2023
DOI: 10.1109/access.2023.3245524
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preservation Techniques for IoT Devices: A Systematic Mapping Study

Abstract: The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life. The objective of IoT is to provide ubiquitous access to numerous devices and machines on service providers. However, IoT-based devices may expose a user to various privacy and security threats. Privacypreservation techniques focus on securing any type of data transfer between different parties. We aim to deliver the current state of the art in terms of privacy-preservation techniques used for IoT devices that have been … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 292 publications
0
3
0
1
Order By: Relevance
“…Torre et al [18] performed a systematic mapping study to explore the role of privacypreservation (PP) techniques for IoT devices. Their findings comprise (i) the existing PP techniques and supporting tools, (ii) the goals and the IoT layers and devices covered by the studies, (iii) the most commonly discussed privacy threats and attacks, and (iv) the often-used evaluation metrics in the area.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Torre et al [18] performed a systematic mapping study to explore the role of privacypreservation (PP) techniques for IoT devices. Their findings comprise (i) the existing PP techniques and supporting tools, (ii) the goals and the IoT layers and devices covered by the studies, (iii) the most commonly discussed privacy threats and attacks, and (iv) the often-used evaluation metrics in the area.…”
Section: Related Workmentioning
confidence: 99%
“…Year Systematic Domain Main Goal Ogonji et al [15] ✓ IoT Privacy and security threats, attack surface, vulnerabilities, and countermeasures in IoT. Sarwar et al [25] x IoT and Fog Privacy preservation in IoT and fog-enabled IoT Zainuddin et al [16] x IoT Applications Privacy threats in IoT applications Islam et al [17] ✓ IoT and Big Data Types of privacy attacks and solutions in the IoT and Big Data contexts Zarandi et al [20] x Smart Farming Big Data privacy in smart farming Hireche et al [21] x IoMT Privacy and security in IoMT Shahid et al [23] x IoHT Data breaches and legal regulations in IoHT Alabdulatif et al [24] x IoNT Overview of IoNT and its security and privacy issues Torre et al [18] ✓ IoT Devices Privacy-preservation techniques for IoT devices Tokas et al [26] x IoT Privacy-enhancing technologies and GDPR-specific privacy principles Demertzi et al [27] x IIoT Privacy requirements in the Industrial IoT Fallatah et al [28] x PDS PDS and its advantages and disadvantages Zubaydi et al [29] ✓ IoT and Blockchain Blockchain solutions for IoT security and privacy issues Asqah and Moulahi [30] x…”
Section: Authorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Преглед на разработени подходи за защита на чувствителни данни при използване на устройства за Интернет на нещата е направен от Torre и др. [11]. Подходите са категоризирани в осем групи: техники за анонимизиране (включително k-анонимност, l-разнообразие, t-близост), за объркване, машинно обучение на няколко нива, децентрализирано машинно обучение, хомоморфно криптиране, създаване на модели на поток от данни с различни нива на поверителност, създаване на сбита версия на данните и създаване на сигурни индивидуални хранилища на данни.…”
Section: анализ на научни публикацииunclassified