Skip to main content

2018 | OriginalPaper | Buchkapitel

A Research on the IOT Perception Environment Security and Privacy Protection Technology

verfasst von : Xinli Zhou, Liangbin Yang, Yanmei Kang

Erschienen in: Frontier Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things, which is called the IOT for short, is the third wave of the information industry. Some simple superposition of the existing technology of privacy protection cannot meet the new demand for privacy protection of the Internet of Things in the third wave of the information industry. A timely overview of the development of the Internet of Things security and privacy technology, from numerous existing research results, will serve as a cornerstone of future research. Despite some literatures have given us a detailed summary of the relevant issues of the Internet of Things according to its perception or network, previous studies fail to discuss the terms of the overall framework of the Internet of Things or simply apply the security and privacy protection of the internet to the Internet of Things, which will inevitably affect the directions of future research more or less. This paper first analyzes the system structure and features of the Internet of Things, and then focuses on the security and privacy protection technology of the perceived environment by presenting a systematic overview of the current privacy protection technology concerning the Internet of Things, with a view to laying a foundation for future research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sun, Q.B., Liu, J., Li, S., Fan, C.X., Sun, J.J.: Internet of Things: summarize on concepts, architecture and key technology problem. J. Beijing Univ. Posts Telecommun. 33(3), 1–9 (2010). (in Chinese) Sun, Q.B., Liu, J., Li, S., Fan, C.X., Sun, J.J.: Internet of Things: summarize on concepts, architecture and key technology problem. J. Beijing Univ. Posts Telecommun. 33(3), 1–9 (2010). (in Chinese)
2.
Zurück zum Zitat International Telecommunication Union (ITU): ITU Internet Reports 2005: The Internet of Things. World Summit on the Information Society (WSIS), Tunis (2005) International Telecommunication Union (ITU): ITU Internet Reports 2005: The Internet of Things. World Summit on the Information Society (WSIS), Tunis (2005)
3.
Zurück zum Zitat Weber, R.H.: Internet of Things new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)CrossRef Weber, R.H.: Internet of Things new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)CrossRef
4.
Zurück zum Zitat Zhou, C.L.: Protection strategy of privacy data for the Internet of Things. Ms.D. thesis, Harbin Engineering University, Harbin (2012). (in Chinese) Zhou, C.L.: Protection strategy of privacy data for the Internet of Things. Ms.D. thesis, Harbin Engineering University, Harbin (2012). (in Chinese)
5.
Zurück zum Zitat Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRef Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRef
6.
Zurück zum Zitat Machanavajjhala, A., Gehrke, J., Kifer, D., et al.: L-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), pp. 24–36 (2006) Machanavajjhala, A., Gehrke, J., Kifer, D., et al.: L-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), pp. 24–36 (2006)
7.
Zurück zum Zitat Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey, pp. 106–115 (2007) Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey, pp. 106–115 (2007)
8.
Zurück zum Zitat Yu, R.X.: Research and application of location service privacy protection technology. Ms.D. thesis, Nanjing University of Science and Technology, Nanjing (2013). (in Chinese) Yu, R.X.: Research and application of location service privacy protection technology. Ms.D. thesis, Nanjing University of Science and Technology, Nanjing (2013). (in Chinese)
10.
Zurück zum Zitat Kalnis, P., Ghinita, G., Mouratidis, K., et al.: Preserving anonymity in location based services. Bt Technol. J. 21(1), 34–43 (2006) Kalnis, P., Ghinita, G., Mouratidis, K., et al.: Preserving anonymity in location based services. Bt Technol. J. 21(1), 34–43 (2006)
11.
Zurück zum Zitat Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the Internet of Things. In: Proceedings of the 20th Tyrrhenian Workshop on Digital Communications, pp. 389–395. Springer, Sardinia (2010)CrossRef Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the Internet of Things. In: Proceedings of the 20th Tyrrhenian Workshop on Digital Communications, pp. 389–395. Springer, Sardinia (2010)CrossRef
13.
Zurück zum Zitat Rieback, M.R., Crispo, B., Tanenbaum, A.S.: Is your cat infected with a computer virus? In: Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom), Pisa, Italy, 10–18 (2006) Rieback, M.R., Crispo, B., Tanenbaum, A.S.: Is your cat infected with a computer virus? In: Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom), Pisa, Italy, 10–18 (2006)
14.
Zurück zum Zitat Liu, X.L., Qi, H., Li, K.Q., Wu, J., Xue, W.L., Min, G.Y., Xiao, B.: Efficient detection of cloned attacks for large-scale RFID Systems. In: Lecture Notes in Computer Science, vol. 8630, pp. 85–99 (2014) Liu, X.L., Qi, H., Li, K.Q., Wu, J., Xue, W.L., Min, G.Y., Xiao, B.: Efficient detection of cloned attacks for large-scale RFID Systems. In: Lecture Notes in Computer Science, vol. 8630, pp. 85–99 (2014)
15.
Zurück zum Zitat Yan, T.: Research the key problems of privacy protection and key management in the Internet of Things. Ph.D. thesis. Beijing University of Posts and Telecommunications, Beijing (2012). (in Chinese) Yan, T.: Research the key problems of privacy protection and key management in the Internet of Things. Ph.D. thesis. Beijing University of Posts and Telecommunications, Beijing (2012). (in Chinese)
16.
Zurück zum Zitat Yang, G., Geng, G.N., Du, J.: Security threats and measures for the Internet of Things. J. Tsinghua Univ. (Sci. Tech.) 51(10), 1335–1340 (2011). (in Chinese) Yang, G., Geng, G.N., Du, J.: Security threats and measures for the Internet of Things. J. Tsinghua Univ. (Sci. Tech.) 51(10), 1335–1340 (2011). (in Chinese)
Metadaten
Titel
A Research on the IOT Perception Environment Security and Privacy Protection Technology
verfasst von
Xinli Zhou
Liangbin Yang
Yanmei Kang
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7398-4_11

Premium Partner