Towards Transparent and Secure IoT: Improving the Security and Privacy through a User-Centric Rules-Based System

被引:0
|
作者
Lola, Joao [1 ]
Serrao, Carlos [1 ]
Casal, Joao [2 ]
机构
[1] Inst Univ Lisboa ISCTE IUL, Informat Sci Technol & Architecture Res Ctr ISTAR, P-1600189 Lisbon, Portugal
[2] SCNL Truphone SA, P-1700158 Lisbon, Portugal
关键词
security; privacy; IoT networks; intent declaration; communication rights and permissions; traffic analysis;
D O I
10.3390/electronics12122589
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, we have seen a growing wave in the integration of IoT (Internet of Things) technologies into society. This has created new opportunities, but at the same time given rise to several critical issues, creating new challenges that need to be addressed. One of the main challenges is the security and privacy of information that is processed by IoT devices in our daily lives. Users are, most of the time, unaware of IoT devices' personal information collection and transmission activities that affect their security and privacy. In this work, we propose a solution that aims to increase the privacy and security of data in IoT devices, through a system that controls the IoT device's communication on the network. This system is based on two basic and simple principles. First, the IoT device manufacturer declares their device's data collection intentions. Second, the user declares their own preferences of what is permitted to the IoT device. The design of the system includes tools capable of analyzing packets sent by IoT devices and applying network traffic control rules. The objective is to allow the declaration and verification of communication intentions of IoT devices and control the communication of such devices to detect potential security and privacy violations. We have created a test-bed to validate the developed solution, based on virtual machines, and we concluded that our system has little impact on how the overall system performed.
引用
收藏
页数:23
相关论文
共 4 条
  • [1] User-Centric Privacy for Identity Federations Based on a Recommendation System
    Villaran, Carlos
    Beltran, Marta
    ELECTRONICS, 2022, 11 (08)
  • [2] Decision tree based user-centric security solution for critical IoT infrastructure
    Puthal, Deepak
    Wilson, Stanly
    Nanda, Ashish
    Liu, Ming
    Swain, Srinibas
    Sahoo, Biswa P. S.
    Yelamarthi, Kumar
    Pillai, Prashant
    El-Sayed, Hesham
    Prasad, Mukesh
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [3] A privacy enabled service authorization based on a user-centric virtual identity management system
    Chen, Zhikui
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 583 - 587
  • [4] Towards a User Privacy Preservation System for IoT Environments: a Habit-Based Approach
    Tamani, Nouredine
    Ghamri-Doudane, Yacine
    2016 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2016, : 2425 - 2432