Self attestation of things

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Various devices including our mobile phones are increasingly used as the intermediary (gateway) between IoT peripherals (like the smart lock at our homes) and the larger cloud infrastructure. In this paper we introduce the novel notion of Caveat instances on the cloud together with a novel application of MQTT (the communication protocol designed for peripherals) to stamp our will on how data about us can be used when it travels and resides outside our immediate boundary. Even when we cannot keep our personal data private, we can still prevent it from being misused, for example to commit identity theft, by ensuring that the attacker cannot produce an appropriate attestation for the data.

Cite

CITATION STYLE

APA

Das Chowdhury, P., & Christianson, B. (2017). Self attestation of things. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10476 LNCS, pp. 76–84). Springer Verlag. https://doi.org/10.1007/978-3-319-71075-4_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free