Page 143 - Kaleidoscope Academic Conference Proceedings 2021
P. 143

Connecting physical and virtual worlds




           Enhanced WiFi  management function.  The WiFi      and opt out functions. The collection, storage, transmission
           management function  mechanism should be designed  and   and use of sensitive information must be authorized by IoT-
           implemented. For unfamiliar devices that are connected to   domotics users.
           the IoT-domotics gateway  for the first  time, the  IoT-
           domotics gateway manager will determine whether to allow   Privacy  protection of applications.  The  privacy driver
           the  access of  unfamiliar devices,  and provide the IoT-  should be embedded in the firmware. At the same time, the
           domotics gateway manager with information that can easily   application should adopt the principle of minimization when
           view the access  of  IoT-domotics devices and  manage  the   collecting personal information. Before storing or using PII,
           access of IoT-domotics devices.                    it is necessary to de-identify or desensitize the data.

           Provide privacy management tools. Security management   Privacy security of device connection. Privacy security of
           tools are equipped for privacy protection and management to   domotics  device connection should  be designed and
           prevent new privacy from being illegally collected and used.   implemented.  Use mature  network privacy  security
           Flexible management and control of devices connected to the   technology  to  reduce  the risk of privacy  security.  High
           gateway. Users can use common gateway management tools   security network chips and modules are used to minimize the
           to detect gateway vulnerabilities and upgrade firmware, as   impact of technical vulnerabilities on IoT-domotics users.
           well as other security management services.
                                                              Enhance the privacy  protection  of hardware.  Provides
           Provide hardware privacy protection.  The hardware   hardware control privacy options to prevent any background
           control mechanism of privacy security should be designed   program access. Provide device operation status indication
           and implemented, for example,  using security chips  with   options.  Provide  camera hiding function when  the  device
           TEE or SE modules. Chip design, privacy protection circuit   stops running.
           and other security measures.
                                                              4.3.4   Privacy controls for networks
           4.3.3   Privacy controls for IoT-domotics  devices and
                  physical entities                           Privacy security of transmission in network. The same as
                                                              privacy controls of security controls for networks.
           Transparency of PII in data life  cycle.  Inform IoT-
           domotics users of the privacy policy in an easy to understand   5.  SUPPORTING CONTROL SCHEMES
           way, and provide IoT-domotics users with effective consent

                                        Table 3 — Supporting control schemes comparison
           Existing    Control     Targeted
          Supporting   schemes      entities   Targeted risk   Technology theory   Advantage    Disadvantage
           schemes
                                                                            Effectively identify
                    Access control    Service    Access control         unauthorized     Depends on platform
                    Application   subsystems   flaw      Increase the     operations       characteristics
          [12,13]   authentication    Devices and    Lack of   granularity of authority   Fill up the existing   requires special
                    Security of   Physical Entities   effective   management   system authority   architecture
                   application               authentication
                                                                           management defects
                   Secure                    The network                   Enhance protocol   Need for multi-party
          [14]     communication  Networks   protocol is   Increase the internal   confidentiality and   collaboration to develop a
                                                          safety mechanism
                   protocol                  cracked                       integrity        unified standard
                    Network traffic
                   is intercepted    Networks   Network traffic  Packet encapsulation   Effectively fight   Increase communication
          [15,16]                Devices and                              against information   delay and load, increase
                   and                       analysis attack  traffic shaping
                   eavesdropped   physical entities                        leakage          traffic noise
                                                          Program component
                                 Gateway                 permissions and   Effectively defend   Performance and
                   Firmware                  Insecure                      against traditional   adaptability are reduced,
          [17,18]                Devices and             memory address space
                   security                  firmware                      firmware         which affects the real-time
                                physical entities         isolation control flow   vulnerabilities   performance of the system
                                                          integrity protection











                                                           – 81 –
   138   139   140   141   142   143   144   145   146   147   148