scholarly journals Security and Privacy in Smart Devices Era

2017 ◽  
Vol 23 (1) ◽  
pp. 44-52
Author(s):  
Laviniu Bojor

AbstractToday, more than ever, our society has become obsessed with technology and people surround themselves with smart devices designed to improve their lifestyle. Communications have benefited of this rise of the gadgets the most, and reality shows that most adults in the urban environment own a smartphone with the help of which they can connect to the Internet. We would be tempted to state that the World Wide Web will change in the future into Human World Wide Web, but connecting to the Internet does not stop here. Vehicles, TV sets and other electronic devices or appliances have already started to be connected to the Internet, which makes it easier to believe that, in the future, we will live in a society where most devices around us will be interconnected to a global or even spatial network. This concept, which the academic world embraced as the Internet of Things, should be understood and accepted by society not only from the perspective of the deprivation of privacy it generates, but especially from the perspective of the insecurity, a possible result of this dependence on software and programs that can be remotely accessed and controlled.

2000 ◽  
pp. 166-185 ◽  
Author(s):  
Sherif Kamel

The Internet and the World Wide Web are demonstrating the growing influence of information and communication technologies in various aspects of the economy. Regardless of the barriers of time and distance, newly introduced information highways are linking the world countries together, their societies and cultures contributing effectively to globalization. One of the growing trends in societal development and growth is investment in people. Therefore, the learning process is a priority issue that information and communication technologies are serving trying to upgrade and leverage human resources to become more competitive as we approach the 21st century with all its challenges and opportunities. This chapter covers an initiative that was launched in Egypt in 1997 that targets the investment of Egypt’s young generation, the kids of the present and the leaders of the future. This initiative is part of a national plan that aims at leveraging the capacities of Egypt’s human resources. The focus of the chapter will be the learning process, the Internet and the presence of the first Egyptian Web site for children on the Internet “Little Horus.” With the introduction of the Internet since 1993 in Egypt, today there are around 250,000 Internet subscribers, among which are a growing community of schools, teachers and children. As the Internet grows in magnitude and capacity, perceived to reach over one million subscribers in the coming five years with an estimated 20 percent under the age of 16, the Internet and the World Wide Web could play an active role in the education process in Egypt. The chapter, therefore, will demonstrate the “Little Horus” initiative, the steps that were achieved so far, the plan for the future and the building blocks that represented the critical success factors for the realization of this initiative with relatively modest resources.


The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.


Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5897
Author(s):  
Shantanu Pal ◽  
Michael Hitchens ◽  
Tahiry Rabehaja ◽  
Subhas Mukhopadhyay

There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.


Author(s):  
Azeem Khan ◽  
N. Z. Jhanjhi ◽  
Mamoona Humayun ◽  
Muneer Ahmad

The acronym IoT stands for internet of things. The IoT ecosystem can be envisioned as a set of physical electronic devices embedded with intelligence, connected through a network, enabling them to collect and exchange data, and allowing these devices to be sensed and handled remotely between the physical and cyber worlds. The devices connected through the internet has been influencing all walks of our life ranging from individual, societal, educational, industrial, entrepreneurial, and related to governance as well. As we are connected and surrounded with a plethora of connected smart devices, it seems there is a great risk of security and privacy in several aspects, such as device authentication, data theft, device manipulation, data falsification, etc., to name a few. Hence, the current chapter has been undertaken to explore and comprehend the security and privacy related implications, opportunities, future directions, and challenges involved in implementing digital governance with IoT.


2014 ◽  
Vol 687-691 ◽  
pp. 2205-2209
Author(s):  
Xiu Rong Li ◽  
Shuang Zheng ◽  
Ya Li Liu

The Internet of things is the technology extension and expansion of computer, Internet and mobile communication network. We will strongly rely on the Internet of Things in the future. The Internet of Things provides more conveniences, but it also will face more threats. In this article, we describe architecture of the Internet of Things, the function of every layer and what components every layer need. Our emphasis is to analyze the threats for the security and privacy at different levels of architecture in the Internet of Things.


