. E., Changjin H., Du, D. H. C., Tewfik, A. H.: A novel update propagation module for the data provenance problem: a contemplating vision on realizing data provenance from models to storage. In Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies, CIKM '11, pages 61–69, 11–14 (2005). doi: 10.​1109/​MSST.​2005.​2.
17.
go back to reference Lee, Y. K., Lim, J. D., Jeon, Y. S., Kim, J. N.: Technology trends of access control in IoT and requirements analysis, Information and Communication Technology Convergence (ICTC), 2015 International Conference on, Jeju, (2015). pp. 1031–1033, doi: 10.1109/ICTC.2015.7354730. Lee, Y. K., Lim, J. D., Jeon, Y. S., Kim, J. N.: Technology trends of access control in IoT and requirements analysis, Information and Communication Technology Convergence (ICTC), 2015 International Conference on, Jeju, (2015). pp. 1031–1033, doi: 10.​1109/​ICTC.​2015.​7354730.
18.
go back to reference Liu, J., Ahmed, E., Shiraz, M., Gani, A., Buyya, R., Qureshi, A.: Application partitioning algorithms in mobile cloud computing: taxonomy, review and future directions. J. Netw. Comput. Appl. 48, 99–117 (2015)CrossRef Liu, J., Ahmed, E., Shiraz, M., Gani, A., Buyya, R., Qureshi, A.: Application partitioning algorithms in mobile cloud computing: taxonomy, review and future directions. J. Netw. Comput. Appl. 48, 99–117 (2015)CrossRef
19.
go back to reference Loo, J., Aiash, M.: Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. J. Netw. Comput. Appl. 50, 64–72 (2015)CrossRef Loo, J., Aiash, M.: Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. J. Netw. Comput. Appl. 50, 64–72 (2015)CrossRef
20.
go back to reference Lucia, B.; Ceze, L.: Data provenance tracking for concurrent programs. In Proceedings of the 2015 IEEE/ACM International Symposium on Code Generation and Optimization, CGO (2015), pages 146–156, 7–11 2015. doi: 10.1109/CGO.2015.7054195. Lucia, B.; Ceze, L.: Data provenance tracking for concurrent programs. In Proceedings of the 2015 IEEE/ACM International Symposium on Code Generation and Optimization, CGO (2015), pages 146–156, 7–11 2015. doi: 10.​1109/​CGO.​2015.​7054195.
21.
go back to reference Marjit, U., Sarkar, A., Biswas, U.: A novel approach to develop linked data with provenance. Computing, communication and applications (ICCCA), 2012 International Conference on, pp.1-5, 22-24 Feb. (2012), doi: 10.1109/ICCCA.2012.6179211. Marjit, U., Sarkar, A., Biswas, U.: A novel approach to develop linked data with provenance. Computing, communication and applications (ICCCA), 2012 International Conference on, pp.1-5, 22-24 Feb. (2012), doi: 10.​1109/​ICCCA.​2012.​6179211.
22.
go back to reference Nastic, S., Copil, G., Truong, H. L., Dustdar, S.: Governing elastic IoT cloud systems under uncertainty, 2015 I.E. 7th International Conference on cloud computing Technology and Science (CloudCom), Vancouver, BC, (2015), pp.131–138, doi: 10.1109/CloudCom.2015.77. Nastic, S., Copil, G., Truong, H. L., Dustdar, S.: Governing elastic IoT cloud systems under uncertainty, 2015 I.E. 7th International Conference on cloud computing Technology and Science (CloudCom), Vancouver, BC, (2015), pp.131–138, doi: 10.​1109/​CloudCom.​2015.​77.
25.
go back to reference Park, J., Nguyen, D., Sandhu, R.: On data provenance in group-centric secure collaboration. Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, pp.221–230, 15–18 (2011) Park, J., Nguyen, D., Sandhu, R.: On data provenance in group-centric secure collaboration. Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, pp.221–230, 15–18 (2011)
26.
go back to reference Remus, S., Biemann, C.: Three knowledge-free methods for automatic lexical chain extraction, Proceedings of NAACL-HLT 2013, pages 989–999, Atlanta, Georgia, 9–14. Association for Computational Linguistics (2013) Remus, S., Biemann, C.: Three knowledge-free methods for automatic lexical chain extraction, Proceedings of NAACL-HLT 2013, pages 989–999, Atlanta, Georgia, 9–14. Association for Computational Linguistics (2013)
