Security, Privacy, and Trust on Internet of Things

The ability of smart objects to stay connected to the Internet for purposes of transmitting and receiving data is referred to as the Internet of Things (IoT). As per recent estimates, the number of IoT devices will surpass 50 billion by 2020. Unsurprisingly, this mushrooming of IoT devices has drawn the attention of attackers who seek to exploit them for their own benefit, with the Mirai botnet being perhaps the most prominent example of IoT specific malware [1, 2]. Basically, IoT brings along a plethora of potential security and privacy risks to the end-users, including the unsanctioned access and abuse of private information, the enabling and strengthening of assaults against other systems, and the breeding of risks pertaining to personal safeness [3]. Especially, IoT facilitates the creation of an assortment of privacy risks to the consumer associated with the collection of personal and sensitive information, like their preferences, locations, habits, and so on. In the midor long-run these pieces of data can be used to, say, profile or impersonate the user or group of interest. On the other hand, such risks to security, privacy, and trust may significantly diminish end-user’s confidence in IoT and therefore impede its full realization. The feature topic at hand intends to promote the dissemination of the latest methodologies, solutions, and case studies pertaining to IoT security, privacy, and trust issues. Its objective is to publish high-quality articles presenting security algorithms, protocols, policies, frameworks, and solutions for the IoT ecosystem. The goal of this special issue was to attract high-quality contributions from researchers working in the broad area of security, privacy, and trust for IoT ecosystems, including but not limited to (a) cloud computing-based security solutions for IoT data, (b) mobile service privacy for IoT devices, (c) standardization efforts related to IoT, (d) testbeds and case studies for IoT, (e) Intrusion detection for IoT, (f) trust management for IoT, and (g) virtualization solutions to IoT security

[1]  Toru Fujiwara,et al.  On the Security of Tag-KEM for Signcryption , 2007, Electron. Notes Theor. Comput. Sci..

[2]  Jianer Chen,et al.  Security from the transparent computing aspect , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[3]  Xiaolei Dong,et al.  PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems , 2015, IEEE Journal of Selected Topics in Signal Processing.

[4]  Aaditya Jain,et al.  Solutions for Secure Routing in Mobile Ad Hoc Network (MANET): A Survey , 2016 .

[5]  Igor V. Kotenko,et al.  Computer attack modeling and security evaluation based on attack graphs , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).

[6]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[7]  Manoj Prabhakaran,et al.  Attribute-Based Signatures , 2011, CT-RSA.

[8]  Haider Abbas,et al.  A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata , 2013, J. Netw. Comput. Appl..

[9]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[10]  Kehua Guo,et al.  Transparent Computing: A Promising Network Computing Paradigm , 2017, Computing in Science & Engineering.

[11]  R. S. Ponmagal,et al.  Design and Development of Secure Cloud Architecture for Sensor Services , 2015, ICDCIT.

[12]  Daniel Díaz López,et al.  Dynamic counter-measures for risk-based access control systems: An evolutive approach , 2016, Future Gener. Comput. Syst..

[13]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[14]  Abdelmalek Azizi,et al.  Internet of things security , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).

[15]  Sarah Abdallah,et al.  Identity-based authentication scheme for the Internet of Things , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[16]  Abdelhamid Belmekki,et al.  Privacy Preservation in the Internet of Things , 2016, UNet.

[17]  George Yee Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards , 2011 .

[18]  Chin-Laung Lei,et al.  Attribute-based Encryption , 2015 .

[19]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[20]  Flora Malamateniou,et al.  Enabling data protection through PKI encryption in IoT m-Health devices , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).

[21]  Xiaohui Liang,et al.  PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs , 2014, Inf. Sci..

[22]  Yi Mu,et al.  Comments on a Public Auditing Mechanism for Shared Cloud Data Service , 2015, IEEE Transactions on Services Computing.

[23]  Chin-Ling Chen,et al.  A Privacy Authentication Scheme Based on Cloud for Medical Environment , 2014, Journal of Medical Systems.

[24]  N. B. Anuar,et al.  The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..

[25]  Randal C. Burns,et al.  Secure deletion for a versioning file system , 2005, FAST'05.

[26]  Muhammad Sher,et al.  A survey of dynamic replication strategies for improving data availability in data grids , 2012, Future Gener. Comput. Syst..

[27]  Xiaolei Dong,et al.  4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..

[28]  Kire Trivodaliev,et al.  Internet of Things Framework for Home Care Systems , 2017, Wirel. Commun. Mob. Comput..

[29]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[30]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[31]  M. Shamim Hossain,et al.  A Survey on Sensor-Cloud: Architecture, Applications, and Approaches , 2013, Int. J. Distributed Sens. Networks.

[32]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[33]  Stephan U Dombrowski,et al.  Using Smartphones and Health Apps to Change and Manage Health Behaviors: A Population-Based Survey , 2017, Journal of medical Internet research.

[34]  Kumar Yelamarthi,et al.  Internet of Things (IoT) Platform for Structure Health Monitoring , 2017, Wirel. Commun. Mob. Comput..

[35]  Nick Szabo,et al.  Formalizing and Securing Relationships on Public Networks , 1997, First Monday.

[36]  Georgios Kambourakis,et al.  Optimal Countermeasures Selection Against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks , 2018, IEEE Communications Surveys & Tutorials.

[37]  Ji Zhang,et al.  A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing , 2017, Cluster Computing.

[38]  Rafael Dowsley,et al.  MARS: Monetized Ad-hoc Routing System (A Position Paper) , 2018, CRYBLOCK@MobiSys.

[39]  Dawn Song,et al.  Smart Locks: Lessons for Securing Commodity Internet of Things Devices , 2016, AsiaCCS.

[40]  Richard J. Lipton,et al.  A Revocable Backup System , 1996, USENIX Security Symposium.

[41]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[42]  Yuji Yamaoka,et al.  IoT Security for Utilization of Big Data : Mutual Authentication Technology and Anonymization Technology for Positional Data , 2016 .

[43]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[44]  Thomas C. Schmidt,et al.  RIOT OS: Towards an OS for the Internet of Things , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[45]  Maurizio A. Spirito,et al.  DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.

[46]  10 emerging technologies that will change your world , 2004, IEEE Engineering Management Review.

[47]  Antti Ruhanen,et al.  Embedded passive UHF RFID seal tag for metallic returnable transit items , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).

[48]  Asan,et al.  Sequencing of 50 Human Exomes Reveals Adaptation to High Altitude , 2010, Science.

[49]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[50]  Prateek Saxena,et al.  Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..

[51]  Michael G. Bailey,et al.  The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems , 2004, CITC5 '04.

[52]  Weimin Li,et al.  A Resource Service Model in the Industrial IoT System Based on Transparent Computing , 2018, Sensors.

[53]  Michael Z. Newman Crazy Ex-Girlfriend , 2016 .

[54]  Jin Kwak,et al.  Smart card-based secure authentication protocol in multi-server IoT environment , 2017, Multimedia Tools and Applications.

[55]  Farrukh Nadeem,et al.  An Early Evaluation and Comparison of Three Private Cloud Computing Software Platforms , 2015, Journal of Computer Science and Technology.

[56]  Athanasios V. Vasilakos,et al.  BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..

[57]  Anton O. Prokofiev,et al.  A method to detect Internet of Things botnets , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[58]  Thorben Keller,et al.  Using low-level reader data to detect false-positive RFID tag reads , 2010, 2010 Internet of Things (IOT).

[59]  Jan Sliwa A Generalized Framework for Multi-party Data Exchange for IoT Systems , 2016, 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).

[60]  Yong Ho Hwang IoT Security & Privacy: Threats and Challenges , 2015, IoTPTS@AsiaCCS.

[61]  Peter Robinson,et al.  OpenFace: An open source facial behavior analysis toolkit , 2016, 2016 IEEE Winter Conference on Applications of Computer Vision (WACV).

[62]  Yves-Alexandre de Montjoye,et al.  Computational privacy : towards privacy-conscientious uses of metadata , 2015 .

[63]  Samee Ullah Khan,et al.  e-Health Cloud: Privacy Concerns and Mitigation Strategies , 2015, Medical Data Privacy Handbook.

[64]  Nicolas Herbaut,et al.  A Model for Collaborative Blockchain-Based Video Delivery Relying on Advanced Network Services Chains , 2017, IEEE Communications Magazine.

[65]  Mauro Conti,et al.  RPiDS: Raspberry Pi IDS — A Fruitful Intrusion Detection System for IoT , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).

[66]  Srinivasan Seshan,et al.  Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.

