Skip to main content
Top

2017 | Book

Secure and Privacy-Preserving Data Communication in Internet of Things

insite
SEARCH

About this book


This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

Table of Contents

Frontmatter
Chapter 1. Introduction
Abstract
The Internet of Things (IoT) has altered our world into a more physically connected and formed a global network, enabling higher order applications. As smart devices and cars around us are able to freely communicate with each other, more opportunities and advantages are brought to us. However, as our information which is stored inside these objects is disclosed and shared, our security and privacy concerns call for a efficient protection mechanism more than ever. In this book, we focus on the security and privacy protection issues in three areas of IoTs, namely wireless sensor networks, smart grid and vehicular ad hoc networks. We aim to provide an extensive overview of existing work.
Liehuang Zhu, Zijian Zhang, Chang Xu
Chapter 2. Secure Data Aggregation in Wireless Sensor Networks
Abstract
Wireless sensor networks (WSNs) usually consists of a large number of sensors which have limited capability in terms of communication, computation and memory [1] (Akyildiz et al. IEEE Commun. Mag. 40 (8), 102–114, 2002), [2] (Yick et al. Comput. Networks, 52 (12), 2292–2330, 2008). These sensors are deployed in a remote and unsurveillant field and they autonomously form before they engage in a predefined sensing task. WSNs renders possible solutions to many problems in both civilian and military applications, including temperature monitoring, wildfire detection, animal tracking, and battlefield surveillance. Therefore, it is challenging to come up with efficient ways to collect desired data, given the sensors only have simple hardware and software resources. For instance, most of the sensors only have a short lifetime due to the non-rechargeable battery which is a bottleneck for designing WSNs protocols.
Liehuang Zhu, Zijian Zhang, Chang Xu
Chapter 3. Privacy-Preserving Meter Reading Transmission in Smart Grid
Abstract
In this chapter, the area of smart grid and privacy preservation schemes are discussed and compared in detail. Existing power grids generally carry energy from central locations to a large cluster of customers, such as a housing estate or an apartment block. Smart grid uses two-way flow using energy and information to increase automation and to better distribute energy flow throughout the grid. Smart grid utilizes modern technologies to deliver energy efficiently, and to respond to events within the grid, such as a power line failure (Gungor and Hancke, IEEE Trans Ind Electron 57(10):3357–3564, 2010, [1]).
Liehuang Zhu, Zijian Zhang, Chang Xu
Chapter 4. Security and Privacy Preservation in VANET
Abstract
Nowadays, more and more efforts have been started to improve road safety by applying intelligent systems.
Liehuang Zhu, Zijian Zhang, Chang Xu
Chapter 5. Conclusion
Abstract
Security and privacy issues are of great importance in the Internet of Things, catastrophic consequences will be happen if no proper mechanisms are enforced. This book first gives the problems, models, goals in wireless sensor networks, and then presents a detailed introduction of data aggregation schemes in terms of cryptography and non-cryptography. Afterwards, same introduction of problems, models, goals of smart grid and vehicular ad hoc networks are discussed, and privacy preservation schemes are presented. Inevitably, there are still several issues that have not been addressed by the existing research and many research directions are to be worked on.
Liehuang Zhu, Zijian Zhang, Chang Xu
Metadata
Title
Secure and Privacy-Preserving Data Communication in Internet of Things
Authors
Liehuang Zhu
Zijian Zhang
Chang Xu
Copyright Year
2017
Publisher
Springer Singapore
Electronic ISBN
978-981-10-3235-6
Print ISBN
978-981-10-3234-9
DOI
https://doi.org/10.1007/978-981-10-3235-6