Online citations, reference lists, and bibliographies.
← Back to Search

Privacy-Preserving Content-Oriented Wireless Communication In Internet-of-Things

Keke Gai, Kim-Kwang Raymond Choo, M. Qiu, L. Zhu
Published 2018 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
With mobile devices (e.g., Android and iOS devices) and other resource constrained Internet-connected devices (e.g., sensors) becoming the norm in our digitalized society, the capacity to ensure security of data-in-transit and at-rest without incurring unrealistic performance overheads is crucial. Rather than using conventional encryption, in this paper we propose the dynamic privacy protection model. The model is designed for ensuring mobile device user privacy even in large volume of data transmissions, which uses dynamic programming to produce an optimal solution of maximizing privacy protection levels even for resource constrained devices. We then develop an Android app and use it to evaluate the effectiveness of the model. The findings suggest that the proposed model allows us to achieve improved privacy protection.
This paper references
10.1109/TDSC.2015.2498603
Achieving Content-Oriented Anonymity with CRISP
Peng Zhang (2017)
10.1287/opre.1120.1109
The Bin Packing Problem with Precedence Constraints
M. Dell'Amico (2012)
10.1109/TC.2015.2470247
Privacy Protection for Preventing Data Over-Collection in Smart City
Yibin Li (2016)
10.1016/j.jnca.2013.03.002
A novel cache size optimization scheme based on manifold learning in Content Centric Networking
Y. Xu (2014)
10.1109/SP.2012.16
Dissecting Android Malware: Characterization and Evolution
Y. Zhou (2012)
10.1109/TII.2013.2277938
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid
C. Fan (2014)
10.1109/TPDS.2013.34
Exploiting Service Similarity for Privacy in Location-Based Search Queries
Rinku Dewri (2014)
10.1109/TWC.2013.032513.120149
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks
Ming Li (2013)
10.1109/TII.2017.2780885
Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers
Keke Gai (2018)
10.1145/2613087.2613097
Game theoretic analysis of multiparty access control in online social networks
H. Hu (2014)
10.1109/TVT.2011.2162864
Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs
R. Lu (2012)
10.1145/2545883
Security and Privacy Protection in Visual Sensor Networks: A Survey
T. Winkler (2014)
10.1109/JIOT.2017.2659783
Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things
P. Hu (2017)
10.1109/JIOT.2016.2549046
Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
J. Sun (2016)
10.1109/TIFS.2016.2611487
Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards
L. Xu (2017)
10.1109/4434.708255
Optimal task assignment in heterogeneous distributed computing systems
Muhammad Kafil (1998)
10.1109/TIFS.2014.2371237
Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis
M. Masoumi (2015)
10.1109/JIOT.2017.2666783
A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing
Sultan Basudan (2017)
10.1109/JIOT.2015.2481926
Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks
Y. Li (2016)
10.1109/TIFS.2016.2587241
On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for $k$ -Anonymity Location Privacy
Y. Zhang (2016)
10.1002/wcm.2369
PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks
S. Özdemir (2015)
10.23883/ijrter.2017.3343.aqaei
EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING
E. Praganavi (2017)
10.1145/2619091
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
William Enck (2010)
10.1109/TIFS.2014.2310355
Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard
Ahmed Alahmadi (2014)
10.1109/JIOT.2017.2683200
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
Jie Lin (2017)
10.1145/2500501
A survey of mobility in information-centric networks
G. Tyson (2013)
10.1109/JIOT.2017.2694844
A Survey on Security and Privacy Issues in Internet-of-Things
Yuchen Yang (2017)
10.1016/j.comnet.2014.04.002
Information-centric networking: The evolution from circuits to packets to content
J. Kurose (2014)
10.1109/JIOT.2016.2594205
Privacy-Preserving Mechanisms for Crowdsensing: Survey and Research Challenges
Idalides J. Vergara-Laurens (2017)
10.1109/MWC.2015.7096296
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions
J. Zhou (2015)
10.1109/MNET.2016.7579028
Security in wearable communications
Shengling Wang (2016)
10.1109/MSP.2012.2228343
Privacy-preserving data aggregation in smart metering systems: an overview
Z. Erkin (2013)
10.1109/TDSC.2014.2382592
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
Aziz Mohaisen (2015)
10.1109/INFCOM.2013.6567071
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
T. Jung (2013)
10.1145/2789168.2789170
Demo: AntMonitor: A System for Mobile Traffic Monitoring and Real-Time Prevention of Privacy Leaks
A. Shuba (2015)



