Managing Privacy in a Social Broker Internet of Thing

  • V. Carchiolo
  • A. LongheuEmail author
  • M. Malgeri
  • G. Mangioni
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11874)


Smart homes, smart cities, smart everything and the Internet of Things (IoT) have incredible impact in our life. Typically, IoT devices are though vulnerable to attacks and the strategy to manage IoT security is influenced by the IoT model and the application field. Social Internet of Things (SIoT) can be viewed as the evolution of IoT in the same way social networks can be considered an evolution of the Internet. In this paper, we discuss about security issues on social IoT approach based on a social broker paradigm. In particular, we present a solution to manage information privacy in a SIoT environment built on a social broker.


Social networks IoT Information broker Publish-subscribe model Trust network Security and privacy 


  1. 1.
    Abu-Elkheir, M., Hayajneh, M., Ali, N.A.: Data management for the Internet of Things: design primitives and solution. Sensors 13(11), 15582–15612 (2013). Scholar
  2. 2.
    Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8–27 (2018). Scholar
  3. 3.
    Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282, First 2014. Scholar
  4. 4.
    Buzzanca, M., Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Direct trust assignment using social reputation and aging. J. Ambient Intell. Hum. Comput. 8(2), 167–175 (2017). Scholar
  5. 5.
    Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: A social inspired broker for M2M protocols. In: Proceedings of COMPLEXIS 2019, pp. 101–105 (2019). ISBN 978-989-758-366-7
  6. 6.
    Carchiolo, V., Malgeri, M., Mangioni, G., Nicosia, V.: PROSA: P2P resource organisation by social acquaintances. In: Joseph, S., Despotovic, Z., Moro, G., Bergamaschi, S. (eds.) AP2PC 2006. LNCS (LNAI), vol. 4461, pp. 135–142. Springer, Heidelberg (2008). Scholar
  7. 7.
    Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: The cost of trust in the dynamics of best attachment. Comput. Inf. 34, 167–184 (2015)zbMATHGoogle Scholar
  8. 8.
    Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G.: Smart topic sharing in IoT platform based on a social inspired broker: a case study. In: Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., Ivanovic, M. (eds.) Accepted for Publication in Proceedings of IDC 2019 Conference, vol. 868, pp. 48–55. Springer, Heidelberg (2019)Google Scholar
  9. 9.
    Chae, S.H., Choi, W., Lee, J.H., Quek, T.Q.S.: Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone. IEEE Trans. Inf. Forensics Secur. 9(10), 1617–1628 (2014). Scholar
  10. 10.
    Chen, Y., Trappe, W., Martin, R.P.: Detecting and localizing wireless spoofing attacks. In: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 193–202, June 2007.
  11. 11.
    D’Elia, A., Viola, F., Roffia, L., Cinotti, T.S.: A multi-broker platform for the Internet of Things. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) ruSMART 2015. LNCS, vol. 9247, pp. 34–46. Springer, Cham (2015). Scholar
  12. 12.
    Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, WOWMOM 2006, pp. 564–570. IEEE Computer Society, Washington, DC, USA (2006).
  13. 13.
    Foundation, O.: OWASP foundation, Accessed 2019.
  14. 14.
    Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.-W.: Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 116–122. Springer, Heidelberg (2001). Scholar
  15. 15.
    Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K.: 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, pp. 55–66. ACM, New York, NY, USA (2013).
  16. 16.
    Hunkeler, U., Truong, H.L., Stanford-Clark, A.: MQTT-S - a publish/subscribe protocol for wireless sensor networks. In: 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE’08), pp. 791–798, January 2008.
  17. 17.
    Jayaraman, P.P., Yang, X., Yavari, A., Georgakopoulos, D., Yi, X.: Privacy preserving Internet of Things: from privacy techniques to a blue print architecture and efficient implementation. Future Gener. Comput. Syst. 76, 540–549 (2017). Kindly provide complete details for Ref. [19]CrossRefGoogle Scholar
  18. 18.
