PRIVACY-PRESERVING AUTHENTICATION IN WIRELESS IOT: APPLICATIONS, APPROACHES, AND CHALLENGES

被引:9
作者
Wang, Shujuan [1 ]
Wang, Jian [1 ]
Yu, Zhengtao [1 ]
机构
[1] Kunming Univ Sci & Technol, Sch Informat Engn & Automat, Kunming, Yunnan, Peoples R China
基金
中国国家自然科学基金;
关键词
SCHEME;
D O I
10.1109/MWC.2017.1800109
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless IoT is a promising area in which large quantities of data and information are collected, exchanged, and stored constantly. While these data and information are utilized for good purposes in wireless IoT, great risks arise in that attackers are seeking to exploit the merits of this new technology for their own benefits. In such a resource-constrained environment, devices are easily exposed to various attacks. Confidential private information is as valuable as it is vulnerable. It is difficult for end users to trust wireless IoT and to adopt related applications due to the lack of satisfactory privacy-preserving mechanisms, which has become the major obstacle for the adoption and popularization of wireless IoT. In this article, we first introduce the classical application scenarios of wireless IoT, along with related security and privacy attack models. We then present a brief overview of privacy-preserving schemes of wireless IoT. Based on the classification of application scenarios, we further present recent advances in privacy-preserving mechanisms in wireless IoT. Finally, we discuss open issues and future research directions for these application scenarios in wireless IoT.
引用
收藏
页码:60 / 67
页数:8
相关论文
共 15 条
[1]  
[Anonymous], 2017, 2017 IEEE C ENERGY I
[2]  
[Anonymous], 2017, PROC INT APPL COMPUT
[3]   A lightweight live memory forensic approach based on hardware virtualization [J].
Cheng, Yingxin ;
Fu, Xiao ;
Du, Xiaojiang ;
Luo, Bin ;
Guizani, Mohsen .
INFORMATION SCIENCES, 2017, 379 :23-41
[4]   PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid [J].
Chim, Tat Wing ;
Yiu, Siu-Ming ;
Li, Victor O. K. ;
Hui, Lucas C. K. ;
Zhong, Jin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (01) :85-97
[5]   An effective key management scheme for heterogeneous sensor networks [J].
Du, Xiaojiang ;
Xiao, Yang ;
Guizani, Mohsen ;
Chen, Hslao-Hwa .
AD HOC NETWORKS, 2007, 5 (01) :24-34
[6]  
Ferrag M. A., SECURITY COMMUN NETW, V2017
[7]  
Hei XL, 2013, IEEE INFOCOM SER, P3030
[8]  
Kang J, 2017, INT EL DEVICES MEET
[9]   Anonymous Secure Framework in Connected Smart Home Environments [J].
Kumar, Pardeep ;
Braeken, An ;
Gurtov, Andrei ;
Iinatti, Jari ;
Ha, Phuong Hoai .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) :968-979
[10]   Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm [J].
Liu, Yanbing ;
Wang, Yuhang ;
Chang, Guanghui .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (10) :2740-2749