This paper is referenced by
10.1016/j.jpdc.2020.04.005
A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks
Yaping Liu (2020)
10.1007/s13369-020-04461-2
A Survey on Secure Transmission in Internet of Things: Taxonomy, Recent Techniques, Research Requirements, and Challenges
Surya Naryan Mahapatra (2020)
10.1109/ACCESS.2019.2946969
An Efficient and Secure Key Agreement Protocol for Sharing Emergency Events in VANET Systems
C. Chen (2019)
10.1016/J.INS.2019.03.035
Privacy preserving similarity joins using MapReduce
Xiaofeng Ding (2019)
10.1109/SMARTCLOUD.2018.00024
Cloud-Based Distributed Nth Order Binary Encoding Redefines the Limit of Lossless Compression
Bharat S. Rawal (2018)
10.1109/BigDataSecurity-HPSC-IDS.2019.00045
On the Large-Scale Traffic DDoS Threat of Space Backbone Network
A. Di (2019)
10.1016/j.comcom.2020.06.021
Real time auxiliary data mining method for wireless communication mechanism optimization based on Internet of things system
L. Li (2020)
10.29322/ijsrp.10.08.2020.p10494
Internet of Things-Based Agriculture: A Review of Security Threats and Countermeasures
Onoja Emmanuel Oche (2020)
10.1109/TIFS.2020.2986879
An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud
Y. Sun (2020)
10.1145/3327960.3332385
A New Complex Network Robustness Attack Algorithm
Xinyi Li (2019)
10.1016/j.jpdc.2020.04.004
BTNC: A blockchain based trusted network connection protocol in IoT
Junwei Zhang (2020)
10.1109/SMARTCLOUD.2018.00013
Effectiveness Analysis of Web Based Simulation for Computational Science and Engineering on Improvement EDISON Platform
Yejin Kwon (2018)
10.3390/app10134541
Smart Route: Internet-of-Vehicles (IoV)-Based Congestion Detection and Avoidance (IoV-Based CDA) Using Rerouting Planning
Zahid Khan (2020)
10.1016/J.JISA.2020.102582
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
Shahab Shamshirband (2020)
10.1109/JIOT.2018.2883905
Exploiting Emerging Sensing Technologies Toward Structure in Data for Enhancing Perception in Human-Centric Applications
Murat Ozatay (2019)
10.1109/JIOT.2019.2904303
Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks
Keke Gai (2019)
10.1016/J.FUTURE.2019.05.054
RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment
Sheng-Yao Su (2019)
10.1016/J.FUTURE.2018.10.050
Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression
A. Das (2019)
10.1007/978-3-030-05755-8_8
The Influence of Sleep on Opportunistic Relay in Linear Wireless Sensor Networks
H. Luo (2018)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.1007/978-3-030-05755-8_33
Information-Centric Fog Computing for Disaster Relief
Jianwen Xu (2018)
10.1145/3419604.3419789
Evaluation of security risks using Apriori algorithm
Wissam Abbass (2020)
10.1007/978-3-030-19813-8_23
A Power Efficient Authentication Model for E-Healthcare System Security Concerns in Context to Internet of Things (IoT)
P. H. Latha (2019)
10.1109/JIOT.2020.2986341
A Privacy-Preserving Scheme for Interactive Messaging Over Online Social Networks
Ying Cai (2020)
10.1007/978-3-030-34139-8_11
I2P Anonymous Communication Network Measurement and Analysis
L. Liu (2019)
10.1016/J.FUTURE.2018.10.040
Security enhancement on an RFID ownership transfer protocol based on cloud
C. Lee (2019)
10.1109/JIOT.2020.2987070
Edge-Computing-Enabled Smart Cities: A Comprehensive Survey
L. U. Khan (2020)
10.1007/978-3-030-60248-2_8
Blockchain Meets DAG: A BlockDAG Consensus Mechanism
Keke Gai (2020)
10.1016/j.future.2019.06.002
Intelligent security and optimization in Edge/Fog Computing
M. Qiu (2020)
10.1016/J.JNCA.2018.10.012
Device to device communication: A survey
Mittal K. Pedhadiya (2019)
10.1007/978-981-13-8300-7_11
Smart Judiciary System: A Smart Dust Based IoT Application
S. K. Jain (2019)
10.1007/978-3-030-05764-0_2
A New Sustainable Interchain Design on Transport Layer for Blockchain
Jing Wu (2018)
See more
Semantic Scholar Logo Some data provided by SemanticScholar