Article
Computer Science, Information Systems
Ali Dorri, Clemence Roulin, Shantanu Pal, Sarah Baalbaki, Raja Jurdak, Salil S. Kanhere
Summary: This article explores the impact of user deanonymization on IoT-based blockchain and demonstrates that machine learning algorithms can successfully classify transactions. To enhance user anonymity, the article proposes multiple obfuscation methods.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Shuodi Hui, Zhenhua Wang, Xueshi Hou, Xiao Wang, Huandong Wang, Yong Li, Depeng Jin
Summary: Privacy leakage of Internet of Things (IoT) has become a significant challenge as IoT services become more popular on mobile networks. While previous work has provided general structures for analyzing IoT privacy and case studies for specific devices or scenarios, conducting a comprehensive and systematic study of large-scale IoT privacy leakage in the real world remains challenging. Our method to quantify IoT privacy leakage on a large-scale mobile network traffic data set demonstrates considerable risks for IoT users, devices, and platforms respectively, and shows that IoT devices have a larger scale of privacy leakage than users and platforms, with different daily patterns of privacy leakage. Three case studies on location information, application calling, and voice service illustrate the ability of a third party to profile a network entity in both cyberspace and physical space.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Shancang Li, Shanshan Zhao, Geyong Min, Lianyong Qi, Gang Liu
Summary: The emerging technologies in IoT, such as smart sensors, 5G/6G wireless communication, and artificial intelligence, have revolutionized business operations by enabling efficient and privacy-preserving collection and transmission of real-time data. However, privacy concerns remain a major challenge. This study proposes a lightweight privacy-preserving scheme based on homomorphic encryption in IoT, effectively protecting user privacy through computationally efficient algorithms.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Artificial Intelligence
Rabeeha Fazal, Razaullah Khan, Adeel Anjum, Madiha Haider Syed, Abid Khan, Semeen Rehman
Summary: With the development of modern information systems, sharing Electronic Health Records (EHRs) among different organizations has become important for medical treatment and analysis. However, privacy concerns and data utility are challenges that need to be addressed. This article focuses on the utility loss and privacy issues in sharing datasets with multiple records, and proposes an improved algorithm to better preserve privacy and utility.
PEERJ COMPUTER SCIENCE
(2023)
Article
Computer Science, Information Systems
Muhammad Tanveer, Ghulam Abbas, Ziaul Haq Abbas, Muhammad Bilal, Amrit Mukherjee, Kyung Sup Kwak
Summary: This article introduces a lightweight user AKE scheme (LAKE-6SH) for smart home networks, which establishes private session keys between users and network entities to achieve authenticity of RUs using the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. The scheme has been informally validated to be secure against various security attacks, and further validated formally through the random oracle model and Scyther validation. Additionally, LAKE-6SH is shown to provide better security features with low communication and computational overheads.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Leonardo Babun, Kyle Denney, Z. Berkay Celik, Patrick McDaniel, A. Selcuk Uluagac
Summary: This paper analyzes popular IoT platforms in different application domains, defines a comprehensive evaluation framework with seven technical comparison criteria, discusses the distinguishing attributes of these platforms in terms of communication, security, and privacy, and provides suggestions to enhance security and privacy within IoT solutions.
