Data Privacy Protection in the Internet of Things

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Internet of Things (IoT)".

Deadline for manuscript submissions: 31 March 2025 | Viewed by 1798

Special Issue Editors


E-Mail Website
Guest Editor
School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
Interests: IoT; data privacy protection; artificial intelligence

E-Mail Website
Guest Editor
College of Integrated Science and Engineering, James Madison University, Harrisonburg, VA 22807, USA
Interests: data analytics; algorithms; the internet of things
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computer and Control Engineering, Yantai University, Yantai 264005, China
Interests: swarm intelligence sensing network; service computing; privacy protection; artificial intelligence

Special Issue Information

Dear Colleagues,

Nowadays, the Internet of Things (IoT) allows regular users to upload sensing data collected via their smart devices, which constitutes an indispensable component of IoT data acquisition. These users, while working as data contributors, also form a community where they are comprehensively collaborative during the procedure of data collection, communication, analysis, and services. It is believed that the IoT is a promising paradigm that brings seamless and flexible coverage for our surrounding environment via the extensive and voluntary involvement of crowds. However, this new trend also brings significant threats to data security and privacy. Sensing contents are more likely to be hijacked within the open and vulnerable system, and the sensitive information of users could be recovered. For example, trajectories recorded by mobile phones may indicate the daily status of users like health, incoming, sex orientation, etc. These threats are made even worse by the fact that users of IoTs usually continuously and unconsciously contribute sensing data to systems via devices and apps running in the background of operating systems. Moreover, the IoT also suffers high dynamics and heterogeneity due to the diverse behaviors and preference of participants. Both facts aggravate the difficulties for security and privacy preservation, which have already thwarted the current development of  IoTs.

In recent years, multiple techniques have flourished which enhance security and privacy preservation capabilities in diverse distributed systems. Some noticeable terms include federated learning, privacy-aware computing, blockchains, AI-powered security, Zero Trust, etc. These techniques have both broadened the scope of system security and also strengthened the level of privacy preservation, as continuous and heterogeneous behaviors of regular and malicious participants are both handled. 

We argue that there should also be an in-depth and comprehensive consideration on integrating these cutting-edge techniques with the design of IoTs, which includes but is not limited to novel theories, frameworks, techniques, and applications. Therefore, this Special Issue will be a virtual research forum for the sharing of insightful ideas towards secure and privacy-aware computing in IoTs.

The topics of interest include, but are not limited to:

  • Fundamental theories on security and privacy preservation in IoTs;
  • Privacy-aware computing for data processing in IoTs;
  • Federated learning for data processing in IoTs;
  • Design and implementation of blockchain techniques for IoTs;
  • Design and implementation of Zero Trust approaches for IoTs;
  • Design of authentication mechanisms for dynamic devices in IoTs;
  • Design of lightweight encryption and decryption methods for IoTs;
  • Reinforcement learning methods for data processing in IoTs;
  • Network protocols supporting privacy-aware computing in IoTs;
  • Demos, systems and applications for security- and privacy-aware computing in IoTs.

Dr. Xu Zheng
Dr. Zhuojun Duan
Prof. Dr. Yingjie Wang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

11 pages, 452 KiB  
Review
Technologies of Data Protection and Institutional Decisions for Data Sovereignty
by Enrico Del Re
Information 2024, 15(8), 444; https://doi.org/10.3390/info15080444 - 30 Jul 2024
Viewed by 1102
Abstract
This paper aims to propose innovative actions of advanced technological solutions and consequent necessary institutional decisions to achieve in a reasonable time the definitive confidential data protection and data sovereignty, based on available scientific results. Confidential data protection is a fundamental and strategic [...] Read more.
This paper aims to propose innovative actions of advanced technological solutions and consequent necessary institutional decisions to achieve in a reasonable time the definitive confidential data protection and data sovereignty, based on available scientific results. Confidential data protection is a fundamental and strategic issue in next-generation Internet systems to guarantee data sovereignty and the respect of human rights as stated in the foundation of the United Nations. Even if presently many international regulations are decisive steps to guarantee data protection within normative contexts, they are not adequate to face new technologies, such as facial recognition, automatic profiling, position tracking, biometric data, AI applications, and many others in the future, as they are implemented without any awareness by the interested subjects. Therefore, a new approach to data protection is mandatory based on innovative and disruptive technological solutions. A recent OECD report highlighted the need for the so-called Privacy-Enhancing Technologies (PETs) for the effective protection of confidential data, even more urgent for the coexistence of privacy and data sharing in international contexts. A common feature of these technologies is the use of software methodologies that can run on currently available microprocessors and their present immaturity. More effective and definitive protection can be achieved with another methodological approach based on the paradigm of ‘Data Usage Control’. This new concept guarantees data protection policy by default and initial design and it requires a new architecture of the data and a new HW&SW architecture of the computers. This contribution has a two-fold objective: first, to clarify why regulations alone and present technological proposals are not adequate for the effective and definitive protection of data and, second, to indicate the new necessary technological approach and the simultaneous institutional actions required to achieve the definitive protection and sovereignty of data in reasonable times, based on the results already available in the scientific literature. Full article
(This article belongs to the Special Issue Data Privacy Protection in the Internet of Things)
Show Figures

