A passive method for privacy protection in the perceptual layer of IoTs

Xiaoyu Li, Osamu Yoshie, Daoping Huang

Research output: Contribution to journalArticle


Purpose: The purpose of this paper is to detect the existence of unknown wireless devices which could result negative means to the privacy. The perceptual layer of internet of things (IoTs) suffers the most significant privacy disclosing because of limited hardware resources, huge quantity and wide varieties of sensing equipment. Determining whether there are unknown wireless devices in the communicating environment is an effective method to implement the privacy protection for the perceptual layer of IoTs. Design/methodology/approach: The authors use horizontal hierarchy slicing (HHS) algorithm to extract the morphology feature of signals. Meanwhile, partitioning around medoids algorithm is used to cluster the HHS curves and agglomerative hierarchical clustering algorithm is utilized to distinguish final results. Link quality indicator (LQI) data are chosen as the network parameters in this research. Findings: Nowadays data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. How to detect these unknown wireless devices in the communication environment is a valuable topic in the further research. Originality/value: The authors derive an innovative and passive unknown wireless devices detection method based on the mathematical morphology and machine learning algorithms to detect the existence of unknown wireless devices which could result negative means to the privacy. The simulation results show their effectiveness in privacy protection.

Original languageEnglish
Pages (from-to)194-210
Number of pages17
JournalInternational Journal of Pervasive Computing and Communications
Issue number2
Publication statusPublished - 2017



  • Horizontal hierarchy slicing
  • Internet of things
  • Link quality indicator
  • Privacy protection

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this