A passive method for privacy protection in the perceptual layer of IoTs

Xiaoyu Li, Osamu Yoshie, Daoping Huang

Research output: Contribution to journalArticle

Abstract

Purpose: The purpose of this paper is to detect the existence of unknown wireless devices which could result negative means to the privacy. The perceptual layer of internet of things (IoTs) suffers the most significant privacy disclosing because of limited hardware resources, huge quantity and wide varieties of sensing equipment. Determining whether there are unknown wireless devices in the communicating environment is an effective method to implement the privacy protection for the perceptual layer of IoTs. Design/methodology/approach: The authors use horizontal hierarchy slicing (HHS) algorithm to extract the morphology feature of signals. Meanwhile, partitioning around medoids algorithm is used to cluster the HHS curves and agglomerative hierarchical clustering algorithm is utilized to distinguish final results. Link quality indicator (LQI) data are chosen as the network parameters in this research. Findings: Nowadays data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. How to detect these unknown wireless devices in the communication environment is a valuable topic in the further research. Originality/value: The authors derive an innovative and passive unknown wireless devices detection method based on the mathematical morphology and machine learning algorithms to detect the existence of unknown wireless devices which could result negative means to the privacy. The simulation results show their effectiveness in privacy protection.

Original languageEnglish
Pages (from-to)194-210
Number of pages17
JournalInternational Journal of Pervasive Computing and Communications
Volume13
Issue number2
DOIs
Publication statusPublished - 2017

Fingerprint

Internet of Things
Privacy Protection
Unknown
Privacy
Slicing
Horizontal
Mathematical morphology
Private Information
Mathematical Morphology
Disclosure
Communication
Hierarchical Clustering
Clustering algorithms
Learning algorithms
Encryption
Cryptography
Design Methodology
Clustering Algorithm
Learning systems
Internet of things

Keywords

  • Horizontal hierarchy slicing
  • Internet of things
  • Link quality indicator
  • Privacy protection

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

A passive method for privacy protection in the perceptual layer of IoTs. / Li, Xiaoyu; Yoshie, Osamu; Huang, Daoping.

In: International Journal of Pervasive Computing and Communications, Vol. 13, No. 2, 2017, p. 194-210.

Research output: Contribution to journalArticle

@article{78c19aa4354f41a1b0dc0a589f839cc1,
title = "A passive method for privacy protection in the perceptual layer of IoTs",
abstract = "Purpose: The purpose of this paper is to detect the existence of unknown wireless devices which could result negative means to the privacy. The perceptual layer of internet of things (IoTs) suffers the most significant privacy disclosing because of limited hardware resources, huge quantity and wide varieties of sensing equipment. Determining whether there are unknown wireless devices in the communicating environment is an effective method to implement the privacy protection for the perceptual layer of IoTs. Design/methodology/approach: The authors use horizontal hierarchy slicing (HHS) algorithm to extract the morphology feature of signals. Meanwhile, partitioning around medoids algorithm is used to cluster the HHS curves and agglomerative hierarchical clustering algorithm is utilized to distinguish final results. Link quality indicator (LQI) data are chosen as the network parameters in this research. Findings: Nowadays data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. How to detect these unknown wireless devices in the communication environment is a valuable topic in the further research. Originality/value: The authors derive an innovative and passive unknown wireless devices detection method based on the mathematical morphology and machine learning algorithms to detect the existence of unknown wireless devices which could result negative means to the privacy. The simulation results show their effectiveness in privacy protection.",
keywords = "Horizontal hierarchy slicing, Internet of things, Link quality indicator, Privacy protection",
author = "Xiaoyu Li and Osamu Yoshie and Daoping Huang",
year = "2017",
doi = "10.1108/IJPCC-03-2017-0025",
language = "English",
volume = "13",
pages = "194--210",
journal = "International Journal of Pervasive Computing and Communications",
issn = "1742-7371",
publisher = "Emerald Group Publishing Ltd.",
number = "2",

}

TY - JOUR

T1 - A passive method for privacy protection in the perceptual layer of IoTs

AU - Li, Xiaoyu

AU - Yoshie, Osamu

AU - Huang, Daoping

PY - 2017

Y1 - 2017

N2 - Purpose: The purpose of this paper is to detect the existence of unknown wireless devices which could result negative means to the privacy. The perceptual layer of internet of things (IoTs) suffers the most significant privacy disclosing because of limited hardware resources, huge quantity and wide varieties of sensing equipment. Determining whether there are unknown wireless devices in the communicating environment is an effective method to implement the privacy protection for the perceptual layer of IoTs. Design/methodology/approach: The authors use horizontal hierarchy slicing (HHS) algorithm to extract the morphology feature of signals. Meanwhile, partitioning around medoids algorithm is used to cluster the HHS curves and agglomerative hierarchical clustering algorithm is utilized to distinguish final results. Link quality indicator (LQI) data are chosen as the network parameters in this research. Findings: Nowadays data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. How to detect these unknown wireless devices in the communication environment is a valuable topic in the further research. Originality/value: The authors derive an innovative and passive unknown wireless devices detection method based on the mathematical morphology and machine learning algorithms to detect the existence of unknown wireless devices which could result negative means to the privacy. The simulation results show their effectiveness in privacy protection.

AB - Purpose: The purpose of this paper is to detect the existence of unknown wireless devices which could result negative means to the privacy. The perceptual layer of internet of things (IoTs) suffers the most significant privacy disclosing because of limited hardware resources, huge quantity and wide varieties of sensing equipment. Determining whether there are unknown wireless devices in the communicating environment is an effective method to implement the privacy protection for the perceptual layer of IoTs. Design/methodology/approach: The authors use horizontal hierarchy slicing (HHS) algorithm to extract the morphology feature of signals. Meanwhile, partitioning around medoids algorithm is used to cluster the HHS curves and agglomerative hierarchical clustering algorithm is utilized to distinguish final results. Link quality indicator (LQI) data are chosen as the network parameters in this research. Findings: Nowadays data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. How to detect these unknown wireless devices in the communication environment is a valuable topic in the further research. Originality/value: The authors derive an innovative and passive unknown wireless devices detection method based on the mathematical morphology and machine learning algorithms to detect the existence of unknown wireless devices which could result negative means to the privacy. The simulation results show their effectiveness in privacy protection.

KW - Horizontal hierarchy slicing

KW - Internet of things

KW - Link quality indicator

KW - Privacy protection

UR - http://www.scopus.com/inward/record.url?scp=85026679850&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85026679850&partnerID=8YFLogxK

U2 - 10.1108/IJPCC-03-2017-0025

DO - 10.1108/IJPCC-03-2017-0025

M3 - Article

VL - 13

SP - 194

EP - 210

JO - International Journal of Pervasive Computing and Communications

JF - International Journal of Pervasive Computing and Communications

SN - 1742-7371

IS - 2

ER -