A Privacy Scheme for Monitoring Devices in the Internet of Things

03/12/2018
by   Zygmunt J. Haas, et al.
0

Sufficiently strong security and privacy mechanisms are prerequisite to amass the promising benefits of the IoT technology and to incorporate this technology into our daily lives. This paper introduces a novel approach to privacy in networks, an approach which is especially well matched with the IoT characteristics. Our general approach is based on continually changing the identifying attributes of IoT nodes. In particular, the scheme proposed in this work is based on changing the IoT nodes' IP addresses, and because the changing patterns of the IP addresses appear random to a non-intended observer, an adversary is unable to identify the source or destination of a particular transmission. Thus, packets that carry information generated by a particular node cannot be linked together. The scheme offers additional security benefits, including DoS mitigation, is relatively easy to implement, and requires no changes to the existing networking infrastructure. We discuss the details of the implementation of the scheme and evaluate its performance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/10/2019

Analyzing Endpoints in the Internet of Things Malware

The lack of security measures in the Internet of Things (IoT) devices an...
research
07/13/2023

DAXiot: A Decentralized Authentication and Authorization Scheme for Dynamic IoT Networks

Federated and decentralized networks supporting frequently changing syst...
research
08/26/2018

Trustworthy and Privacy-Aware Sensing for Internet of Things

The Internet of Things (IoT) is considered as the key enabling technolog...
research
05/17/2021

Towards Novel Multipath Data Scheduling For Future IoT Systems: A Survey

During the initial years of its inception, the Internet was widely used ...
research
06/04/2018

Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems

Stealth address prevents public association of a blockchain transaction'...
research
04/17/2019

Performance study of ABC scheme in an IoT context: the case of I2PA, Idemix and U-prove

IoT has lots of benefits. However, when tackling issues about user's pri...
research
01/31/2018

Protecting Privacy in VANETs Using Mix Zones With Virtual Pseudonym Change

Vehicular ad hoc networks VANETs use pseudonyms to communicate among the...

Please sign up or login with your details

Forgot password? Click here to reset