DOI QR코드

DOI QR Code

Security and Privacy in Ubiquitous Sensor Networks

  • Perez, Alfredo J. (TSYS School of Computer Science, Columbus State University) ;
  • Zeadally, Sherali (College of Communication and Information, University of Kentucky) ;
  • Jabeur, Nafaa (Dept. of Computer Science, German University of Technology in Oman (GUtech))
  • Received : 2017.11.26
  • Accepted : 2017.12.29
  • Published : 2018.04.30

Abstract

The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides various types of solutions to the general public in multiple sectors, including environmental monitoring, entertainment, transportation, security, and healthcare. Here, we explore and compare the features of wireless sensor networks and USN. Based on our extensive study, we classify the security- and privacy-related challenges of USNs. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges for designing more secure and privacy-preserving approaches in next-generation USNs.

Keywords

References

  1. Requirements for Support of Ubiquitous Sensor Network (USN) Applications and Services in the NGN Environment, International Telecommunication Union, ITU-T Y.2221, 2010.
  2. A. Nordrum, "The Internet of fewer things," IEEE Spectrum, vol. 53, no. 10, pp. 12-13, 2016. https://doi.org/10.1109/MSPEC.2016.7572524
  3. C. Camara, P. Peris-Lopez, and J. E. Tapiador, "Security and privacy issues in implantable medical devices: A comprehensive survey," Journal of Biomedical Informatics, vol. 55, pp. 272-289, 2015. https://doi.org/10.1016/j.jbi.2015.04.007
  4. M. Zhang, A. Raghunathan, and N. K Jha, "Towards trustworthy medical devices and body area networks," in Proceedings of the 50th Annual Design Automation Conference, Austin, TX, 2013.
  5. K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, "Denial of service attacks in wireless networks: the case of jammers," IEEE Communications Surveys & Tutorials, vol. 13, no. 2, pp. 245-257, 2011. https://doi.org/10.1109/SURV.2011.041110.00022
  6. J. Dunning, "Taming the blue beast: a survey of Bluetooth based threats," IEEE Security & Privacy, vol. 8, no. 2, pp. 20-27, 2010.
  7. G. Madlmayr, J. Langer, C. Kantner, and J. Scharinger, "NFC devices: security and privacy," in Proceedings of the 2008 Availability, Reliability and Security, Barcelona, Spain, 2008, pp. 642-647.
  8. F. Stajano, and R. Anderson, "The resurrecting duckling: security issues for ubiquitous computing," IEEE Computer, vol. 35, no. 4, pp. 22-26, 2002.
  9. T. Martin, M. Hsiao, D. Ha, and J. Krishnaswami, "Denial-of-service attacks on battery-powered mobile computers," in Proceedings of the 2004 IEEE Conference in Pervasive Computing and Communications, Orlando, FL, 2004, pp. 309-318.
  10. A. Armando, M. Migliardi, and L. Verderame, "Would you mind forking this process? A denial of service attack on Android (and some countermeasures)," in IFIP International Information Security Conference. Heidelberg: Springer, 2012, pp. 13-24.
  11. H. Huang, S. Zhu, K. Chen, and P. Liu "From system services freezing to system server shutdown in android: all you need is a loop in an app," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, 2015, pp. 1236-1247.
  12. A. J. Perez, M. A. Labrador, and S. J. Barbeau, "G-sense: a scalable architecture for global sensing and monitoring," IEEE Network, vol. 24, no. 4, pp. 57-64, 2010. https://doi.org/10.1109/MNET.2010.5510920
  13. M. A. Labrador, A. J. Perez, and P. M. Wightman, Location-based Information Systems: Developing Real-Time Tracking Applications. Boca Raton, FL: CRC Press, 2010.
  14. S. Barbeau, R. Perez, M. A. Labrador, A. J. Perez, P. Winters, and N. Georggi, "A location-aware framework for intelligent real-time mobile applications," IEEE Pervasive Computing, vol. 10, no. 3, pp. 58-67, 2011. https://doi.org/10.1109/MPRV.2010.48
  15. D. Mendez, A. J. Perez, M. A. Labrador, and J. J. Marron, "P-sense: a participatory sensing system for air pollution monitoring and control," in Proceedings of the 2011 IEEE Conference in Pervasive Computing and Communications, Seattle, WA, 2011, pp. 344-347.
