Committee Chair

Yang, Li

Committee Member

Wu, Dalei; Gao, Lani; Hong, Qin


Dept. of Computational Science


College of Engineering and Computer Science


University of Tennessee at Chattanooga

Place of Publication

Chattanooga (Tenn.)


Today, people use many connected devices to make people’s lives easier in a connected environment. Devices like fitness trackers, smartwatches, smart home appliances, and other devices make people’s lives easier. People can use their smartphones to control the thermostat, television, vacuum cleaner, and other connected devices. While IoT devices make their lives easier, they also concern security threats like privacy. Organizations like the U.S. DoD forbid having fitness trackers on some of their buildings, while other organizations discourage patrons from using them in their spaces. The question of how to use IoT devices and simultaneously safeguard users' privacy is a big challenge. Let’s look at a couple of different ways to secure IoT devices' privacy. Since IoT devices are very vast and very different, no universal scheme exists to prevent privacy attacks; thus, a variety of techniques need to be used. Some blockchain applications and transformations will be used to protect privacy in IoT devices. These algorithms that transform data or use blockchain to manage the data or the flow can prevent privacy attacks. Using such algorithms protects the data of IoT/Smart devices and secures them so that people do not have to worry about not being safe while these devices are being used.


I have received support from many people throughout my years as a Doctoral student at the University of Tennessee at Chattanooga. First, I sincerely thank my advisor, Professor Li Yang, for her continuous support. You have supported me in my academic journey, especially with the doctoral program. I would also like to express my gratitude to the rest of the committee. I also want to thank all my friends in the Computer Science Department. I also would like to thank the faculty and staff of the Computer Science Department. I want to thank all of my colleagues at work for their support and help. To friends at Ruatech, thank you for providing the data and helping with the experimentation.


Ph. D.; A dissertation submitted to the faculty of the University of Tennessee at Chattanooga in partial fulfillment of the requirements of the degree of Doctor of Philosophy.




Computer security; Internet of things


Privacy; Internet of Things;

Document Type

Doctoral dissertations




xii, 36 leaves