An Efficient Scheme to Secure Data Provenance in Home Area Networks

Paper


Tang, Zhaohui and Keoh, Sye Loong. 2020. "An Efficient Scheme to Secure Data Provenance in Home Area Networks." IEEE 3rd 5G World Forum (5GWF 2020). Bangalore, India 10 - 12 Sep 2020 United States. https://doi.org/10.1109/5GWF49715.2020.9221402
Paper/Presentation Title

An Efficient Scheme to Secure Data Provenance in Home Area Networks

Presentation TypePaper
AuthorsTang, Zhaohui (Author) and Keoh, Sye Loong (Author)
Journal or Proceedings Title2020 IEEE 3rd 5G World Forum (5GWF) Conference Proceedings
Number of Pages6
Year2020
Place of PublicationUnited States
ISBN9781728173009
9781728172996
Digital Object Identifier (DOI)https://doi.org/10.1109/5GWF49715.2020.9221402
Web Address (URL) of Paperhttps://ieeexplore.ieee.org/document/9221346/
Web Address (URL) of Conference Proceedingshttps://ieeexplore.ieee.org/xpl/conhome/9214304/proceeding
Conference/EventIEEE 3rd 5G World Forum (5GWF 2020)
Event Details
IEEE 3rd 5G World Forum (5GWF 2020)
Event Date
10 to end of 12 Sep 2020
Event Location
Bangalore, India
Abstract

The 5G technology has raised new security issues in the new communication paradigm as there are more devices in the network. Internet-of-Things devices, including smart home devices, will be allowed to connect, communicate, and share data faster than ever. In the context of a Home Area Network (HAN) where smart home appliances are monitored and controlled in real-time, the explosive growth of networked devices poses an elevated security threat to data provenance. This paper focuses on data provenance issues in a HAN within a smart metering infrastructure. We propose a comprehensive yet efficient solution to guarantee that the reported energy usage is collected from the real appliance as claimed, at the designated location, and that it reflects the real consumption by the appliance.

Keywordscommunication paradigm, Internet-of-Things devices, smart home devices, share data, Home Area Network, HAN, smart home appliances, networked devices, elevated security threat, data provenance issues, smart metering infrastructure
Contains Sensitive ContentDoes not contain sensitive content
ANZSRC Field of Research 2020460403. Data security and protection
460401. Cryptography
Public Notes

Files associated with this item cannot be displayed due to copyright restrictions.

Byline AffiliationsSchool of Sciences
University of Glasgow, United Kingdom
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q5zzw/an-efficient-scheme-to-secure-data-provenance-in-home-area-networks

  • 114
    total views
  • 11
    total downloads
  • 1
    views this month
  • 0
    downloads this month

Export as

Related outputs

Lightweight federated learning for STIs/HIV prediction
Nguyen, Thi Phuoc Van, Yang, Wencheng, Tang, Zhaohui, Xia, Xiaoyu, Mullens, Amy B., Dean, Judith A. and Li, Yan. 2024. "Lightweight federated learning for STIs/HIV prediction." Scientific Reports. 14 (1). https://doi.org/10.1038/s41598-024-56115-0
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Yang, Wencheng, Wang, Song, Cui, Hui, Tang, Zhaohui and Li, Yan. 2023. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors. 23 (7). https://doi.org/10.3390/s23073566
Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning
Tang, Zhaohui. 2022. "Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.
Federated Learning with Real-world Datasets: Compliance with the Privacy Act
Tang, Zhaohui and Keoh, Sye Loong. 2022. "Federated Learning with Real-world Datasets: Compliance with the Privacy Act." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.
Secret sharing-based IoT text data outsourcing: a secure and efficient scheme
Tang, Zhaohui. 2021. "Secret sharing-based IoT text data outsourcing: a secure and efficient scheme." IEEE Access. 9, pp. 76908 -76920. https://doi.org/10.1109/ACCESS.2021.3075282
Privacy Preserving Computation in Home Loans Using the FRESCO Framework
Chan, Fook Mun, Xu, Quanqing, Seah, Hao Jian, Keoh, Sye Loong, Tang, Zhaohui and Aung, Khin Mi Mi. 2019. "Privacy Preserving Computation in Home Loans Using the FRESCO Framework." Kacprzyk, Janusz (ed.) 2018 Future of Information and Communication Conference (FICC 2018). Singapore 05 - 06 Apr 2018 Switzerland. https://doi.org/10.1007/978-3-030-03405-4_7
Authentication and Integrity Protection for Real-time Cyber-Physical Systems
Keoh, Sye Loong, Tan, Heng Chuan and Tang, Zhaohui. 2020. "Authentication and Integrity Protection for Real-time Cyber-Physical Systems." Tian, Yu-Chu and Levy, David Charles (ed.) Handbook of Real-Time Computing. Singapore. Springer. pp. 1-22