6 research outputs found

    Privacy of the Internet of Things: A Systematic Literature Review

    Get PDF
    The Internet of Things’ potential for major privacy invasion is a concern. This paper reports on a systematic literature review of privacy-preserving solutions appearing in the research literature and in the media. We analysed proposed solutions in terms of the techniques they deployed and the extent to which they satisfied core privacy principles. We found that very few solutions satisfied all core privacy principles. We also identified a number of key knowledge gaps in the course of the analysis. In particular, we found that most solution providers assumed that end users would be willing to expend effort to preserve their privacy; that they would be motivated to take action to ensure that their privacy was respected. The validity of this assumption needs to be proved, since it cannot simply be assumed that people would necessarily be willing to engage with privacy-preserving solutions. We suggest this as a topic for future research

    A Study on Sanctuary and Seclusion Issues in Internet-of-Things

    Get PDF
    Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in hospitals, deployed outside to control and report the changes in environment, prevent fires, and many more beneficial functionality. However, all those benefits can come of huge risks of seclusion loss and sanctuary issues. To secure the IoT devices, many research works have been con-ducted to countermeasure those problems and find a better way to eliminate those risks, or at least minimize their effects on the user�s seclusion and sanctuary requirements. The study consists of four segments. The first segment will explore the most relevant limitations of IoT devices and their solutions. The second one will present the classification of IoT attacks. The next segment will focus on the mechanisms and architectures for authentication and access control. The last segment will analyze the sanctuary issues in different layers

    TAW: cost-effective threshold authentication with weights for internet of things

    Get PDF
    In the Internet of Things, based on the collaboration of sensing nodes, sensing data are collected and transmitted. The collaboration of sensing nodes also plays an important role in the safeguard of the Internet of Things. Owing to the limited ability of the single sensing node, the threshold authentication based on the collaboration of sensing nodes can improve the trust of security authentication of sensing nodes. The current threshold authentication schemes may require high-computational complexity, and more importantly, most of them are instantiated by membership authentication. It’s challenging to apply the current state of the arts to the case where sensing nodes with various weights join together to fulfill a relatively lightweight authentication. In this paper, we first design a communication key distribution scheme for sensing networks based on a symmetric operator. Using the permutation function, the scheme is able to generate characteristic sequences to improve the efficiency of key distribution in sensing networks. In addition, we propose a threshold authentication scheme based on weights, in which the higher weight represents the more important role in authentication. Our authentication scheme only requires lightweight operations, so that, it is extremely friendly to the IoT nodes with restricted computation power. The security analysis and the case verification demonstrate that our novel authentication protects IoT nodes without yielding significantly computational burden to the nodes

    A Survey on Smartphone-Based Crowdsensing Solutions

    Get PDF
    © 2016 Willian Zamora et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.[EN] In recent years, the widespread adoption of mobile phones, combined with the ever-increasing number of sensors that smartphones are equipped with, greatly simplified the generalized adoption of crowdsensing solutions by reducing hardware requirements and costs to a minimum. These factors have led to an outstanding growth of crowdsensing proposals from both academia and industry. In this paper, we provide a survey of smartphone-based crowdsensing solutions that have emerged in the past few years, focusing on 64 works published in top-ranked journals and conferences. To properly analyze these previous works, we first define a reference framework based on how we classify the different proposals under study. The results of our survey evidence that there is still much heterogeneity in terms of technologies adopted and deployment approaches, although modular designs at both client and server elements seem to be dominant. Also, the preferred client platform is Android, while server platforms are typically web-based, and client-server communications mostly rely on XML or JSON over HTTP. The main detected pitfall concerns the performance evaluation of the different proposals, which typically fail to make a scalability analysis despite being critical issue when targeting very large communities of users.This work was partially supported by the Ministerio de Economia y Competitividad, Programa Estatal de Investigacion, Desarrollo e Innovacion Orientada a los Retos de la Sociedad, Proyectos I+D+I 2014, Spain, under Grant TEC2014-52690-R, the "Universidad Laica Eloy Alfaro de Manabi-ULEAM," and the "Programa de Becas SENESCYT de la Republica del Ecuador."Zamora-Mero, WJ.; Tavares De Araujo Cesariny Calafate, CM.; Cano Escribá, JC.; Manzoni, P. (2016). A Survey on Smartphone-Based Crowdsensing Solutions. Mobile Information Systems. 2016:1-26. https://doi.org/10.1155/2016/9681842S126201