    Kim, H.: Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. In: 2008 International Conference on Convergence and Hybrid Information Technology, pp. 796–801, August 2008.
  19. 19.
    Kumar, J.S., Patel, D.R.: A survey on Internet of Things: security and privacy issues (2014)Google Scholar
  20. 20.
    Mendes, P., Mendes, P.A.: Social-driven internet of connected objects (2011)Google Scholar
  21. 21.
    Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A., Tarkoma, S.: IoT sentinel: automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177–2184, June 2017.
  22. 22.
    Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social Internet of Things. IEEE Trans. Knowl. Data Eng. 26(5), 1253–1266 (2013)CrossRefGoogle Scholar
  23. 23.
    Noubir, G., Lin, G.: Low-power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 29–30 (2003). Scholar
  24. 24.
    Pecorella, T., Brilli, L., Mucchi, L.: The role of physical layer security in IoT: a novel perspective. Information 7(3) (2016)., Scholar
  25. 25.
    Riaz, R., Kim, K., Ahmed, H.F.: Security analysis survey and framework design for IP connected LoWPANs. In: 2009 International Symposium on Autonomous Decentralized Systems, pp. 1–6, March 2009.
  26. 26.
    Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed Internet of Things. Comput. Netw. 57(10), 2266–2279 (2013). Scholar
  27. 27.
    Saleem, Y., Crespi, N., Pace, P.: SCDIoT: social cross-domain IoT enabling application-to-application communications. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), pp. 346–350, April 2018.
  28. 28.
    Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)CrossRefGoogle Scholar
  29. 29.
    Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International (1998)Google Scholar
  30. 30.
    Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the Internet of Things. Digit. Commun. Netw. 4(2), 118–137 (2018). Scholar
  31. 31.
    Sharma, V., You, I., Jayakody, D.N.K., Atiquzzaman, M.: Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internetof Things. Future Gener. Comput. Syst. 92, 758–776 (2019). Scholar
  32. 32.
    Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015). Scholar
  33. 33.
    Truong, N.B., Um, T.W., Lee, G.M.: A reputation and knowledge based trust service platform for trustworthy social Internet of Things. Innovations in clouds, Internet and networks (ICIN) (2016)Google Scholar
  34. 34.
    Vikas, B.: Internet of Things (IoT): a survey on privacy issues and security. Int. J. Sci. Res. Sci. Eng. Technol. IJSRSET 1, 168–173 (2015)Google Scholar
  35. 35.
    Vinoski, S.: Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87–89 (2006). Scholar
  36. 36.
    Wazid, M., Das, A.K., Kumari, S., Khan, M.K.: Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur. Commun. Netw. 9(17), 4596–4614 (2016). Scholar
  37. 37.
    Weber, R.H.: Internet of Things ? New security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010). Scholar
  38. 38.
    Weekly, K., Pister, K.: Evaluating sinkhole defense techniques in RPL networks. In: 2012 20th IEEE International Conference on Network Protocols (ICNP), pp. 1–6, October 2012.
  39. 39.
    Xiao, L., Greenstein, L., Mandayam, N., Trappe, W.: Fingerprints in the ether: using the physical layer for wireless authentication. In: 2007 IEEE International Conference on Communications, pp. 4646–4651, June 2007.
  40. 40.
    Xiao, L., Greenstein, L.J., Mandayam, N.B., Trappe, W.: Channel-based detection of sybil attacks in wireless networks. IEEE Trans. Inf. Forensics Secur. 4(3), 492–503 (2009). Scholar
  41. 41.
    Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’05, pp. 46–57. ACM, New York (2005).
  42. 42.
    Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017). Scholar
  43. 43.
    Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016). Scholar
  44. 44.
    Zhang, Z., Cho, M.C.Y., Wang, C., Hsu, C., Chen, C., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 230–234, November 2014.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Dip. Matematica e InformaticaUniversità degli Studi di CataniaCataniaItaly
  2. 2.Dip. Ingegneria Elettrica, Elettronica e InformaticaUniversità degli Studi di CataniaCataniaItaly

Personalised recommendations