Managing Privacy in a Social Broker Internet of Thing

Smart homes, smart cities, smart everything and the Internet of Things (IoT) have incredible impact in our life. Typically, IoT devices are though vulnerable to attacks and the strategy to manage IoT security is influenced by the IoT model and the application field. Social Internet of Things (SIoT) can be viewed as the evolution of IoT in the same way social networks can be considered an evolution of the Internet. In this paper, we discuss about security issues on social IoT approach based on a social broker paradigm. In particular, we present a solution to manage information privacy in a SIoT environment built on a social broker.

[1]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[2]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[3]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[4]  HyunGon Kim,et al.  Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[5]  Prem Prakash Jayaraman,et al.  Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..

[6]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[7]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[8]  Yasir Saleem,et al.  SCDIoT: Social Cross-Domain IoT Enabling Application-to-Application Communications , 2018, 2018 IEEE International Conference on Cloud Engineering (IC2E).

[9]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[10]  Kevin Weekly,et al.  Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[11]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[12]  Hong Linh Truong,et al.  MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[13]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[14]  Bernt Schiele,et al.  Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.

[15]  Yacine Challal,et al.  A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.

[16]  Muhammad Khurram Khan,et al.  Design of sinkhole node detection mechanism for hierarchical wireless sensor networks , 2016, Secur. Commun. Networks.

[17]  Guevara Noubir,et al.  Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.

[18]  Mohammad Hayajneh,et al.  Data Management for the Internet of Things: Design Primitives and Solution , 2013, Sensors.

[19]  Hanno Wirtz,et al.  6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.

[20]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[21]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[22]  Shui Yu,et al.  Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.

[23]  N. Truong,et al.  A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things , 2016 .

[24]  Fabio Viola,et al.  A Multi-Broker Platform for the Internet of Things , 2015, NEW2AN.

[25]  Dushantha Nalin K. Jayakody,et al.  Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things , 2017, Future Gener. Comput. Syst..

[26]  Rabia Riaz,et al.  Security analysis survey and framework design for IP connected LoWPANs , 2009, 2009 International Symposium on Autonomous Decentralized Systems.

[27]  Richard P. Martin,et al.  Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[28]  Vincenza Carchiolo,et al.  The Cost of Trust in the Dynamics of Best Attachment , 2015, Comput. Informatics.

[29]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[30]  O VikasB,et al.  Internet of Things (IoT): A Survey on Privacy Issues and Security , 2015 .

[31]  Steve Vinoski,et al.  Advanced Message Queuing Protocol , 2006, IEEE Internet Computing.

[32]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[33]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[34]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[35]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[36]  Vincenza Carchiolo,et al.  A Social Inspired Broker for M2M Protocols , 2019, COMPLEXIS.

[37]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[38]  Lorenzo Mucchi,et al.  The Role of Physical Layer Security in IoT: A Novel Perspective , 2016, Inf..

[39]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[40]  Vincenza Carchiolo,et al.  PROSA: P2P Resource Organisation by Social Acquaintances , 2006, AP2PC.

[41]  Vincenza Carchiolo,et al.  Direct trust assignment using social reputation and aging , 2017, J. Ambient Intell. Humaniz. Comput..