Abstract
Smart homes, smart cities, smart everything and the Internet of Things (IoT) have incredible impact in our life. Typically, IoT devices are though vulnerable to attacks and the strategy to manage IoT security is influenced by the IoT model and the application field. Social Internet of Things (SIoT) can be viewed as the evolution of IoT in the same way social networks can be considered an evolution of the Internet. In this paper, we discuss about security issues on social IoT approach based on a social broker paradigm. In particular, we present a solution to manage information privacy in a SIoT environment built on a social broker.
This work has been partially supported by the Università degli Studi di Catania - Piano della Ricerca 2016–2018 Linea di intervento 2.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Abu-Elkheir, M., Hayajneh, M., Ali, N.A.: Data management for the Internet of Things: design primitives and solution. Sensors 13(11), 15582–15612 (2013). https://doi.org/10.3390/s131115582. https://www.mdpi.com/1424-8220/13/11/15582
Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8–27 (2018). https://doi.org/10.1016/j.jisa.2017.11.002
Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282, First 2014. https://doi.org/10.1109/SURV.2013.050113.00191
Buzzanca, M., Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Direct trust assignment using social reputation and aging. J. Ambient Intell. Hum. Comput. 8(2), 167–175 (2017). https://doi.org/10.1007/s12652-016-0413-0
Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: A social inspired broker for M2M protocols. In: Proceedings of COMPLEXIS 2019, pp. 101–105 (2019). https://doi.org/10.5220/0007765101010105. ISBN 978-989-758-366-7
Carchiolo, V., Malgeri, M., Mangioni, G., Nicosia, V.: PROSA: P2P resource organisation by social acquaintances. In: Joseph, S., Despotovic, Z., Moro, G., Bergamaschi, S. (eds.) AP2PC 2006. LNCS (LNAI), vol. 4461, pp. 135–142. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79705-0_12
Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: The cost of trust in the dynamics of best attachment. Comput. Inf. 34, 167–184 (2015)
Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Smart topic sharing in IoT platform based on a social inspired broker: a case study. In: Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., Ivanovic, M. (eds.) Accepted for Publication in Proceedings of IDC 2019 Conference, vol. 868, pp. 48–55. Springer, Heidelberg (2019)
Chae, S.H., Choi, W., Lee, J.H., Quek, T.Q.S.: Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone. IEEE Trans. Inf. Forensics Secur. 9(10), 1617–1628 (2014). https://doi.org/10.1109/TIFS.2014.2341453
Chen, Y., Trappe, W., Martin, R.P.: Detecting and localizing wireless spoofing attacks. In: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 193–202, June 2007. https://doi.org/10.1109/SAHCN.2007.4292831
D’Elia, A., Viola, F., Roffia, L., Cinotti, T.S.: A multi-broker platform for the Internet of Things. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) ruSMART 2015. LNCS, vol. 9247, pp. 34–46. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23126-6_4
Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, WOWMOM 2006, pp. 564–570. IEEE Computer Society, Washington, DC, USA (2006). https://doi.org/10.1109/WOWMOM.2006.27. http://dx.doi.org/10.1109/WOWMOM.2006.27
Foundation, O.: OWASP foundation, Accessed 2019. https://www.owasp.org
Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.-W.: Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 116–122. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45427-6_10
Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K.: 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, pp. 55–66. ACM, New York, NY, USA (2013). https://doi.org/10.1145/2462096.2462107. http://doi.acm.org/10.1145/2462096.2462107
Hunkeler, U., Truong, H.L., Stanford-Clark, A.: MQTT-S - a publish/subscribe protocol for wireless sensor networks. In: 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE’08), pp. 791–798, January 2008. https://doi.org/10.1109/COMSWA.2008.4554519
Jayaraman, P.P., Yang, X., Yavari, A., Georgakopoulos, D., Yi, X.: Privacy preserving Internet of Things: from privacy techniques to a blue print architecture and efficient implementation. Future Gener. Comput. Syst. 76, 540–549 (2017). Kindly provide complete details for Ref. [19]
Kim, H.: Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. In: 2008 International Conference on Convergence and Hybrid Information Technology, pp. 796–801, August 2008. https://doi.org/10.1109/ICHIT.2008.261
Kumar, J.S., Patel, D.R.: A survey on Internet of Things: security and privacy issues (2014)
Mendes, P., Mendes, P.A.: Social-driven internet of connected objects (2011)
Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A., Tarkoma, S.: IoT sentinel: automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177–2184, June 2017. https://doi.org/10.1109/ICDCS.2017.283
Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social Internet of Things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2013)
Noubir, G., Lin, G.: Low-power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 29–30 (2003). https://doi.org/10.1145/961268.961277. http://doi.acm.org/10.1145/961268.961277
Pecorella, T., Brilli, L., Mucchi, L.: The role of physical layer security in IoT: a novel perspective. Information 7(3) (2016). https://doi.org/10.3390/info7030049, https://www.mdpi.com/2078-2489/7/3/49
Riaz, R., Kim, K., Ahmed, H.F.: Security analysis survey and framework design for IP connected LoWPANs. In: 2009 International Symposium on Autonomous Decentralized Systems, pp. 1–6, March 2009. https://doi.org/10.1109/ISADS.2009.5207373
Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed Internet of Things. Comput. Netw. 57(10), 2266–2279 (2013). https://doi.org/10.1016/j.comnet.2012.12.018. http://dx.doi.org/10.1016/j.comnet.2012.12.018
Saleem, Y., Crespi, N., Pace, P.: SCDIoT: social cross-domain IoT enabling application-to-application communications. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), pp. 346–350, April 2018. https://doi.org/10.1109/IC2E.2018.00068
Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International (1998)
Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the Internet of Things. Digit. Commun. Netw. 4(2), 118–137 (2018). https://doi.org/10.1016/j.dcan.2017.04.003. http://www.sciencedirect.com/science/article/pii/S2352864817300214
Sharma, V., You, I., Jayakody, D.N.K., Atiquzzaman, M.: Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internetof Things. Future Gener. Comput. Syst. 92, 758–776 (2019). https://doi.org/10.1016/j.future.2017.12.039. http://www.sciencedirect.com/science/article/pii/S0167739X17312748
Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015). https://doi.org/10.1016/j.comnet.2014.11.008. http://www.sciencedirect.com/science/article/pii/S1389128614003971
Truong, N.B., Um, T.W., Lee, G.M.: A reputation and knowledge based trust service platform for trustworthy social Internet of Things. Innovations in clouds, Internet and networks (ICIN) (2016)
Vikas, B.: Internet of Things (IoT): a survey on privacy issues and security. Int. J. Sci. Res. Sci. Eng. Technol. IJSRSET 1, 168–173 (2015)
Vinoski, S.: Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87–89 (2006). https://doi.org/10.1109/MIC.2006.116
Wazid, M., Das, A.K., Kumari, S., Khan, M.K.: Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur. Commun. Netw. 9(17), 4596–4614 (2016). https://doi.org/10.1002/sec.1652. https://doi.org/10.1002/sec.1652
Weber, R.H.: Internet of Things ? New security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010). https://doi.org/10.1016/j.clsr.2009.11.008. http://www.sciencedirect.com/science/article/pii/S0267364909001939
Weekly, K., Pister, K.: Evaluating sinkhole defense techniques in RPL networks. In: 2012 20th IEEE International Conference on Network Protocols (ICNP), pp. 1–6, October 2012. https://doi.org/10.1109/ICNP.2012.6459948
Xiao, L., Greenstein, L., Mandayam, N., Trappe, W.: Fingerprints in the ether: using the physical layer for wireless authentication. In: 2007 IEEE International Conference on Communications, pp. 4646–4651, June 2007. https://doi.org/10.1109/ICC.2007.767
Xiao, L., Greenstein, L.J., Mandayam, N.B., Trappe, W.: Channel-based detection of sybil attacks in wireless networks. IEEE Trans. Inf. Forensics Secur. 4(3), 492–503 (2009). https://doi.org/10.1109/TIFS.2009.2026454
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’05, pp. 46–57. ACM, New York (2005). https://doi.org/10.1145/1062689.1062697. http://doi.acm.org/10.1145/1062689.1062697
Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017). https://doi.org/10.1109/JIOT.2017.2694844
Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016). https://doi.org/10.1109/ACCESS.2016.2577036
Zhang, Z., Cho, M.C.Y., Wang, C., Hsu, C., Chen, C., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 230–234, November 2014. https://doi.org/10.1109/SOCA.2014.58
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G. (2019). Managing Privacy in a Social Broker Internet of Thing. In: Montella, R., Ciaramella, A., Fortino, G., Guerrieri, A., Liotta, A. (eds) Internet and Distributed Computing Systems . IDCS 2019. Lecture Notes in Computer Science(), vol 11874. Springer, Cham. https://doi.org/10.1007/978-3-030-34914-1_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-34914-1_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34913-4
Online ISBN: 978-3-030-34914-1
eBook Packages: Computer ScienceComputer Science (R0)