2017
DOI: 10.1007/978-3-319-56877-5_7
|View full text |Cite
|
Sign up to set email alerts
|

On the Road to Secure and Privacy-Preserving IoT Ecosystems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
8
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 2 publications
1
8
0
Order By: Relevance
“…OECD reported [19] that privacy incidents are growing in both number and sophistication. Similar concerns are expressed by several academic articles which suggest lack of privacy including unauthorized surveillance or eavesdropping [20] as a major concern for individuals.…”
Section: Review Of Privacy Literature With Specific Iot Focussupporting
confidence: 53%
See 1 more Smart Citation
“…OECD reported [19] that privacy incidents are growing in both number and sophistication. Similar concerns are expressed by several academic articles which suggest lack of privacy including unauthorized surveillance or eavesdropping [20] as a major concern for individuals.…”
Section: Review Of Privacy Literature With Specific Iot Focussupporting
confidence: 53%
“…The lifecycle of an IoT service or product is shown in Figure 2. • Products which provide audit mechanism while dealing with PII [20] • Products which notify user to provide dynamic consent for data use [37] • Products which stop working properly when consent is not given by user [38] • Firmware upgrade and patchability of IoT devices [24] are available.…”
Section: Consumer-centric Approachmentioning
confidence: 99%
“…Besides the evident benefits that can be achieved by such IoT ecosystems, dealing with security and privacy in the IoT is more challenging and more complex than it is in conventional networks, mainly by 4 reasons: 1) a very dynamic set of services and applications intensively handling data types with also very dynamic formats; 2) a multitude of usage scenarios, 1 http://big-iot.eu Figure 1. The BIG IoT approach for building an ecosystem of IoT platforms (source: [2]). 2 stakeholder settings for data provisioning and usage; 3) the high speed of information propagation and tool development in an IoT ecosystem; and 4) the lack of a simple security methodology that does not rely on long lists of factors that are complex to apply.…”
Section: Introductionmentioning
confidence: 99%
“…The BIG IoT approach for building an ecosystem of IoT platforms (source: [2]). 2 stakeholder settings for data provisioning and usage; 3) the high speed of information propagation and tool development in an IoT ecosystem; and 4) the lack of a simple security methodology that does not rely on long lists of factors that are complex to apply.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation