Trustworthy and Privacy-Aware Sensing for Internet of Things

08/26/2018
by   Ihtesham Haider, et al.
0

The Internet of Things (IoT) is considered as the key enabling technology for smart services. Security and privacy are particularly open challenges for IoT applications due to the widespread use of commodity devices. This work introduces two hardware-based lightweight security mechanisms to ensure sensed data trustworthiness (i.e., sensed data protection and sensor node protection) and usage privacy of the sensors (i.e., privacy-aware reporting of the sensed data) for centralized and decentralized IoT applications. Physically unclonable functions (PUF) form the basis of both proposed mechanisms. To demonstrate the feasibility of our PUF-based approach, we have implemented and evaluated PUFs on three platforms (Atmel 8-bit MCU, ARM Cortex M4 32 bit MCU, and Zynq7010 SoC) with varying complexities. We have also implemented our trusted sensing and privacy-aware reporting scheme (for centralized applications) and secure node scheme (for decentralized applications) on a visual sensor node comprising an OV5642 image sensor and a Zynq7010 SoC. Our experimental evaluation shows a low overhead wrt. latency, storage, hardware, and communication incurred by our security mechanisms.

READ FULL TEXT

page 8

page 14

page 16

research
03/04/2020

Towards a Context-Aware Security and Privacy as a Service in the Internet of Things

Smart city is one of the most known Internet of Things (IoT) application...
research
06/09/2023

Integrating Usage Control into Distributed Ledger Technology for Internet of Things Privacy

The Internet of Things brings new ways to collect privacy-sensitive data...
research
06/06/2018

Leveraging Secure Multiparty Computation in the Internet of Things

Centralized systems in the Internet of Things---be it local middleware o...
research
07/13/2021

Security and Privacy of Wireless Beacon Systems

Bluetooth Low Energy (BLE) beacons have been increasingly used in smart ...
research
03/12/2018

A Privacy Scheme for Monitoring Devices in the Internet of Things

Sufficiently strong security and privacy mechanisms are prerequisite to ...
research
09/26/2018

Brokering Policies and Execution Monitors for IoT Middleware

Event-based systems lie at the heart of many cloud-based Internet-of-Thi...
research
07/29/2020

Localization with One-Bit Passive Radars in Narrowband Internet-of-Things using Multivariate Polynomial Optimization

Several Internet-of-Things (IoT) applications provide location-based ser...

Please sign up or login with your details

Forgot password? Click here to reset