[67]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[68]  Klaus Wehrle,et al.  A Cloud design for user-controlled storage and processing of sensor data , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[69]  Bruno Schulze,et al.  An Analysis of Public Clouds Elasticity in the Execution of Scientific Applications: a Survey , 2016, Journal of Grid Computing.

[70]  Shiva Prakash,et al.  Hybrid Cryptography for Secure Data Communication in Wireless Sensor Networks , 2018 .

[71]  Georgios Kambourakis,et al.  A Survey on Cluster-Based Group Key Agreement Protocols for WSNs , 2011, IEEE Communications Surveys & Tutorials.

[72]  Rajesh Yerneni,et al.  Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[73]  Laurence T. Yang,et al.  Information security underlying transparent computing: Impacts, visions and challenges , 2010, Web Intell. Agent Syst..

[74]  Hiroki Watanabe,et al.  The Blockchain-Based Digital Content Distribution System , 2015, 2015 IEEE Fifth International Conference on Big Data and Cloud Computing.

[75]  Guangjie Han,et al.  Analysis of Energy-Efficient Connected Target Coverage Algorithms for Industrial Wireless Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.

[76]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[77]  Klaus Wehrle,et al.  A comprehensive approach to privacy in the cloud-based Internet of Things , 2016, Future Gener. Comput. Syst..

[78]  E. Baburaj,et al.  An efficient secure authentication on cloud based e-health care system in WBAN , 2016 .

[79]  Alfred Menezes,et al.  Pairing-Based Cryptography at High Security Levels , 2005, IMACC.

[80]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[81]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[82]  Nabil Bouzerna,et al.  Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[83]  Madoka Yuriyama,et al.  Sensor-Cloud Infrastructure - Physical Sensor Management with Virtualized Sensors on Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[84]  Abderrezak Rachedi,et al.  A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[85]  Adam Dunkels,et al.  Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[86]  Junji Shikata,et al.  Lattice-Based Signcryption Without Random Oracles , 2018, PQCrypto.

[87]  Farshad Firouzi,et al.  Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics , 2018, Future Gener. Comput. Syst..

[88]  Hideki Imai,et al.  Compact and unforgeable key establishment over an ATM network , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[89]  Sayantani Saha Secure sensor data management model in a sensor - cloud integration environment , 2015, 2015 Applications and Innovations in Mobile Computing (AIMoC).

[90]  Murizah Kassim,et al.  Mobile ad hoc network (MANET) routing protocols comparison for wireless sensor network , 2011, 2011 IEEE International Conference on System Engineering and Technology.

[91]  Cem Ersoy,et al.  Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.

[92]  Mireille Hildebrandt,et al.  Defining Profiling: A New Type of Knowledge? , 2008, Profiling the European Citizen.

[93]  Cesare Pautasso,et al.  The Blockchain as a Software Connector , 2016, 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA).

[94]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[95]  Nitin Pandey,et al.  Enhancement of security using cryptographic techniques , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).

[96]  Alessandro Soro,et al.  Minding the Gap: Reconciling Human and Technical Perspectives on the IoT for Healthy Ageing , 2017, Wirel. Commun. Mob. Comput..

[97]  Yan Fu,et al.  Short Signcryption Scheme for the Internet of Things , 2011, Informatica.

[98]  Jaimin Patel Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing , 2017 .

[99]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[100]  Yacine Challal,et al.  Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[101]  Kui Ren,et al.  Attribute-based fine-grained access control with efficient revocation in cloud storage systems , 2013, ASIA CCS '13.

[102]  Marko Vukolic,et al.  Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.

[103]  Helen J. Wang,et al.  SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser , 2015, 2015 IEEE Symposium on Security and Privacy.

[104]  Nick Feamster,et al.  A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation , 2018, IoT S&P@SIGCOMM.

[105]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[106]  Robert H. Deng,et al.  Privacy-Preserving Data Processing with Flexible Access Control , 2020, IEEE Transactions on Dependable and Secure Computing.

[107]  Matthew Louis Mauriello,et al.  User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns , 2016, Future Internet.

[108]  Ricardo Neisse,et al.  Security and privacy issues for an IoT based smart home , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[109]  Yacine Challal,et al.  Energy efficiency in wireless sensor networks: A top-down survey , 2014, Comput. Networks.

[110]  Yixian Yang,et al.  Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities , 2017, Secur. Commun. Networks.

