Skip to main content

Managing Privacy in a Social Broker Internet of Thing

  • Conference paper
  • First Online:
  • 892 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11874))

Abstract

Smart homes, smart cities, smart everything and the Internet of Things (IoT) have incredible impact in our life. Typically, IoT devices are though vulnerable to attacks and the strategy to manage IoT security is influenced by the IoT model and the application field. Social Internet of Things (SIoT) can be viewed as the evolution of IoT in the same way social networks can be considered an evolution of the Internet. In this paper, we discuss about security issues on social IoT approach based on a social broker paradigm. In particular, we present a solution to manage information privacy in a SIoT environment built on a social broker.

This work has been partially supported by the Università degli Studi di Catania - Piano della Ricerca 2016–2018 Linea di intervento 2.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Abu-Elkheir, M., Hayajneh, M., Ali, N.A.: Data management for the Internet of Things: design primitives and solution. Sensors 13(11), 15582–15612 (2013). https://doi.org/10.3390/s131115582. https://www.mdpi.com/1424-8220/13/11/15582

    Article  Google Scholar 

  2. Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8–27 (2018). https://doi.org/10.1016/j.jisa.2017.11.002

    Article  Google Scholar 

  3. Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282, First 2014. https://doi.org/10.1109/SURV.2013.050113.00191

    Article  Google Scholar 

  4. Buzzanca, M., Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Direct trust assignment using social reputation and aging. J. Ambient Intell. Hum. Comput. 8(2), 167–175 (2017). https://doi.org/10.1007/s12652-016-0413-0

    Article  Google Scholar 

  5. Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: A social inspired broker for M2M protocols. In: Proceedings of COMPLEXIS 2019, pp. 101–105 (2019). https://doi.org/10.5220/0007765101010105. ISBN 978-989-758-366-7

  6. Carchiolo, V., Malgeri, M., Mangioni, G., Nicosia, V.: PROSA: P2P resource organisation by social acquaintances. In: Joseph, S., Despotovic, Z., Moro, G., Bergamaschi, S. (eds.) AP2PC 2006. LNCS (LNAI), vol. 4461, pp. 135–142. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79705-0_12

    Chapter  Google Scholar 

  7. Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: The cost of trust in the dynamics of best attachment. Comput. Inf. 34, 167–184 (2015)

    MATH  Google Scholar 

  8. Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Smart topic sharing in IoT platform based on a social inspired broker: a case study. In: Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., Ivanovic, M. (eds.) Accepted for Publication in Proceedings of IDC 2019 Conference, vol. 868, pp. 48–55. Springer, Heidelberg (2019)

    Google Scholar 

  9. Chae, S.H., Choi, W., Lee, J.H., Quek, T.Q.S.: Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone. IEEE Trans. Inf. Forensics Secur. 9(10), 1617–1628 (2014). https://doi.org/10.1109/TIFS.2014.2341453

    Article  Google Scholar 

  10. Chen, Y., Trappe, W., Martin, R.P.: Detecting and localizing wireless spoofing attacks. In: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 193–202, June 2007. https://doi.org/10.1109/SAHCN.2007.4292831

  11. D’Elia, A., Viola, F., Roffia, L., Cinotti, T.S.: A multi-broker platform for the Internet of Things. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) ruSMART 2015. LNCS, vol. 9247, pp. 34–46. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23126-6_4

    Chapter  Google Scholar 

  12. Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, WOWMOM 2006, pp. 564–570. IEEE Computer Society, Washington, DC, USA (2006). https://doi.org/10.1109/WOWMOM.2006.27. http://dx.doi.org/10.1109/WOWMOM.2006.27

  13. Foundation, O.: OWASP foundation, Accessed 2019. https://www.owasp.org

  14. Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.-W.: Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 116–122. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45427-6_10

    Chapter  Google Scholar 

  15. Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K.: 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, pp. 55–66. ACM, New York, NY, USA (2013). https://doi.org/10.1145/2462096.2462107. http://doi.acm.org/10.1145/2462096.2462107

  16. Hunkeler, U., Truong, H.L., Stanford-Clark, A.: MQTT-S - a publish/subscribe protocol for wireless sensor networks. In: 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE’08), pp. 791–798, January 2008. https://doi.org/10.1109/COMSWA.2008.4554519

  17. Jayaraman, P.P., Yang, X., Yavari, A., Georgakopoulos, D., Yi, X.: Privacy preserving Internet of Things: from privacy techniques to a blue print architecture and efficient implementation. Future Gener. Comput. Syst. 76, 540–549 (2017). Kindly provide complete details for Ref. [19]

    Article  Google Scholar 

  18. Kim, H.: Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. In: 2008 International Conference on Convergence and Hybrid Information Technology, pp. 796–801, August 2008. https://doi.org/10.1109/ICHIT.2008.261

  19. Kumar, J.S., Patel, D.R.: A survey on Internet of Things: security and privacy issues (2014)

    Google Scholar 

  20. Mendes, P., Mendes, P.A.: Social-driven internet of connected objects (2011)

    Google Scholar 

  21. Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A., Tarkoma, S.: IoT sentinel: automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177–2184, June 2017. https://doi.org/10.1109/ICDCS.2017.283

  22. Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social Internet of Things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2013)

    Article  Google Scholar 

  23. Noubir, G., Lin, G.: Low-power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 29–30 (2003). https://doi.org/10.1145/961268.961277. http://doi.acm.org/10.1145/961268.961277

    Article  Google Scholar 

  24. Pecorella, T., Brilli, L., Mucchi, L.: The role of physical layer security in IoT: a novel perspective. Information 7(3) (2016). https://doi.org/10.3390/info7030049, https://www.mdpi.com/2078-2489/7/3/49

    Article  Google Scholar 

  25. Riaz, R., Kim, K., Ahmed, H.F.: Security analysis survey and framework design for IP connected LoWPANs. In: 2009 International Symposium on Autonomous Decentralized Systems, pp. 1–6, March 2009. https://doi.org/10.1109/ISADS.2009.5207373

  26. Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed Internet of Things. Comput. Netw. 57(10), 2266–2279 (2013). https://doi.org/10.1016/j.comnet.2012.12.018. http://dx.doi.org/10.1016/j.comnet.2012.12.018

    Article  Google Scholar 

  27. Saleem, Y., Crespi, N., Pace, P.: SCDIoT: social cross-domain IoT enabling application-to-application communications. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), pp. 346–350, April 2018. https://doi.org/10.1109/IC2E.2018.00068

  28. Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  29. Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International (1998)

    Google Scholar 

  30. Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the Internet of Things. Digit. Commun. Netw. 4(2), 118–137 (2018). https://doi.org/10.1016/j.dcan.2017.04.003. http://www.sciencedirect.com/science/article/pii/S2352864817300214

    Article  Google Scholar 

  31. Sharma, V., You, I., Jayakody, D.N.K., Atiquzzaman, M.: Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internetof Things. Future Gener. Comput. Syst. 92, 758–776 (2019). https://doi.org/10.1016/j.future.2017.12.039. http://www.sciencedirect.com/science/article/pii/S0167739X17312748

    Article  Google Scholar 

  32. Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015). https://doi.org/10.1016/j.comnet.2014.11.008. http://www.sciencedirect.com/science/article/pii/S1389128614003971

    Article  Google Scholar 

  33. Truong, N.B., Um, T.W., Lee, G.M.: A reputation and knowledge based trust service platform for trustworthy social Internet of Things. Innovations in clouds, Internet and networks (ICIN) (2016)

    Google Scholar 

  34. Vikas, B.: Internet of Things (IoT): a survey on privacy issues and security. Int. J. Sci. Res. Sci. Eng. Technol. IJSRSET 1, 168–173 (2015)

    Google Scholar 

  35. Vinoski, S.: Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87–89 (2006). https://doi.org/10.1109/MIC.2006.116

    Article  Google Scholar 

  36. Wazid, M., Das, A.K., Kumari, S., Khan, M.K.: Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur. Commun. Netw. 9(17), 4596–4614 (2016). https://doi.org/10.1002/sec.1652. https://doi.org/10.1002/sec.1652

    Article  Google Scholar 

  37. Weber, R.H.: Internet of Things ? New security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010). https://doi.org/10.1016/j.clsr.2009.11.008. http://www.sciencedirect.com/science/article/pii/S0267364909001939

    Article  MathSciNet  Google Scholar 

  38. Weekly, K., Pister, K.: Evaluating sinkhole defense techniques in RPL networks. In: 2012 20th IEEE International Conference on Network Protocols (ICNP), pp. 1–6, October 2012. https://doi.org/10.1109/ICNP.2012.6459948

  39. Xiao, L., Greenstein, L., Mandayam, N., Trappe, W.: Fingerprints in the ether: using the physical layer for wireless authentication. In: 2007 IEEE International Conference on Communications, pp. 4646–4651, June 2007. https://doi.org/10.1109/ICC.2007.767

  40. Xiao, L., Greenstein, L.J., Mandayam, N.B., Trappe, W.: Channel-based detection of sybil attacks in wireless networks. IEEE Trans. Inf. Forensics Secur. 4(3), 492–503 (2009). https://doi.org/10.1109/TIFS.2009.2026454

    Article  Google Scholar 

  41. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’05, pp. 46–57. ACM, New York (2005). https://doi.org/10.1145/1062689.1062697. http://doi.acm.org/10.1145/1062689.1062697

  42. Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017). https://doi.org/10.1109/JIOT.2017.2694844

    Article  Google Scholar 

  43. Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016). https://doi.org/10.1109/ACCESS.2016.2577036

    Article  Google Scholar 

  44. Zhang, Z., Cho, M.C.Y., Wang, C., Hsu, C., Chen, C., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 230–234, November 2014. https://doi.org/10.1109/SOCA.2014.58

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Longheu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G. (2019). Managing Privacy in a Social Broker Internet of Thing. In: Montella, R., Ciaramella, A., Fortino, G., Guerrieri, A., Liotta, A. (eds) Internet and Distributed Computing Systems . IDCS 2019. Lecture Notes in Computer Science(), vol 11874. Springer, Cham. https://doi.org/10.1007/978-3-030-34914-1_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34914-1_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34913-4

  • Online ISBN: 978-3-030-34914-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics