A Brief Survey on IoT Privacy: Taxonomy, Issues and Future Trends

  • Kinza SarwarEmail author
  • Sira Yongchareon
  • Jian Yu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11434)


Internet of Things (IoT) is a paradigm that has the capability to revolutionize on everyday life, in sectors of ranging from our homes, health, transport, industry, entertainment to interaction with government. The comfort and benefits that IoT is providing are undeniable, however, these may come with a huge risk of individual identity and data privacy. Several researches have been conducted to find a better way to eliminate privacy risks and minimize the effect on users’ privacy requirements. In this context, the proposed study consists of four segments, first we analyse the privacy problems evolving with the advancement in IoT paradigm. In the second segment, we present methodology review with analysis and classification of privacy solutions. Then we provide an in-depth analysis of preserving privacy during sensors data transmission. In the last segment, we depict the future trend for end-to-end privacy in IoT.


Internet of Things (IoT) Privacy Security 


  1. 1.
    Yang, Y., et al.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5), 1250–1258 (2017)CrossRefGoogle Scholar
  2. 2.
    Puthli, R.: The Internet of Things will be much, much bigger than mobile (2015).
  3. 3.
    Mendez, D.M., Papapanagiotou, I., Yang, B.: Internet of things: survey on security and privacy. arXiv preprint arXiv:1707.01879 (2017)
  4. 4.
    Aleisa, N., Renaud, K.: Privacy of the Internet of Things: A Systematic Literature Review (2017)Google Scholar
  5. 5.
    Lopez, J., et al.: Evolving privacy: from sensors to the internet of things. Future Gener. Comput. Syst. 75, 46–57 (2017)CrossRefGoogle Scholar
  6. 6.
    Zhou, J., et al.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017)CrossRefGoogle Scholar
  7. 7.
    Li, R., et al.: IoT applications on secure smart shopping system. IEEE Internet Things J. 4(6), 1945–1954 (2017)CrossRefGoogle Scholar
  8. 8.
    Henze, M., et al.: A comprehensive approach to privacy in the cloud-based internet of things. Future Gener. Comput. Syst. 56, 701–718 (2016)CrossRefGoogle Scholar
  9. 9.
    Srinivas, J., et al.: Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. J. Ambient Intell. Humanized Comput. (2017)Google Scholar
  10. 10.
    Gope, P., Hwang, T.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11), 7124–7132 (2016)CrossRefGoogle Scholar
  11. 11.
    Kumar, P., et al.: Anonymous secure framework in connected smart home environments. IEEE Trans. Inf. Forensics Secur. 12(4), 968–979 (2017)CrossRefGoogle Scholar
  12. 12.
    Amin, R., et al.: A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener. Comput. Syst. 80, 483–495 (2018)CrossRefGoogle Scholar
  13. 13.
    Tonyali, S., et al.: Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems. Future Gener. Comput. Syst. 78, 547–557 (2018)CrossRefGoogle Scholar
  14. 14.
    Jayaraman, P.P., et al.: Privacy preserving internet of things: from privacy techniques to a blueprint architecture and efficient implementation. Future Gener. Comput. Syst. 76, 540–549 (2017)CrossRefGoogle Scholar
  15. 15.
    Li, X., et al.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 103, 194–204 (2018)CrossRefGoogle Scholar
  16. 16.
    Ivaşcu, T., Frîncu, M., Negru, V.: Considerations towards security and privacy in internet of things based eHealth applications. In: 2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY). IEEE (2016)Google Scholar
  17. 17.
    Dorri, A., et al.: Blockchain for IoT security and privacy: The case study of a smart home, pp. 618–623 (2017)Google Scholar
  18. 18.
    Le, J., Liao, X., Yang, B.: Full autonomy: a novel individualized anonymity model for privacy preserving. Comput. Secur. 66, 204–217 (2017)CrossRefGoogle Scholar
  19. 19.
    Tao, M., et al.: Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes. Future Gener. Comput. Syst. 78, 1040–1051 (2018)CrossRefGoogle Scholar
  20. 20.
    Challa, S., et al.: Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5, 3028–3043 (2017)CrossRefGoogle Scholar
  21. 21.
    Seo, S.-H., Won, J., Bertino, E.: pCLSC-TKEM: a pairing-free certificateless signcryption-tag key encapsulation mechanism for a privacy-preserving IoT. Trans. Data Privacy 9(2), 101–130 (2016)Google Scholar
  22. 22.
    Gope, P., et al.: Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener. Comput. Syst. (2017)Google Scholar
  23. 23.
    Huang, Q., Yang, Y., Wang, L.: Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things. IEEE Access 5, 12941–12950 (2017)CrossRefGoogle Scholar
  24. 24.
    Neisse, R., et al.: SecKit: a model-based security toolkit for the internet of things. Comput. Secur. 54, 60–76 (2015)CrossRefGoogle Scholar
  25. 25.
    Su, J., et al.: ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things. Future Gener. Comput. Syst. 33, 11–18 (2014)CrossRefGoogle Scholar
  26. 26.
    Ivascu, T., Frîncu, M., Negru, V.: Considerations towards security and privacy in Internet of Things based eHealth applications, p. 275–280 (2016)Google Scholar
  27. 27.
    Yao, L., et al.: Protecting the sink location privacy in wireless sensor networks. Pers. Ubiquit. Comput. 17(5), 883–893 (2013)CrossRefGoogle Scholar
  28. 28.
    Shao, M., et al.: Cross-layer enhanced source location privacy in sensor networks. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009 SECON 2009. IEEE (2009)Google Scholar
  29. 29.
    Kamat, P., et al.: Temporal privacy in wireless sensor networks: theory and practice. ACM Trans. Sens. Netw. (TOSN) 5(4), 28 (2009)Google Scholar
  30. 30.
    Yang, X., et al.: A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems. Comput. Netw. 88, 21–88 (2015)CrossRefGoogle Scholar
  31. 31.
    Ara, A., et al.: A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems. IEEE Access 5, 12601–12617 (2017)CrossRefGoogle Scholar
  32. 32.
    Vahedi, E., et al.: A secure ECC-based privacy preserving data aggregation scheme for smart grids. Comput. Netw. 129, 28–36 (2017)CrossRefGoogle Scholar
  33. 33.
    Figueres, N.B., et al.: Efficient smart metering based on homomorphic encryption. Comput. Commun. 82, 95–101 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of Engineering, Computer and Mathematical SciencesAuckland University of TechnologyAucklandNew Zealand

Personalised recommendations