  16. M. Mun, S. Reddy, K. Shilton, N. Yau, J. Burke, D. Estrin, M. Hansen, E. Howard, R. West, and P. Boda, "PEIR, the personal environmental impact report, as a platform for participatory sensing systems research," in Proceedings of the 7th international conference on Mobile Systems, Applications, and Services, Krakow, Poland, 2009, pp. 556-68.
  17. E. Kanjo, "NoiseSPY: areal-time mobile phone platform for urban noise monitoring and mapping," Mobile Networks and Applications, vol. 15, no. 4, pp. 562-574, 2010. https://doi.org/10.1007/s11036-009-0217-y
  18. A. Wiggins, "eBirding: technology adoption and the transformation of leisure into science," in Proceedings of the 2011 iConference, Seattle, WA, 2011, pp. 798-799.
  19. N. D. Lane, S. B. Eisenman, M. Musolesi, E. Miluzzo, and A.T . Campbell, "Urban sensing systems: opportunistic or participatory?" in Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, Napa Valley, CA, 2008, pp. 11-16.
  20. O. D. Lara, A. J. Perez, M. A. Labrador, and J. D. Posada, "Centinela: a human activity recognition system based on acceleration and vital sign data," Pervasive and Mobile Computing, vol. 8 no. 5, pp. 717-729, 2012.
  21. Runtastic Inc. [Online]. Available: https://www.runtastic.com.
  22. Niantic Inc. [Online]. Available: http://www.pokemongo.com.
  23. S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey," Rensselaer Polytechnic Institute, Troy, NY, Technical Report, 2005.
  24. A. S. Wander, N. Gura, H. Eberle, V. Gupta, and C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proceedings of IEEE 2005 Pervasive Computing and Communications Conference, Kauai Island, HI, 2005, pp. 324-328.
  25. X. Zhang, H. M. Heys, and C. Li, "Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks," in Proceedings of the 2010 25th IEEE Biennial Symposium on Communications, Kingston, Canada, 2010, pp. 168-172.
  26. A. J. Perez, S. Zeadally, and N. Jabeur, "Investigating security for ubiquitous sensor networks," Procedia Computer Science, vol. 109, pp. 737-744, 2017. https://doi.org/10.1016/j.procs.2017.05.432
  27. A. Kapadia, D. Kotz, and N. Triandopoulos, "Opportunistic sensing: security challenges for the new paradigm," in Proceedings of the 1st International Communication Systems and Networks and Workshops, Bangalore, India, 2009, pp. 1-10.
  28. P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall, "Toward trustworthy mobile sensing," in Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, Annapolis, MD, 2009, pp. 31-36.
  29. Y. Shoukry, P. Martin, Y. Yona, S. Diggavi, and M. Srivastava, "PyCRA: physical challenge-response authentication for active sensors under spoofing attacks," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, 2015, pp. 1004-1015.
  30. A. J. Perez, K. Arroyo-Rivera, M. A. Labrador, and I. J. Vergara-Laurens, "HR-Auth: Heart Rate Data Authentication using Consumer Wearables", in Proceedings of the 5th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft), Gothenburg, Sweden, 2018, pp. 1-2.
  31. A. Sharabani and Y. Amit, "Mobile vulnerabilities from data breach to complete shutdown," 2015 [Online]. Available: https://www.rsaconference.com/writable/presentations/file_upload/mbs-t09--mobilevulnerabilities-from-data-breach-to-complete-shutdown.pdf.
  32. Y. Ma, Y. Guo, D. Silva, O. Tsinalis, and C. Wu, "Elastic information management for air pollution monitoring in large-scale M2M sensor networks," International Journal of Distributed Sensor Networks, vol. 9, no. 12, article no. 251374, 2013.
  33. S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1-11, 2011. https://doi.org/10.1016/j.jnca.2010.07.006
  34. J. S. Lee and B. Hoh, "Sell your experiences: a market mechanism based incentive for participatory sensing," in Proceedings of the 2010 IEEE Conference in Pervasive Computing and Communications, Mannheim, Germany, 2010, pp. 60-68.
  35. J. Aikio, V. Pentikinen, J. Haikio, J. Hakkila, and A. Colley, On the Road to Digital Paradise: The Naked Approach. Rovaniemi, Finland: University of Lapland, 2016.
  36. D. Christin, "Privacy in mobile participatory sensing: Current trends and future challenges," Journal of Systems and Software, vol. 116, pp. 57-68, 2015.
