2018
DOI: 10.1109/access.2018.2820716
|View full text |Cite
|
Sign up to set email alerts
|

A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…Methods such as PUF [62], accelerometer data [63], and visible light (referred as Li-Fi) [64] are explored for improving authentication of Wi-Fi networks. Moreover, novel methods are introduced for securing LPWAN [52], NB-IoT [65], RFID [66], and BLE [67] authentication phases. These technologies are used for D2D or ad-hoc type authentication, which are common for IoT deployments.…”
Section: ) Possible Authentication Violationsmentioning
confidence: 99%
“…Methods such as PUF [62], accelerometer data [63], and visible light (referred as Li-Fi) [64] are explored for improving authentication of Wi-Fi networks. Moreover, novel methods are introduced for securing LPWAN [52], NB-IoT [65], RFID [66], and BLE [67] authentication phases. These technologies are used for D2D or ad-hoc type authentication, which are common for IoT deployments.…”
Section: ) Possible Authentication Violationsmentioning
confidence: 99%
“…Therefore, no sensitive data is accessed without their consent. Meanwhile, in [59], Cha considered a Blockchain framework where users set their privacy preferences for the IoT devices they interact with. Doing so ensures that no sensitive data is accessed without users' consent.…”
Section: B Overview Of Related Literaturementioning
confidence: 99%
“…Decoupling Consent from the individual data paths is also used in the case of Internet-of-Things (IoT). This is perhaps the only possible approach: IoT applications can be extremely challenging for Consent because devices may not even have a screen or buttons, and Users cannot always use an accessory device such as a mobile phone [32]. Particularly when there are multiple devices which collaboratively define the service, an overarching consent needs to be given by aggregating and consolidating different data sources and devices.…”
Section: Related Workmentioning
confidence: 99%