Security will test healthcare IoT as tech advances

Subject Healthcare IoT. Significance As healthcare Internet of Things (IoT) devices become widespread through wearable technology such as ‘smartwatches’, companies are looking to the next advance. With long-term intentions including wireless interfacing with brain implants, security and privacy issues will take centre-stage in IoT design. Impacts Regulators may pressure companies to educate users on privacy. Cybersecurity firms will be able to leverage limited understanding of security among existing medical IoT manufacturers to win new clients. Medical IoT device manufacturers will need to priotise safety to avoid losing market share and falling foul of regulators.

2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


2018 ◽  
Vol 20 (5) ◽  
pp. 399-412 ◽  
Author(s):  
Sheshadri Chatterjee ◽  
Arpan Kumar Kar

Purpose The purpose of this study is to highlight the importance of Internet of Things (IoT) in India. The purpose also includes providing insights regarding policy framing for IoTs with a focus on regulation and governance. Design/methodology/approach A qualitative approach has been taken here for understanding the issues of IoT policy for India so far as regulations and governance are concerned. Findings This study highlights that the draft IoT policy of India, 2015 is to be improved. Attention is to be focused on regulation and governance for addressing security and privacy issues among other issues. For proper enablement of IoT technology, arrangements of funds are essential. Research limitations/implications IoT-related technologies in India have immense potential for the industries. This study implies the importance of security and privacy issues. If these issues are properly addressed, the industries will flourish further. Practical implications The study provides insights covering how usage of IoT technology would help the industry to grow up, how research and development organizations would be able to strengthen IoT technology for further development and to what extent it will improve the human daily activities. Social implications IoT would influence lives of millions of people of India. IoT-related policies would have huge social implication in terms of human–device interactions and communications. This research is a contemporary study on the implication of IoT policy toward the future growth of IoT-enabled devices in India. Originality/value The Government of India is expected to frame a comprehensive IoT policy with the help of draft IoT policy of 2015. This paper has taken a unique attempt to provide effective inputs to develop a comprehensive IoT policy for India.


Author(s):  
D. N. Kartheek ◽  
Bharath Bhushan

The inherent features of internet of things (IoT) devices, like limited computational power and storage, lead to a novel platform to efficiently process data. Fog computing came into picture to bridge the gap between IoT devices and data centres. The main purpose of fog computing is to speed up the computing processing. Cloud computing is not feasible for many IoT applications; therefore, fog computing is a perfect alternative. Fog computing is suitable for many IoT services as it has many extensive benefits such as reduced latency, decreased bandwidth, and enhanced security. However, the characteristics of fog raise new security and privacy issues. The existing security and privacy measures of cloud computing cannot be directly applied to fog computing. This chapter gives an overview of current security and privacy concerns, especially for the fog computing. This survey mainly focuses on ongoing research, security challenges, and trends in security and privacy issues for fog computing.


2018 ◽  
Vol 38 (1) ◽  
pp. 79-93 ◽  
Author(s):  
Xueling Liang ◽  
Yong Chen

Purpose Internet of Things (IoT) has been widely adopted in the commercial sector. Although IoT enables traditional libraries to convert into digital ones, the implementation of the IoT in libraries is slow. The purpose of this paper is to report on the current state of research on applications of IoT in libraries, describe challenges that IoT applications face in libraries and discus directions of adopting IoT in libraries in the future. Design/methodology/approach To conduct this research, the literature of IoT and its application in libraries were reviewed by examining existing literature in Institute of Electrical and Electronics Engineers (IEEE) Xplore. Findings The literature review finds that radio-frequency identification has been adopted by digital libraries. The slow implementation of IoT is caused by security and privacy issues, lack of standards and the lack of financial, technological and organizational resources. This study provides a prospective for the application of IoT in libraries; the technologies of IoT have the potential in betterment of library services. Research limitations/implications The limitation of this study is that only IEEE Xplore is included. Other database should be explored in future research. Originality/value The application of IoT in libraries is an emerging issue; a systematic and extensive review of recent research on applications of IoT in libraries is unavailable. This paper presents an overview of IoT in libraries, findings and potential research opportunities.


2022 ◽  
pp. 148-175
Author(s):  
Anish Khan ◽  
Dragan Peraković

The internet of things is a cutting-edge technology that is vulnerable to all sorts of fictitious solutions. As a new phase of computing emerges in the digital world, it intends to produce a huge number of smart gadgets that can host a wide range of applications and operations. IoT gadgets are a perfect target for cyber assaults because of their wide dispersion, availability/accessibility, and top-notch computing power. Furthermore, as numerous IoT devices gather and investigate private data, they become a gold mine for hostile actors. Hence, the matter of fact is that security, particularly the potential to diagnose compromised nodes, as well as the collection and preservation of testimony of an attack or illegal activity, have become top priorities. This chapter delves into the timeline and the most challenging security and privacy issues that exist in the present scenario. In addition to this, some open issues and future research directions are also discussed.


Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Author(s):  
Martin Victor K ◽  
J. Immanuel Johnraja ◽  
Getzi Jeba Leelipushpam ◽  
J. Jebaveerasingh Jebadurai ◽  
I. Bildass Santhosam

2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


Sign in / Sign up

Export Citation Format

Share Document