Abstract
The Internet of Things (IoT) is likely to become one of the milestones which is going to determine the technological advance for the future. At the same time, new privacy concerns arise which might seriously impede the adoption of such systems. In this paper, we provide for our view on privacy implications of IoT focusing on RFID technology as one of its main enablers and suggest possible solutions to developing IoT systems in a privacy-respecting and secure way.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Comput. Netw. 54, 2787–2805 (2010)
Hui, J.W., Culler, D.E.: Extending IP to low-power, wireless personal area networks. IEEE Internet Computing 12(4), 37–45 (2008)
Krikorian, R., Gershenfeld, N., Cohen, D.: The Internet of Things. Scientific American, 76–81 (October 2004)
Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., Balazinska, M., Borriello, G.: Building the internet of things using RFID: The RFID ecosystem experience. IEEE Internet Computing 13(3), 48–55 (2009)
Gudymenko, I., Borcea-Pfitzmann, K.: A Framework for Transforming Abstract Privacy Models into Implementable System Requirements. In: 1st International Workshop on Model-based Interactive Ubiquitous Systems (2011)
Benetton to tag 15 million items (March 2003), http://www.rfidjournal.com/article/view/344 (accessed on July 18, 2011)
Gonsalves, A.: Privacy concerns hinder RFID rollout (January 2000), http://www.itnews.com.au/News/11417,privacy-concerns-hinder-rfid-rollout.aspx (accessed on July 18, 2011)
Weber, R.H.: Internet of things - new security and privacy challenges. Computer Law & Security Review 26(1), 23–30 (2010)
Report: Privacy and data protection impact assessment framework for RFID applications (January 2011) (accessed on May 25, 2011)
Cavoukian, A.: Privacy by Design. Take a challenge. Electronic Resource (2009), http://www.privacybydesign.ca/content/uploads/2010/03/PrivacybyDesignBook.pdf
Whiting, D., Housley, R., Ferguson, N.: Counter with CBC-MAC (CCM). Internet Ingineering Task Force (2003)
Schelby, Z., Bormann, C.: 6LoWPAN: the Wireless Embedded Internet. Wiley (2009)
European Parliament and Council Directive: Directive 2002/58/EC of the European Parliament and of the Council: concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). Official Journal of the European Communities (2002)
Cha, I., Shah, Y., Schmidt, A.U., Leicher, A., Meyerstein, M.V.: Trust in M2M communication. IEEE Vehicular Technology Magazine 4(3), 69–75 (2009)
Wu, G., Talwar, S., Johnsson, K., Himayat, N., Johnson, K.D.: M2M: From mobile to embedded internet. IEEE Communications Magazine 49(4), 36–43 (2011)
Day, J.D., Zimmermann, H.: The OSI reference model. Proceedings of the IEEE 71(12), 1334–1340 (1983)
Cichon, J., Klonowski, M., Kutylowski, M.: Privacy Protection in Dynamic Systems Based on RFID Tags. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pp. 235–240 (March 2007)
Hutter, M., Feldhofer, M., Wolkerstorfer, J.: A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 144–159. Springer, Heidelberg (2011)
Hutter, M., Joye, M., Sierra, Y.: Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 170–187. Springer, Heidelberg (2011)
NIST. Specification for the Advanced Encryption Standard (AES). FIPS 197 (November 2001)
Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48(177), 203–209 (1987)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Karjoth, G., Moskowitz, P.A.: Disabling RFID Tags with Visible Confirmation: Clipped Tags are Silenced. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 27–30. ACM, New York (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gudymenko, I., Borcea-Pfitzmann, K., Tietze, K. (2012). Privacy Implications of the Internet of Things. In: Wichert, R., Van Laerhoven, K., Gelissen, J. (eds) Constructing Ambient Intelligence. AmI 2011. Communications in Computer and Information Science, vol 277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31479-7_48
Download citation
DOI: https://doi.org/10.1007/978-3-642-31479-7_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31478-0
Online ISBN: 978-3-642-31479-7
eBook Packages: Computer ScienceComputer Science (R0)