Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A passive method for privacy protection in the perceptual layer of IoTs

A passive method for privacy protection in the perceptual layer of IoTs <jats:sec> <jats:title content-type="abstract-subheading">Purpose</jats:title> <jats:p>The purpose of this paper is to detect the existence of unknown wireless devices which could result negative means to the privacy. The perceptual layer of internet of things (IoTs) suffers the most significant privacy disclosing because of limited hardware resources, huge quantity and wide varieties of sensing equipment. Determining whether there are unknown wireless devices in the communicating environment is an effective method to implement the privacy protection for the perceptual layer of IoTs.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Design/methodology/approach</jats:title> <jats:p>The authors use horizontal hierarchy slicing (HHS) algorithm to extract the morphology feature of signals. Meanwhile, partitioning around medoids algorithm is used to cluster the HHS curves and agglomerative hierarchical clustering algorithm is utilized to distinguish final results. Link quality indicator (LQI) data are chosen as the network parameters in this research.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Findings</jats:title> <jats:p>Nowadays data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. How to detect these unknown wireless devices in the communication environment is a valuable topic in the further research.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Originality/value</jats:title> <jats:p>The authors derive an innovative and passive unknown wireless devices detection method based on the mathematical morphology and machine learning algorithms to detect the existence of unknown wireless devices which could result negative means to the privacy. The simulation results show their effectiveness in privacy protection.</jats:p> </jats:sec> http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Pervasive Computing and Communications CrossRef

A passive method for privacy protection in the perceptual layer of IoTs

International Journal of Pervasive Computing and Communications , Volume 13 (2): 194-210 – Jun 5, 2017

A passive method for privacy protection in the perceptual layer of IoTs


Abstract

<jats:sec>
<jats:title content-type="abstract-subheading">Purpose</jats:title>
<jats:p>The purpose of this paper is to detect the existence of unknown wireless devices which could result negative means to the privacy. The perceptual layer of internet of things (IoTs) suffers the most significant privacy disclosing because of limited hardware resources, huge quantity and wide varieties of sensing equipment. Determining whether there are unknown wireless devices in the communicating environment is an effective method to implement the privacy protection for the perceptual layer of IoTs.</jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-subheading">Design/methodology/approach</jats:title>
<jats:p>The authors use horizontal hierarchy slicing (HHS) algorithm to extract the morphology feature of signals. Meanwhile, partitioning around medoids algorithm is used to cluster the HHS curves and agglomerative hierarchical clustering algorithm is utilized to distinguish final results. Link quality indicator (LQI) data are chosen as the network parameters in this research.</jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-subheading">Findings</jats:title>
<jats:p>Nowadays data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. How to detect these unknown wireless devices in the communication environment is a valuable topic in the further research.</jats:p>
</jats:sec>
<jats:sec>
<jats:title content-type="abstract-subheading">Originality/value</jats:title>
<jats:p>The authors derive an innovative and passive unknown wireless devices detection method based on the mathematical morphology and machine learning algorithms to detect the existence of unknown wireless devices which could result negative means to the privacy. The simulation results show their effectiveness in privacy protection.</jats:p>
</jats:sec>

Loading next page...
 
/lp/crossref/a-passive-method-for-privacy-protection-in-the-perceptual-layer-of-XMMeZGXFDU

References (17)

Publisher
CrossRef
ISSN
1742-7371
DOI
10.1108/ijpcc-03-2017-0025
Publisher site
See Article on Publisher Site

Abstract

<jats:sec> <jats:title content-type="abstract-subheading">Purpose</jats:title> <jats:p>The purpose of this paper is to detect the existence of unknown wireless devices which could result negative means to the privacy. The perceptual layer of internet of things (IoTs) suffers the most significant privacy disclosing because of limited hardware resources, huge quantity and wide varieties of sensing equipment. Determining whether there are unknown wireless devices in the communicating environment is an effective method to implement the privacy protection for the perceptual layer of IoTs.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Design/methodology/approach</jats:title> <jats:p>The authors use horizontal hierarchy slicing (HHS) algorithm to extract the morphology feature of signals. Meanwhile, partitioning around medoids algorithm is used to cluster the HHS curves and agglomerative hierarchical clustering algorithm is utilized to distinguish final results. Link quality indicator (LQI) data are chosen as the network parameters in this research.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Findings</jats:title> <jats:p>Nowadays data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. How to detect these unknown wireless devices in the communication environment is a valuable topic in the further research.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Originality/value</jats:title> <jats:p>The authors derive an innovative and passive unknown wireless devices detection method based on the mathematical morphology and machine learning algorithms to detect the existence of unknown wireless devices which could result negative means to the privacy. The simulation results show their effectiveness in privacy protection.</jats:p> </jats:sec>

Journal

International Journal of Pervasive Computing and CommunicationsCrossRef

Published: Jun 5, 2017

There are no references for this article.