2018
DOI: 10.1016/j.comnet.2018.07.019
|View full text |Cite
|
Sign up to set email alerts
|

Decentralizing privacy enforcement for Internet of Things smart objects

Abstract: Internet of Things (IoT) is now evolving into a loosely coupled, decentralized system of cooperating smart objects, where highspeed data processing, analytics and shorter response times are becoming more necessary than ever. Such decentralization has a great impact on the way personal information generated and consumed by smart objects should be protected, because, without centralized data management, it is more difficult to control how data are combined and used by smart objects. To cope with this issue, in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 26 publications
(26 citation statements)
references
References 34 publications
0
26
0
Order By: Relevance
“…In this regard, studies on the use of IPSec/IPv6 and OpenSSL in virtual private networks have been performed to protect smart objects and provide end-to-end security [92]. e same is true for studies on end-to-end security framework development of the Constrained Application Protocol (CoAP) [93][94][95] and on frameworks in which smart-object users designate privacy preferences to protect personal information generated and consumed by smart objects [96]. Smart objects that have recently attracted attention are vehicles that are equipped with various sensor devices, actuators, GPS (global positioning system) receivers, and micro-embedded computers to collect, process, and transmit vast amounts of data [97,98].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…In this regard, studies on the use of IPSec/IPv6 and OpenSSL in virtual private networks have been performed to protect smart objects and provide end-to-end security [92]. e same is true for studies on end-to-end security framework development of the Constrained Application Protocol (CoAP) [93][94][95] and on frameworks in which smart-object users designate privacy preferences to protect personal information generated and consumed by smart objects [96]. Smart objects that have recently attracted attention are vehicles that are equipped with various sensor devices, actuators, GPS (global positioning system) receivers, and micro-embedded computers to collect, process, and transmit vast amounts of data [97,98].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…e first subtopic is related to personal information security [280][281][282][283]. e second subtopic is related to the data value chain, including information related to the owner's perception of privacy protection and the right to make decisions about personal information protection [96,[284][285][286][287].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…When it comes to IoT, blockchain can be used to store critical machine-to-machine communications, sent as blockchain transactions, ensuring accountability and security of 1 Block structure varies in different blockchain protocols, here we list the most common elements. 2 ethereum.org the stored data. It can also provide identity and proof of provenance of IoT devices with its cryptographic functions.…”
Section: Introductionmentioning
confidence: 99%
“…IoT technology has been growing chaotically on many environments, such as homes and factories [1], connecting exceptionally large number of devices, expected to increase up to 130 billion devices in 2030. 3 Yet, this increasing popularity has made IoT devices a powerful amplifying platform for cyberattacks [2]. In fact, IoT devices are often simple products that due to the limits of available constrained-resources do not take security as primary goal.…”
Section: Introductionmentioning
confidence: 99%
“…As proof of this, a recent study from HP found that more than 70% of IoT devices do not have passwords with sufficient complexity and use unencrypted network services, resulting in being easy targets for attackers. 4 In such a vulnerable environment, attackers can easily gain access to insecure IoT devices, and inject malicious softwares, malware, to control them or to steal confidential information [3]. Today, one of the most relevant threat posed by malware in IoT is represented by malicious botnets.…”
Section: Introductionmentioning
confidence: 99%