  37. A. J. Perez and S. Zeadally, "PEAR: a privacy-enabled architecture for crowdsensing," in Proceedings of the International Conference on Research in Adaptive and Convergent Systems, Krakow, Poland, 2017, pp. 161-171.
  38. J. Al-Muhtadi, R. Campbell, A. Kapadia, M. D. Mickunas, and S. Yi, "Routing through the mist: privacy preserving communication in ubiquitous computing environments," in Proceedings of the 22nd International Conference on Distributed Computing Systems, Vienna, Austria, 2002, pp. 74-83.
  39. M. Gruteser and D. Grunwald, "Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis," Mobile Networks and Applications, vol. 10, no. 3, pp. 315-325, 2005. https://doi.org/10.1007/s11036-005-6425-1
  40. M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, CA, 2005, pp. 31-42.
  41. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. "Preventing location-based identity inference in anonymous spatial queries," IEEE Transactions on Knowledge and Data Engineering, vol. 19 no. 12, pp. 1719-1733, 2007. https://doi.org/10.1109/TKDE.2007.190662
  42. C. Bettini, S. Mascetti, X. S. Wang, D. Freni, and S. Jajodia, S, "Anonymity and historical-anonymity in location-based services," in Privacy in Location-based Applications. Heidelberg: Springer, 2009, pp. 1-30.
  43. B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: architecture and algorithms," IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1-18, 2008. https://doi.org/10.1109/TMC.2007.1062
  44. A. Gkoulalas-Divanis, P. Kalnis, and V. S. Verykios. "Providing k-anonymity in location based services," ACM SIGKDD Explorations Newsletter, vol. 12, no. 1, pp. 3-10, 2010. https://doi.org/10.1145/1882471.1882473
  45. M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy," in International Conference on Pervasive Computing. Heidelberg: Springer, 2005, pp. 152-170.
  46. C. A. Ardagna, M, Cremonini, S. D. C. di Vimercati, and P. Samarati, "An obfuscation-based approach for protecting location privacy," IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 1, pp. 13-27, 2009. https://doi.org/10.1109/TDSC.2009.25
  47. P. Wightman, W. Coronell, D. Jabba, M. A. Jimeno, and M. Labrador, "Evaluation of location obfuscation techniques for privacy in location based information systems," in Proceedings of the 2011 IEEE Latin-American Conference on Communications, Belem do Para, Brazil, 2011, pp. 1-6.
  48. D. Quercia, I. Leontiadis, L. McNamara, C. Mascolo, and J. Crowcroft, "Spotme if you can: randomized responses for location obfuscation on mobile phones, in Proceedings of the 31st International Conference on Distributed Computing Systems, Minneapolis, MN, 2011, pp. 363-372.
  49. M. E. Andres, N. E., Bordenabe, K. Chatzikokolakis, and C, Palamidessi, "Geo-indistinguishability: differential privacy for location-based systems," in Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, Berlin, Germany, 2013, pp. 901-914.
  50. J. Krumm, "Inference attacks on location tracks," in International Conference on Pervasive Computing. Heidelberg: Spribger, 2007, pp. 127-143.
  51. I. J. Vergara-Laurens and M. A. Labrador, "Preserving privacy while reducing power consumption and information loss in lbs and participatory sensing applications," in Proceedings of 2011 IEEE GLOBECOM, Houston, TX, 2011, pp. 1247-1252.
  52. C. Y. Chow and M. F. Mokbel, "Trajectory privacy in location-based services and data publication," ACM SIGKDD Explorations Newsletter, vol. 13, no. 1, pp. 19-29, 2011. https://doi.org/10.1145/2031331.2031335
  53. B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J. C. Herrera, A. M Bayen, M. Annavaram, and Q. Jacobson, "Virtual trip lines for distributed privacy-preserving traffic monitoring," in Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, Breckenridge, CO, 2008, pp. 15-28.
  54. K. C. Lee, W. C. Lee, H. V. Leong, and B. Zheng, "Navigational path privacy protection: navigational path privacy protection," in Proceedings of the 18th ACM Conference on Information and Knowledge Management, Hong Kong, China, 2009, pp. 691-700.
  55. K. T. Yang, G. M. Chiu, H. J. Lyu, D. J. Huang, and W. C. Teng, "Path privacy protection in continuous location-based services over road networks," in Proceedings of 2012 Wireless and Mobile Computing, Networking and Communications, Barcelona, Spain, 2012, pp. 435-442.