[111]  Xuemin Shen,et al.  Security and privacy in mobile crowdsourcing networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[112]  Peter M. A. Sloot,et al.  eHealth in the future of medications management: personalisation, monitoring and adherence , 2017, BMC Medicine.

[113]  Xiaohui Liang,et al.  ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.

[114]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[115]  Mahadev Satyanarayanan,et al.  A Scalable and Privacy-Aware IoT Service for Live Video Analytics , 2017, MMSys.

[116]  Samaher Al-Janabi,et al.  Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .

[117]  Rasool Jalili,et al.  Alert Correlation Algorithms: A Survey and Taxonomy , 2013, CSS.

[118]  Alexander W. Dent,et al.  Building Better Signcryption Schemes with Tag-KEMs , 2006, Public Key Cryptography.

[119]  Zhou Cai-xue Improved certificateless hybrid signcryption scheme , 2013 .

[120]  Yang Hua-jie RBIS: Security Enhancement for MRBP and MRBP2 Using Integrity Check , 2007 .

[121]  Dengguo Feng,et al.  Efficiently Attribute-Based Access Control for Mobile Cloud Storage System , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[122]  Davor Svetinovic,et al.  Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.

[123]  B. Latha,et al.  HHSRP: a cluster based hybrid hierarchical secure routing protocol for wireless sensor networks , 2017, Cluster Computing.

[124]  Min Chen,et al.  Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing , 2020, IEEE Transactions on Cloud Computing.

[125]  Anas Abou El Kalam,et al.  SmartOrBAC security and privacy in the Internet of Things , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).

[126]  Anton Vedder,et al.  KDD: The challenge to individualism , 1999, Ethics and Information Technology.

[127]  Yi Zhou,et al.  Understanding the Mirai Botnet , 2017, USENIX Security Symposium.

[128]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[129]  Mehdi Hosseinzadeh,et al.  Correction to: A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks , 2019, Peer Peer Netw. Appl..

[130]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[131]  P. Khatri,et al.  A Survey on Security issues in Mobile ADHOC networks , 2009 .

[132]  Vincent Zimmer Platform Trust Beyond BIOS Using the Unified Extensible Firmware Interface , 2007, Security and Management.

[133]  Bart Custers,et al.  Effects of Unreliable Group Profiling by Means of Data Mining , 2003, Discovery Science.

[134]  Jian Shen,et al.  Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services , 2018, IEEE Systems Journal.

[135]  Andrei V. Gurtov,et al.  PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications , 2014, Int. J. Distributed Sens. Networks.

[136]  Yaoxue Zhang,et al.  Block-Stream as a Service: A More Secure, Nimble, and Dynamically Balanced Cloud Service Model for Ambient Computing , 2018, IEEE Network.

[137]  Jee Hea An Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses , 2001, IACR Cryptol. ePrint Arch..

[138]  Maria Fazio,et al.  Are Next-Generation Sequencing Tools Ready for the Cloud? , 2017, Trends in biotechnology.

[139]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[140]  Fagen Li,et al.  Certificateless hybrid signcryption , 2009, Math. Comput. Model..

[141]  Javier López,et al.  NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU , 2015, AsiaCCS.

[142]  Matthew Green,et al.  Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.

[143]  Mahadev Satyanarayanan,et al.  Privacy Mediators: Helping IoT Cross the Chasm , 2016, HotMobile.

[144]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[145]  Frank Kargl,et al.  KopperCoin - A Distributed File Storage with Financial Incentives , 2016, ISPEC.

[146]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[147]  Alex Biryukov,et al.  Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay , 2015, Financial Cryptography.

[148]  Satyen Abrol,et al.  Data Security and Privacy , 2016 .

[149]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..

[150]  Kaoru Kurosawa,et al.  Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM , 2005, EUROCRYPT.

[151]  Jinyong Chang,et al.  The ECCA Security of Hybrid Encryptions , 2017, ISPEC.

[152]  Abdelfettah Belghith,et al.  Wireless Body Area Networks: Applications and Technologies , 2016, ANT/SEIT.

[153]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[154]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[155]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[156]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[157]  Eric Gossett,et al.  Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2015 .

[158]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[159]  Aruna Seneviratne,et al.  A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain , 2018, IEEE Access.

[160]  Miao Yun,et al.  Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid , 2010, 2010 International Conference on Advances in Energy Engineering.

[161]  Junji Shikata,et al.  Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption , 2013, IMACC.

