Evidence and Trust: IoT Collaborative Security
Mechanism
Bin Wen and Ziqiang Luo
School of Information Science and Technology,
Hainan Normal University,
Haikou, China
Email: binwenwebb@gmail.com
Yazhi Wen
School of Computer Science and Technology,
Huazhong University of Science and Technology,
Wuhan, China
Email: wyzhust@163.com
Abstract—The evidence has three properties including rele-
vance, authenticity and legitimacy. For evidence, once implement-
ed, it must not be tampered with and can always be traced back.
For trust, the content can be forensics, so the relationship between
each other is trustworthy and exchangeable value. Blockchain is
a tamper-proof and unforgeable decentralized shared ledger that
chunks data blocks chronologically into specific data structures
and is cryptographically guaranteed. In this paper, we use the key
technologies of blockchain to investigate and achieve collaborative
security for IoT devices. This approach uses distributed crowd-
sourcing to make tampering of critical data evidence (security) .
Combination of theoretical research and empirical validation, the
paper tries to provide a technical operational and cost-effective
solution for collaborative security with blockchain services and
promoting the key data stability and self-healing ability.
Keywords—Internet of Things; evidence; blockchain services;
collaborative security
I. INTRODUCTION
Internet is moving from content delivery to the era of
trust value. On the basis of mutual trust, both parties can
exchange value[1], [2]. Bitcoin birth in 2009 is a landmark
event[3], [1]. As a technology that builds trust and exchange
of value, blockchain came into being. Blockchain allows every
movement of the digital currency to be clearly identified and
linked, while also protecting the privacy of the participants.
The core advantage of the commercial blockchain is that
the distributed ledger constructed by the blockchain using
cryptography has formed a complete and uninterrupted trust
bond between the parties in the collaboration, greatly reducing
business friction and improving business process efficiency.
The distributed system can learn from the decentralized ledger
database technology in the blockchain to improve the core data
resource security [2], [4].
Therefore, starting from the discussion of the logic for
evidence and trust, we are committed to the integrity and
illegal tampering of the key data (evidence) of distributed
systems in order to achieve system security.
This paper aims at study the collaborative security for
distributed IoT with blockchain style. We will mainly focus on
collaborative data protection and self-healing mechanism. The
rest of the article is organized as follows. Section II includes
the related technologies for Internet trust infrastructure. Sec-
tion III introduces the application scenario - distributed IoT
system. Section IV presents collaborative security mechanism
to deal with data protection and self-healing. Conclusions with
main contributions of proposed approach are also touched
upon in section V.
II. B
UILD AN INTERNET TRUST INFRASTRUCTURE
A. Evidence and Trust
Evidence refers to the basis for ascertaining the facts of
a case in accordance with the rules of procedure. Foren-
sics means obtaining evidence. According to Wikipedia’s
definition, Forensic science is the application of science to
criminal and civil laws, mainly-on the criminal side-during
criminal investigation, as governed by the legal standards of
admissible evidence and criminal procedure
1
. There is a job
called Computer Intrusion Forensics Expert.
In social science, trust is considered a dependency. In
psychology, trust is a stable belief that maintains the social
shared value and stability. It is the overall expectation that the
individual can trust others’ words, promises and declarations.
Formally, Authenticity = Completeness = ”Untampered” is
the formal requirement of a data message as evidence. The
evidence has three properties including relevance, authenticity
and legitimacy. Electronic data (data messages) is not just
textual information.
How to employ sophisticated algorithm design and cryptog-
raphy to build trust?
• Evidence:
Once implemented, it must not be tampered with and can
always be traced back. Once the data is generated, it must
not be tampered with and can always be traced back.
• Trust:
Because the content can be forensics, the relationship
between each other is trustworthy and exchangeable
value.
We can precisely control the transparency and privacy
through algorithms. Artificial Intelligence now has three main
representative genres.
1) The first direction of artificial intelligence is to use a
logical approach, usually we call it a school of logic, or
symbolism school.
1
https://en.wikipedia.org/wiki/Forensic science
8th International Conference on Information Science and Technology
June 30-Jul
6, 2018; Granada, Cordoba, and Seville, Spain
978-1-5386-3782-1/18/$31.00 ©2018 IEEE 98