  56. I. Anagnostopoulos, S. Zeadally, and E. Exposito, "Handling big data: research challenges and future directions," Journal of Supercomputing, vol. 72, no. 4, pp 1494-1516, 2016. https://doi.org/10.1007/s11227-016-1677-z
  57. S. Avancha, A. Baxi, and D. Kotz, "Privacy in mobile technology for personal healthcare," ACM Computing Surveys, vol. 45, no. 1, article no. 3, 2012.
  58. BakerHosteler, "2015 International Compendium of Data Privacy Laws," [Online]. Available: http://towerwall.com/wp-content/uploads/2016/02/International-Compendium-of-Data-Privacy-Laws.pdf.
  59. D. Mendez, M. A. Labrador, and K. Ramachandran, "Data interpolation for participatory sensing systems," Pervasive and Mobile Computing, vol. 9, no. 1, pp. 132-148, 2013. https://doi.org/10.1016/j.pmcj.2012.11.001
  60. D. Mendez and M. A. Labrador, "On sensor data verification for participatory sensing systems," Journal of Networks, vol. 8, no. 3, pp. 576-587, 2013.
  61. V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: a survey," ACM Computing Surveys, vol. 41, no. 3, pp. 1-15, 2009.
  62. C. C. Poon, Y. T. Zhang, and S. D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, 2006.
  63. N. Henry, N. Paul, and N. McFarlane, "Using bowel sounds to create a forensically-aware insulin pump system," in Proceedings of 2013 USENIX Workshop on Health Information Technologies (HealthTech), Washington, DC, 2013.
  64. O. Mir, T. van der Weide, and C. C. Lee, "A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems," Journal of Medical Systems, vol. 39, no. 9, article no. 89, 2015.
  65. J. M. Sorber, M. Shin, R. Peterson, and D. Kotz, "Plug-n-trust: practical trusted sensing for mhealth," in Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, Low Wood Bay, UK, 2012, pp. 309-322.
  66. L. Xu, and F. Wu, "Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care," Journal of Medical Systems, vol. 39, no. 2, article no. 10, 2015.
  67. F. Wu, L. Xu, S. Kumari, and X. Li, "An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks," Multimedia Systems, vol. 23 no. 2, pp. 195-205, 2017. https://doi.org/10.1007/s00530-015-0476-3
  68. V. Pournaghshband, M. Sarrafzadeh, and P. Reiher, "Securing legacy mobile medical devices," in International Conference on Wireless Mobile Communication and Healthcare. Heidelberg: Springer, 2012, pp. 163-172.
  69. A. Dua, N. Bulusu, W. C. Feng, and W. Hu, "Towards trustworthy participatory sensing," in Proceedings of the 4th USENIX Conference on Hot Topics in Security, Montreal, Canada, 2011.
  70. A. Darwish and A. E. Hassanien, "Wearable and implantable wireless sensor network solutions for healthcare monitoring," Sensors, vol. 11, no. 6, pp. 5561-5595, 2011. https://doi.org/10.3390/s110605561
  71. J. E. Ekberg, K. Kostiainen, and N. Asokan, "The untapped potential of trusted execution environments on mobile devices," IEEE Security & Privacy, vol. 12, no. 4, pp. 29-37, 2014. https://doi.org/10.1109/MSP.2014.38
  72. K. Kostiainen, E. Reshetova, J. E. Ekberg, and N. Asokan, "Old, new, borrowed, blue: a perspective on the evolution of mobile platform security architectures," in Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, San Antonio, TX, 2011, pp. 13-24.
  73. N. Vallina-Rodriguez and J. Crowcroft, "ErdOS: achieving energy savings in mobile OS," in Proceedings of the 6th International Workshop on MobiArch, Bethesda, MD, 2011, pp. 37-42.
  74. A. Merlo, M. Migliardi, and L. Caviglione, "A survey on energy-aware security mechanisms," Pervasive and Mobile Computing, vol. 24, pp. 77-90, 2015. https://doi.org/10.1016/j.pmcj.2015.05.005
  75. M. Dong and L. Zhong, "Self-constructive high-rate system energy modeling for battery-powered mobile systems," in Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, Bethesda, MD, 2011, pp. 335-348.
  76. R. Mittal, A. Kansal, and R. Chandra, "Empowering developers to estimate app energy consumption," in Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Istanbul, Turkey, 2012, pp. 317-328.
