2019
DOI: 10.1007/s40860-019-00075-0
|View full text |Cite
|
Sign up to set email alerts
|

What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net

Abstract: Privacy requires more than just encryption of data before and during transmission. Privacy would actually demand hiding the sheer fact that communication takes place. This requires to protect meta-data from observation. We motivate the need for strong privacy protection in a smart home use case by highlighting the privacy issues that cannot be solved by confidentiality mechanisms like encryption alone. Our solution is a implementation of DC-net on Re-Mote sensor nodes running Contiki OS. From this, we conclude… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(15 citation statements)
references
References 64 publications
0
15
0
Order By: Relevance
“…At the present stage of the "Smartcity" system development and its introduction into the city life, it is necessary to understand the when a city is considered as a smart and safe one (Staudemeyer et al, 2019). When considering the problems of towns, it should be understood that small towns have their own specifics.…”
Section: Resultsmentioning
confidence: 99%
“…At the present stage of the "Smartcity" system development and its introduction into the city life, it is necessary to understand the when a city is considered as a smart and safe one (Staudemeyer et al, 2019). When considering the problems of towns, it should be understood that small towns have their own specifics.…”
Section: Resultsmentioning
confidence: 99%
“…With a wider angle on context beyond location, the ethical considerations in the development of context aware computing have been studied in the area of intelligent environments [11], with guidelines such as proposed by Jones et al [98]. A key question is where the intelligence resides and how communication within an intelligent environment can be protected [176]. A smart home, for instance, that operates on local hardware and acts on behalf of the user rather than an external web-service, acting on behalf of advertisers, can, e.g., provide a range of AI services without requiring access to remote servers by leveraging cost-effective off-the-shelf gaming hardware [169].…”
Section: Location Privacymentioning
confidence: 99%
“…This information, when extracted and combined with a priori knowledge, statistics and processed (e.g. by machine learning algorithms) can be rich enough to even bypass end-to-end encryption [12], [13]. The attacks on the users' privacy, which work without the attacker having knowledge of the communications' contents, are called traffic analysis attacks [14], [15].…”
Section: Introductionmentioning
confidence: 99%
“…However, these solutions have their own challenges, such as providing round (or slot)-reservation techniques and dealing with disruptions. Moreover, the initial DCN-based ACSs suffered from high computational and communication overheads and lack of scalability [12]. For this reason, even though the history of DCN dates back to almost three decades ago, they were rarely implemented in real-world anonymous communications until solutions were proposed to improve efficiency and make them more realistic [5].…”
Section: Introductionmentioning
confidence: 99%