The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication

被引:0
|
作者
Staudemeyer, Ralf C. [1 ]
Poehls, Henrich C. [2 ]
Wojcik, Marcin [3 ]
机构
[1] Schmalkalden Univ Appl Sci, Fac Comp Sci, Schmalkalden, Germany
[2] Univ Passau, Inst IT Secur & Secur Law, Passau, Germany
[3] Univ Cambridge, Comp Lab, Cambridge, England
来源
2018 IEEE 19TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM) | 2018年
基金
欧盟地平线“2020”;
关键词
Internet of Things; privacy; network security; cryptography; dc-net; mix; contiki; IoT; DTLS; ECDSA; PAN; WSN; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Privacy requires more than just encryption of data before and during transmission. Privacy would actually demand hiding the sheer fact that communication takes place. This requires to protect meta-data from observation. We think that this feature is in particular useful and interesting for the Internet-of-Things. However, it requires strong cryptographic security mechanisms, like encryption of communication, to be in place. We motivate the need for strong privacy protection by highlighting privacy issues in a smart home use-case. We advance beyond encryption and discuss which existing techniques can be used to achieve unobservable communication. Then we describe the architecture needed to provide strong protection in this particular use-case. Lastly, we present the building blocks of the architecture we implemented so far on the Re-Mote sensor nodes running Contiki OS and sketch the computational and network overheads imposed by these techniques.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Flexible symmetric predicate encryption for data privacy in IoT environments
    Qingquan Bian
    Yue Zhang
    Chang Song
    Axin Wu
    Peer-to-Peer Networking and Applications, 2024, 17 : 656 - 664
  • [22] Flexible symmetric predicate encryption for data privacy in IoT environments
    Bian, Qingquan
    Zhang, Yue
    Song, Chang
    Wu, Axin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (02) : 656 - 664
  • [23] Federated Learning Based Privacy Ensured Sensor Communication in IoT Networks: A Taxonomy, Threats and Attacks
    Manzoor, Sheikh Imroza
    Jain, Sanjeev
    Singh, Yashwant
    Singh, Harvinder
    IEEE ACCESS, 2023, 11 : 42248 - 42275
  • [24] Toward Privacy Preserving in IoT E-health Systems: A Key Escrow Identity-based Encryption Scheme
    Boussada, Rihab
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [25] Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT
    Ouaddah, Aafaf
    Abou Elkalam, Anas
    Ouahman, Abdellah Ait
    EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 523 - 533
  • [26] Towards Privacy Preserving IoT Environments: A Survey
    Seliem, Mohamed
    Elgazzar, Khalid
    Khalil, Kasem
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [27] Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT
    Rasheed, Amar
    Mahapatra, Rabi N.
    Varol, Cihan
    Narashimha, Karpoor
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (03) : 1476 - 1491
  • [28] Privacy-preserving using homomorphic encryption in Mobile IoT systems
    Ren, Wang
    Tong, Xin
    Du, Jing
    Wang, Na
    Li, Shan Cang
    Min, Geyong
    Zhao, Zhiwei
    Bashir, Ali Kashif
    COMPUTER COMMUNICATIONS, 2021, 165 : 105 - 111
  • [29] Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions
    Cook, Jonathan
    Rehman, Sabih Ur
    Khan, M. Arif
    IEEE ACCESS, 2023, 11 : 39295 - 39317
  • [30] Improved Advance Encryption Standard with a Privacy Database Structure for IoT Nodes
    Anajemba, Joseph Henry
    Iwendi, Celestine
    Mittal, Mohit
    Yue, Tang
    2020 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2020), 2020, : 201 - 206