A Survey on Internet of Things: Security and Privacy Issues

This paper introduces Internet of Things (IoTs), which offers capabilities to identify and connect worldwide physical objects into a unified system. As a part of IoTs, serious concerns are raised over access of personal information pertaining to device and individual privacy. This survey summarizes the security threats and privacy concerns of IoT..

[1]  Li Yang,et al.  Application of Internet of Things in the Community Security Management , 2011, 2011 Third International Conference on Computational Intelligence, Communication Systems and Networks.

[2]  Giannis F. Marias,et al.  Towards secure and context-aware information lookup for the Internet of Things , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[3]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[4]  Gang Gan,et al.  Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.

[5]  Qiaoyan Wen,et al.  Preserving Sensor Location Privacy in Internet of Things , 2012, 2012 Fourth International Conference on Computational and Information Sciences.

[6]  Ali Emre Pusane,et al.  On the use of modern coding techniques in QR applications , 2013, 2013 21st Signal Processing and Communications Applications Conference (SIU).

[7]  Fei Shao,et al.  Digital Rights Management and Access Control in Multimedia Social Networks , 2013, ICGEC.

[8]  Mats Näslund,et al.  Privacy in machine-to-machine communications A state-of-the-art survey , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).

[9]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[10]  Larry A. Wasserman,et al.  Differential privacy for functions and functional data , 2012, J. Mach. Learn. Res..

[11]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[12]  Jiang Du,et al.  A study of information security for M2M of IOT , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[13]  Robert W. Shirey,et al.  Internet Security Glossary , 2000, RFC.

[14]  Kang Bing,et al.  Design of an Internet of Things-based smart home system , 2011, 2011 2nd International Conference on Intelligent Control and Information Processing.