scholarly journals ONGOING CHALLENGES AND RESEARCH OPPORTUNITIES IN INTERNET OF THINGS (IOT)

Author(s):  
Sachin Upadhyay

The Internet of Things (IoT) opens opportunities for handheld devices, home appliances, and software to share and communicate information on the Internet. Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This “Internet of Things (IoT)” infrastructure will be strongly integrated with the environment. This paper focuses on researching on the architecture and technology of Internet of Things. Moreover, the applications of Internet of Things are interpreted in this paper. We begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters. The future is Internet of Things, which will transform the real world objects into intelligent virtual objects.

2017 ◽  
Vol 129 ◽  
pp. 444-458 ◽  
Author(s):  
Ibrar Yaqoob ◽  
Ejaz Ahmed ◽  
Muhammad Habib ur Rehman ◽  
Abdelmuttlib Ibrahim Abdalla Ahmed ◽  
Mohammed Ali Al-garadi ◽  
...  

2019 ◽  
Author(s):  
Vaclav Janecek

This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.


Intexto ◽  
2019 ◽  
pp. 139-165
Author(s):  
André Luiz Martins Lemos ◽  
Daniel Góis Rabêlo Marques ◽  
Elias Cunha Bitencourt

The article describes how the Brazilian media shows the Internet of Things. The corpus is composed of 165 texts of Folha de São Paulo published online between 2011 and 2016. A data scraping tool was developed to extract the texts, which were analyzed using Atlas.ti. As criterion of analysis, we sought to identify the most cited objects, the qualities attributed to them, as well as the most recurrent IoT definitions. We also observed the main themes found in the texts and the judgment implied by the articles. We conclude that IoT is defined by the connectivity between intelligent objects, linked to technical and economic issues and to the imaginary of the future. These objects work mostly in the residential, health and transportation areas. Privacy issues still do not dominate the discussions.


Crimen ◽  
2020 ◽  
Vol 11 (3) ◽  
pp. 255-271
Author(s):  
Sanja Milivojević ◽  
Elizabeth Radulski

The Internet of Things (IoT) is poised to revolutionise the way we live and communicate, and the manner in which we engage with our social and natural world. In the IoT, objects such as household items, vending machines and cars have the ability to sense and share data with other things, via wireless, Bluetooth, or Radio Frequency IDentification (RFID) technology. "Smart things" have the capability to control their performance, as well as our experiences and decisions. In this exploratory paper, we overview recent developments in the IoT technology, and their relevance for criminology. Our aim is to partially fill the gap in the literature, by flagging emerging issues criminologists and social scientists ought to engage with in the future. The focus is exclusively on the IoT while other advances, such as facial recognition technology, are only lightly touched upon. This paper, thus, serves as a starting point in the conversation, as we invite scholars to join us in forecasting-if not preventing-the unwanted consequences of the "future Internet".


Author(s):  
Copyeditor JTDE

TelSoc has held its first forum on the future of Australia’s National Broadband Network (NBN). Three papers from that forum are published in this issue. TelSoc is planning a second forum, discussing the user potential of the NBN, in October 2019. The historical reprint in this issue is also NBN-related about online learning. The technical papers in this issue concern architectural issues in the Internet of Things and cybersecurity. The Journal welcomes further contributions on telecommunications and the digital economy.        


Author(s):  
Mohammad Tariq Banday

The chapter discusses various security challenges in the design of the internet of things and their possible solutions. After presenting a precise introduction to the internet of things, its applications, and technologies enabling it, the chapter discusses its various architectures and models which follow with an introduction of development kits, boards, platforms, hardware, software, and devices used in the internet of things. A concise explanation and discussion on the internet of things standards and protocols with emphasis on their security is presented. Next, various possible security threats and attacks to the internet of things are presented. The subsequent sections of the chapter discuss identified security challenges at individual layers of various models along with their possible solutions. It further presents cryptographic and lightweight cryptographic primitives for the internet of things, existing use of cryptography in the internet of things protocols, security challenges, and its prospectus.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 700
Author(s):  
N. Koteswara Rao ◽  
Gandharba Swain

The proliferation of smart objects with capability of sensing, processing and communication has grown in recent years. In this scenario, the Internet of Things (IoT) connects these objects to the Internet and provides communication with users and devices. IoT enables a huge amount of new applications, with which academics and industries can benefit, such as smart cities, health care and automation. In this environment, compose of constrained devices, the widespread adoption of this paradigm depends of security requirements like secure communication between devices, privacy and anonymity of its users. This paper presents the main security challenges and solutions to provide authentication and authorization on the Internet of Things. 


Sign in / Sign up

Export Citation Format

Share Document