An Overview of Privacy and Security Issues in the Internet of Things

  • Carlo Maria Medaglia
  • Alexandru Serbanati
Conference paper


While the general definition of the Internet of Things (IoT) is almost mature, roughly defining it as an information network connecting virtual and physical objects, there is a consistent lack of consensus around technical and regulatory solutions. There is no doubt, though, that the new paradigm will bring forward a completely new host of issues because of its deep impact on all aspects of human life. In this work, the authors outline the current technological and technical trends and their impacts on the security, privacy, and governance. The work is split into short- and long-term analysis where the former is focused on already or soon available technology, while the latter is based on vision concepts. Also, an overview of the vision of the European Commission on this topic will be provided.


Wireless Sensor Network Near Field Communication Security Feature Smart Object Identity Management System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Gershenfeld N, Krikorian R, Cohen D (2004) The Internet of things. Sci Am 291(4):76–81CrossRefGoogle Scholar
  2. 2.
    Furness A (2008) A Framework Model for The Internet of Things. In: GRIFS/CASAGRAS Workshop, Hong Kong, December 2008Google Scholar
  3. 3.
    Presser M et al. (2008) Real World Internet (Position Paper). Future Internet Assembly, Madrid, Spain, December 2008Google Scholar
  4. 4.
    Hourcade JC, Nuevo Y, Wahlster W, Saracco R, Reinhard P (2009) Future Internet 2020: visions of an industry expert group. Future Internet Final Report, Belgium, May 2009Google Scholar
  5. 5.
    Duc DN, Park J, Lee H, Kim K (2006) Enhancing security of EPCglobal GEN-2 RFID tag against traceability and cloning. The 2006 symposium on cryptography and information security, Hiroshima, JapanGoogle Scholar
  6. 6.
    Korkmaz E, Ustundag A (2007) Standards, security & privacy issues about radio frequency identification (RFID). RFID Eurasia, 2007 1st Annual, Istanbul, TurkeyGoogle Scholar
  7. 7.
    Chien HY, Chen CH (2007) Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Comput Stand Interfaces 29(2):254–259CrossRefMathSciNetGoogle Scholar
  8. 8.
    Peris-Lopez P, Hernandez-Castro JC, Estevez JM, Ribagorda A (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput Stand Interfaces 31(2):372–380CrossRefGoogle Scholar
  9. 9.
    Garcia FD, de Koning Gans G, Muijrers R, van Rossum P, Verdult R, Schreur RW, Jacobs B (2008) Dismantling MIFARE classic. Proceedings of ESORICS 2008, Malaga, Spain, pp 97–114Google Scholar
  10. 10.
    Aigner M, Dominikus S, Feldhofer M (2007) A system of secure virtual coupons using NFC technology. Pervasive Computing and Communications Workshops, 2007. PerCom Workshops ’07. Fifth annual IEEE international conference on, 19–23 Mar 2007, pp 362–366Google Scholar
  11. 11.
    Arch Rock. Arch Rock PhyNetTM.
  12. 12.
    Boyle D, Newe T (2008) Securing wireless sensor networks: security architectures. J Netw (JNW) 3(1):65–77Google Scholar
  13. 13.
    Mullingan G (2007) The 6LoWPAN architecture. Proceedings of the 4th workshop on embedded networked sensors, Cork, Ireland, pp 78–82Google Scholar
  14. 14.
    European Commission (2009) When your yogurt pots start talking to you: Europe prepares for the internet revolution. European Commission’s Press Release, June 2009Google Scholar
  15. 15.
    Hansen M, Krasemann H (2008) PRIME whitepaper. Available at, May 2008

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Centro per le Applicazioni della Televisione e delle Tecniche di Istruzione a Distanza (CATTID)University “Sapienza”RomeItaly

Personalised recommendations