    Optimising data diffusion while reducing local resources consumption in Opportunistic Mobile Crowdsensing

    Full text link
    [EN] The combination of Mobile Crowdsensing (MCS) with Opportunistic Networking (Opp-Net) allows mobile users to share sensed data easily and conveniently without the use of fixed infrastructure. OppNet is based on intermittent connectivity among wireless mobile devices, in which mobile nodes may store, carry and forward messages (sensing information) by taking advantage of wireless ad hoc communication opportunities. A common approach for the diffusion of this sensing data in OppNet is the epidemic protocol, which carries out a fast data diffusion at the expense of increasing the usage of local buffers on mobile nodes and also the number of transmissions, thereby limiting scalability. A way to reduce this consumption of local resources is to set a message expiration time that forces the removal of old messages from local buffers. Since dropping messages too early may reduce the speed of information diffusion, we propose a dynamic expiration time setting to limit this effect. Moreover, we introduce an epidemic diffusion model for evaluating the impact of the expiration time. This model allows us to obtain optimal expiration times that achieve performances similar to those other approaches where no expiration is considered, with a significant reduction of local buffer and network usage. Furthermore, in our proposed model, the buffer utilisation remains steady with the number of nodes, whereas in other approaches it increases sharply. Finally, our approach is evaluated and validated in a mobile crowdsensing scenario, where students collect and broadcast information regarding a university campus, showing a significant reduction on buffer usage and nodes message transmissions, and therefore, decreasing battery consumption.This work was partially supported by the Ministerio de Ciencia, Innovación y Universidades, Spain, under Grant RTI2018- 096384-B-I00. Also, this work has been partially performed in the framework of the European Union¿s Horizon 2020 project 5G-CARMEN co-funded by the EU under grant agreement No. 825012. The views expressed are those of the authors and do not necessarily represent the project. The Commission is not liable for any use that may be made of any of the information contained therein.Hernández-Orallo, E.; Borrego, C.; Manzoni, P.; Marquez Barja, JM.; Cano, J.; Tavares De Araujo Cesariny Calafate, CM. (2020). Optimising data diffusion while reducing local resources consumption in Opportunistic Mobile Crowdsensing. Pervasive and Mobile Computing. 67:1-18. https://doi.org/10.1016/j.pmcj.2020.101201S11867Capponi, A., Fiandrino, C., Kantarci, B., Foschini, L., Kliazovich, D., & Bouvry, P. (2019). A Survey on Mobile Crowdsensing Systems: Challenges, Solutions, and Opportunities. IEEE Communications Surveys & Tutorials, 21(3), 2419-2465. doi:10.1109/comst.2019.2914030Trifunovic, S., Kouyoumdjieva, S. T., Distl, B., Pajevic, L., Karlsson, G., & Plattner, B. (2017). A Decade of Research in Opportunistic Networks: Challenges, Relevance, and Future Directions. IEEE Communications Magazine, 55(1), 168-173. doi:10.1109/mcom.2017.1500527cmDede, J., Forster, A., Hernandez-Orallo, E., Herrera-Tapia, J., Kuladinithi, K., Kuppusamy, V., … Vatandas, Z. (2018). Simulating Opportunistic Networks: Survey and Future Directions. IEEE Communications Surveys & Tutorials, 20(2), 1547-1573. doi:10.1109/comst.2017.2782182Udugama, A., Dede, J., Förster, A., Kuppusamy, V., Kuladinithi, K., Timm-Giel, A., & Vatandas, Z. (2019). My Smartphone tattles: Considering Popularity of Messages in Opportunistic Data Dissemination. Future Internet, 11(2), 29. doi:10.3390/fi11020029Groenevelt, R., Nain, P., & Koole, G. (2005). The message delay in mobile ad hoc networks. Performance Evaluation, 62(1-4), 210-228. doi:10.1016/j.peva.2005.07.018Lindgren, A., Doria, A., & Schelén, O. (2003). Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), 19-20. doi:10.1145/961268.961272Borrego, C., Borrell, J., & Robles, S. (2019). Efficient broadcast in opportunistic networks using optimal stopping theory. Ad Hoc Networks, 88, 5-17. doi:10.1016/j.adhoc.2019.01.001Hernández-Orallo, E., Murillo-Arcila, M., Calafate, C. T., Cano, J. C., Conejero, J. A., & Manzoni, P. (2016). Analytical evaluation of the performance of contact-Based messaging applications. Computer Networks, 111, 45-54. doi:10.1016/j.comnet.2016.07.006Haas, Z. J., & Small, T. (2006). A new networking model for biological applications of ad hoc sensor networks. IEEE/ACM Transactions on Networking, 14(1), 27-40. doi:10.1109/tnet.2005.863461Zhang, X., Neglia, G., Kurose, J., & Towsley, D. (2007). Performance modeling of epidemic routing. Computer Networks, 51(10), 2867-2891. doi:10.1016/j.comnet.2006.11.028Tsai, T.-C., & Chan, H.-H. (2015). NCCU Trace: social-network-aware mobility trace. IEEE Communications Magazine, 53(10), 144-149. doi:10.1109/mcom.2015.7295476Yao, Y., Yang, L. T., & Xiong, N. N. (2015). Anonymity-Based Privacy-Preserving Data Reporting for Participatory Sensing. IEEE Internet of Things Journal, 2(5), 381-390. doi:10.1109/jiot.2015.2410425Wu, X., Brown, K. N., & Sreenan, C. J. (2013). Analysis of smartphone user mobility traces for opportunistic data collection in wireless sensor networks. Pervasive and Mobile Computing, 9(6), 881-891. doi:10.1016/j.pmcj.2013.07.003Amah, T., Kamat, M., Bakar, K., Rahman, S., Mohammed, M., Abali, A., … Oliveira, A. (2017). Collecting Sensed Data with Opportunistic Networks: The Case of Contact Information Overhead. Information, 8(3), 108. doi:10.3390/info8030108Pajevic, L., Fodor, V., & Karlsson, G. (Eds.). (2018). Ensuring Persistent Content in Opportunistic Networks via Stochastic Stability Analysis. ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 3(4), 1-23. doi:10.1145/3232161Hernandez-Orallo, E., Olmos, M. D. S., Cano, J.-C., Calafate, C. T., & Manzoni, P. (2015). CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes. IEEE Transactions on Mobile Computing, 14(6), 1162-1175. doi:10.1109/tmc.2014.2343627Karaliopoulos, M. (2009). Assessing the vulnerability of DTN data relaying schemes to node selfishness. IEEE Communications Letters, 13(12), 923-925. doi:10.1109/lcomm.2009.12.091520Whitbeck, J., Conan, V., & de Amorim, M. D. (2011). Performance of Opportunistic Epidemic Routing on Edge-Markovian Dynamic Graphs. IEEE Transactions on Communications, 59(5), 1259-1263. doi:10.1109/tcomm.2011.020811.090163Moutinho de Souza Dias, G., Ferreira de Rezende, J., & Moreira Salles, R. (2019). Mathematical modeling of delivery delay for multi-copy opportunistic networks with heterogeneous pairwise encounter rates. Information Sciences, 475, 142-160. doi:10.1016/j.ins.2018.09.056Herrera-Tapia, J., Hernández-Orallo, E., Tomás, A., Manzoni, P., Tavares Calafate, C., & Cano, J.-C. (2016). Friendly-Sharing: Improving the Performance of City Sensoring through Contact-Based Messaging Applications. Sensors, 16(9), 1523. doi:10.3390/s16091523Hernandez-Orallo, E., Herrera-Tapia, J., Cano, J.-C., Calafate, C. T., & Manzoni, P. (2015). Evaluating the Impact of Data Transfer Time in Contact-Based Messaging Applications. IEEE Communications Letters, 19(10), 1814-1817. doi:10.1109/lcomm.2015.2472407Grossglauser, M., & Tse, D. N. C. (2002). Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Transactions on Networking, 10(4), 477-486. doi:10.1109/tnet.2002.801403Borrego, C., Hernández-Orallo, E., & Magaia, N. (2019). General and mixed linear regressions to estimate inter-contact times and contact duration in opportunistic networks. Ad Hoc Networks, 93, 101927. doi:10.1016/j.adhoc.2019.101927A. Keränen, J. Ott, T. Kärkkäinen, The ONE simulator for DTN protocol evaluation, in: Proceedings of SIMUTools’09, 2009, pp. 55:1–55:10.E. Hernández-Orallo, D. Fernández-Delegido, J. Herrera-Tapia, J. Cano, C. Calafate, P. Manzoni, GRChat: A contact-based messaging application for the evaluation of information diffusion, in: Proceedings of the 6th International Conference on Advanced Communications and Computation, INFOCOMP, 2016
    corecore