Article Preview
TopIntroduction
Internet of Things is a norm of connecting the whole world through network with the help of sensors, different telecommunication interfaces which are entirely dependent upon wireless technologies. RFID (Radio Frequency Identification), WSN (Wireless Sensor Networks) (Sicari et al., 2015) and NFC (Near Field Communication) technologies are playing a pivotal role in Internet of Things (IoT) infrastructures. The concerns of the Internet of Things are to allow things to be connected ubiquitous (anytime, anyplace, with anything and anyone) or preferably using any path/network and any service. Thus, the main objective of the IoT is to provide better quality of services to users and to mark down the cost of resources can act as an important step close to “Smart World” (Vasilomanolakis et al., 2015). Smart City is the bigger part of IoT and it includes smart communication, emergency management, health monitoring, smart vehicle parking, smart roads, context-based vehicle maintenance, smart waste management, smart grid, smart retails and many more applications. In the scenario of IoT, all the objects connect probably with the internet which creates the interconnection between the two things which may be of type: M to M, M to H or H to H communication where M is machine and H is Human. For the connectivity and sensibility, sensors used in these technologies which also observe different surroundings like humidity, motion, and climate in the communication. These sensors nodes in Internet of Things, are connected to a central system which stores the plethora of data and then just provide various data access to all devices. This stored data can leak the private data which can create privacy issues for a user. If we talk about privacy in health-care system using IoT, patient transfer information like address, name, health statistics which is a most sensitive data, can be accessed by unauthorized third party and can be leaked (Airehrour et al., 2016).
According to IoT theory, everything turns into virtual world that means every single person and thing are addressable, locatable and readable on the internet. Thus, IoT things may have some characteristics e.g. connectivity, dynamicity, existence, privacy, interactivity and sensibility. As a consequence, it became mandatory to preserve the location privacy of node in Internet of Things because if location gets drained, invader can smoothly destroy the source node and sink node which will be a clear end of communication and it is possible that important data get leaked. Thus, Privacy basically split into two brackets: Context Privacy and Data Privacy (Yao et al., 2013). These two categories include identity privacy, location privacy, timing privacy and data query, data aggregation respectively. The main concerns of privacy are to provide the Un-observability, Un-tractability, Un-linkability and Anonymity to the user.