Privacy Preserving Techniques in the Internet of Things

Article Preview

Abstract:

The Internet of Things is a novel paradigm in the scenario of modern wireless telecommunications. It has high impact on several aspects of everyday-life and behavior of potential users. However, it raises serious concerns over individual privacy in the new environment of smart things. In this paper, we provide for an overview on privacy preserving techniques in the Internet of Things and discuss the present problems and directions for future research.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2466-2469

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] L. Atzori, A. Iera and G. Morabito: The Internet of Things: A survey. Computer Networks, 54(15), 2010, 2787-2805.

DOI: 10.1016/j.comnet.2010.05.010

Google Scholar

[2] R.H. Weber: Internet of Things: New security and privacy challenges. Computer Law and Security Report, 26(1), 2010, 23-30.

DOI: 10.1016/j.clsr.2009.11.008

Google Scholar

[3] S. Babar, P. Mahalle and A. Stango: Proposed security model and threat taxonomy for the Internet of Things. Communications in Computer and Information Science, 89(2), 2010, 420-429.

DOI: 10.1007/978-3-642-14478-3_42

Google Scholar

[4] S. Elahia: Privacy and consent in the digital era. Information Security Technical Report, 14(3), 2009, 113-118.

DOI: 10.1016/j.istr.2009.10.004

Google Scholar

[5] V. Oleshchuk: Internet of Things and privacy preserving technologies. In Proceedings of the 1st International Conference on Wireless Communication, 2009, 336-340.

DOI: 10.1109/wirelessvitae.2009.5172470

Google Scholar

[6] I. Gudymenko, K. Borcea-Pfitzmann and K. Tietze: Privacy implications of the internet of things. Communications in Computer and Information Science, 277, 280-286, (2012).

DOI: 10.1007/978-3-642-31479-7_48

Google Scholar

[7] M. Elkhodr, S. Shahrestani and H. Cheung: A review of mobile location privacy in the Internet of Things. In Proceedings of the International Conference on ICT and Knowledge Engineering, 2012, 266-272.

DOI: 10.1109/ictke.2012.6408566

Google Scholar

[8] J. Schrammel, C. Hochleitner and M. Tscheligi: Privacy, trust and interaction in the Internet of Thing. LNCS 7040, 2011, 378-379.

Google Scholar

[9] N.H. Li, N. Zhang, S.K. Das, B. Thuraisingham: Privacy preservation in wireless sensor networks: A state-of-the-art survey.Ad hoc Networks, 7( 8), 2009, 1501-1514.

DOI: 10.1016/j.adhoc.2009.04.009

Google Scholar

[10] L. Sweeney: K-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 10(5) , 2002, 557-570.

DOI: 10.1142/s0218488502001648

Google Scholar

[11] A.C. Yao: How to Generate and Exchange Secrets. In Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, 1986, 162-167.

DOI: 10.1109/sfcs.1986.25

Google Scholar

[12] C.Y. Chow, M.F. Mokbel and W.G. Aref: Casper*: Query processing for location services without compromising privacy.ACM Transactions on Database Systems, 34(4) , 2009, 1-24.

DOI: 10.1145/1620585.1620591

Google Scholar

[13] P.H. Wang: Survey on privacy preserving data mining. International Journal of Digital Content Technology and its Applications, 4(9), 2010, 1-7.

Google Scholar