Privacy Preservation and Security Dilemma Relationship proposition for IoT authentication

被引:0
作者
Gamundani, Attlee M. [1 ]
Phillips, Amelia [2 ]
Muyingi, Hippolyte N. [3 ]
机构
[1] Namibia Univ Sci & Technol, Fac Comp & Informat, Dept Comp Sci, Windhoek, Namibia
[2] Highline Coll, CIS & Comp Sci, Dept Cyber Secur & Forens BAS, Seattle, WA USA
[3] Namibia Univ Sci & Technol, Fac Comp & Informat, Windhoek, Namibia
来源
2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018) | 2018年
关键词
Authentication; Data; Internet of Things; Privacy; Security; LIGHTWEIGHT; INTERNET; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things (IoT) authentication demands a complex approach to ensure all facets of security are taken care of. Security in IoT is not complete without looking at privacy protection especially if sensitive data is involved. Privacy of user credentials is critically important as that holds pieces of data that can compromise the whole security system. The need to emphasize on privacy preserving for authentication is on the basis that, we need to complete the security puzzle unequivocally. One of the security worries in IoT is user data privacy as a result of the unsupervised nature of IoT device's interaction. Focusing on smart home environments and personal area networks to a large extent, this paper gives an overview on some of the existing solutions that employs privacy preserving attributes towards providing IoT authentication security solutions in the quest to try and provide the relationship between privacy and security.
引用
收藏
页码:363 / 367
页数:5
相关论文
共 18 条
  • [1] Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections
    Abdallah, Asmaa
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (03) : 2615 - 2629
  • [2] [Anonymous], 2016, PRIVACY PRESERVING M
  • [3] Ashibani Y., 2017, CONTEXT AWARE AUTHEN
  • [4] Batool S, 2017, 2017 SECOND INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P183, DOI 10.1109/FMEC.2017.7946428
  • [5] Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
    Challa, Sravani
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEEE ACCESS, 2017, 5 : 3028 - 3043
  • [6] Gu ZL, 2016, PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), P277, DOI [10.1109/CIS.2016.0070, 10.1109/CIS.2016.69]
  • [7] Janbabaei S, 2016, 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), P162, DOI 10.1109/ISTEL.2016.7881802
  • [8] An Anonymous Authentication Protocol for Smart Grid
    Kishimoto, Hikaru
    Yanai, Naoto
    Okamura, Shingo
    [J]. 2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 62 - 67
  • [9] Li X., 2015, 2015 IEEE GLOB COMM
  • [10] Mandyam GD, 2017, INT CONF COMMUN SYST, P480, DOI 10.1109/COMSNETS.2017.7945438