  77. C. Min, Y. Lee, C. Yoo, S. Kang, S. Choi, P. Park, I. Hwang, Y. Ju, S. Choi, and J. Song, "Powerforecaster: predicting smartphone power impact of continuous sensing applications at pre-installation time," in Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, Seoul, Korea, 2015, pp. 31-44.
  78. X. Ma, P. Huang, X. Jin, P. Wang, S. Park, D. Shen, Y. Zhou, L. K. Saul, and G. M. Voelker, "eDoctor: automatically diagnosing abnormal battery drain issues on smartphones," in Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, Lombard, IL, 2013, pp. 57-70.
  79. A. Pathak, A. Jindal, Y. C. Hu, and S. P. Midkiff, "What is keeping my phone awake? Characterizing and detecting no-sleep energy bugs in smartphone apps," in Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, Low Wood Bay, UK, 2012, pp. 267-280.
  80. F. Xu, Y. Liu, Q. Li, and Y. Zhang, "V-edge: fast self-constructive power modeling of smartphones based on battery voltage dynamics," in Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, Lombard, IL, 2013, pp. 43-56.
  81. S. Hallem, B. Chelf, Y. Xie, and D. Engler, "A system and language for building system-specific, static analyses," ACM SIGPLAN Notices, vol. 37, no. 5, pp. 69-82, 2002. https://doi.org/10.1145/543552.512539
  82. A. Fattori, R. Paleari, L. Martignoni, and M. Monga, "Dynamic and transparent analysis of commodity production systems," in Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, Antwerp, Belgium, 2010, pp. 417-426.
  83. G. J. Holzmann, "The model checker SPIN," IEEE Transactions on Software Engineering, vol. 23, no. 5, pp. 279-295, 1997. https://doi.org/10.1109/32.588521
  84. S. Gritzalis, D. Spinellis, and P. Georgiadis, "Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification," Computer Communications, vol. 22, no. 8, pp. 697-709, 1999. https://doi.org/10.1016/S0140-3664(99)00030-4
  85. K. Lee, D. Murray, D. Hughes, and W. Joosen, "Extending sensor networks into the cloud using Amazon web services," in Proceedings of Networked Embedded Systems for Enterprise Applications, Suzhou, China, 2010, pp. 1-7.
  86. Y Xu and S. Helal, "Scalable cloud-sensor architecture for the Internet of Things," IEEE Internet of Things, vol. 3 no. 3, pp. 285-298, 2016. https://doi.org/10.1109/JIOT.2015.2455555
  87. O. Osanaiye, K. R. Choo, and M. Dlodlo, "Distributed Denial of Service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework," Journal of Network and Computer Applications, vol. 67, pp. 147-165, 2016. https://doi.org/10.1016/j.jnca.2016.01.001
  88. F. Salim and U. Haque, "Urban computing in the wild: a survey on large scale participation and citizen engagement with ubiquitous computing, cyber physical systems, and Internet of Things," International Journal of Human-Computer Studies, vol. 81, pp. 31-48.
  89. L. G. Jaimes, I. J. Vergara-Laurens, and A. Raij, "A survey of incentive techniques for mobile crowd sensing," IEEE Internet of Things, vol. 2, no. 5, pp. 370-380, 2015. https://doi.org/10.1109/JIOT.2015.2409151
  90. N. Hardy and E. D. Tribble, The Digital Silk Road. Los Altos, CA: Agoric Inc., 1993.
  91. J. S. Lee and B. Hoh, "Sell your experiences: a market mechanism based incentive for participatory sensing," in Proceedings of the 2010 IEEE Conference in Pervasive Computing and Communications, Mannheim, Germany, 2010, pp. 60-68.
  92. M. Shin, C. Cornelius, D. Peebles, A. Kapadia, D. Kotz, and N. Triandopoulos, "AnonySense: a system for anonymous opportunistic sensing," Pervasive and Mobile Computing, vol. 7, no. 1, pp. 16-30, 2010. https://doi.org/10.1016/j.pmcj.2010.04.001
  93. I. J. Vergara-Laurens, D. Mendez, and M. A. Labrador, "Privacy, quality of information, and energy consumption in participatory sensing systems," in Proceedings of the 2014 IEEE Conference in Pervasive Computing and Communications, Budapest, Hungary, 2014, pp. 199-207.