[162]  Georgios Kambourakis,et al.  Cybertrust in the IoT Age , 2018, Computer.

[163]  Ju Ren,et al.  Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing , 2017, IEEE Network.

[164]  James R. Larus,et al.  Imagining the Future: Thoughts on Computing , 2012, Computer.

[165]  Erik Poll,et al.  Using Trusted Execution Environments in Two-factor Authentication: comparing approaches , 2013, Open Identity Summit.

[166]  Xiaojiang Du,et al.  Achieving Secure and Efficient Data Access Control for Cloud-Integrated Body Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[167]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[168]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[169]  Wu Ming Analysis and a case study of transparent computing implementation with UEFI , 2012, Int. J. Cloud Comput..

[170]  Wenyong Wang,et al.  Aya: “An efficient access-controlled storage and processing for cloud-based sensed data” , 2015, 2015 12th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP).

[171]  Masooda Bashir,et al.  The onion router: Understanding a privacy enhancing technology community , 2016, ASIST.

[172]  Yu-Hung Huang,et al.  A lightweight authentication protocol for Internet of Things , 2014, 2014 International Symposium on Next-Generation Electronics (ISNE).

[173]  Sangeeta Sharma,et al.  The Evolution of RFID Security and Privacy: A Research Survey , 2011, 2011 International Conference on Communication Systems and Network Technologies.

[174]  B. B. Gupta,et al.  Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.

[175]  William C. Chu,et al.  Privacy Preservation in Affect-Driven Personalization , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[176]  Hongli Zhang,et al.  An Efficient Security System for Mobile Data Monitoring , 2018, Wirel. Commun. Mob. Comput..

[177]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[178]  Srdjan Capkun,et al.  Secure Time Synchronization in Sensor Networks , 2008, TSEC.

[179]  Chien-Ding Lee,et al.  A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations , 2008, IEEE Transactions on Information Technology in Biomedicine.

[180]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[181]  Maryline Laurent-Maknavicius,et al.  Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[182]  Sudheendra Hangal,et al.  PrPl: a decentralized social networking infrastructure , 2010, MCS '10.

[183]  Walid Saad,et al.  On the authentication of devices in the Internet of things , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[184]  Kaoru Kurosawa,et al.  Tag-KEM/DEM: A New Framework for Hybrid Encryption , 2008, Journal of Cryptology.

[185]  Gal Shpantzer,et al.  Implementing Hardware Roots of Trust : The Trusted Platform Module Comes of Age , 2013 .

[186]  Maxim O. Kalinin,et al.  Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing , 2016, SIN.

[187]  J. Voelcker,et al.  Stalked by satellite - an alarming rise in GPS-enabled harassment , 2006, IEEE Spectrum.

[188]  Amit P. Sheth,et al.  Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems , 2018, IEEE Internet Computing.

[189]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[190]  Gus Hosein,et al.  They Know Where You Are , 2007 .

[191]  Andrew M. Odlyzko,et al.  Privacy, economics, and price discrimination on the Internet , 2003, ICEC '03.

[192]  Georgios Kambourakis,et al.  The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[193]  Padinjappurathu Shynu,et al.  An Enhanced ABE based Secure Access Control Scheme for E-health Clouds , 2017 .

[194]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[195]  Jian Pei,et al.  A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.

[196]  Ju Ren,et al.  BOAT: A Block-Streaming App Execution Scheme for Lightweight IoT Devices , 2018, IEEE Internet of Things Journal.

[197]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[198]  Markus Endler,et al.  A comprehensive cloud-based IoT software infrastructure for Ambient Assisted Living , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).

[199]  Mohsen Guizani,et al.  The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.

[200]  Luca Lombardi,et al.  Challenges for Data Mining in Distributed Sensor Networks , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[201]  Fagen Li,et al.  An efficient signcryption for data access control in cloud computing , 2017, Computing.

[202]  Yongli Wang,et al.  Privacy management of patient physiological parameters , 2018, Telematics Informatics.

[203]  Rajkumar Buyya,et al.  Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.

[204]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[205]  Ju Ren,et al.  A scalable and manageable IoT architecture based on transparent computing , 2017, J. Parallel Distributed Comput..

[206]  Mohd Aizaini Maarof,et al.  Secure searchable based asymmetric encryption in cloud computing , 2013 .

[207]  Hoh Peter In,et al.  A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks , 2014, Inf. Sci..

