21Jun 2017

RESEARCH ON PRIVACY PROTECTION TECHNOLOGY BASED ON IOT.

  • Department of information technology, Wenzhou vocational and technical college, Wenzhou, China.
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

The Internet of things technology is leading the wave of information industry revolution and would be widely used in smart home, military and commerce. In Wireless sensor networks, each node sensing, collecting and transmitting information about the perceived objects in coverage areas periodically through collaboration with neighbors. Each sensor node is always resources limited. This paper starting from the hierarchical structure of the internet of things, analyze the privacy and security problems faced by the intelligent home system, then proposed the privacy protection strategy, and designed a privacy protection scheme for smart home systems. This paper constructs the privacy protection model of the internet of things for the intelligent home, gives a detailed model of the process analysis and model of the overall logical structure, improved privacy protection technology for existing legacy networks. Finally , verified the security and practicability of this model.


  1. Zhang Y, Chen X, Li J, et al. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 2016.
  2. Yuan X, Peng S. A research on secure smart home based on the Internet of Things[C]// International Conference on Information Science and Technology. IEEE, 2012:737-740.
  3. Park H, Park T, Son S H. A comparative study of privacy protection methods for smart home environments[J]. International Journal of Smart Home, 2013, 7.
  4. He Y. Research on the development and tendency of smart home based on Internet of things[J]. Wireless Internet Technology, 2016.
  5. Eschenauer L,? Gligor? V? ? A? key-management? scheme? for? distributed? sensor networks[C]. ACM, 2002.
  6. Liu D, Ning P, Li R. Establishing pairwise keys in distributed sensor networks[J]. ACM Transactions on Information and System Security (TISSEC). 2005, 8(1): 41-77.
  7. Shao, Y. Yang, S. Zhu and G. Cao, ?Towards Statistically Strong Source Anonymity for Sensor Networks?, Proceedings of the 27th Conference on Computer Communications, INFOCOM, IEEE, (2008), pp. 51-55.
  8. Lao F, Li G X. Design and Realization of Gateway Node for the Smart Home System Based on Internet of Things. Advanced Materials Research, 2014, 912-914:1218-1221.
  9. Li F, Wan Z, Xiong X, et al. Research on Sensor-Gateway-Terminal Security Mechanism of Smart Home Based on IOT. Communications in Computer & Information Science, 2012, 312:415-422.
  10. Mehta and D. Liu, ?Protecting Location Privacy in Sensor Networks against a Global Eavesdropper?, IEEE Transactions on Mobile Computing, TMC, vol. 11, no. 2, IEEE, (2012), pp. 320-337.
  11. Liu Z, Pan Y, Cao Q, et al. Security and Privacy Protection of Smart Home Based on IPv6. Atlantis Press, 2014.
  12. Homin Park H, Basaran C, Park T, et al. Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics[J]. Sensors, 2014, 14(9):16235-16257.
  13. Tian Y, Song B, Hassan M M, et al. The Distributed Pub-Sub System with Privacy Protection in Smart Home Environments[J]. International Journal on Information, vol.16(vol.16): 2013,pp.663-667.
  14. Wu J, Liu J, Hu X S, et al. Privacy protection via appliance scheduling in smart homes[C]// International Conference on Computer-Aided Design. ACM, 2016:106.
  15. Kabir M H, Hoque M R, Yang S H. Development of a smart home context-aware application: A machine learning based approach[J]. International Journal of Smart Home, 9(1):2015, 217-226.
  16. Ni Q, Hernando A B G, Cruz I P D L. A Context-Aware System Infrastructure for Monitoring Activities of Daily Living in Smart Home[J]. Journal of Sensors, (2016-3-15), 2016, 2016:1-9.
  17. Amiribesheli M, Benmansour A, Bouchachia A. A review of smart homes in healthcare[J]. Journal of Ambient Intelligence and Humanized Computing, 6(4): 2015, 495-517.
  18. Chua S L, Marsland S, Guesgen H. A supervised learning approach for behaviour recognition in smart homes[J]. Journal of Ambient Intelligence & Smart Environments, 2016, 8(3):259-271.
  19. Das B. Machine learning challenges for automated prompting in smart homes[J]. Dissertations & Theses - Gradworks, 2014.
  20. Schweizer D, Zehnder M, Wache H, et al. Using Consumer Behavior Data to Reduce Energy Consumption in Smart Homes: Applying Machine Learning to Save Energy without Lowering Comfort of Inhabitants[C]// IEEE, International Conference on Machine Learning and Applications. IEEE, 2015:1123-1129.
  21. Apthorpe N, Reisman D, Feamster N. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic[J]. 2017.
  22. Dorri A, Kanhere S S, Jurdak R, et al. Blockchain for IoT Security and Privacy: The Case Study of a Smart Home[C]// IEEE PERCOM WORKSHOP ON SECURITY PRIVACY AND TRUST IN THE INTERNET OF THING. IEEE, 2017.
  23. Abrishamchi M A N, Abdullah A H, Cheok A D, et al. A probability based hybrid energy-efficient privacy preserving scheme to encounter with wireless traffic snooping in smart home[C]// Mobility Iot. 2016.
  24. Yoon S, Park H, Yoo H S. Security Issues on Smarthome in IoT Environment[M]// Computer Science and its Applications. Springer Berlin Heidelberg, 2015.
  25. Wang X, Zhang J, Schooler E M, et al. Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT[C]// IEEE International Conference on Communications. IEEE, 2014:725-730.

[Zhang Yajie. (2017); RESEARCH ON PRIVACY PROTECTION TECHNOLOGY BASED ON IOT. Int. J. of Adv. Res. 5 (Jun). 1397-1402] (ISSN 2320-5407). www.journalijar.com


Zhang Yajie
Department of information technology, Wenzhou vocational and technical college, Wenzhou, china

DOI:


Article DOI: 10.21474/IJAR01/4549      
DOI URL: https://dx.doi.org/10.21474/IJAR01/4549