Security and Privacy related Issues in the Internet of Things

被引:1
作者
Holbl, Marko [1 ]
Welzer, Tatjana [1 ]
Zlatolas, Lili Nemec [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, Maribor, Slovenia
来源
INFORMATION MODELLING AND KNOWLEDGE BASES XXVII | 2016年 / 280卷
关键词
Internet of Things; Security; Privacy; Trust; WIRELESS SENSOR NETWORKS; ACCESS-CONTROL; AUTHENTICATION; SCHEME; ARCHITECTURE;
D O I
10.3233/978-1-61499-611-8-321
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) features a new paradigm, where smart devices will be interconnected through the internet. The concept is already in use today, but it is anticipated that over the next several years the number of devices will grow rapidly. However, there are still open problems and challenges which need to be adequately addressed before the concept can live to its full potential. These topics also include security and privacy, as well as related concepts. Since smart devices that are part of the IoT gather sensitive data (e.g. location data, patient data, etc.) both security and privacy are issues, which the research community tends to focus on. In this chapter we present an overview of the aspects of security and privacy related to IoT, but also highlight the challenges and open problems as well as related concepts and technologies.
引用
收藏
页码:321 / 326
页数:6
相关论文
共 43 条
[1]   Aurora: a new model and architecture for data stream management [J].
Abadi, DJ ;
Carney, D ;
Cetintemel, U ;
Cherniack, M ;
Convey, C ;
Lee, S ;
Stonebraker, M ;
Tatbul, N ;
Zdonik, S .
VLDB JOURNAL, 2003, 12 (02) :120-139
[2]  
[Anonymous], INF SYST FRONT
[3]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[4]  
Babar S., 2011, 2011 2 INT C WIRELES, P1
[5]  
Bandyopadhyay S, 2011, COMM COM INF SC, V162, P288
[6]   Enforcing privacy in e-commerce by balancing anonymity and trust [J].
Bella, Giampaolo ;
Giustolisi, Rosario ;
Riccobene, Salvatore .
COMPUTERS & SECURITY, 2011, 30 (08) :705-718
[7]  
Boswarthick D., 2012, M2M communications: a systems approach
[8]   CASTLE: Continuously Anonymizing Data Streams [J].
Cao, Jianneng ;
Carminati, Barbara ;
Ferrari, Elena ;
Tan, Kian-Lee .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (03) :337-352
[9]  
Carminati B, 2007, LECT NOTES COMPUT SC, V4443, P410
[10]   Security and privacy in sensor networks [J].
Chan, HW ;
Perrig, A .
COMPUTER, 2003, 36 (10) :103-105