Privacy Implications of the Internet of Things
The Internet of Things (IoT) is likely to become one of the milestones which is going to determine the technological advance for the future. At the same time, new privacy concerns arise which might seriously impede the adoption of such systems. In this paper, we provide for our view on privacy implications of IoT focusing on RFID technology as one of its main enablers and suggest possible solutions to developing IoT systems in a privacy-respecting and secure way.
KeywordsIoT privacy RFID
Unable to display preview. Download preview PDF.
- 3.Krikorian, R., Gershenfeld, N., Cohen, D.: The Internet of Things. Scientific American, 76–81 (October 2004)Google Scholar
- 5.Gudymenko, I., Borcea-Pfitzmann, K.: A Framework for Transforming Abstract Privacy Models into Implementable System Requirements. In: 1st International Workshop on Model-based Interactive Ubiquitous Systems (2011)Google Scholar
- 6.Benetton to tag 15 million items (March 2003), http://www.rfidjournal.com/article/view/344 (accessed on July 18, 2011)
- 7.Gonsalves, A.: Privacy concerns hinder RFID rollout (January 2000), http://www.itnews.com.au/News/11417,privacy-concerns-hinder-rfid-rollout.aspx (accessed on July 18, 2011)
- 9.Report: Privacy and data protection impact assessment framework for RFID applications (January 2011) (accessed on May 25, 2011)Google Scholar
- 10.Cavoukian, A.: Privacy by Design. Take a challenge. Electronic Resource (2009), http://www.privacybydesign.ca/content/uploads/2010/03/PrivacybyDesignBook.pdf
- 11.Whiting, D., Housley, R., Ferguson, N.: Counter with CBC-MAC (CCM). Internet Ingineering Task Force (2003)Google Scholar
- 12.Schelby, Z., Bormann, C.: 6LoWPAN: the Wireless Embedded Internet. Wiley (2009)Google Scholar
- 13.European Parliament and Council Directive: Directive 2002/58/EC of the European Parliament and of the Council: concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). Official Journal of the European Communities (2002)Google Scholar
- 17.Cichon, J., Klonowski, M., Kutylowski, M.: Privacy Protection in Dynamic Systems Based on RFID Tags. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pp. 235–240 (March 2007)Google Scholar
- 20.NIST. Specification for the Advanced Encryption Standard (AES). FIPS 197 (November 2001)Google Scholar
- 22.Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)CrossRefGoogle Scholar