Visible to the public Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain

TitleMediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Publication TypeConference Paper
Year of Publication2020
AuthorsEnkhtaivan, B., Inoue, A.
Conference Name2020 IEEE International Conference on Smart Internet of Things (SmartIoT)
Date Publishedaug
KeywordsAI technology, artificial intelligence, artificial intelligence technology, authenticated encryption method, blockchain, blockchain ledger, composability, computer network security, cryptographic protocols, Data analysis, data analysis methods, Data Transmission, data trustworthiness, digital signatures, Encryption, Internet of Things, IoT, IoT device, physically unclonable function, Protocols, pubcrawl, Relays, secure protocol, Servers, smart cities, TEE, Trusted Computing, Trusted Execution Environment, trusted hardware, trustworthiness
AbstractIn recent years, with the progress of data analysis methods utilizing artificial intelligence (AI) technology, concepts of smart cities collecting data from IoT devices and creating values by analyzing it have been proposed. However, making sure that the data is not tampered with is of the utmost importance. One way to do this is to utilize blockchain technology to record and trace the history of the data. Park and Kim proposed ensuring the trustworthiness of the data by utilizing an IoT device with a trusted execution environment (TEE). Also, Guan et al. proposed authenticating an IoT device and mediating data using a TEE. For the authentication, they use the physically unclonable function of the IoT device. Usually, IoT devices suffer from the lack of resources necessary for creating transactions for the blockchain ledger. In this paper, we present a secure protocol in which a TEE acts as a proxy to the IoT devices and creates the necessary transactions for the blockchain. We use an authenticated encryption method on the data transmission between the IoT device and TEE to authenticate the device and ensure the integrity and confidentiality of the data generated by the IoT devices.
DOI10.1109/SmartIoT49966.2020.00056
Citation Keyenkhtaivan_mediating_2020