Privacy in Internet of Things: From Principles to Technologies

@article{Li2019PrivacyII,
  title={Privacy in Internet of Things: From Principles to Technologies},
  author={C. Li and Balaji Palanisamy},
  journal={IEEE Internet of Things Journal},
  year={2019},
  volume={6},
  pages={488-505}
}
Ubiquitous deployment of low-cost smart devices and widespread use of high-speed wireless networks have led to the rapid development of the Internet of Things (IoT). IoT embraces countless physical objects that have not been involved in the traditional Internet and enables their interaction and cooperation to provide a wide range of IoT applications. Many services in the IoT may require a comprehensive understanding and analysis of data collected through a large number of physical devices that… 

Figures and Tables from this paper

A Privacy-Enhancing Framework for Internet of Things Services

TLDR
This study categorizes various existing privacy-enhancing technologies (PETs) and assessment of their suitability for privacy-requiring services within IoT and proposes a simple novel privacy-preserving framework based on a set of suitable privacy- enhancing technologies in order to maintain security and privacy within IoT services.

An Examination of Security and Privacy Challenges in Internet of Things

TLDR
This research paper has been based on all the facts related to IoT security issues and its desirable solution which is needed to be done and should follow the security triangle to an extent.

Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns

TLDR
The findings of the review show that the initial IoT architectures did not provide a comprehensive meaning for IoT that describe its nature, whereas the recent IoT architectures convey a comprehensive mean of IoT, starting from data collection, followed by data transmission and processing, and ending with data dissemination.

The Internet of Things: Architecture, Security Threats, and Risk Mitigation Techniques

TLDR
This paper presents a few of security risks and mitigations, as well as best practices to implement by administrators of IoT networks.

On the Design of a Privacy-Centered Data Lifecycle for Smart Living Spaces

TLDR
This paper captures the generic function of an IoT system to model privacy so that threats affecting such contexts can be identified and categorized at system design stage and integrates an extension to so called Data Flow Diagrams in the model, which provides the means to handle the privacy-specific threats in IoT systems.

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

TLDR
An up-to-date privacy method mapping and relevant use cases are surveyed for II services, focusing on post-quantum cryptography techniques that may (or must when quantum computers become a reality) be used in the future through concrete products, pilots, and projects.

Novel authentication framework for securing communication in internet-of-things

TLDR
The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats and shows better security strength with faster response time and energy saving of the IoT nodes.

A Review of Network Evolution Towards a Smart Connected World

TLDR
This paper proposes a comprehensive literature review that focuses on various network components that create connectivity among different devices, specifically Wireless Sensor Networks, RFID tags, Internet of Things (IoT) devices, and how these devices helped usher in the 4th Industrial Revolution, or Industry 4.0.

Blockchain With the Internet of Things

TLDR
This chapter presents the advantages of blockchain technology to secure the operation of the modern manufacturing industry in a trustless environment with IoT applications and how integration with blockchain can resolve some of the manufacturing enterprise information systems (EIS).

References

SHOWING 1-10 OF 186 REFERENCES

A comprehensive approach to privacy in the cloud-based Internet of Things

Internet of things: Survey on security

TLDR
This work focuses on IoT intrinsic vulnerabilities and their implications to the fundamental information security challenges in confidentiality, integrity, and availability.

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things - New security and privacy challenges

  • R. Weber
  • Computer Science
    Comput. Law Secur. Rev.
  • 2010

On the Feasibility of Attribute-Based Encryption on Internet of Things Devices

TLDR
A thorough evaluation confirms that adopting attribute-based encryption in the IoT is indeed feasible, considering well-known IoT platforms--specifically, Intel Galileo Gen 2, Intel Edison, Raspberry Pi 1 Model B, and Raspberry Pi Zero.

IoT Middleware: A Survey on Issues and Enabling Technologies

TLDR
A thorough analysis of the challenges and the enabling technologies in developing an IoT middleware that embraces the heterogeneity of IoT devices and also supports the essential ingredients of composition, adaptability, and security aspects of an IoT system is conducted.

A security survey of middleware for the Internet of Things

TLDR
The purpose of this paper is to review the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a particular focus on how these aspects are handled in IoT middleware.

Middleware for Internet of Things: A Survey

TLDR
This paper outlines a set of requirements for IoT middleware, and presents a comprehensive review of the existing middleware solutions against those requirements, and open research issues, challenges, and future research directions are highlighted.

Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms

TLDR
This paper proposes a set of guidelines, a privacy by-design framework, that can be used to assess privacy capabilities and gaps of existing IoT applications as well as middleware platforms.

Security and privacy grand challenges for the Internet of Things

TLDR
Various kinds of vulnerabilities that can be expected to arise are discussed, and a research agenda for mitigating the worst of the impacts is presented.
...