Figure 1

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Title: Communication and Sensing: PHY Layer Threats to Security and Privacy for IoT systems, and possible Countermeasures
Authors: Renato Lo Cigno, Francesco Gringoli, Stefania Bartoletti, Marco Cominelli, Lorenzo Ghiro and Samuele Zanini
Affiliation: University of Brescia and Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT), Italy; University of Roma Tor Vergata and Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT), Italy; Politecnico di Milano, Italy; Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT), Italy
Abstract: Recent advances in signal processing and AI-based inference enable the exploitation of communication signals to collect information on devices, people, actions and the environment in general, i.e., to perform Integrated Sensing And Communication (ISAC). This possibility opens new and exciting opportunities for IoT systems, but at the same time poses unprecedented threats to security and privacy of data, devices, and systems. In fact, ISAC operates at the PHY and MAC layers, where it is impossible to protect the information with standard encryption techniques, or with any other purely digital methodologies. The work we present analyzes, within the framework of IoT and distributed, pervasive communication systems, the threats to security and privacy posed by ISAC and how they do intertwine at the PHY layer. Next, possible countermeasures are presented and discussed, with proper architectural choices and tradeoffs to implement them, as well as solutions and protocols to preserve the potential benefits of ISAC while ensuring data protection and users' privacy.

Title: --
Authors: Alper Kanak 1/2, İbrahim Arif 1/2, Ali Serdar Atalay 3, Oguzhan Herkiloğlu 3, and Salih Ergün* 1/2
Affiliation: 1 ERGTECH Research GmbH, Switzerland; 2 Ergünler R&D Ltd. Co. (ERARGE), Turkiye; 3 AI3SEC OÖ
Abstract: In the automotive industry, many manufacturing processes begin with selecting various materials for vehicle requirements, involving a large supply chain network, including electronics, plastic, glass, raw materials, cotton, etc. This network is both cross-departmental at the factory level and multi-institutional at the cross-organizational level. There is a significant challenge in trustworthy governance of data, information, and knowledge from different sources to gain transparency about the location, availability, demand, and supply of raw materials, semi-finished, and finished prod-ucts in industrial environments. Increasing resilience even in local supply chains within a manu-facturing environment and improving the security of supply for respective departments in urban factories require a holistic shielding mechanism against security, privacy, and safety threats. This study, based on a combined privacy-security-safety threat model, presents a triangular accounta-bility model for decentralized cooperation networks where manufacturers, suppliers, and com-pliance or certification authorities naturally participate in the production lifecycle through secure, private, and immutable transactions. The study explores the use of knowledge graphs and large language models (LLMs) in managing the automotive supply chain with a specific focus on in-factory logistics realized through electric forklifts. The targeted use case addresses the energy efficiency of the electric vehicles used in internal logistics by considering their state-of-charge and state-of-health. Knowledge graphs present a structural view of entities and their interactions, aiding in the detection of operational, privacy, security, and safety issues. LLMs enhance data processing, natural language queries, decision-making, and predictive analytics, making the EV-enabled logis-tics system accessible, explainable, efficient, and trusted. The triangular model, strengthened with LLMs, provides a dynamic map of the supply chain, offering insights into product origins, labor and environmental impacts, and risks while maintaining data privacy.

Title: Communication and Sensing: PHY Layer Threats to Security and Privacy for IoT systems, and possible Countermeasures
Author: Lo Cigno
Highlights: * Physical Layer threats to Security and Privacy based on analog signal analysis and processing are presented. * Countermeasures (obfuscation in particular) to be used against such attacks are introduced and discussed. * Legitimate use of sensing is also tackled, showing how signals can be de-obfuscated if needed.

Title: Proposed reinforcement learning fuzzy-stranded-NN model for the early detection and response to vine water stress events due to climate change
Authors: Sotirios Kontogiannis; Stefanos Koundouras; Christos Pikridas
Affiliation: Aristotle University of Thessaloniki
Abstract: This paper presents a new deep-learning model that utilizes Neural Network strands of different learning depths, probabilistic decision weights, and a fuzzy penalty function to provide the optimum policy for the early detection of vine water deficiencies. Model data inputs include environmental sensory measurements of temperature, humidity, soil moisture, and temperature. The model offers localized outputs of stress events and irrigation feedback under water-stress abiotic conditions. The proposed model is supported by the open-source cloud-based thingsAI system that includes a mobile phone application to notify the farmers. The proposed model output has been validated under stressful vine events. Cross-comparison experimentation between the proposed model and the Penman-Moteith model for evapotranspiration calculations shows that the proposition is a conservative evapotranspiration calculation candidate that can offer significant water conservation, introducing minimal tolerable vine stress that can positively affect the quality of winemaking varieties.

Back to TopTop