Article
Computer Science, Information Systems
Bhabendu Kumar Mohanta, Debasish Jena, Somula Ramasubbareddy, Mahmoud Daneshmand, Amir H. Gandomi
Summary: The rapid growth of IoT technology presents security and privacy challenges, but blockchain technology offers some solutions. By integrating IoT and blockchain technologies, a more secure smart IoT system can be achieved.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Jiangfeng Sun, Fazlullah Khan, Junxia Li, Mohammad Dahman Alshehri, Ryan Alturki, Mohammad Wedyan
Summary: This article presents a mutual authentication scheme for devices-to-server and vice versa in the operational Internet of Medical Things to ensure secure communication sessions among multiple mobile devices and servers. By introducing an offline phase for registration process, blocking potential intruder devices, and using encryption and decryption schemes, data reliability is ensured during communication sessions.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Review
Computer Science, Information Systems
Yasser Khan, Mazliham Bin Mohd Su'ud, Muhammad Mansoor Alam, Sayed Fayaz Ahmad, Nur Agus Salim, Nasir Khan
Summary: The internet of things (IoT) is a rapidly growing platform that has attracted a large number of users and become indispensable in our daily lives. This article provides an overview of the technology and layered architecture of the IoT, focusing on key applications such as smart homes, smart agriculture, smart transportation, and smart healthcare. It also addresses the security threats and vulnerabilities at each layer of the IoT, outlining the challenges of confidentiality, integrity, privacy, availability, authentication, non-repudiation, and key management. Finally, the article identifies and presents future research directions for security concerns in the IoT.
Article
Computer Science, Hardware & Architecture
Inam Ullah, Asra Noor, Shah Nazir, Farhad Ali, Yazeed Yasin Ghadi, Nida Aslam
Summary: The term Internet of Things (IoT) refers to a network that gathers, analyzes and modifies data from all connected devices to provide new services. IoT devices require a constant Internet connection, leading to rapid growth in data volume and speed. Ensuring IoT security is crucial to protect customer privacy, data integrity, and the security of assets and IoT devices. This research work aims to address security problems in IoT devices by organizing them into categories and evaluating various features.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Computer Science, Information Systems
Yijia Liu, Jie Wang, Zheng Yan, Zhiguo Wan, Riku Jantti
Summary: The Internet of Things (IoT) aims to create a vast network of interconnected objects that can exchange data and interact intelligently with people. However, the openness, heterogeneity, and dynamicity of IoT introduce security, privacy, and trust issues. Traditional trust management systems (TMSs) are not sufficient, and thus blockchain-based trust management (BC-TM) has been extensively studied to achieve decentralized trust management in IoT. This article provides a comprehensive survey on BC-TM in IoT, proposing evaluation criteria, taxonomy of TMSs, and a review on BC-TM. It also identifies open issues and suggests future research directions.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Information Science & Library Science
Alex Koohang, Carol Springer Sargent, Jeretta Horn Nord, Joanna Paliszkiewicz
Summary: The research model includes constructs like IoT awareness, users' knowledge of IoT privacy and security, users' IoT trust, and intention to continue using IoT. Results indicate that IoT awareness influences users' privacy and security knowledge, which in turn impacts user trust and intention to use IoT.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT
(2022)
Article
Computer Science, Information Systems
Mohamed Amine Ferrag, Lei Shu
Summary: This article presents research challenges and a tutorial on the performance evaluation of blockchain-based security and privacy systems for IoT. The article reviews existing surveys, blockchain applications in IoT, consensus algorithms, security analysis techniques, performance metrics, and open challenges. The study provides insights into building and evaluating blockchain-based security and privacy systems and highlights future research opportunities.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Musa G. Samaila, Carolina Lopes, Edi Aires, Joao B. F. Sequeiros, Tiago Simoes, Mario M. Freire, Pedro R. M. Inacio
Summary: The applications of IoT technologies have significant impacts on society and the environment, but security incidents have raised concerns in both academia and industry. While various security solutions have been proposed, some may not adequately support designers and developers with limited security expertise in creating secure IoT systems.
Article
Computer Science, Information Systems
Mochan Fan, Kailai Ji, Zhaofeng Zhang, Hongfang Yu, Gang Sun
Summary: This article proposes a new decentralized, secure and verifiable consortium BFL privacy protection scheme, named LPBFL, which ensures the privacy of the local model and data set while achieving lightweight computing. It adopts Paillier encryption and a newly designed lightweight digital signature and batch verification algorithm. A device reputation selection mechanism is also designed to improve efficiency.
IEEE INTERNET OF THINGS JOURNAL
(2023)