also indicate UEs which information it should be
returned in response (either Measurement report or
RLF report). Narrowband IoT (NB-IoT) functionality
is specified in the LTE technical specifications
(3GPP, 2016). In (Ratasuk, et al., 2016) authors
describe two optimizations introduced for small data
transmission, namely the RRC connection
suspend/resume procedure and data transmission
using control plane signaling. As reported by NB-IoT
specifications (3GPP, 2017) M2M communications
are not provided with measurements reporting and
handover management. Until serving eNB does not
release the connection or a link failure happens, UEs
stay in the connected mode. When the connection is
interrupted, they go to the idle state and then trigger
RRC connection reestablishment procedure. Paging
processes, if triggered when users are in IDLE state,
could allow relating IMSIs and GUTIs to TAs (Kune,
et al., 2012) (3GPP, 2017). In fact, in its first phase,
RRC paging lacks encryption protection (Shaik, et al.,
2015). Moreover, correlations among TAs and eNBs
can be disclosed.
In summary, our work has presented a
methodology of analysis for identifying privacy
threats in the IoT with a view to 5G networks
implementation. The paradigm shift of wireless
networks toward the 5G evolution will result in
employment of ultra-dense networks as to provide,
among all benefits, high data rate and low
communication latencies. Anyway, this network
transformation may seriously undermine, to some
extent, the privacy of devices and users. The proposed
methodology extends and the LINDDUN
frameworks by introducing temporal and location
information to the threats identification process.
Moreover, taking a cue from the popular Zachman
framework, it also addresses the privacy weaknesses
identification by investigating the entangled IoT from
four different points of view, namely contextual,
conceptual, logical, and physical.
The current paper lacks a comparative evaluation
and validation. Anyway, we planned to provide these
enhancements in the future.
5 CONCLUSION
We have presented a privacy assessment
methodology, which aims at discovering privacy
threats in the IoT through a systematic approach. Our
technique extends the LINDUNN framework by
introducing temporal and location information to the
threats identification processes. Moreover, it draws
on from the Zachman framework, thus observing
privacy issues from various viewpoints.
An application example of our methodology has
been discussed. However, in order to be brief, it has
not been conducted a thorough investigation. We
foresee to provide supplementary information in
future works. Further studies, which consider
different IoT architectures, will need to be
undertaken. Although our approach has been thought
to a specific case of the IoT, hopefully, it could be
also applied to other technological systems in which
privacy is critical. The prospect of being able to do
deliver secure and privacy-preserving services in
many contexts, serves as a continuous stimulus for
future research.
REFERENCES
3GPP, 2016. Evolved Universal Terrestrial Radio Access
(E-UTRA) and Evolved Universal Terrestrial Radio
Access Network (E-UTRAN); Overall description.
Issue TS 36.300.
3GPP, 2017. Evolved Universal Terrestrial Radio Access
(E-UTRA); Radio Resource Control (RRC); Protocol
specification. s.l.:s.n.
Bailey, D. A., 2012. Moving 2 mishap: M2M’s impact on
privacy and safety. IEEE Security Privacy, 10(1), pp.
84-87.
Chen, S. et al., 2017. Machine-to-Machine Communica-
tions in Ultra-Dense Networks-A Survey. IEEE
Communications Surveys & Tutorials.
CISCO, 2016. Cisco Visual Networking Index: Global
Mobile Data Traffic Forecast Update, 2015--2020
White Paper. Cisco Public Information.
Kende, M., 2014. Internet society global internet report
2014. Internet Society, 15 July.
Kune, D. F., Koelndorfer, J., Hopper, N. & Kim, Y., 2012.
Location leaks on the GSM Air Interface. s.l., s.n.
Malina, L., Hajny, J., Fujdiak, R. & Hosek, J., 2016. On
perspective of security and privacy-preserving
solutions in the internet of things. Computer Networks,
Volume 102, pp. 83 - 95.
Mannilthodi, N. & Kannimoola, J. M., 2017. Secure IoT:
An Improbable Reality. s.l., SciTePress, pp. 338-343.
Mylonas, A. et al., 2012. Smartphone forensics: A proactive
investigation scheme for evidence acquisition. s.l.,
Springer.
Porambage, P. et al., 2016. The Quest for Privacy in the
Internet of Things. IEEE Cloud Computing, 3(2), pp.
36-45.
Ratasuk, R. et al., 2016. Overview of narrowband IoT in
LTE Rel-13. 2016 IEEE Conference on Standards for
Communications and Networking (CSCN), pp. 1-7.
Sfar, A. R., Natalizio, E., Challal, Y. & Chtourou, Z., 2017.
A Roadmap for Security Challenges in Internet of
Things. Digital Communications and Networks.