Skip to main content

Privacy Implications of the Internet of Things

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 277))

Abstract

The Internet of Things (IoT) is likely to become one of the milestones which is going to determine the technological advance for the future. At the same time, new privacy concerns arise which might seriously impede the adoption of such systems. In this paper, we provide for our view on privacy implications of IoT focusing on RFID technology as one of its main enablers and suggest possible solutions to developing IoT systems in a privacy-respecting and secure way.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Comput. Netw. 54, 2787–2805 (2010)

    Article  MATH  Google Scholar 

  2. Hui, J.W., Culler, D.E.: Extending IP to low-power, wireless personal area networks. IEEE Internet Computing 12(4), 37–45 (2008)

    Article  Google Scholar 

  3. Krikorian, R., Gershenfeld, N., Cohen, D.: The Internet of Things. Scientific American, 76–81 (October 2004)

    Google Scholar 

  4. Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M., Borriello, G.: Building the internet of things using RFID: The RFID ecosystem experience. IEEE Internet Computing 13(3), 48–55 (2009)

    Article  Google Scholar 

  5. Gudymenko, I., Borcea-Pfitzmann, K.: A Framework for Transforming Abstract Privacy Models into Implementable System Requirements. In: 1st International Workshop on Model-based Interactive Ubiquitous Systems (2011)

    Google Scholar 

  6. Benetton to tag 15 million items (March 2003), http://www.rfidjournal.com/article/view/344 (accessed on July 18, 2011)

  7. Gonsalves, A.: Privacy concerns hinder RFID rollout (January 2000), http://www.itnews.com.au/News/11417,privacy-concerns-hinder-rfid-rollout.aspx (accessed on July 18, 2011)

  8. Weber, R.H.: Internet of things - new security and privacy challenges. Computer Law & Security Review 26(1), 23–30 (2010)

    Article  Google Scholar 

  9. Report: Privacy and data protection impact assessment framework for RFID applications (January 2011) (accessed on May 25, 2011)

    Google Scholar 

  10. Cavoukian, A.: Privacy by Design. Take a challenge. Electronic Resource (2009), http://www.privacybydesign.ca/content/uploads/2010/03/PrivacybyDesignBook.pdf

  11. Whiting, D., Housley, R., Ferguson, N.: Counter with CBC-MAC (CCM). Internet Ingineering Task Force (2003)

    Google Scholar 

  12. Schelby, Z., Bormann, C.: 6LoWPAN: the Wireless Embedded Internet. Wiley (2009)

    Google Scholar 

  13. European Parliament and Council Directive: Directive 2002/58/EC of the European Parliament and of the Council: concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). Official Journal of the European Communities (2002)

    Google Scholar 

  14. Cha, I., Shah, Y., Schmidt, A.U., Leicher, A., Meyerstein, M.V.: Trust in M2M communication. IEEE Vehicular Technology Magazine 4(3), 69–75 (2009)

    Article  Google Scholar 

  15. Wu, G., Talwar, S., Johnsson, K., Himayat, N., Johnson, K.D.: M2M: From mobile to embedded internet. IEEE Communications Magazine 49(4), 36–43 (2011)

    Article  Google Scholar 

  16. Day, J.D., Zimmermann, H.: The OSI reference model. Proceedings of the IEEE 71(12), 1334–1340 (1983)

    Article  Google Scholar 

  17. Cichon, J., Klonowski, M., Kutylowski, M.: Privacy Protection in Dynamic Systems Based on RFID Tags. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pp. 235–240 (March 2007)

    Google Scholar 

  18. Hutter, M., Feldhofer, M., Wolkerstorfer, J.: A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 144–159. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  19. Hutter, M., Joye, M., Sierra, Y.: Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 170–187. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  20. NIST. Specification for the Advanced Encryption Standard (AES). FIPS 197 (November 2001)

    Google Scholar 

  21. Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48(177), 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  22. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  23. Karjoth, G., Moskowitz, P.A.: Disabling RFID Tags with Visible Confirmation: Clipped Tags are Silenced. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 27–30. ACM, New York (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gudymenko, I., Borcea-Pfitzmann, K., Tietze, K. (2012). Privacy Implications of the Internet of Things. In: Wichert, R., Van Laerhoven, K., Gelissen, J. (eds) Constructing Ambient Intelligence. AmI 2011. Communications in Computer and Information Science, vol 277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31479-7_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31479-7_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31478-0

  • Online ISBN: 978-3-642-31479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics