Internet of Things

Security, Privacy and Trust Considerations
  • Antonio Skarmeta
  • M. Victoria Moreno
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8425)


Secure and reliable Internet of Things (IoT) presents the main challenges to face for sustainable and efficient IoT ecosystems based on privacy-aware systems. In this paper we present a concise description of such challenges.


Internet of Things Security Privacy Trust 


  1. 1.
    Sundmaeker, H., Guillemin, P., Friess, P., Woelffl, S.: Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things (CERP-IoT) (2010)Google Scholar
  2. 2.
    Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefzbMATHGoogle Scholar
  3. 3.
    Schonwalder, J., Fouquet, M., Rodosek, G., Hochstatter, I.: Future internet= content+ services+ management. IEEE Commun. Mag. 47(7), 27–33 (2009)CrossRefGoogle Scholar
  4. 4.
    Akin, A., Aysu, A., Ulusel, O.C., Savas, E.: Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single-and multi-message hashing. In: Proceedings of the 3rd International Conference on Security of Information and Networks, pp. 168–177. ACM (2010)Google Scholar
  5. 5.
    Öztürk, E., Sunar, B., Savaş, E.: Low-power elliptic curve cryptography using scaled modular arithmetic. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 92–106. Springer, Heidelberg (2004) Google Scholar
  6. 6.
    Ren, K., Lou, W.: A sophisticated privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks. In: The 28th International Conference on Distributed Computing Systems. ICDCS’08, pp. 286–294. IEEE (2008)Google Scholar
  7. 7.
    Durahim, A.O., Savas, E.: \({\rm A}2\_{\rm MAKE}\): an efficient anonymous and accountable mutual authentication and key agreement protocol for WMNs. Ad Hoc Netw. 9(7), 1202–1220 (2011)CrossRefGoogle Scholar
  8. 8.
    Hwang, J.Y., Lee, S., Chung, B.H., Cho, H.S., Nyang, D.: Short group signatures with controllable linkability. In: 2011 Workshop on Lightweight Security and Privacy: Devices, Protocols and Applications (LightSec), pp. 44–52. IEEE (2011)Google Scholar
  9. 9.
    Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. Computer 44(9), 51–58 (2011)CrossRefGoogle Scholar
  10. 10.
    Gudymenko, I., Borcea-Pfitzmann, K., Tietze, K.: Privacy implications of the Internet of Things. In: Wichert, R., Van Laerhoven, K., Gelissen, J. (eds.) AmI 2011. CCIS, vol. 277, pp. 280–286. Springer, Heidelberg (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of Information and Communications Engineering Computer Science FacultyUniversity of MurciaMurciaSpain

Personalised recommendations