29.
go back to reference She, W., I-Ling, Y., Bastani, F., Tran, B., Thuraisingham, B.: Role-based integrated access control and data provenance for SOA based net-centric systems. Service Oriented System Engineering (SOSE), 2011 I.E. 6th International Symposium on, pp.225–234, 12–14 (2011) She, W., I-Ling, Y., Bastani, F., Tran, B., Thuraisingham, B.: Role-based integrated access control and data provenance for SOA based net-centric systems. Service Oriented System Engineering (SOSE), 2011 I.E. 6th International Symposium on, pp.225–234, 12–14 (2011)
30.
go back to reference Sultana, S., Shehab, M., Bertino, E.: Secure provenance transmission for streaming data. Knowledge and Data Engineering, IEEE Transactions on, vol.PP, no.99, (2012), pp.1, doi: 10.1109/TKDE.2012.31 Sultana, S., Shehab, M., Bertino, E.: Secure provenance transmission for streaming data. Knowledge and Data Engineering, IEEE Transactions on, vol.PP, no.99, (2012), pp.1, doi: 10.​1109/​TKDE.​2012.​31
31.
go back to reference Sun, L., Park, J., Nguyen, D., Sandhu, R.: A provenance-aware access control framework with typed provenance. IEEE Transactions on Dependable and Secure Computing, vol.PP, no.99, pages 1–14, 09, 2015. doi: 10.1109/TDSC.2015.2410793 Sun, L., Park, J., Nguyen, D., Sandhu, R.: A provenance-aware access control framework with typed provenance. IEEE Transactions on Dependable and Secure Computing, vol.PP, no.99, pages 1–14, 09, 2015. doi: 10.​1109/​TDSC.​2015.​2410793
32.
go back to reference Tan, V., Groth, P., Miles, S., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Security issues in a SOA-based provenance system, provenance and annotation of data. Lect. Notes Comput. Sci. 4145, 203–211 (2006)CrossRef Tan, V., Groth, P., Miles, S., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Security issues in a SOA-based provenance system, provenance and annotation of data. Lect. Notes Comput. Sci. 4145, 203–211 (2006)CrossRef
33.
go back to reference Zhang, O.Q., Kirchberg, M., Ko, R.K.L., Lee, B. S.: How to track Your data: the case for cloud computing provenance. In Proceedings of the 2011 I.E. third International Conference on cloud computing Technology and Science, CloudCom 2011, pages 446–453, (2011). doi: 10.1109/CloudCom.2011.66. Zhang, O.Q., Kirchberg, M., Ko, R.K.L., Lee, B. S.: How to track Your data: the case for cloud computing provenance. In Proceedings of the 2011 I.E. third International Conference on cloud computing Technology and Science, CloudCom 2011, pages 446–453, (2011). doi: 10.​1109/​CloudCom.​2011.​66.
34.
go back to reference Zhang, O.Q., Ko, R.K.L., Kirchberg, M., Suen, C. H., Jagadpramana, P., Lee, B. S.: How to track your data: rule-based data provenance tracing algorithms. In Proceedings of the 2012 I.E. 11th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, pages 1429–1437, 25–27 June (2012). doi: 10.1109/TrustCom.2012.175. Zhang, O.Q., Ko, R.K.L., Kirchberg, M., Suen, C. H., Jagadpramana, P., Lee, B. S.: How to track your data: rule-based data provenance tracing algorithms. In Proceedings of the 2012 I.E. 11th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, pages 1429–1437, 25–27 June (2012). doi: 10.​1109/​TrustCom.​2012.​175.
Metadata
Title
Traceability and visual analytics for the Internet-of-Things (IoT) architecture
Authors
Richard K. Lomotey
Joseph C. Pry
Chenshean Chai
Publication date
01-05-2017
Publisher
Springer US
Published in
World Wide Web / Issue 1/2018
Print ISSN: 1386-145X
Electronic ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-017-0461-1

Other articles of this Issue 1/2018

World Wide Web 1/2018 Go to the issue

Premium Partner