{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:58:56Z","timestamp":1775282336147,"version":"3.50.1"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T00:00:00Z","timestamp":1609286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2021,1,31]]},"abstract":"<jats:p>Internet of Things (IoT) is composed of physical devices, communication networks, and services provided by edge systems and over-the-top applications. IoT connects billions of devices that collect data from the physical environment, which are pre-processed at the edge and then forwarded to processing services at the core of the infrastructure, on top of which cloud-based applications are built and provided to mobile end users. IoT comes with important advantages in terms of applications and added value for its users, making their world smarter and simpler. These advantages, however, are mitigated by the difficulty of guaranteeing IoT trustworthiness, which is still in its infancy. IoT trustworthiness is a must especially in critical domains (e.g., health, transportation) where humans become new components of an IoT system and their life is put at risk by system malfunctioning or breaches. In this article, we put forward the idea that trust in IoT can be boosted if and only if its automation and adaptation processes are based on trustworthy data. We therefore depart from a scenario that considers the quality of a single decision as the main goal of an IoT system and consider the trustworthiness of collected data as a fundamental requirement at the basis of a trustworthy IoT environment. We therefore define a methodology for data collection that filters untrusted data out according to trust rules evaluating the status of the devices collecting data and the collected data themselves. Our approach is based on blockchain and smart contracts and collects data whose trustworthiness and integrity are proven over time. The methodology balances trustworthiness and privacy and is experimentally evaluated in real-world and simulated scenarios using Hyperledger fabric blockchain.<\/jats:p>","DOI":"10.1145\/3418686","type":"journal-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T13:09:05Z","timestamp":1609333745000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["From Trustworthy Data to Trustworthy IoT"],"prefix":"10.1145","volume":"5","author":[{"given":"Claudio A.","family":"Ardagna","sequence":"first","affiliation":[{"name":"DI, Universit\u00e0 degli Studi di Milano"}]},{"given":"Rasool","family":"Asal","sequence":"additional","affiliation":[{"name":"EBTIC, Khalifa University of Science, Technology and Research"}]},{"given":"Ernesto","family":"Damiani","sequence":"additional","affiliation":[{"name":"C2PS, Khalifa University"}]},{"given":"Nabil El","family":"Ioini","sequence":"additional","affiliation":[{"name":"Free University of Bozen"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2203-9195","authenticated-orcid":false,"given":"Mehdi","family":"Elahi","sequence":"additional","affiliation":[{"name":"University of Bergen"}]},{"given":"Claus","family":"Pahl","sequence":"additional","affiliation":[{"name":"Free University of Bozen"}]}],"member":"320","published-online":{"date-parts":[[2020,12,30]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the European Symposium on Research in Computer Security (ESORICS\u201918)","author":"Ambrosin M.","unstructured":"M. Ambrosin , M. Conti , A. Ibrahim , A. Sadeghi , and M. Schunter . 2018. SCIoT: A secure and scalable end-to-end management framework for IoT devices . In Proceedings of the European Symposium on Research in Computer Security (ESORICS\u201918) . Barcelona, Spain. M. Ambrosin, M. Conti, A. Ibrahim, A. Sadeghi, and M. Schunter. 2018. SCIoT: A secure and scalable end-to-end management framework for IoT devices. In Proceedings of the European Symposium on Research in Computer Security (ESORICS\u201918). Barcelona, Spain."},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"C. A. Ardagna R. Asal E. Damiani T. Dimitrakos N. El Ioini and C. Pahl. 2018. Certification-based cloud adaptation. IEEE Trans. Soc. Comput. (2018). Early Access.  C. A. Ardagna R. Asal E. Damiani T. Dimitrakos N. El Ioini and C. Pahl. 2018. Certification-based cloud adaptation. IEEE Trans. Soc. Comput. (2018). Early Access.","DOI":"10.1109\/TSC.2018.2793268"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the IEEE International Conference on Services Computing (SCC\u201919)","author":"Ardagna C. A.","unstructured":"C. A. Ardagna , R. Asal , E. Damiani , C. Pahl , N. El Ioini , and C. Pahl . 