Advertisement

Managing Privacy in a Social Broker Internet of Thing

  • V. Carchiolo
  • A. LongheuEmail author
  • M. Malgeri
  • G. Mangioni
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11874)

Abstract

Smart homes, smart cities, smart everything and the Internet of Things (IoT) have incredible impact in our life. Typically, IoT devices are though vulnerable to attacks and the strategy to manage IoT security is influenced by the IoT model and the application field. Social Internet of Things (SIoT) can be viewed as the evolution of IoT in the same way social networks can be considered an evolution of the Internet. In this paper, we discuss about security issues on social IoT approach based on a social broker paradigm. In particular, we present a solution to manage information privacy in a SIoT environment built on a social broker.

Keywords

Social networks IoT Information broker Publish-subscribe model Trust network Security and privacy 

References

  1. 1.
    Abu-Elkheir, M., Hayajneh, M., Ali, N.A.: Data management for the Internet of Things: design primitives and solution. Sensors 13(11), 15582–15612 (2013).  https://doi.org/10.3390/s131115582. https://www.mdpi.com/1424-8220/13/11/15582CrossRefGoogle Scholar
  2. 2.
    Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8–27 (2018).  https://doi.org/10.1016/j.jisa.2017.11.002CrossRefGoogle Scholar
  3. 3.
    Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282, First 2014.  https://doi.org/10.1109/SURV.2013.050113.00191CrossRefGoogle Scholar
  4. 4.
    Buzzanca, M., Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Direct trust assignment using social reputation and aging. J. Ambient Intell. Hum. Comput. 8(2), 167–175 (2017).  https://doi.org/10.1007/s12652-016-0413-0CrossRefGoogle Scholar
  5. 5.
    Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: A social inspired broker for M2M protocols. In: Proceedings of COMPLEXIS 2019, pp. 101–105 (2019).  https://doi.org/10.5220/0007765101010105. ISBN 978-989-758-366-7
  6. 6.
    Carchiolo, V., Malgeri, M., Mangioni, G., Nicosia, V.: PROSA: P2P resource organisation by social acquaintances. In: Joseph, S., Despotovic, Z., Moro, G., Bergamaschi, S. (eds.) AP2PC 2006. LNCS (LNAI), vol. 4461, pp. 135–142. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-79705-0_12CrossRefGoogle Scholar
  7. 7.
    Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: The cost of trust in the dynamics of best attachment. Comput. Inf. 34, 167–184 (2015)zbMATHGoogle Scholar
  8. 8.
    Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Smart topic sharing in IoT platform based on a social inspired broker: a case study. In: Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., Ivanovic, M. (eds.) Accepted for Publication in Proceedings of IDC 2019 Conference, vol. 868, pp. 48–55. Springer, Heidelberg (2019)Google Scholar
  9. 9.
    Chae, S.H., Choi, W., Lee, J.H., Quek, T.Q.S.: Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone. IEEE Trans. Inf. Forensics Secur. 9(10), 1617–1628 (2014).  https://doi.org/10.1109/TIFS.2014.2341453CrossRefGoogle Scholar
  10. 10.
    Chen, Y., Trappe, W., Martin, R.P.: Detecting and localizing wireless spoofing attacks. In: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 193–202, June 2007.  https://doi.org/10.1109/SAHCN.2007.4292831
  11. 11.
    D’Elia, A., Viola, F., Roffia, L., Cinotti, T.S.: A multi-broker platform for the Internet of Things. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) ruSMART 2015. LNCS, vol. 9247, pp. 34–46. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-23126-6_4CrossRefGoogle Scholar
  12. 12.
    Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, WOWMOM 2006, pp. 564–570. IEEE Computer Society, Washington, DC, USA (2006).  https://doi.org/10.1109/WOWMOM.2006.27. http://dx.doi.org/10.1109/WOWMOM.2006.27
  13. 13.
    Foundation, O.: OWASP foundation, Accessed 2019. https://www.owasp.org
  14. 14.
    Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.-W.: Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 116–122. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-45427-6_10CrossRefGoogle Scholar
  15. 15.
    Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K.: 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, pp. 55–66. ACM, New York, NY, USA (2013).  https://doi.org/10.1145/2462096.2462107. http://doi.acm.org/10.1145/2462096.2462107
  16. 16.
    Hunkeler, U., Truong, H.L., Stanford-Clark, A.: MQTT-S - a publish/subscribe protocol for wireless sensor networks. In: 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE’08), pp. 791–798, January 2008.  https://doi.org/10.1109/COMSWA.2008.4554519
  17. 17.
    Jayaraman, P.P., Yang, X., Yavari, A., Georgakopoulos, D., Yi, X.: Privacy preserving Internet of Things: from privacy techniques to a blue print architecture and efficient implementation. Future Gener. Comput. Syst. 76, 540–549 (2017). Kindly provide complete details for Ref. [19]CrossRefGoogle Scholar
  18. 18.
    Kim, H.: Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. In: 2008 International Conference on Convergence and Hybrid Information Technology, pp. 796–801, August 2008.  https://doi.org/10.1109/ICHIT.2008.261
  19. 19.
    Kumar, J.S., Patel, D.R.: A survey on Internet of Things: security and privacy issues (2014)Google Scholar
  20. 20.
