Fig 1 - uploaded by Fizza Abbas
Content may be subject to copyright.
Architecture of IoT devices  

Architecture of IoT devices  

Source publication
Conference Paper
Full-text available
These days Internet of Things (IoT) is considered to be the extension of machine-to-machine (M2M) communication that supports various domains, protocols, and applications. Users share their personal information with IoT device to get various services. However, if IoT device loses integrity or malfunctions due to some malicious attack, it causes dir...

Context in source publication

Context 1
... we mean embedded systems such as household appliances, mobile equipment, wearable computers (just to name a few). It is also possible to get data or acquire information through communicating with sensors present in external environment [1,2]. These IoT devices can be categorized in groups of gateways, user devices and smart sensors as shown in Fig. [1]. ...

Similar publications

Conference Paper
Full-text available
The significant growth of the Internet of Things (IoT) is revolutionizing the way people live by transforming everyday Internet-enabled objects into an interconnected ecosystem of digital and personal information accessible anytime and anywhere. As more objects become Internet-enabled, the security and privacy of the personal information generated,...
Conference Paper
Full-text available
Energy-efficient machine-learning and physical unclonable function (PUF) becomes popular in Internet-of-Things (IoT) applications for saliency detection and privacy protection at sensor node. A machine-learning and PUF engine for IoT applications is presented in this work with a current mirror crossbar (CMCB) array being a shared core, reducing sil...
Article
Full-text available
It has been predicted that the impact of IoT technology will be revolutionary in societies in coming IoT age. Meanwhile, despite all the benefits IoT technology can afford us, almost every researcher these days assumes that the leakage of the private information may be one of the most serious problems in the IoT age. The purpose of this study is, t...
Article
Full-text available
With recent advancements in information technology more and more devices are integrated in the Internet of Things. These devices gather significant amount of private information pertinent to a user and while, in some cases it helps in improving the life style of an individual, in others it raises major privacy concerns. This trade-off between utili...

Citations

... •Analyzing and Identifying Privacy Risks. [121], [123], [122], [62], [125], [39], [73]. ...
Preprint
Full-text available
We do not have any data. This is a systematic literature review where we selected relevant publications from several top venues and journals in computer science, privacy, security, and software engineering.
... •Analyzing and Identifying Privacy Risks. [121], [123], [122], [62], [125], [39], [73]. ...
Preprint
Full-text available
We do not have any data. This is a systematic literature review where we selected relevant publications from several top venues and journals in computer science, privacy, security, and software engineering.
... However, the security and integrity of data as well as sensitive information is a vital challenge for the implementation of AI, IoT-based algorithm. 148 It enhances the security of IoT devices and also effectively protects users' personal information, but the cost is the only constraint of this technique. In Reference 149, the authors have proposed a Fuzzy-based decision tree approach to expand its operational range and enhance its robustness under noisy conditions. ...
... It gathers and analyzes the CPU state of every VM, the memory contents, file I/O activity, network information that is delivered via hypervisor and detects malicious software on the VM. However, if an IoT device loses integrity due to any malicious attack, it creates risks to the users' privacy [34]. ...
... It gathers and analyzes the CPU state of every VM, the memory contents, file I/O activity, network information that is delivered via hypervisor and detects malicious software on the VM. However, if IoT device loses integrity due to any malicious attack, it creates risks to the users' privacy [34]. ...
Article
Full-text available
The Internet of Things' potential for major privacy invasion is a concern. This paper reports on a systematic literature review of privacy-preserving solutions appearing in the research literature and in the media. We analysed proposed solutions in terms of the techniques they deployed and the extent to which they satisfied core privacy principles. We found that very few solutions satisfied all core privacy principles. We also identified a number of key knowledge gaps in the course of the analysis. In particular, we found that most solution providers assumed that end users would be willing to expend effort to preserve their privacy; that they would be motivated to act to preserve their privacy. The validity of this assumption needs to be proved, since it cannot simply be assumed that people would necessarily be willing to engage with these solutions. We suggest this as a topic for future research.