scholarly journals Review Of Security Issues In Internet Of Things (IoT)

Author(s):  
Imran ◽  
◽  
Syed Mubashir Ali ◽  
Muhammad Alam ◽  
Mazliham Mohd Suud ◽  
...  

It is succinct as per the topic that it will focus on IoT-based security issues. The topic is emerging so contemplation is required to bridge scanty in this field. This study will focus on a rigorous literature review which will provide us scrupulous path to satisfy the industry need. In curtail IoT is not just about interconnecting embedded devices or gadgets to the Internet, however, it is also fast and continuously growing to improve the ease or satisfaction of life. The motive of IoT services is to connect the entire globe through sensors. This study reviews the IoT methodologies in the light of qualitative research. The data analysis and synthesis focus over the last three years (2018 to 2020) which are based on the PRISMA block diagram for understanding. The review identifies the IoT privacy and security issues from a different perspective and also finds out which security issue is mostly discussed in the last few years which elaborated as a basis for further research. After a review of this paper, we can easily understand the different problem faces of IoT devices with the help of comparative analysis using summary tables and graphical representation of IoT in the context of the privacy and security challenges and issues face of IoT devices. After vigorous contemplation, it is clear that in future most of the paper will discuss data security and privacy, confidentiality, and authenticity.

2018 ◽  
Vol 10 (12) ◽  
pp. 114 ◽  
Author(s):  
Shaukat Ali ◽  
Naveed Islam ◽  
Azhar Rauf ◽  
Ikram Din ◽  
Mohsen Guizani ◽  
...  

The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN have turned the social sphere of users into the commercial sphere. This should create a privacy and security issue for OSN users. OSN service providers collect the private and sensitive data of their customers that can be misused by data collectors, third parties, or by unauthorized users. In this paper, common security and privacy issues are explained along with recommendations to OSN users to protect themselves from these issues whenever they use social media.


Author(s):  
V. Jeevika Tharini ◽  
S. Vijayarani

One of the best-known features of IoT is automation. Because of this, IoT is a much-needed field for many applications, namely emergency and healthcare domains. IoT has made many revolutionary changes in the healthcare industry. IoT paves the way to numerous advancements for healthcare. The possibilities of IoT have reached their peak in the commercial industry and health sector. In recent years, serious concerns have been raised over the control and access of one's individual information. Privacy and security of the IoT devices can be compromised by intruders. Apart from the numerous benefits of IoTs, there are several security and privacy concerns to consider. A brief overview of different kinds of security attacks, solution for the attacks, privacy and security issues are discussed in this chapter.


2018 ◽  
Vol 7 (2.19) ◽  
pp. 26
Author(s):  
C Bala Murugan ◽  
S Koteeswaran

IoT technology and applications represents security as a significant issue for facilitating the tremendous implementation.     Devoid of IoTs technology ensures the device level confidentiality, privacy and authenticity. The applicable users are not going to     undertake answers for security in IoT in huge scale. The earlier stage deployments of IoT devices are primarily based on RFIDs         technology which results in simplest, security solutions inside the principal been devised in an advert hoc manner [8]. This brings the fact that such deployments were typically vertically incorporated, with all additives beneath the manage of a single administrative entity. In the angle of an IoT eco-system, in which unique person may be worried in a given software state of affairs. One person owing the      physical operations of  sensors, one stakeholder deals with the statistics and processing them and other numerous stakeholders supplies different services based totally on such statistics to the customers. This leads to numerous variety of safety demanding situations and security for the IoT. In this paper, we address the revisited security issues and discuss the critical safety protection conditions of Internet of Things era into a mainstream. To support this, the three key problems requiring cutting-edge techniques includes are data               confidentiality, privacy and trust.In this review, we presented net factors with architectural design goals of IoT. We surveyed security and privacy issues in IoTs. Also the discussion on several open issues based on the privacy and security is addressed. Many real time applications of IoTs in real life treats the security issues of IoT as a main factor. Thus the IoT of complicated security issues have been anticipated the researchers to address. 