2019. Trustworty IoT: An evidence collection approach based on smart contracts . In Proceedings of the IEEE International Conference on Services Computing (SCC\u201919) . Milan, Italy. C. A. Ardagna, R. Asal, E. Damiani, C. Pahl, N. El Ioini, and C. Pahl. 2019. Trustworty IoT: An evidence collection approach based on smart contracts. In Proceedings of the IEEE International Conference on Services Computing (SCC\u201919). Milan, Italy."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2767005"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"C. A. Ardagna E. Damiani J. Schutte and P. Stephanow. 2017. A case for IoT security assurance. In Internet of Everything B. Di Martino K. Ching Li L. Yang and A. Esposito (Eds.). Springer.  C. A. Ardagna E. Damiani J. Schutte and P. Stephanow. 2017. A case for IoT security assurance. In Internet of Everything B. Di Martino K. Ching Li L. Yang and A. Esposito (Eds.). Springer.","DOI":"10.1007\/978-981-10-5861-5_8"},{"key":"e_1_2_1_6_1","unstructured":"S. Bonomi M. Casini and C. Ciccotelli. 2018. B-CoC: A blockchain-based chain of custody for evidences management in digital forensics. arXiv:1807.10359. Retrieved from https:\/\/arxiv.org\/abs\/1807.10359.  S. Bonomi M. Casini and C. Ciccotelli. 2018. B-CoC: A blockchain-based chain of custody for evidences management in digital forensics. arXiv:1807.10359. Retrieved from https:\/\/arxiv.org\/abs\/1807.10359."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the SIAM International Conference on Data Mining (SDM\u201908)","author":"Dai C.","unstructured":"C. Dai , D. Lin , E. Bertino , and M. Kantarcioglu . 2008. An approach to evaluate data trustworthiness based on data provenance . In Proceedings of the SIAM International Conference on Data Mining (SDM\u201908) . C. Dai, D. Lin, E. Bertino, and M. Kantarcioglu. 2008. An approach to evaluate data trustworthiness based on data provenance. In Proceedings of the SIAM International Conference on Data Mining (SDM\u201908)."},{"key":"e_1_2_1_8_1","unstructured":"Ericsson. 2016. Bootstrapping security\u2014The key to internet of things access authentication and data integrity. Ericsson white paper 284 23-3284.  Ericsson. 2016. Bootstrapping security\u2014The key to internet of things access authentication and data integrity. Ericsson white paper 284 23-3284."},{"key":"e_1_2_1_9_1","first-page":"3","article-title":"Cloud-trust, a security assessment model for infrastructure as a service (IaaS) clouds","volume":"5","author":"Gonzales D.","year":"2017","unstructured":"D. Gonzales , J. M. Kaplan , E. Saltzman , Z. Winkelman , and D. Woods . 2017 . Cloud-trust, a security assessment model for infrastructure as a service (IaaS) clouds . IEEE TCC 5 , 3 (July 2017), 523--536. D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman, and D. Woods. 2017. Cloud-trust, a security assessment model for infrastructure as a service (IaaS) clouds. IEEE TCC 5, 3 (July 2017), 523--536.","journal-title":"IEEE TCC"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1538"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the ITU Kaleidoscope Conference (ITU K\u201917)","author":"Jayasinghe U.","unstructured":"U. Jayasinghe , A. Otebolaku , T.-W. Um , and G. M. Lee . 2017. Data centric trust evaluation and prediction framework for IoT . In Proceedings of the ITU Kaleidoscope Conference (ITU K\u201917) . U. Jayasinghe, A. Otebolaku, T.-W. Um, and G. M. Lee. 2017. Data centric trust evaluation and prediction framework for IoT. In Proceedings of the ITU Kaleidoscope Conference (ITU K\u201917)."},{"key":"e_1_2_1_12_1","unstructured":"S. Kariyappa and M. K. Qureshi. 2019. Improving adversarial robustness of ensembles with diversity training. In arXiv:1901.09981.  S. Kariyappa and M. K. Qureshi. 2019. Improving adversarial robustness of ensembles with diversity training. In arXiv:1901.09981."},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the International Conference on Sustainable Communication Networks and Application (ICSCN\u201917)","author":"Karthik N.","unstructured":"N. Karthik and V. S. Ananthanarayana . 2017. Data trust model for event detection in wireless sensor networks using data correlation techniques . In Proceedings of the International Conference on Sustainable Communication Networks and Application (ICSCN\u201917) . N. Karthik and V. S. Ananthanarayana. 2017. Data trust model for event detection in wireless sensor networks using data correlation techniques. In Proceedings of the International Conference on Sustainable Communication Networks and Application (ICSCN\u201917)."},{"key":"e_1_2_1_14_1","first-page":"2","article-title":"IoT-enabled machine learning for an algorithmic spectrum decision process","volume":"6","author":"Li L.","year":"2019","unstructured":"L. Li and A. Ghasemi . 2019 . IoT-enabled machine learning for an algorithmic spectrum decision process . IEEE IoT J. 6 , 2 (April 2019), 1911--1919. L. Li and A. Ghasemi. 