[208]  Ratnamala Prakash More,et al.  A Reconfigurable Smart Sensor Interface for Industrial WSN in IoT Environment , 2016 .

[209]  Simon Duquennoy,et al.  Towards Blockchain-based Auditable Storage and Sharing of IoT Data , 2017, CCSW.

[210]  Zhetao Li,et al.  Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[211]  Dongqing Xie,et al.  Attribute-based signature and its applications , 2010, ASIACCS '10.

[212]  Ronald Cramer,et al.  Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..

[213]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[214]  W. Marsden I and J , 2012 .

[215]  Susana Alcalde Bagüés,et al.  Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing , 2007 .

[216]  Kan Siew Leong,et al.  A secure multi-hop routing for IoT communication , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[217]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[218]  Igor V. Kotenko,et al.  Common Framework for Attack Modeling and Security Evaluation in SIEM Systems , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[219]  Sarmistha Neogy,et al.  A cloud security framework for a data centric WSN application , 2016, ICDCN.

[220]  Félix Gómez Mármol,et al.  I Don't Trust ICT: Research Challenges in Cyber Security , 2016, IFIPTM.

[221]  Victor Shoup,et al.  On Formal Models for Secure Key Exchange , 1999, IACR Cryptol. ePrint Arch..

[222]  Franz J. Hauck,et al.  Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[223]  Richard G Baraniuk,et al.  More Is Less: Signal Processing and the Data Deluge , 2011, Science.

[224]  Georgios Kambourakis,et al.  Securing Medical Sensor Environments: The CodeBlue Framework Case , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[225]  Weisong Shi,et al.  The Promise of Edge Computing , 2016, Computer.

[226]  Christo El Morr,et al.  Using Mobile Health to Enhance Outcomes of Noncommunicable Diseases Care in Rural Settings and Refugee Camps: Randomized Controlled Trial , 2018, JMIR mHealth and uHealth.

[227]  Goichiro Hanaoka,et al.  Applications of Signcryption , 2010, Practical Signcryption.

[228]  Keshav P. Dahal,et al.  Toward Anonymizing IoT Data Streams via Partitioning , 2016, 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[229]  Kishor S. Trivedi,et al.  Software aging in the eucalyptus cloud computing infrastructure , 2014, ACM J. Emerg. Technol. Comput. Syst..

[230]  Ronald Cramer,et al.  A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.

[231]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[232]  Dong Yang,et al.  TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[233]  Yang Wang,et al.  Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.

[234]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[235]  Lei Zhou,et al.  Cssp: The Consortium Blockchain Model for Improving the Trustworthiness of Network Software Services , 2017, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC).

[236]  Vern Paxson,et al.  The Matter of Heartbleed , 2014, Internet Measurement Conference.

[237]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[238]  Rogério Schmidt Feris,et al.  Video analytics for retail , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.

[239]  Yacine Challal,et al.  Healing on the cloud: Secure cloud architecture for medical wireless sensor networks , 2016, Future Gener. Comput. Syst..

[240]  Yuan Chen,et al.  RCCA Security for KEM+DEM Style Hybrid Encryptions , 2012, Inscrypt.

[241]  Nikos Fotiou,et al.  Decentralized name-based security for content distribution using blockchains , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[242]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[243]  Stuti Gupta,et al.  Vulnerable network analysis using war driving and security intelligence , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[244]  Kim-Kwang Raymond Choo,et al.  A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.

[245]  Jiannong Cao,et al.  OSR: Optimal and Secure Routing Protocol in Multi-hop Wireless Networks , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[246]  Manuel Barbosa,et al.  Certificateless signcryption , 2008, ASIACCS '08.

[247]  Ting Yu,et al.  What are customers looking at? , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.

[248]  Antônio A. de A. Rocha,et al.  A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack , 2018, Secur. Commun. Networks.

[249]  Kim-Kwang Raymond Choo,et al.  A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.

[250]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[251]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[252]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[253]  Victor C. M. Leung,et al.  Recent Advances in Industrial Wireless Sensor Networks Toward Efficient Management in IoT , 2015, IEEE Access.

[254]  Evangelos P. Markatos,et al.  A Generic Anonymization Framework for Network Traffic , 2006, 2006 IEEE International Conference on Communications.

[255]  Ali Daud,et al.  Corrigendum to "Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure" , 2019, Wirel. Commun. Mob. Comput..