Author(s):  
Fernando Almeida ◽  
Justino Lourenço

Internet of things (IoT) is increasingly present in our lives. As a consequence of connecting devices, IoT can make people's lives more convenient and comfortable. However, despite unquestionable benefits offered by IoT, there is still a great deal of concern from users and companies about the security and privacy of their data. In this sense, this study conducts a qualitative study based on three case studies of companies in the IoT field, which aims to characterize how these IoT companies look at the security and privacy challenges posed by IoT. The findings allowed the authors to identify the main challenges faced by IoT companies during the past years, the main privacy risks exposed by IoT devices, and the countermeasures that companies and users can adopt to increase the security of IoT.


Author(s):  
Yehia Ibrahim Alzoubi ◽  
Ahmad Al-Ahmad ◽  
Ashraf Jaradat

<span lang="EN-US">Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.</span>


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ado Adamou Abba Ari ◽  
Olga Kengni Ngangmo ◽  
Chafiq Titouna ◽  
Ousmane Thiare ◽  
Kolyang ◽  
...  

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 341
Author(s):  
Dr E. Suresh Babu ◽  
V Bhargav Raj ◽  
M Manogna Devi ◽  
K Kirthana

This papers reviews and surveys the security issues, mechanism of internet of things (IoT) proposed in the literature. As IoT is a computing concept that describes the idea of everyday physical objects being connected to the internet and being able to identify themselves to other devices. The main advantages of IoT improve the resource utilization ratio and relationship between human and nature. In addition, it possesses various characteristics like sensing, heterogeneity, connectivity, dynamic nature and intelligence. However, it possesses several challenges like connectivity, compatibility, longevity, privacy and security. Specifically, Security and privacy are the crucial issues that need to be solved for successful deployment of IoT. Moreover, some of the data collected from the IoT are very sensitive and should not be revealed to third parties. Such data needs to be protected by some provided legislations. We reviewed some of the security challenges of IoT like secure communication, data privacy and integrity, authorizing and authenticating the devices.  


2021 ◽  
Vol 20 (2) ◽  
pp. 1-24
Author(s):  
Stef Verreydt ◽  
Koen Yskout ◽  
Wouter Joosen

Electronic consent (e-consent) has the potential to solve many paper-based consent approaches. Existing approaches, however, face challenges regarding privacy and security. This literature review aims to provide an overview of privacy and security challenges and requirements proposed by papers discussing e-consent implementations, as well as the manner in which state-of-the-art solutions address them. We conducted a systematic literature search using ACM Digital Library, IEEE Xplore, and PubMed Central. We included papers providing comprehensive discussions of one or more technical aspects of e-consent systems. Thirty-one papers met our inclusion criteria. Two distinct topics were identified, the first being discussions of e-consent representations and the second being implementations of e-consent in data sharing systems. The main challenge for e-consent representations is gathering the requirements for a “valid” consent. For the implementation papers, many provided some requirements but none provided a comprehensive overview. Blockchain is identified as a solution to transparency and trust issues in traditional client-server systems, but several challenges hinder it from being applied in practice. E-consent has the potential to grant data subjects control over their data. However, there is no agreed-upon set of security and privacy requirements that must be addressed by an e-consent platform. Therefore, security- and privacy-by-design techniques should be an essential part of the development lifecycle for such a platform.


2020 ◽  
pp. 16-30
Author(s):  
Mukesh Soni ◽  
◽  
◽  
◽  
YashKumar Barot ◽  
...  

