Wireless Communications and Mobile Computing

Privacy in the Internet of Things


Status
Published

Lead Editor

1Georgia State University, Atlanta, USA

2IBM T.J. Watson Research Center, Yorktown Heights, USA

3Mid Sweden University, Sundsvall, Sweden

4University of Ljubljana, Ljubljana, Slovenia

5Tsinghua University, Beijing, China


Privacy in the Internet of Things

Description

The ubiquity of sensor devices in Internet of Things opens up a large source for sensory data, which has shown great potential in benefiting the industry as well as improving people’s quality of life. Sensory data has become an indispensable component in wide variety of applications, including manufacturing, marketing, healthcare, transportation, entertainment, environmental monitoring, indoor localization, and traffic monitoring, and will continue to play an even more pivotal role in the near future. Smart sensors are being employed in more and more manufacturers. Thanks to sensory data, their efficiency has been substantially increased, product defects have been dramatically reduced, and customers' quality of experience has been improved to a maximum extend. It is worth mentioning that more than 40 percent of data generated from Internet of Things come from sensors. On the other hand, the size of sensory data has already overwhelmed the current ability to collect, store, and analyze them which is one of the major bottlenecks to the further development of IoT applications. More problematically, consumers’ privacy is being seriously threatened by the huge amount of sensory data revealing personal information. Unfortunately, conventional privacy protection methodologies are mainly for small scale or isomorphic data, and they are not effective or efficient for big sensory data. Therefore, corresponding privacy protection technologies and tools are eagerly expected so that people can enjoy the benefits of sensory data with privacy being preserved anytime and anywhere.

This special issue solicits high-quality contributions that focus on designing new technologies and tools to address the privacy issues towards sensory data.

Potential topics include but are not limited to the following:

  • Privacy for sensory data applications and implementations 
  • Privacy for sensory data collection
  • Privacy for sensory data fusion and transformation
  • Privacy for sensory data storage management
  • Privacy for sensory data sharing and visualization
  • Privacy for sensory data access control
  • Privacy for sensory data analytics and mining
  • Privacy for mobile social networks
  • Privacy for vehicular networks
  • Privacy and service trade-off for mobile applications
  • Business processing and business models for
  • Pricing model for sensory data
  • Signal processing in the encrypted domain
  • Data anonymization
  • Privacy versus information sharing trade-offs
  • Privacy in wearable devices
  • Privacy in smart home and smart city

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 8281379
  • - Editorial

Privacy in the Internet of Things

Zhipeng Cai | Rong N. Chang | ... | Chaokun Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 5816765
  • - Research Article

A Secure and Scalable Data Communication Scheme in Smart Grids

Chunqiang Hu | Hang Liu | ... | Qingyu Xiong
  • Special Issue
  • - Volume 2018
  • - Article ID 8404219
  • - Research Article

Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

Qinghe Du | Ying Xu | ... | Houbing Song
  • Special Issue
  • - Volume 2017
  • - Article ID 5290579
  • - Research Article

A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth

Yuwen Chen | José-Fernán Martínez | ... | Lourdes López
  • Special Issue
  • - Volume 2017
  • - Article ID 7089259
  • - Research Article

Trust on the Ratee: A Trust Management System for Social Internet of Vehicles

Fangyu Gai | Jiexin Zhang | ... | Xinwen Jiang
  • Special Issue
  • - Volume 2017
  • - Article ID 6128437
  • - Research Article

Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing

Kai Zhang | Lifei Wei | ... | Haifeng Qian
  • Special Issue
  • - Volume 2017
  • - Article ID 1832051
  • - Research Article

A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers

Yan Huo | Yuqi Tian | ... | Tao Jing
  • Special Issue
  • - Volume 2017
  • - Article ID 1393026
  • - Research Article

An Advanced Private Social Activity Invitation Framework with Friendship Protection

Weitian Tong | Lei Chen | ... | Jeffrey Li
  • Special Issue
  • - Volume 2017
  • - Article ID 3928261
  • - Research Article

Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing

Zhen Ling | Melanie Borgeest | ... | Wei Zhao
  • Special Issue
  • - Volume 2017
  • - Article ID 3787089
  • - Research Article

Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence

Feng Yi | Hong Li | ... | Limin Sun
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate33%
Submission to final decision81 days
Acceptance to publication37 days
CiteScore2.900
Impact Factor1.819
 Submit