Pervasive Computing Paradigms for Mental Health. Selected Papers from MindCare 2016, Fabulous 2016, and IIoT 2015

Research Article

A Privacy Scheme for Monitoring Devices in the Internet of Things

Download47 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-74935-8_22,
        author={Zygmunt Haas and Ashkan Yousefpour},
        title={A Privacy Scheme for Monitoring Devices in the Internet of Things},
        proceedings={Pervasive Computing Paradigms for Mental Health. Selected Papers from MindCare 2016, Fabulous 2016, and IIoT 2015},
        proceedings_a={MINDCARE \& IIOT \& FABULOUS},
        year={2018},
        month={3},
        keywords={Privacy Anonymity IoT Security IP address hopping},
        doi={10.1007/978-3-319-74935-8_22}
    }
    
  • Zygmunt Haas
    Ashkan Yousefpour
    Year: 2018
    A Privacy Scheme for Monitoring Devices in the Internet of Things
    MINDCARE & IIOT & FABULOUS
    Springer
    DOI: 10.1007/978-3-319-74935-8_22
Zygmunt Haas1,*, Ashkan Yousefpour2,*
  • 1: Cornell University
  • 2: University of Texas at Dallas
*Contact email: zhaas@cornell.edu, ashkan@utdallas.edu

Abstract

Sufficiently strong security and privacy mechanisms are prerequisite to amass the promising benefits of the IoT technology and to incorporate this technology into our daily lives. This paper introduces a novel approach to privacy in networks, an approach which is especially well matched with the IoT characteristics. Our general approach is based on continually changing the identifying attributes of IoT nodes. In particular, the scheme proposed in this work is based on changing the IoT nodes’ IP addresses, and because the changing patterns of the IP addresses appear random to a non-intended observer, an adversary is unable to identify the source or destination of a particular transmission. Thus, packets that carry information generated by a particular node cannot be linked together. The scheme offers additional security benefits, including DoS mitigation, is relatively easy to implement, and requires no changes to the existing networking infrastructure. We discuss the details of the implementation of the scheme and evaluate its performance.