  94. I. J. Vergara-Laurens "A hybrid privacy-preserving mechanism for participatory sensing systems," Ph.D. dissertation, University of South Florida, FL, 2014.
  95. E. Snekkenes, "Concepts for personal location privacy policies," in Proceedings of the 3rd ACM conference on Electronic Commerce, Tampa, FL, 2001, pp. 48-57.
  96. C. Hauser and M. Kabatnik, "Towards privacy support in a global location service," in Proceedings of the IFIP Workshop on IP and ATM Traffic Management, Paris, France, 2001.
  97. H. Lu, N. Lane, S. Eisenman, and A. Campbell, "Bubble-sensing: a new paradigm for binding a sensing task to the physical world," Pervasive Mobile Computing, vol. 6, no. 1, pp. 58-71, 2009. https://doi.org/10.1016/j.pmcj.2009.10.005
  98. D. Christin, P. S. Lopez, A. Reinhardt, M. Hollick, and M. Kauer, "Share with strangers: privacy bubbles as user-centered privacy control for mobile content sharing applications," Information Security Technical Report, vol. 17, no. 3, pp. 105-116, 2012. https://doi.org/10.1016/j.istr.2012.10.004
  99. A. Kapadia, T. Henderson, J. J. Fielding, and D. Kotz, "Virtual walls: protecting digital privacy in pervasive environments," in International Conference on Pervasive Computing. Heidelberg: Springer, 2007, pp. 162-179.
  100. S. De Capitani, S. Foresti, G. Livraga, and P. Samarati, "Data privacy: definitions and techniques," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 20, no. 6, pp. 793-817, 2012. https://doi.org/10.1142/S0218488512400247
  101. A. J. Perez and S. Zeadally, "Privacy issues and solutions for consumer wearables," IT Professional, 2017. https://doi.org/10.1109/MITP.2017.265105905.
  102. US Federal Trade Commission Report, "Protecting consumer privacy in an era of rapid change," 2012.
  103. A. Kosba, A. Miller, E. Shi, Z Wen, and C. Papamanthou, "Hawk: the blockchain model of cryptography and privacy-preserving smart contracts," in Proceedings of 2016 IEEE Symposium on Security and Privacy, San Jose, CA, 2016, pp. 839-858.
  104. L. Sweeney, "k-anonymity: a model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002. https://doi.org/10.1142/S0218488502001648
  105. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-diversity: privacy beyond kanonymity," ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 1, article no. 3, 2007.
  106. N. Li, T. Li, and S. Venkatasubramanian, "t-closeness: privacy beyond k-anonymity and l-diversity," in Proceedings of IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey, 2007, pp. 106-115.
  107. C. Dwork, "Differential privacy: a survey of results," in Theory and Applications of Models of Computation. Heidelberg: Springer, 2008.
  108. A J. Perez, S. Zeadally, and J. Cochran "A review and an empirical analysis of privacy policy and notices for consumer Internet of things, " Security and Privacy, e15, doi: https://doi.org/10.1001/spy2.15 , 2018.
  109. CBSNews, "'Pokemon Go' being used to stage robberies, police say," [Online]. Available: http://www.cbsnews.com/news/robbery-suspects-using-pokemon-go-to-target-victims-police-say/.
  110. T. Pultarova, "Webcam hack shows vulnerability of connected devices," Engineering & Technology, vol. 11, no. 11, pp. 10-10, 2016. https://doi.org/10.1049/et.2016.1112
  111. Zephyr BioHarness 3 [Online]. Available: https://www.zephyranywhere.com.
  112. A. J. Perez, K. Arroyo-Rivera, M. A. Labrador, and I. J. Vergara-Laurens, "HR-Auth: Heart Rate Data Authentication using Consumer Wearables", in Proceedings of the 5th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft), Gothenburg, Sweden, 2018, pp. 1-2.
  113. Literacy Project Foundation, "Staggering illiteracy statistics," 2008 [Online]. Available: http://www.literacyprojectfoundation.org/statistics-page/.
  114. S. Winkler and S. Zeadally, "Privacy policy analysis of popular web platforms," IEEE Technology and Society Magazine, vol. 35, no. 2, pp. 75-85, 2016. https://doi.org/10.1109/MTS.2016.2554419
  115. A. J. Perez, S. Zeadally, and S. Griffith, "Bystanders' privacy," IT Professional, vol. 19, no. 3, pp. 61-65, 2017. https://doi.org/10.1109/MITP.2017.42