학술논문

Privacy-Preservation Techniques for IoT Devices: A Systematic Mapping Study
Document Type
Periodical
Source
IEEE Access Access, IEEE. 11:16323-16345 2023
Subject
Aerospace
Bioengineering
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineered Materials, Dielectrics and Plasmas
Engineering Profession
Fields, Waves and Electromagnetics
General Topics for Engineers
Geoscience
Nuclear Engineering
Photonics and Electrooptics
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Transportation
Internet of Things
Privacy
Systematics
Security
Differential privacy
Crowdsensing
Object recognition
Threat assessment
Privacy preservation
systematic mapping study
privacy threats
privacy goals
privacy attacks
Language
ISSN
2169-3536
Abstract
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life. The objective of IoT is to provide ubiquitous access to numerous devices and machines on service providers. However, IoT-based devices may expose a user to various privacy and security threats. Privacy-preservation techniques focus on securing any type of data transfer between different parties. We aim to deliver the current state of the art in terms of privacy-preservation techniques used for IoT devices that have been discussed in the literature. Therefore, we carried out a systematic identification of the privacy-preservation techniques for IoT devices that have been described in the cybersecurity domain. To do so, we followed rigorous guidelines to define our research protocol to increase the repeatability and reliability of our results. A set of ten research questions was created to drive the analysis of our study. This research work comprehensively analyzes and discusses the privacy-preservation techniques for IoT devices published in five different academic venues. We identified 260 studies, mostly published between 2017 and 2021, that were systematically selected from an initial set of 1394 papers. The most active research areas in privacy-preservation techniques for IoT devices discuss cryptography techniques to improve the authentication process to access IoT devices. The majority of authors presented privacy-preservation techniques for IoT that involved inventory privacy threats and discussed privacy interference attacks. We comprehensively analyze and discuss the trends, gaps, and possible future research directions of the privacy-preservation techniques used for IoT devices published in different academic venues.