User Privacy Risk Analysis For The Internet of Things

Akash Aggarwal, Waqar Asif, Habibul Azam, Milan Markovic, Muttukrishnan Rajarajan, Peter Edwards

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

1 Citation (Scopus)

Abstract

The Internet of Things (IoT) refers to a large network of devices such as sensors and actuators in which diverse types of data is generated and shared. Data can be shared in its raw form or as a result of data processing activities performed by an IoT device (e.g. anonymization, aggregation, etc.). However, sharing such data introduces a multitude of risks which are influenced by data type, data harvesting granularity, user demographics and the device under consideration. In this work, we propose a novel extension to our attack tree risk model [1] to consider user preferences for sharing personal data. We enrich our earlier work by exploring more attacks and complimenting them with a user privacy-risk model. We evaluate this proposed model and identify a range of scenarios which can result in personal information privacy violation and thus provide a model for estimating the potential risk of an IoT ecosystem.
Original languageEnglish
Title of host publicationProceedings of the 6th IEEE International Conference on Internet of Things
Subtitle of host publicationSystems, Management and Security
PublisherIEEE Explore
Pages259-264
Number of pages6
ISBN (Electronic)978-1-7281-2949-5
ISBN (Print)978-1-7281-2950-1
DOIs
Publication statusPublished - 1 Feb 2020
EventThe 6th IEEE International Conference on Internet of Things 2019: Systems, Management and Security 2019 - Granada, Spain
Duration: 22 Oct 201925 Oct 2019
Conference number: 6th
https://ieeexplore.ieee.org/xpl/conhome/8924808/proceeding

Conference

ConferenceThe 6th IEEE International Conference on Internet of Things 2019
Abbreviated title(IOTSMS 2019)
Country/TerritorySpain
CityGranada
Period22/10/1925/10/19
Internet address

Keywords

  • Privacy
  • Attack Cost
  • Attack Impact
  • Attack Attributes
  • Attack Scenarios

Fingerprint

Dive into the research topics of 'User Privacy Risk Analysis For The Internet of Things'. Together they form a unique fingerprint.

Cite this