Systematically Quantifying IoT Privacy Leakage in Mobile Networks

Author(s):  
Shuodi Hui ◽  
Zhenhua Wang ◽  
Xueshi Hou ◽  
Xiao Wang ◽  
Huandong Wang ◽  
...  
2016 ◽  
Vol 2016 ◽  
pp. 1-17 ◽  
Author(s):  
Milena Radenkovic

This paper proposes a novel Cognitive Privacy (CogPriv) framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5176
Author(s):  
Stefano Tomasin ◽  
Marco Centenaro ◽  
Gonzalo Seco-Granados ◽  
Stefan Roth ◽  
Aydin Sezgin

The 5g of cellular networks improves the precision of user localization and provides the means to disclose location information to ott service providers. The nwdaf can further elaborate this information at an aggregated level using artificial intelligence techniques. These powerful features may lead to the improper use of user location information by mno and ott service providers. Moreover, vulnerabilities at various layers may also leak user location information to eavesdroppers. Hence, the privacy of users is likely at risk, as location is part of their sensitive data. In this paper, we first go through the evolution of localization in cellular networks and investigate their effects on location privacy. Then, we propose a location-privacy-preserving integrated solution comprising virtual private mobile networks, an independent authentication and billing authority, and functions to protect wireless signals against location information leakage. Moreover, we advocate the continuous and detailed control of localization services by the user.


GIS Business ◽  
2019 ◽  
Vol 14 (6) ◽  
pp. 728-750
Author(s):  
Naeem Z Azeemi ◽  
Saira Khan ◽  
Sharmini Enoch ◽  
Riktesh Srivastava ◽  
Omar al Basheer ◽  
...  

The superstructure network in the Internet of Things (IoT) is an emerging network targeted to enable an ecosystem of smart applications and services. It connectsphysical resources and peopletogether with software, hence contribute to sustainable growth, provided it combines and guarantees trustand security for people and businesses.  In this work we presented smart city viewpoint opt-in to the Firth Generation (5G) mobile networks. Both a framework and deployment are explored rigorously to assist and predicting robustness of IoT technologies and applications as a natural outcome of the Third Generation Partnership Project (3GPP) in general and LTE in particular. These technologies are compared on the basis of Air Interfaces and their Specifications i.e. Adaptive Modulation and Coding, Multiple Access Schemes and Multiple Antenna Techniques along with the evolution and comparison of the Network Architectures.


Telecom IT ◽  
2019 ◽  
Vol 7 (3) ◽  
pp. 50-55
Author(s):  
D. Saharov ◽  
D. Kozlov

The article deals with the СoAP Protocol that regulates the transmission and reception of information traf-fic by terminal devices in IoT networks. The article describes a model for detecting abnormal traffic in 5G/IoT networks using machine learning algorithms, as well as the main methods for solving this prob-lem. The relevance of the article is due to the wide spread of the Internet of things and the upcoming update of mobile networks to the 5g generation.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Sign in / Sign up

Export Citation Format

Share Document