210,460 research outputs found

    A Middleware for the Internet of Things

    Full text link
    The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as things to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things, or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.Comment: 20 pages, International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 201

    Companies Positioned in the Middle:Municipal Wireless and Its Impact on Privacy and Free Speech

    Get PDF
    When a city institutes a municipal wireless system, it is building a new communications infrastructure on behalf of its residents. Like our rights to privacy in our public telephone communications, individuals have the right to a municipal wireless network that respects privacy and free speech, allowing users to explore all that the Internet offers without worrying where information about their online activities will end up or how it will be used or abused. Cities have a duty to protect the privacy and free speech rights of their residents, and safeguards for these rights must be priorities, not afterthoughts

    Fog computing, applications , security and challenges, review

    Get PDF
    The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented

    Asymptotic Loss in Privacy due to Dependency in Gaussian Traces

    Full text link
    The rapid growth of the Internet of Things (IoT) necessitates employing privacy-preserving techniques to protect users' sensitive information. Even when user traces are anonymized, statistical matching can be employed to infer sensitive information. In our previous work, we have established the privacy requirements for the case that the user traces are instantiations of discrete random variables and the adversary knows only the structure of the dependency graph, i.e., whether each pair of users is connected. In this paper, we consider the case where data traces are instantiations of Gaussian random variables and the adversary knows not only the structure of the graph but also the pairwise correlation coefficients. We establish the requirements on anonymization to thwart such statistical matching, which demonstrate the significant degree to which knowledge of the pairwise correlation coefficients further significantly aids the adversary in breaking user anonymity.Comment: IEEE Wireless Communications and Networking Conferenc

    EXPLORING USER PRIVACY BASED ON HUMAN BEHAVIOR WITH INTERNET OF THINGS DEVICES AT HOME (FORMATIVE RESEARCH)

    Get PDF
    The proposed research initiative is aimed at investigating potential security and privacy vulnerabilities in home based Internet of Things (IoT) smart devices, such as Amazon Echo, Google Home, and smart home appliances, by analyzing the type, nature, and frequency of its encrypted, network communications. Such communications may reveal private information about the activities occurring within a home, as well as behaviors, relationships, and habits. Regardless of the quality of encryption used for network communications, digital messages expose certain information in much the same way as a sealed envelope sent via the postal service. The results of this formative research initiative will encourage better design of future home based IoT smart devices for security and privacy, as well as educate consumers on risks

    Internet anonymity with mobility - key challenges for the future.

    Get PDF
    Privacy, including the privacy of correspondence (communications), is a human right. Privacy Enhancing Technologies (PETs) provide a number of tools with the aim to protect this right. Anonymity networks, such as Tor, contribute to privacy by providing a degree of anonymity for an individual's Internet traffic. An increase in mobile devices connecting to the Internet is predicted to surpass static connections by 2014. The desire for privacy will provide additional challenges in the future, for anonymity networks, in supporting an increasing mobile client base. An experiment was set up, to simulate a mobile device accessing the Tor network while roaming across different wireless networks. The preliminary results show that the impact on performance for the mobile client (and potentially the overall Tor network) is significant, due to the frequency of hand-offs and subsequent break in the secured connection to the Tor network. Performance is critical in maintaining a large and diverse anonymity set, therefore the impact of an increasing mobile client base, must be fully understood

    Encryption Regulation in the Wake of September 11, 2001: Must We Protect National Security at the Expense of the Economy?

    Get PDF
    This Note argues that although privacy and economic concerns have ruled the encryption debate during the past decade, the move toward increased privacy on the Internet and relaxed encryption regulation, designed to promote electronic commerce, comes at the expense of national security and the protection of Americans\u27 safety. The Article begins with historical information about encryption and an examination of how businesses use encryption to secure their communications and financial transactions on the Internet. This Section also observes that this technology is employed by terrorist organizations to accomplish the same goal: to send private communications. The Author next details the history of encryption regulation during the last decade and addresses why the government has relaxed its stance even though encryption ultimately poses such a threat. The Note then analyzes whether encryption regulation will provide the intelligence community the tools to deal with terrorists who are now technologically savvy, or whether regulation will hurt the nation\u27s already wounded economy. The Author then examines Magic Lantern, cutting-edge technology developed by the FBI that effectively incorporates the privacy benefits of encryption while still providing Americans protection in this new era of terrorism. The Author concludes by proposing the adoption of Magic Lantern as a way to protect privacy and economic concerns while ensuring national security
    • …
    corecore