2019. IoT-enabled machine learning for an algorithmic spectrum decision process. IEEE IoT J. 6, 2 (April 2019), 1911--1919.","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the International Conference on Web Services (ICWS\u201917)","author":"Liu B.","unstructured":"B. Liu , X. L. Yu , S. Chen , X. Xu , and L. Zhu . 2017. Blockchain based data integrity service framework for IoT data . In Proceedings of the International Conference on Web Services (ICWS\u201917) . B. Liu, X. L. Yu, S. Chen, X. Xu, and L. Zhu. 2017. Blockchain based data integrity service framework for IoT data. In Proceedings of the International Conference on Web Services (ICWS\u201917)."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.01.002"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the International Conference on Computing, Communication, and Networking Technologies (ICCCNT\u201919)","author":"Mohanta B. K.","unstructured":"B. K. Mohanta , S. S. Panda , U. Satapathy , D. Jena , and D. Gountia . 2019. Trustworthy management in decentralized IoT application using blockchain . In Proceedings of the International Conference on Computing, Communication, and Networking Technologies (ICCCNT\u201919) . B. K. Mohanta, S. S. Panda, U. Satapathy, D. Jena, and D. Gountia. 2019. Trustworthy management in decentralized IoT application using blockchain. In Proceedings of the International Conference on Computing, Communication, and Networking Technologies (ICCCNT\u201919)."},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the ACM SIGBED International Conference on Embedded Software (EMSOFT\u201917)","author":"\u00d6zy\u0131lmaz K. R.","unstructured":"K. R. \u00d6zy\u0131lmaz and A. Yurdakul . 2017. Work-in-progress: Integrating low-power IoT devices to a blockchain-based infrastructure . In Proceedings of the ACM SIGBED International Conference on Embedded Software (EMSOFT\u201917) . K. R. \u00d6zy\u0131lmaz and A. Yurdakul. 2017. Work-in-progress: Integrating low-power IoT devices to a blockchain-based infrastructure. In Proceedings of the ACM SIGBED International Conference on Embedded Software (EMSOFT\u201917)."},{"key":"e_1_2_1_19_1","first-page":"8421","article-title":"Trust evaluation for light weight security in sensor Enabled Internet of Things: Game theory oriented approach","volume":"6","author":"Rani R.","year":"2019","unstructured":"R. Rani , S. Kumar , and U. Dohare . 2019 . Trust evaluation for light weight security in sensor Enabled Internet of Things: Game theory oriented approach . IEEE IoT J. 6 (2019), 8421 -- 8432 . R. Rani, S. Kumar, and U. Dohare. 2019. Trust evaluation for light weight security in sensor Enabled Internet of Things: Game theory oriented approach. IEEE IoT J. 6 (2019), 8421--8432.","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551506070706"},{"key":"e_1_2_1_22_1","unstructured":"K. Salah E. Damiani A. Al-Fuqaha T. Martin K. Taha and M. K. Khan. 2018. Open execution\u2014The blockchain model. IEEE Blockchain Technical Briefs (December 2018).  K. Salah E. Damiani A. Al-Fuqaha T. Martin K. Taha and M. K. Khan. 2018. Open execution\u2014The blockchain model. IEEE Blockchain Technical Briefs (December 2018)."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the IEEE International Conference On Service-Oriented System Engineering (SOSE\u201916)","author":"Sato H.","unstructured":"H. Sato , A. Kanai , S. Tanimoto , and T. Kobayashi . 2016. Establishing trust in the emerging era of IoT . In Proceedings of the IEEE International Conference On Service-Oriented System Engineering (SOSE\u201916) . H. Sato, A. Kanai, S. Tanimoto, and T. Kobayashi. 2016. Establishing trust in the emerging era of IoT. In Proceedings of the IEEE International Conference On Service-Oriented System Engineering (SOSE\u201916)."},{"key":"e_1_2_1_24_1","article-title":"Current challenges and visions in music recommender systems research","volume":"7","author":"Schedl M.","year":"2018","unstructured":"M. Schedl , H. Zamani , C. Chen , Y. Deldjoo , and M. Elahi . 2018 . Current challenges and visions in music recommender systems research . Int. J. Multimedia Inf. Retriev. 7 , 2 (1 June 2018), 95--116. M. Schedl, H. Zamani, C. Chen, Y. Deldjoo, and M. Elahi. 2018. Current challenges and visions in music recommender systems research. Int. J. Multimedia Inf. Retriev. 7, 2 (1 June 2018), 95--116.","journal-title":"Int. J. Multimedia Inf. Retriev."},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the Annual Computer Security Applications Conference (ACSAC\u201916)","author":"Shen S.","unstructured":"S. Shen , S. Tople , and P. Saxena . 2016. Auror: Defending against poisoning attacks in collaborative deep learning systems . In Proceedings of the Annual Computer Security Applications Conference (ACSAC\u201916) . S. Shen, S. Tople, and P. Saxena. 