2021 ◽  
Author(s):  
Ahmad J. Showail

The Internet of Things is becoming more and more popular with time. The extremely low cost of sensors is putting the growth of the Internet of Things on steroids. Many industries such as healthcare, construction, agriculture, and transportation are increasingly leveraging this technology. However, security and privacy are two big concerns when it comes to the future of the Internet of Things. Since most of these “things” that are connected to the Internet are simple devices with limited hardware capabilities, it is nearly impossible to harden them via traditional resource-heavy defenses. In this chapter, we discuss the importance of securing the Internet of Things networks, layout the challenges of the Internet of Things security, and briefly discuss potential solutions in the literature.


2020 ◽  
Author(s):  
Vinod Kumar Verma

BACKGROUND COVID- 19 pandemics has affected the life of every human being in this world dramatically. The daily routine of the human has been changed to an uncertain extent. Some of the people are affected by the COVID-19, and some of the people are in fear of this epidemic. This has completely changed the thorough process of the people, and now, they are looking for solutions of this pandemic at different levels of the human addressable areas. These areas include medicine, vaccination, precautions, psychology, technology-assisted solutions like information technology, etc. There is a need to think in the direction of technology compliant solutions in the era of COVID-19 pandemic. OBJECTIVE The objective of this paper is to discuss the existing views and focus on the recommendations for the enhancement in the current situation from COVID-19. METHODS Based on the literature, perceptions, challenges, and viewpoints, the following opinions are suggested to the research community for the prevention and elimination of global pandemic COVID-19. The research community irrespective of the discipline focus on the following: 1. The comprehensive thought process for the designing of the internet of things (IoT) based solutions for healthcare applications used in the prevention from COVID-19. 2. Strategies for restricting outbreak of COVID-19 with the emerging trends in Ehealthcare applications. Which should be the optimal strategy to deal with a global pandemic? 3. Explorations on the data analysis as derived from the advanced data mining and warehousing associated with IoT. Besides, cloud-based technologies can be incorporated for the global spread of healthcare-related information to serve the community of different countries in the world. 4. The most adaptable method and technology can be deployed for the development of innovative solutions for COVID-19 related people like smart, patient-centric healthcare information systems. 5. Implementation of smart solutions like wearable technology for mask and PPE along with their disposal can be considered to deal with a global epidemic like COVID-19. This will lead to the manufacturing and incorporation of wearable technologies in the healthcare sector by industries. 6. A Pervasive thought process can be standardized for dealing with global pandemic like COVID-19. In addition, research measures should be considered for the security and privacy challenges of IoT services carrying healthcare-related information. These areas and directions are diverse but, in parallel, the need for healthy bonding and correlation between the people like researchers and scientists irrespective of their discipline. The discipline may vary from medical, engineering, computing, finance, and management, etc. In addition, standard protocols and interoperability measures can be worked out for the exchange of information in the global pandemic situations. RESULTS Recommendations Discussed CONCLUSIONS In this paper, the opinions have been discussed in the multi-disciplinary areas of research like COVID-19 challenges, medicines and vaccines, precautionary measures, technology assistance, and the Internet of Things. These opinions and discussion serve as an integrated platform for researchers and scientists to think about future perspectives to deal with healthcare-related COVID-19 pandemic situation. This includes the original, significant, and visionary automation based ideas, innovations, scientific designs, and applications focusing on Inter-disciplinary technology compliant solutions like IoT, vaccinations, manufacturing, preventive measures, etc. for the improvement of efficiency and reliability of existing healthcare systems. For the future, there is dire need to strengthen the technology not only in the one area but also for the interdisciplinary areas to recover from the pandemic situation rapidly and serve the community.


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


1999 ◽  
Vol 40 (1) ◽  
pp. 97-104
Author(s):  
Susan Brady

Over the past decade academic and research libraries throughout the world have taken advantage of the enormous developments in communication technology to improve services to their users. Through the Internet and the World Wide Web researchers now have convenient electronic access to library catalogs, indexes, subject bibliographies, descriptions of manuscript and archival collections, and other resources. This brief overview illustrates how libraries are facilitating performing arts research in new ways.


Sign in / Sign up

Export Citation Format

Share Document