    Mendes, P., Mendes, P.A.: Social-driven internet of connected objects (2011)Google Scholar
  21. 21.
    Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A., Tarkoma, S.: IoT sentinel: automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177–2184, June 2017.  https://doi.org/10.1109/ICDCS.2017.283
  22. 22.
    Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social Internet of Things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2013)CrossRefGoogle Scholar
  23. 23.
    Noubir, G., Lin, G.: Low-power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 29–30 (2003).  https://doi.org/10.1145/961268.961277. http://doi.acm.org/10.1145/961268.961277CrossRefGoogle Scholar
  24. 24.
    Pecorella, T., Brilli, L., Mucchi, L.: The role of physical layer security in IoT: a novel perspective. Information 7(3) (2016).  https://doi.org/10.3390/info7030049, https://www.mdpi.com/2078-2489/7/3/49CrossRefGoogle Scholar
  25. 25.
    Riaz, R., Kim, K., Ahmed, H.F.: Security analysis survey and framework design for IP connected LoWPANs. In: 2009 International Symposium on Autonomous Decentralized Systems, pp. 1–6, March 2009.  https://doi.org/10.1109/ISADS.2009.5207373
  26. 26.
    Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed Internet of Things. Comput. Netw. 57(10), 2266–2279 (2013).  https://doi.org/10.1016/j.comnet.2012.12.018. http://dx.doi.org/10.1016/j.comnet.2012.12.018CrossRefGoogle Scholar
  27. 27.
    Saleem, Y., Crespi, N., Pace, P.: SCDIoT: social cross-domain IoT enabling application-to-application communications. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), pp. 346–350, April 2018.  https://doi.org/10.1109/IC2E.2018.00068
  28. 28.
    Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)CrossRefGoogle Scholar
  29. 29.
    Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International (1998)Google Scholar
  30. 30.
    Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the Internet of Things. Digit. Commun. Netw. 4(2), 118–137 (2018).  https://doi.org/10.1016/j.dcan.2017.04.003. http://www.sciencedirect.com/science/article/pii/S2352864817300214CrossRefGoogle Scholar
  31. 31.
    Sharma, V., You, I., Jayakody, D.N.K., Atiquzzaman, M.: Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internetof Things. Future Gener. Comput. Syst. 92, 758–776 (2019).  https://doi.org/10.1016/j.future.2017.12.039. http://www.sciencedirect.com/science/article/pii/S0167739X17312748CrossRefGoogle Scholar
  32. 32.
    Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015).  https://doi.org/10.1016/j.comnet.2014.11.008. http://www.sciencedirect.com/science/article/pii/S1389128614003971CrossRefGoogle Scholar
  33. 33.
    Truong, N.B., Um, T.W., Lee, G.M.: A reputation and knowledge based trust service platform for trustworthy social Internet of Things. Innovations in clouds, Internet and networks (ICIN) (2016)Google Scholar
  34. 34.
    Vikas, B.: Internet of Things (IoT): a survey on privacy issues and security. Int. J. Sci. Res. Sci. Eng. Technol. IJSRSET 1, 168–173 (2015)Google Scholar
  35. 35.
    Vinoski, S.: Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87–89 (2006).  https://doi.org/10.1109/MIC.2006.116CrossRefGoogle Scholar
  36. 36.
    Wazid, M., Das, A.K., Kumari, S., Khan, M.K.: Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur. Commun. Netw. 9(17), 4596–4614 (2016).  https://doi.org/10.1002/sec.1652. https://doi.org/10.1002/sec.1652CrossRefGoogle Scholar
  37. 37.
    Weber, R.H.: Internet of Things ? New security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010).  https://doi.org/10.1016/j.clsr.2009.11.008. http://www.sciencedirect.com/science/article/pii/S0267364909001939MathSciNetCrossRefGoogle Scholar
  38. 38.
    Weekly, K., Pister, K.: Evaluating sinkhole defense techniques in RPL networks. In: 2012 20th IEEE International Conference on Network Protocols (ICNP), pp. 1–6, October 2012.  https://doi.org/10.1109/ICNP.2012.6459948
  39. 39.
    Xiao, L., Greenstein, L., Mandayam, N., Trappe, W.: Fingerprints in the ether: using the physical layer for wireless authentication. In: 2007 IEEE International Conference on Communications, pp. 4646–4651, June 2007.  https://doi.org/10.1109/ICC.2007.767
  40. 40.
    Xiao, L., Greenstein, L.J., Mandayam, N.B., Trappe, W.: Channel-based detection of sybil attacks in wireless networks. IEEE Trans. Inf. Forensics Secur. 4(3), 492–503 (2009).  https://doi.org/10.1109/TIFS.2009.2026454CrossRefGoogle Scholar
  41. 41.
    Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’05, pp. 46–57. ACM, New York (2005).  https://doi.org/10.1145/1062689.1062697. http://doi.acm.org/10.1145/1062689.1062697
  42. 42.
    Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017).  https://doi.org/10.1109/JIOT.2017.2694844CrossRefGoogle Scholar
  43. 43.
    Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016).  https://doi.org/10.1109/ACCESS.2016.2577036CrossRefGoogle Scholar
  44. 44.
    Zhang, Z., Cho, M.C.Y., Wang, C., Hsu, C., Chen, C., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 230–234, November 2014.  https://doi.org/10.1109/SOCA.2014.58

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Dip. Matematica e InformaticaUniversità degli Studi di CataniaCataniaItaly
  2. 2.Dip. Ingegneria Elettrica, Elettronica e InformaticaUniversità degli Studi di CataniaCataniaItaly

Personalised recommendations