2016. Auror: Defending against poisoning attacks in collaborative deep learning systems. In Proceedings of the Annual Computer Security Applications Conference (ACSAC\u201916)."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.34"},{"key":"#cr-split#-e_1_2_1_27_1.1","doi-asserted-by":"crossref","unstructured":"P. Shi H. Wang S. Yang C. Chen and W. Yang. 2019. Blockchain-based trusted data sharing among trusted stakeholders in IoT. Softw.: Pract. Exp. (August 2019) 1--14. https:\/\/doi.org\/10.1002\/spe.2739 10.1002\/spe.2739","DOI":"10.1002\/spe.2739"},{"key":"#cr-split#-e_1_2_1_27_1.2","doi-asserted-by":"crossref","unstructured":"P. Shi H. Wang S. Yang C. Chen and W. Yang. 2019. Blockchain-based trusted data sharing among trusted stakeholders in IoT. Softw.: Pract. Exp. (August 2019) 1--14. https:\/\/doi.org\/10.1002\/spe.2739","DOI":"10.1002\/spe.2739"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the International Conference on the Internet of Things (IoT\u201919)","author":"Sigwart M.","unstructured":"M. Sigwart , M. Borkowski , M. Peise , S. Schulte , and S. Tai . 2019. Blockchain-based data provenance for the internet of things . In Proceedings of the International Conference on the Internet of Things (IoT\u201919) . M. Sigwart, M. Borkowski, M. Peise, S. Schulte, and S. Tai. 2019. Blockchain-based data provenance for the internet of things. In Proceedings of the International Conference on the Internet of Things (IoT\u201919)."},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the International Conference on Information Networking (ICOIN\u201918)","author":"Suhail S.","unstructured":"S. Suhail , C. S. Hong , M. A. Lodhi , F. Zafar , A. Khan , and F. Bashir . 2018. Data trustworthiness in iot . In Proceedings of the International Conference on Information Networking (ICOIN\u201918) . S. Suhail, C. S. Hong, M. A. Lodhi, F. Zafar, A. Khan, and F. Bashir. 2018. Data trustworthiness in iot. In Proceedings of the International Conference on Information Networking (ICOIN\u201918)."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.10.033"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2417"},{"key":"e_1_2_1_32_1","first-page":"5","article-title":"A survey on security and privacy issues in Internet-of-Things","volume":"4","author":"Yang Y.","year":"2017","unstructured":"Y. Yang , L. Wu , G. Yin , L. Li , and H. Zhao . 2017 . A survey on security and privacy issues in Internet-of-Things . IEEE IoT J. 4 , 5 (October 2017), 1250--1258. Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao. 2017. A survey on security and privacy issues in Internet-of-Things. IEEE IoT J. 4, 5 (October 2017), 1250--1258.","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_33_1","first-page":"1495","article-title":"Blockchain-based decentralized trust management in vehicular networks","volume":"6","author":"Yang Z.","year":"2018","unstructured":"Z. Yang , K. Yang , L. Lei , K. Zheng , and V. C. M. Leung . 2018 . Blockchain-based decentralized trust management in vehicular networks . IEEE IoT J. 6 , 2 (2018), 1495 -- 1505 . Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. M. Leung. 2018. Blockchain-based decentralized trust management in vehicular networks. IEEE IoT J. 6, 2 (2018), 1495--1505.","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the International Conference on Information Reuse and Integration for Data Science (IRI\u201918)","author":"Yen I.","unstructured":"I. Yen , F. Bastani , N. Solanki , Y. Huang , and H. San-Yih . 2018. Trustworthy computing in the dynamic IoT cloud . In Proceedings of the International Conference on Information Reuse and Integration for Data Science (IRI\u201918) . I. Yen, F. Bastani, N. Solanki, Y. Huang, and H. San-Yih. 2018. Trustworthy computing in the dynamic IoT cloud. In Proceedings of the International Conference on Information Reuse and Integration for Data Science (IRI\u201918)."}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3418686","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3418686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:28Z","timestamp":1750197748000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3418686"}},"subtitle":["A Data Collection Methodology Based on Blockchain"],"short-title":[],"issued":{"date-parts":[[2020,12,30]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1,31]]}},"alternative-id":["10.1145\/3418686"],"URL":"https:\/\/doi.org\/10.1145\/3418686","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"value":"2378-962X","type":"print"},{"value":"2378-9638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,30]]},"assertion":[{"value":"2019-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-12-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}