A passive means based privacy protection method for the perceptual layer of IoTs

Xiaoyu Li, Osamu Yoshie, Daoping Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Privacy protection in Internet of Things (IoTs) has long been the topic of extensive research in the last decade. The perceptual layer of IoTs suffers the most significant privacy disclosing because of the limitation of hardware resources. Data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. Therefore, in this paper we derive an innovative and passive method called Horizontal Hierarchy Slicing (HHS) method to detect the existence of unknown wireless devices which could result negative means to the privacy. PAM algorithm is used to cluster the HHS curves and analyze whether unknown wireless devices exist in the communicating environment. Link Quality Indicator data are utilized as the network parameters in this paper. The simulation results show their effectiveness in privacy protection.

Original languageEnglish
Title of host publication18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings
PublisherAssociation for Computing Machinery
Pages335-339
Number of pages5
VolumePart F126325
ISBN (Electronic)9781450348072
DOIs
Publication statusPublished - 2016 Nov 28
Event18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Singapore, Singapore
Duration: 2016 Nov 282016 Nov 30

Other

Other18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016
CountrySingapore
CitySingapore
Period16/11/2816/11/30

Fingerprint

Pulse amplitude modulation
Computer hardware
Cryptography
Telecommunication links
Communication
Internet of things

Keywords

  • Horizontal Hierarchy Slicing
  • Internet of Things
  • Link Quality Indicator
  • Privacy protection

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Cite this

Li, X., Yoshie, O., & Huang, D. (2016). A passive means based privacy protection method for the perceptual layer of IoTs. In 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings (Vol. Part F126325, pp. 335-339). Association for Computing Machinery. https://doi.org/10.1145/3011141.3011153

A passive means based privacy protection method for the perceptual layer of IoTs. / Li, Xiaoyu; Yoshie, Osamu; Huang, Daoping.

18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Vol. Part F126325 Association for Computing Machinery, 2016. p. 335-339.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Li, X, Yoshie, O & Huang, D 2016, A passive means based privacy protection method for the perceptual layer of IoTs. in 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. vol. Part F126325, Association for Computing Machinery, pp. 335-339, 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016, Singapore, Singapore, 16/11/28. https://doi.org/10.1145/3011141.3011153
Li X, Yoshie O, Huang D. A passive means based privacy protection method for the perceptual layer of IoTs. In 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Vol. Part F126325. Association for Computing Machinery. 2016. p. 335-339 https://doi.org/10.1145/3011141.3011153
Li, Xiaoyu ; Yoshie, Osamu ; Huang, Daoping. / A passive means based privacy protection method for the perceptual layer of IoTs. 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Vol. Part F126325 Association for Computing Machinery, 2016. pp. 335-339
@inproceedings{f99a72bad33542fa8f58016c38220a21,
title = "A passive means based privacy protection method for the perceptual layer of IoTs",
abstract = "Privacy protection in Internet of Things (IoTs) has long been the topic of extensive research in the last decade. The perceptual layer of IoTs suffers the most significant privacy disclosing because of the limitation of hardware resources. Data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. Therefore, in this paper we derive an innovative and passive method called Horizontal Hierarchy Slicing (HHS) method to detect the existence of unknown wireless devices which could result negative means to the privacy. PAM algorithm is used to cluster the HHS curves and analyze whether unknown wireless devices exist in the communicating environment. Link Quality Indicator data are utilized as the network parameters in this paper. The simulation results show their effectiveness in privacy protection.",
keywords = "Horizontal Hierarchy Slicing, Internet of Things, Link Quality Indicator, Privacy protection",
author = "Xiaoyu Li and Osamu Yoshie and Daoping Huang",
year = "2016",
month = "11",
day = "28",
doi = "10.1145/3011141.3011153",
language = "English",
volume = "Part F126325",
pages = "335--339",
booktitle = "18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings",
publisher = "Association for Computing Machinery",

}

TY - GEN

T1 - A passive means based privacy protection method for the perceptual layer of IoTs

AU - Li, Xiaoyu

AU - Yoshie, Osamu

AU - Huang, Daoping

PY - 2016/11/28

Y1 - 2016/11/28

N2 - Privacy protection in Internet of Things (IoTs) has long been the topic of extensive research in the last decade. The perceptual layer of IoTs suffers the most significant privacy disclosing because of the limitation of hardware resources. Data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. Therefore, in this paper we derive an innovative and passive method called Horizontal Hierarchy Slicing (HHS) method to detect the existence of unknown wireless devices which could result negative means to the privacy. PAM algorithm is used to cluster the HHS curves and analyze whether unknown wireless devices exist in the communicating environment. Link Quality Indicator data are utilized as the network parameters in this paper. The simulation results show their effectiveness in privacy protection.

AB - Privacy protection in Internet of Things (IoTs) has long been the topic of extensive research in the last decade. The perceptual layer of IoTs suffers the most significant privacy disclosing because of the limitation of hardware resources. Data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. Therefore, in this paper we derive an innovative and passive method called Horizontal Hierarchy Slicing (HHS) method to detect the existence of unknown wireless devices which could result negative means to the privacy. PAM algorithm is used to cluster the HHS curves and analyze whether unknown wireless devices exist in the communicating environment. Link Quality Indicator data are utilized as the network parameters in this paper. The simulation results show their effectiveness in privacy protection.

KW - Horizontal Hierarchy Slicing

KW - Internet of Things

KW - Link Quality Indicator

KW - Privacy protection

UR - http://www.scopus.com/inward/record.url?scp=85014888284&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85014888284&partnerID=8YFLogxK

U2 - 10.1145/3011141.3011153

DO - 10.1145/3011141.3011153

M3 - Conference contribution

AN - SCOPUS:85014888284

VL - Part F126325

SP - 335

EP - 339

BT - 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings

PB - Association for Computing Machinery

ER -