Advertisement

In Things We Trust? Towards Trustability in the Internet of Things

(Extended Abstract)
  • Jaap-Henk Hoepman
Part of the Communications in Computer and Information Science book series (CCIS, volume 277)

Abstract

The Internet of Things is nothing new. Yet the imminent confluence of cyberspace and physical space into one ambient intelligent system still poses fundamental research challenges in the area of security, privacy and trustability. We discuss these challenges, and present new approaches that may help to overcome them.

Keywords

Ambient Intelligence Trust Computing Personal Device Privacy Preference Direct Anonymous Attestation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aarts, E., Harwig, R., Schuurmans, M.: Ambient intelligence. In: Denning, P. (ed.) The Invisible Future: The Seamless Integration Of Technology Into Everyday Life. McGraw-Hill (2001)Google Scholar
  2. 2.
    Alpár, G., Hoepman, J.-H., Siljee, J.: The identity crisis. Security, privacy and usability issues in identity management, eprint CoRR cs.CR:1101.0427 (January 2011)Google Scholar
  3. 3.
    Androulaki, E., Bellovin, S.M.: A Secure and Privacy-Preserving Targeted Ad-System. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 123–135. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  4. 4.
    Asokan, N., Debar, H., Steiner, M., Waidner, M.: Authenticating public terminals. Computer Networks 31(8), 861–870 (1999)CrossRefGoogle Scholar
  5. 5.
    Bandura, A.: Social cognitive theory: An agentic perspective. Annual Review of Psychology 52, 1–26 (2001)CrossRefGoogle Scholar
  6. 6.
    Brickell, E.F., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) ACM Conference on Computer and Communications Security, pp. 132–145. ACM (2004)Google Scholar
  7. 7.
    Broenink, G., Hoepman, J.-H., van ’t Hof, C., van Kranenburg, R., Smits, D., Wisman, T.: The privacy coach: Supporting customer privacy in the internet of things. In: Pervasive 2010 Conference Workshop on What can the Internet of Things do for the Citizen?, Helsinki, Finland, May 17, pp. 72–81 (2010)Google Scholar
  8. 8.
    Friedewald, M., Costa, O.D.: Science and technology roadmapping: Ambient intelligence in everyday life (amilife). Tech. rep., JRC/IPTS - ESTO (2003)Google Scholar
  9. 9.
    Garfinkel, S.L., Juels, A., Pappu, R.: RFID privacy: An overview of problems and proposed solutions. IEEE Security & Privacy, 34–43 (May-June 2005)Google Scholar
  10. 10.
    Hardin, R.: Trust & Trustworthiness. Russell Sage Foundation, New York (2002)Google Scholar
  11. 11.
    Hildebrandt, M.: Behavioural biometric profiling and transparency enhancing tools. FIDIS Deliverable 7.12Google Scholar
  12. 12.
    ISTAG. Ambient intelligence: from vision to reality. Tech. rep., ISTAG (2003)Google Scholar
  13. 13.
    Jalote, P.: Fault Tolerance in Dsitributed Systems. Prentice Hall (1994)Google Scholar
  14. 14.
    Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Lorenz, K.: Er redete mit dem Vieh, den Vögeln und den Fischen. Borotha-Schoeler, Wien (1949)Google Scholar
  16. 16.
    Mitchell, C.J. (ed.): Trusted Computing. The Institution of Engineering and Technology (November 2005)Google Scholar
  17. 17.
    Nissenbaum, H.: Privacy as contextual integrity. Washington Law Review 79(1), 119–158 (2004)Google Scholar
  18. 18.
    Rieback, M.R., Gaydadjiev, G., Crispo, B., Hofman, R.F.H., Tanenbaum, A.S.: A platform for RFID security and privacy administration. In: LISA, pp. 89–102. USENIX (2006)Google Scholar
  19. 19.
    Schneier, B.: Security in 2020. CryptoGram (January 2011)Google Scholar
  20. 20.
    Solove, D.J.: Understanding Privacy. Harvard University Press (2008)Google Scholar
  21. 21.
    Spiekermann, S., Evdokimov, S.: Critical RFID privacy-enhancing technologies. IEEE Security & Privacy 11(2), 56–62 (2009)CrossRefGoogle Scholar
  22. 22.
    Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  23. 23.
    Sundmaeker, H., Guillemin, P., Friess, P., Woelffl, S.: Vision and Challenges for Realising the Internet of Things. Publication Office of the European Union, Luxembourg (2010), Clusterbook of CERP-IoT, ISBN 978-92-79-15088-3Google Scholar
  24. 24.
    Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S.: Adnostic: Privacy preserving targeted advertising. In: 17th Ann. Network and Distributed System Symposium, San Diego, CA, USA (February 2010)Google Scholar
  25. 25.
    Warren, S.D., Brandeis, L.D.: The right to privacy. The implicit made explicit. Harvard Law Review IV(5), 193–220 (1890)CrossRefGoogle Scholar
  26. 26.
    Weber, S.G., Martucci, L.A., Ries, S., Mühlhäuser, M.: Towards trustworthy identity and access management for the future internet. In: The 4th International Workshop on Trustworthy Internet of People, Things & Services (Trustworthy IoPTS 2010) Co-located with the Internet of Things 2010 Conference, Tokyo, Japan (November 2010)Google Scholar
  27. 27.
    Weber, S.G., Mühlhäuser, M.: Multilaterally Secure Ubiquitous Auditing. In: Caballé, S., Xhafa, F., Abraham, A. (eds.) Intelligent Networking, Collaborative Systems and Applications. SCI, vol. 329, pp. 207–233. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  28. 28.
    Weiser, M.: The computer for the 21st century. Scientific American (February 1991)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Jaap-Henk Hoepman
    • 1
    • 2
  1. 1.TNO Information and Communication TechnologyThe Netherlands
  2. 2.Institute for Computing and Information Sciences (ICIS)Radboud University NijmegenThe Netherlands

Personalised recommendations