Return to Article Details Data Provenance for Secure Internet of Things