Abstract

As we move into a new decade, the global world of Intelligent Infrastructure (II) services integrated into the Internet of Things (IoT) are at the forefront of technological advancements. With billions of connected devices spanning continents through interconnected networks, security and privacy protection techniques for the emerging II services become a paramount concern. In this paper, an up-to-date privacy method mapping and relevant use cases are surveyed for II services. Particularly, we emphasize on post-quantum cryptography techniques that may (or must when quantum computers become a reality) be used in the future through concrete products, pilots, and projects. The topics presented in this paper are of utmost importance as (1) several recent regulations such as Europe’s General Data Protection Regulation (GDPR) have given privacy a significant place in digital society, and (2) the increase of IoT/II applications and digital services with growing data collection capabilities are introducing new threats and risks on citizens’ privacy. This in-depth survey begins with an overview of security and privacy threats in IoT/IIs. Next, we summarize some selected Privacy-Enhancing Technologies (PETs) suitable for privacy-concerned II services, and then map recent PET schemes based on post-quantum cryptographic primitives which are capable of withstanding quantum computing attacks. This paper also overviews how PETs can be deployed in practical use cases in the scope of IoT/IIs, and maps some current projects, pilots, and products that deal with PETs. A practical case study on the Internet of Vehicles (IoV) is presented to demonstrate how PETs can be applied in reality. Finally, we discuss the main challenges with respect to current PETs and highlight some future directions for developing their post-quantum counterparts.

Highlights

  • Intelligent Infrastructures (IIs) are known to interconnect a variety of Internet of Things (IoT) applications and services to capture and analyze data as well as invoke autonomic responses

  • The need for security and privacy in our current IoT/II world can be stated with no hesitation

  • This paper gives an in-depth look at privacy protection approaches and highlights their current deployment in ICT products, pilots, projects, and IoT/II use cases

Read more

Summary

INTRODUCTION

Intelligent Infrastructures (IIs) are known to interconnect a variety of Internet of Things (IoT) applications and services to capture and analyze data as well as invoke autonomic responses. The downside is that post-quantum PETs may introduce computational and memory constraints on some IoT nodes as classic PKC schemes have done in the past This survey paper centres on answering the following two questions: ‘‘Which current Privacy-Enhancing Technologies (PETs) are suitable for Intelligent Infrastructures (IIs) which involve IoT devices’’, and ‘‘Which PETs are secure in a post-quantum era?’’. An illustrative case study for demonstrating a privacy-preserving II service, e.g. the Internet of Vehicle (IoV), and presenting some options for a secure design in the post-quantum era (Section VII).

RELATED WORK
PRIVACY-ENHANCING COMPUTATIONS AND DATA STORING
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.