Privacy and Security Threats on the Internet of Things

Author(s):  
Sébastien Ziegler ◽  
Cédric Crettaz ◽  
Eunah Kim ◽  
Antonio Skarmeta ◽  
Jorge Bernal Bernabe ◽  
...  
Author(s):  
Mohamed Eltayeb

The Internet of Things (IoT) has demonstrated significant potential due to its scalability and agility. As such, it has become increasingly popular and has attracted significant attention from researchers, scholars and innovators alike. The vast amount of interconnected sensors that surround us allow data to be collected, transmitted, stored, aggregated, and shared. However, this data is extremely valuable to those with malicious intent, and collecting and sharing data in the IoT environment is becoming increasingly risky. In recent years, some distinct privacy and security concerns have arisen in relation to the increasing popularity of the IOT. These concerns are not limited to privacy and security values alone, but include issues relating to trust in information security. This chapter takes a detailed look at the privacy and security threats that can arise from the use of IoT services and how they can be potentially overcome.


2020 ◽  
Vol 43 (338) ◽  
pp. 27-34
Author(s):  
Lasma Licite-Kurbe ◽  
Athul Chandramohan

AbstractThe Internet of Things (IoT) is a computing concept that describes the idea of everyday physical objects being connected to the Internet and being able to identify themselves to other devices, and day by day it becomes popular in everyday life as well as in entrepreneurship. The IoT covers broad areas, including manufacturing, the health sector, agriculture, smart cities, security and emergencies among many others. The market for the industrial IoT is estimated to surpass 107 billion euros by 2021 and reach a compound annual growth rate of 7.3% as of 2020. The IoT makes an impact on all industries and provides benefits for various areas of business; however, business may be faced with some risks as well. The research aim is to analyse the benefits and risks of the IoT in entrepreneurship. The descriptive method, analysis and synthesis, the induction and deduction methods were used to achieve the aim. The research has revealed that the IoT can provide several opportunities for business in all fields of operations – marketing, logistics, accounting and human resource management. However, businesses may be faced with some challenges related to privacy and security, processing, analysis and management of data, as well as monitoring and sensing.


Author(s):  
Mohammad Tariq Banday

The chapter discusses various security challenges in the design of the internet of things and their possible solutions. After presenting a precise introduction to the internet of things, its applications, and technologies enabling it, the chapter discusses its various architectures and models which follow with an introduction of development kits, boards, platforms, hardware, software, and devices used in the internet of things. A concise explanation and discussion on the internet of things standards and protocols with emphasis on their security is presented. Next, various possible security threats and attacks to the internet of things are presented. The subsequent sections of the chapter discuss identified security challenges at individual layers of various models along with their possible solutions. It further presents cryptographic and lightweight cryptographic primitives for the internet of things, existing use of cryptography in the internet of things protocols, security challenges, and its prospectus.


Author(s):  
Jonika Lamba ◽  
Esha Jain

Cybersecurity is not just about fortification of data. It has wide implications such as maintaining safety, privacy, integrity, and trust of the patients in the healthcare sector. This study methodically reviews the need for cybersecurity amid digital transformation with the help of emerging technologies and focuses on the application and incorporation of blockchain and the internet of things (IoT) to ensure cybersecurity in the well-being of the business. It was found in the study that worldwide, advanced technology has been used in managing the flow of data and information, India should focus on maintaining the same IT-enabled infrastructure to reduce causalities in the nation and on the other hand improve administration, privacy, and security in the hospital sector. Depending on the network system, resource allocation, and mobile devices, there is a need to prioritize the resources and efforts in the era of digitalization.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Subject IoT ecosystem. Significance The market for the Internet of Things (IoT) or connected devices is expanding rapidly, with no manufacturer currently forecast to dominate the supply chain. This has fragmented the emerging IoT ecosystem, triggering questions about interoperability and cybersecurity of IoT devices. Impacts Firms in manufacturing, transportation and logistics and utilities are expected to see the highest IoT spending in coming years. The pace of IoT adoption is inextricably linked to that of related technologies such as 5G, artificial intelligence and cloud computing. Data privacy and security will be the greatest constraint to IoT adoption.


Author(s):  
Kate Carruthers

In many ways the Internet of Things will change everything, as devices and software mesh and become part of the connected fabric of the Internet. This article explores the context and potential offered by the growth of the Internet of Things (IoT). It provides an overview of this next phase of the digital revolution that is underpinned by the growth of the social web, web 2.0, and the convergence of technologies such as mobile and ubiquitous broadband. This article also attempts to provide some insight into the potential value of the Internet of Things market in the future. The opportunities offered by the Internet of Things also raise serious questions about privacy and security in a connected world. As Umair Haque noted recently: “At some point, we should all question the value of an internet that objectifies you, tracks you, and polices you...without your consent.” (Haque 2014)


2020 ◽  
Vol 8 (6) ◽  
pp. 3892-3895

Internet of Things network today naturally is one of the huge quantities of devices from sensors linked through the communication framework to give value added service to the society and mankind. That allows equipment to be connected at anytime with anything rather using network and service. By 2020 there will be 50 to 100 billion devices connected to Internet and will generate heavy data that is to be analyzed for knowledge mining is a forecast. The data collected from individual devices of IoT is not going to give sufficient information to perform any type of analysis like disaster management, sentiment analysis, and smart cities and on surveillance. Privacy and Security related research increasing from last few years. IoT generated data is very huge, and the existing mechanisms like k- anonymity, l-diversity and differential privacy were not able to address these personal privacy issues because the Internet of Things Era is more vulnerable than the Internet Era [10][20]. To solve the personal privacy related problems researchers and IT professionals have to pay more attention to derive policies and to address the key issues of personal privacy preservation, so the utility and trade off will be increased to the Internet of Things applications. Personal Privacy Preserving Data Publication (PPPDP) is the area where the problems are identified and fixed in this IoT Era to ensure better personal privacy.


Sign in / Sign up

Export Citation Format

Share Document