2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI) 2016
DOI: 10.1109/iiki.2016.3
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(27 citation statements)
references
References 21 publications
0
27
0
Order By: Relevance
“…The problem of sharing an encrypted file across different devices was studied. According to previous researches (Chai et al, 2017;Li et al, 2017;Song et al, 2017;Niyat et al, 2017;ÜnalÇavuşoglu et al, 2017;Belazi et al, 2017) and to the best of our knowledge, few concerns were raised about the reliability of the chaotic system simulation. In our study, we have analyzed how chaosbased encryption is applied for information exchange, and developed a method to raise the chance of success of the decryption phase.…”
Section: Resultsmentioning
confidence: 93%
See 1 more Smart Citation
“…The problem of sharing an encrypted file across different devices was studied. According to previous researches (Chai et al, 2017;Li et al, 2017;Song et al, 2017;Niyat et al, 2017;ÜnalÇavuşoglu et al, 2017;Belazi et al, 2017) and to the best of our knowledge, few concerns were raised about the reliability of the chaotic system simulation. In our study, we have analyzed how chaosbased encryption is applied for information exchange, and developed a method to raise the chance of success of the decryption phase.…”
Section: Resultsmentioning
confidence: 93%
“…One way to encode files is to use a single pseudo-random sequence obtained from a chaotic map and there has been extensive research regarding more efficient methods. For example, Liu and Miao (2018) proposes a one-dimensional chaotic map encoding scheme that is more attack-tolerant and Hua et al (2015) uses a combination of sine and logistic maps to tackle the same problem and recently there have been many works regarding new cryptography schemes (Silva et al, 2017;Chai et al, 2017;Li et al, 2017;Song et al, 2017;Niyat et al, 2017;ÜnalÇavuşoglu et al, 2017;Belazi et al, 2017).…”
Section: Introductionmentioning
confidence: 99%
“…Shi et al [50] introduced an ultra-lightweight white-box encryption scheme, which requires a relatively small amount of static data, for securing resource-constrained IoT devices. Song et al [19] presented a D2S secure communication protocol for SHS environment based on symmetric key scheme, in which the key is updated using a one-way hash function to maintain the freshness. In the next year, they improved their method using chaotic system in [1].…”
Section: Secure Communicationmentioning
confidence: 99%
“…These approaches are either vulnerable to the device capture attack or only feasible to small networks due to the high complexity of these distributed algorithms. Some other symmetric key-based works for IoT environment like [1], [19] can just be applied in simple IoT environment such as smart homes where only authorized entities have access to it. In contrast, most types of IoT systems such as ICVs work in outdoor environment can be easily approached by attackers.…”
Section: Introductionmentioning
confidence: 99%
“…ey used a flexible privacy personalization framework to support location anonymity for a wide range of mobile clients with context-sensitive privacy requirements. Tianyi Song et al found that smart home inevitably causes security and privacy problems [12]. ey propose an improved stability and privacy protection communication protocol for smart home systems.…”
Section: Iot Security Issuesmentioning
confidence: 99%