Context Privacy in the Internet of Things

  • Laura Galluccio
  • Alessandro Leonardi
  • Giacomo Morabito
  • Sergio Palazzo


Recent advances in electronics, communications, and information technologies make possible to collect, process and store a large amount of information from the physical world. Once generated, such information is rarely erased and it is almost impossible to fully control its diffusion. This raises serious privacy problems. In this paper attention is focused on the privacy problems occurring in the pervasive and heterogeneous scenarios characterizing the Internet of Things. Since access to the data content can be prevented utilizing traditional security mechanisms, focus will be put on context privacy, which concerns the protection of sensible information that requires to be guaranteed even if data content is fully secured. In this paper, the privacy problems will be described and analyzed along with the main solutions that have been proposed so far in the literature.


Sensor network Privacy 


  1. 1.
    Akyildiz, I.F., Melodia, T., Chowdhury, K.R.: A survey on wireless multimedia sensor networks. Comput. Netw. 51(4), 921–960 (2007)CrossRefGoogle Scholar
  2. 2.
    Armenia, S., Morabito, G., Palazzo, S.: Analysis of location privacy/energy efficiency tradeoffs in wireless sensor networks. In: Proceedings of IFIP Networking, Atlanta, GA, USA, May (2007)Google Scholar
  3. 3.
    Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)Google Scholar
  4. 4.
    Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRefGoogle Scholar
  5. 5.
    Choi, H., McDanial, P., Porta, T.F.L.: Privacy preserving communication in manets. In: Proceedings of 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and networks (SECON), San Diego, California, USA, June (2007)Google Scholar
  6. 6.
    Freudiger, J., Raya, M., Flegyhzi, M., Papadimitratos, P., Hubaux, J.-P.: Mix-zones for location privacy in vehicular networks. In: Proceedings of First International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), Vancouver, Canada, Aug (2007)Google Scholar
  7. 7.
    Galluccio, L., Morabito, G., Palazzo, S.: Spontaneous group management in mobile ad-hoc networks. Wirel. Netw. 10(4), 423–438 (2004)CrossRefGoogle Scholar
  8. 8.
    Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42(2), 39–41 (1999)CrossRefGoogle Scholar
  9. 9.
    Kong, J., Hong, X.: ANODR: Anonymous on demand routing with untraceable routes for mobile ad hoc networks. In: Proceedings ACM Mobihoc 2003, Annapolis, MD, USA, June (2003)Google Scholar
  10. 10.
    Lioudakis, G.V., Koutsoloukas, E.A., Dellas, N., Kapellaki, S., Prezerakos, G.N., Kaklamani, D.I., Venieris, I.S.: A proxy for privacy: the discreet box. EUROCON 2007. Warsaw, Poland, September (2007)Google Scholar
  11. 11.
    Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: Proceedings of TIWDC 2009, Pula, Italy, September (2009)Google Scholar
  12. 12.
    Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-location privacy for networks of energy-constrained sensors. In: Proceedings of IEEE Workshop on Software Technologies for Embedded and Ubiquitous Computing Systems (WSTFEUS), Vienna, Austria, May (2004)Google Scholar
  13. 13.
    Parent, W.: Privacy, morality and the law. Philos. Public Aff.12, 269–288 (1983)Google Scholar
  14. 14.
    Reed, M.G., Member, Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE JSAC 16(4), 482–494 (1998)Google Scholar
  15. 15.
    Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: CARAVAN: Providing location privacy in vanets. In: Proceedings of Embedded Security in Cars (ESCAR), Cologne, Germany, November (2005)Google Scholar
  16. 16.
    Savry, O., Pebay-Peyroula, F., Dehmas, F., Robert, G., Reverdy, J.: Rfid noisy reader: How to prevent from eavesdropping on the communication? In: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems 2007. Vienna, Austria, September (2007)Google Scholar
  17. 17.
    Savry, O., Vacherand, F.: Security and privacy protection of contactless devices. In: Proceedings of TIWDC 2009. Pula, Italy, September (2009)Google Scholar
  18. 18.
    Shelby, O.:Embedded web services. IEEE Wireless Communications Magazine (to appear)Google Scholar
  19. 19.
    Wang, X.Y., Chen, S., Jajodia, S.: Tracking anonymous peer-to-peer voip calls on the internet. In: Proceedings of ACM Conference on Computer Communications Security (CCS 2005), Alexandria, Virginia, USA, November (2005)Google Scholar
  20. 20.
    Weiser, M.: The computer for the twenty-first century. Scie. Am. 265(3), 94–104 (1991)Google Scholar
  21. 21.
    Xi, Y., Schwiebert, L., Shi, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: Proceedings of 20th International Conference on Parallel and Distributed Processing Symposium (IPDPS 2006), Rhodes, Greece, April (2006)Google Scholar

Copyright information

© Springer-Verlag Italia Srl 2011

Authors and Affiliations

  • Laura Galluccio
    • 1
  • Alessandro Leonardi
    • 1
  • Giacomo Morabito
    • 1
  • Sergio Palazzo
    • 1
  1. 1.Dipartimento di Ingegneria Informatica e delle TelecomunicazioniUniversity of CataniaCataniaItaly

Personalised recommendations