Health care information has great potential for improving the health care system and also providing fast and accurate outcomes for patients, predicting disease outbreaks, gaining valuable information for prediction in future, preventing such diseases, reducing healthcare costs, and improving overall health. In any case, deciding the genuine utilization of information while saving the patient's identity protection is an overwhelming task. Regardless of the amount of medical data it can help advance clinical science and it is essential to the accomplishment of all medicinal services associations, at the end information security is vital. To guarantee safe and solid information security and cloud-based conditions, It is critical to consider the constraints of existing arrangements and systems for the social insurance of information security and assurance. Here we talk about the security and privacy challenges of high-quality important data as it is used mainly by the healthcare structure and similar industry to examine how privacy and security issues occur when there is a large amount of healthcare information to protect from all possible threats. We will discuss ways that these can be addressed. The main focus will be on recently analyzed and optimized methods based on anonymity and encryption, and we will compare their strengths and limitations, and this chapter closes at last the privacy and security recommendations for best practices for privacy of preprocessing healthcare data.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zhihao Yu ◽  
Liang Song ◽  
Linhua Jiang ◽  
Omid Khold Sharafi

Purpose Security is the most important issue in Internet of Things (IoT)-based smart cities and blockchain (BC). So, the present paper aims to detect and organize the literature regarding security in the IoT-based smart cities and BC context. It also proposes an agenda for future research. Therefore, the authors did a statistical review of security in IoT and BC in smart cities. The present investigation aims to determine the principal challenges and disturbances in IoT because of the BC adoption, the central BC applications in IoT-based smart cities and the BC future in IoT-based smart cities. Design/methodology/approach IoT) has a notable influence on modernizing and transforming the society and industry for knowledge digitizing. Therefore, it may be perceived and operated in real time. The IoT is undergoing exponential development in industry and investigation. Still, it contains some security and privacy susceptibilities. Naturally, the research community pays attention to the security and privacy of the IoT. Also, the academic community has put a significant focus on BC as a new security project. In the present paper, the significant mechanisms and investigations in BC ground have been checked out systematically because of the significance of security in the IoT and BC in smart cities. Electronic databases were used to search for keywords. Totally, based on different filters, 131 papers have been gained, and 17 related articles have been obtained and analyzed. The security mechanisms of BC in IoT-based smart cities have been ranked into three main categories as follows, smart health care, smart home and smart agriculture. Findings The findings showed that BC’s distinctive technical aspects might impressively find a solution for privacy and security problems encountering the IoT-based smart cities development. They also supply distributed storage, transparency, trust and other IoT support to form a valid, impressive and secure distributed IoT network and provide a beneficial guarantee for IoT-based smart city users’ security and privacy. Research limitations/implications The present investigation aims to be comprehensive, but some restrictions were also observed. Owing to the use of some filters for selecting the original papers, some complete works may be excluded. Besides, inspecting the total investigations on the security topic in BC and the IoT-based smart cities is infeasible. Albeit, the authors attempt to introduce a complete inspection of the security challenges in BC and the IoT-based smart cities. BC includes significant progress and innovation in the IoT-based smart cities’ security domain as new technology. Still, it contains some deficiencies as well. Investigators actively encounter the challenges and bring up persistent innovation and inspection of related technologies in the vision of the issues available in diverse application scenarios. Practical implications The use of BC technology in finding a solution for the security issues of the IoT-based smart cities is a research hotspot. There is numerable literature with data and theoretical support despite the suggestion of numerous relevant opinions. Therefore, this paper offers insights into how findings may guide practitioners and researchers in developing appropriate security systems dependent upon the features of IoT-based smart city systems and BC. This paper may also stimulate further investigation on the challenge of security in BC and IoT-based smart cities. The outcomes will be of great value for scholars and may supply sights into future investigation grounds in the present field. Originality/value As the authors state according to their knowledge, it is the first work using security challenges on BC and IoT-based smart cities. The literature review shows that few papers discuss how solving security issues in the IoT-based smart cities can benefit from the BC. The investigation suggests a literature review on the topic, recommending some thoughts on using security tools in the IoT-based smart cities. The present investigation helps organizations plan to integrate IoT and BC to detect the areas to focus. It also assists in better resource planning for the successful execution of smart technologies in their supply chains.


Sign in / Sign up

Export Citation Format

Share Document