Data Privacy in IoT Networks

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: 15 October 2024 | Viewed by 1230

Special Issue Editors


E-Mail Website
Guest Editor
School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland 1010, New Zealand
Interests: intelligent surveillance; deep learning; blockchain; privacy preservation; data integrity
Department of Electrical and Electronic Engineering, Auckland University of Technology, Auckland 1010, New Zealand
Interests: wireless networking; wireless communications; networking protocols; radio frequency integrated circuits; wireless sensor networks; video streaming; system optimization; evolutionary computing
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In recent years, the Internet of Things (IoT) has emerged as a revolutionary technology that connects numerous devices and enables them to communicate and exchange data seamlessly. This interconnected network of physical objects, embedded with sensors, software, and network connectivity, has opened up a vast array of possibilities across various domains, ranging from smart homes and cities, to industrial automation and healthcare. However, with the proliferation of IoT devices, the issue of data privacy has become a paramount concern.

Data privacy in the IoT context refers to the protection and secure handling of the sensitive information collected by IoT devices. These devices generate an enormous volume of data about individuals, their behaviors, and their environments. These data can include personal and confidential information, such as health records, financial transactions, and personal preferences. The uncontrolled and unauthorized access to this data can lead to significant privacy breaches, identity theft, and other malicious activities. Ensuring data privacy in the IoT ecosystem requires multiple challenges to be addressed.

The importance of data privacy within the IoT realm cannot be overstated. As the number of IoT devices continues to proliferate, so does the potential for privacy breaches. The consequences of these breaches can be severe, ranging from personal harm and financial losses, to the erosion of trust in the IoT as a whole. This research area aims to address critical issues in IoT technology, such as secure data transmission, access control mechanisms, encryption protocols, authentication schemes, and privacy-preserving data analytics. Advancements in these areas can significantly enhance the protection of personal data and empower individuals to have greater control over their privacy in the IoT landscape. Furthermore, data privacy for the IoT can contribute to the development of robust regulations and standards that ensure a safe and secure environment for IoT deployments. Policy frameworks and guidelines can be designed based on scientific findings in order to govern the collection, storage, and use of data by IoT devices.  Overall, data privacy for the IoT is of utmost importance when aiming to mitigate the risks associated with the growing deployment of IoT devices. It enables the development of robust security measures, empowers individuals with control over their personal data, and fosters the adoption of privacy-centric practices. By addressing the challenges of data privacy in the IoT landscape, researchers can contribute to a safer and more trustworthy future for the Internet of Things.

The aim of this Special Issue on data privacy in the IoT is to provide a platform for researchers and practitioners to disseminate their findings, exchange ideas, and contribute to the advancement of knowledge in the field of data privacy within the context of the Internet of Things.

This Special Issue contributes to the understanding and development of solutions that protect the privacy of individuals and organizations using IoT devices and services. It provides a platform for researchers to share their innovative approaches, methodologies, and best practices in preserving data privacy, thereby fostering advancements in the field. By focusing specifically on data privacy in the IoT, the journal ensures that the published content is highly relevant and directly applicable to the concerns and requirements of IoT deployments. This subject matter addresses a wide range of topics and also attends to technical aspects, thus providing a comprehensive understanding of the multifaceted nature of data privacy in the IoT. The journal serves as a valuable resource for researchers and practitioners involved in IoT-related projects, enabling them to stay up to date with the latest advancements and contribute to the development of a secure and privacy-centric IoT ecosystem.

In this Special Issue, the submission of original research articles and reviews is welcome. Research topics may include (but are not limited to) the following:

  • Privacy-preserving data collection and transmission in IoT networks.
  • A privacy protection scheme for images collected on the IoT.
  • Applications of privacy protection based on machine learning in IoT.
  • Machine learning for model distillation and transfer learning with privacy preservation in IoT.
  • Encryption and cryptographic techniques for protecting sensitive information in the IoT.
  • Privacy-enhancing technologies and techniques for IoT devices and applications.
  • Anonymization and de-identification methods to preserve privacy in IoT data.
  • Privacy-aware data analytics and machine learning approaches for IoT environments.

Dr. Wei Qi Yan
Dr. Xuejun Li
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT
  • privacy preservation
  • machine learning
  • deep learning
  • model distillation
  • encryption and cryptographic for privacy-preserving

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

29 pages, 3268 KiB  
Article
A Certificateless Verifiable Bilinear Pair-Free Conjunctive Keyword Search Encryption Scheme for IoMT
by Weifeng Long, Jiwen Zeng, Yaying Wu, Yan Gao and Hui Zhang
Electronics 2024, 13(8), 1449; https://doi.org/10.3390/electronics13081449 - 11 Apr 2024
Viewed by 417
Abstract
With superior computing power and efficient data collection capability, Internet of Medical Things (IoMT) significantly improves the accuracy and convenience of medical work. As most communications are over open networks, it is critical to encrypt data to ensure confidentiality before uploading them to [...] Read more.
With superior computing power and efficient data collection capability, Internet of Medical Things (IoMT) significantly improves the accuracy and convenience of medical work. As most communications are over open networks, it is critical to encrypt data to ensure confidentiality before uploading them to cloud storage servers (CSSs). Public key encryption with keyword search (PEKS) allows users to search for specific keywords in ciphertext and plays an essential role in IoMT. However, PEKS still has the following problems: 1. As a semi-trusted third party, the CSSs may provide wrong search results to save computing and bandwidth resources. 2. Single-keyword searches often produce many irrelevant results, which is undoubtedly a waste of computing and bandwidth resources. 3. Most PEKS schemes rely on bilinear pairings, resulting in computational inefficiencies. 4. Public key infrastructure (PKI)-based or identity-based PEKS schemes face the problem of certificate management or key escrow. 5. Most PEKS schemes are vulnerable to offline keyword guessing attacks, online keyword guessing attacks, and insider keyword guessing attacks. We present a certificateless verifiable and pairing-free conjunctive public keyword searchable encryption (CLVPFC-PEKS) scheme. An efficiency analysis shows that the performance advantage of the new scheme is far superior to that of the existing scheme. More importantly, we provide proof of security under the standard model (SM) to ensure the reliability of the scheme in practical applications. Full article
(This article belongs to the Special Issue Data Privacy in IoT Networks)
Show Figures

Figure 1

21 pages, 2964 KiB  
Article
Graph-Indexed kNN Query Optimization on Road Network
by Wei Jiang, Guanyu Li, Mei Bai, Bo Ning, Xite Wang and Fangliang Wei
Electronics 2023, 12(21), 4536; https://doi.org/10.3390/electronics12214536 - 03 Nov 2023
Viewed by 557
Abstract
The nearest neighbors query problem on road networks constitutes a crucial aspect of location-oriented services and has useful practical implications; e.g., it can locate the k-nearest hotels. However, researches who study road networks still encounter obstacles due to the method’s inherent limitations [...] Read more.
The nearest neighbors query problem on road networks constitutes a crucial aspect of location-oriented services and has useful practical implications; e.g., it can locate the k-nearest hotels. However, researches who study road networks still encounter obstacles due to the method’s inherent limitations with respect to object mobility. More popular methods employ indexes to store intermediate results to improve querying time efficiency, but these other methods are often accompanied by high time costs. To balance the costs of time and space, a lightweight flow graph index is proposed to reduce the quantity of candidate nodes, and with this index the results of a kNN query can be efficiently obtained. Experiments on real road networks confirm the efficiency and accuracy of our optimized algorithm. Full article
(This article belongs to the Special Issue Data Privacy in IoT Networks)
Show Figures

Figure 1

Back to TopTop