Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Source location privacy against laptop-class attacks in sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Query privacy in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
European research on future internet design
IEEE Wireless Communications - Special issue on seamless content delivery in the future mobile internet
The Internet of Things: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Private memoirs of a smart meter
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building
Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey
NBIS '10 Proceedings of the 2010 13th International Conference on Network-Based Information Systems
From the internet of computers to the internet of things
From active data management to event-based systems and more
Detecting computer worms in the cloud
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Adaptive security and privacy management for the internet of things (ASPI 2013)
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
Hi-index | 0.00 |
In this paper, we describe developments towards the Internet of Things (IoT) and discuss architecture visions for the IoT. Our emphasis is to analyze the known and new threats for the security, privacy and trust (SPT) at different levels of architecture. Our strong view is that the IoT will be an important part of the global huge ICT infrastructure ("future Internet") humanity will be strongly relying on in the future with relatively few data centers connected to trillions of sensors and other "things" over gateways, various access networks and a global network connecting them. While the infrastructure is globally connected, it is divided into millions of management domains, such as homes, smart cities, power grids, access points and networks, data centers, etc. It will evolve both bottom-up and top-down. An important question is what consequences a bottom-up and top-down construction of the IoT infrastructure has for the security, privacy and trust and what kind of regulation is appropriate. We review the currently emerging privacy regulation in EU.