Privacy Dangers of Wearables and the Internet of Things

Author(s):  
Scott Amyx

This chapter identifies concerns about, and the managerial implications of, data privacy issues related to wearables and the IoT; it also offers some enterprise solutions to the complex concerns arising from the aggregation of the massive amounts of data derived from wearables and IoT devices. Consumer and employee privacy concerns are elucidated, as are the problems facing managers as data management and security become an important part of business operations. The author provides insight into how companies are currently managing data as well as some issues related to data security and privacy. A number of suggestions for improving the approach to data protection and addressing concerns about privacy are included. This chapter also examines trending issues in the areas of data protection and the IoT, and contains thought-provoking discussion questions pertaining to business, wearables/IoT data, and privacy issues.

2016 ◽  
pp. 379-402 ◽  
Author(s):  
Scott Amyx

This chapter identifies concerns about, and the managerial implications of, data privacy issues related to wearables and the IoT; it also offers some enterprise solutions to the complex concerns arising from the aggregation of the massive amounts of data derived from wearables and IoT devices. Consumer and employee privacy concerns are elucidated, as are the problems facing managers as data management and security become an important part of business operations. The author provides insight into how companies are currently managing data as well as some issues related to data security and privacy. A number of suggestions for improving the approach to data protection and addressing concerns about privacy are included. This chapter also examines trending issues in the areas of data protection and the IoT, and contains thought-provoking discussion questions pertaining to business, wearables/IoT data, and privacy issues.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ado Adamou Abba Ari ◽  
Olga Kengni Ngangmo ◽  
Chafiq Titouna ◽  
Ousmane Thiare ◽  
Kolyang ◽  
...  

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5898
Author(s):  
Patrícia R. Sousa ◽  
Luís Magalhães ◽  
João S. Resende ◽  
Rolando Martins ◽  
Luís Antunes

The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate and circumvent current trust mechanisms. Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems. While digital certificates are one of the most prevalent ways to establish identity and perform authentication, their provision at scale remains open. This provisioning process is usually an arduous task that encompasses device configuration, including identity and key provisioning. Human configuration errors are often the source of many security and privacy issues, so this task should be semi-autonomous to minimize erroneous configurations during this process. In this paper, we propose an identity management (IdM) and authentication method called YubiAuthIoT. The overall provisioning has an average runtime of 1137.8 ms ±65.11+δ. We integrate this method with the FIWARE platform, as a way to provision and authenticate IoT devices.


Author(s):  
D. N. Kartheek ◽  
Bharath Bhushan

The inherent features of internet of things (IoT) devices, like limited computational power and storage, lead to a novel platform to efficiently process data. Fog computing came into picture to bridge the gap between IoT devices and data centres. The main purpose of fog computing is to speed up the computing processing. Cloud computing is not feasible for many IoT applications; therefore, fog computing is a perfect alternative. Fog computing is suitable for many IoT services as it has many extensive benefits such as reduced latency, decreased bandwidth, and enhanced security. However, the characteristics of fog raise new security and privacy issues. The existing security and privacy measures of cloud computing cannot be directly applied to fog computing. This chapter gives an overview of current security and privacy concerns, especially for the fog computing. This survey mainly focuses on ongoing research, security challenges, and trends in security and privacy issues for fog computing.


2018 ◽  
Vol 2018 ◽  
pp. 1-27 ◽  
Author(s):  
Emanuel Ferreira Jesus ◽  
Vanessa R. L. Chicarino ◽  
Célio V. N. de Albuquerque ◽  
Antônio A. de A. Rocha

The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transaction models, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain.


Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 111 ◽  
Author(s):  
Daniel Oliveira ◽  
Miguel Costa ◽  
Sandro Pinto ◽  
Tiago Gomes

Undeniably, the Internet of Things (IoT) ecosystem continues to evolve at a breakneck pace, exceeding all growth expectations and ubiquity barriers. From sensor to cloud, this giant network keeps breaking technological bounds in several domains, and wireless sensor nodes (motes) are expected to be predominant as the number of IoT devices grows towards the trillions. However, their future in the IoT ecosystem still seems foggy, where several challenges, such as (i) device’s connectivity, (ii) intelligence at the edge, (iii) security and privacy concerns, and (iv) growing energy needs, keep pulling in opposite directions. This prospective paper offers a succinct and forward-looking review of recent trends, challenges, and state-of-the-art solutions of low-end IoT motes, where reconfigurable computing technology plays a key role in tomorrow’s IoT devices.


2021 ◽  
Vol 8 (4) ◽  
pp. 685-733
Author(s):  
Jennifer Zwagerman

Technology advancements make life, work, and play easier and more enjoyable in many ways. Technology issues are also the cause of many headaches and dreams of living out the copier destruction scene from the movie “Office Space.” Whether it be user error or technological error, one key technology issue on many minds right now is how all the data produced every second of every day, in hundreds of different ways, is used by those that collect it. How much data are we talking about here? In 2018, the tech company Domo estimated that by 2020 “1.7 MB of data will be created every second” for every single person on Earth. In 2019, Domo’s annual report noted that “Americans use 4,416,720 GB of internet data including 188,000,000 emails, 18,100,000 texts and 4,497,420 Google searches every single minute.” And this was before the pandemic of 2020, which saw reliance on remote technology and the internet skyrocket. It is not just social media and working from home that generates data—the “Internet of Things” (“IoT”) is expanding exponentially. From our homes (smart appliances and thermostats), to entertainment (smart speakers and tablets), to what we wear (smartwatches and fitness devices), we are producing data constantly. Over 30 billion devices currently make up the IoT, and that number will double by 2025. The IoT is roughly defined as “devices—from simple sensors to smartphones and wearables—connected together.” That connection allows the devices to “talk” to each other across networks that stretch across the world, sharing information that in turn can be analyzed (alone or combined with data from other users) in ways that may be beneficial to the user or the broader economy. The key word in that last sentence is “may.” When it comes to the data that individuals and businesses across the world produce every second of every day, some of it—perhaps most of it—could be used in ways that are not beneficial to the user or the entire economy. Some data types can be used to cause harm in obvious ways, such as personal identifying information in cases of identity theft. While some data types may seem innocuous or harmful when viewed on their own, when combined with other data from the same user or even other users, it can be used in a wide variety of ways. While I find it beneficial to know how many steps I take in a day or how much time I sleep at night, I am not the only individual or entity with access to that information. The company that owns the device I wear also takes that information and uses it in ways that are beyond my control. Why would a company do that? In many instances, “[t]he data generated by the Internet of Things provides businesses with a wealth of information that—when properly collected, stored, and processed—gives businesses a depth of insight into user behavior never before seen.” Data security and privacy in general are issues that all companies manage as they work to protect the data we provide. Some types of data receive heightened protections, as discussed below, because they are viewed as personal, as private, or as potentially dangerous since unauthorized access to them could cause harm to the user/owner. Some states and countries have taken a step further, focusing not on industry-related data that needs particular types of protection, but in-stead looking at an individual’s overall right to privacy, particularly on the internet. Those protections are summarized below. It makes sense, you might say, to worry about financial or healthcare data remaining private and to not want every website you have ever visited to keep a file of information on you. But why might we care about the use of data in agricultural operations? Depending on who you ask, the answer may be that agricultural data needs no more care or concern than any other type of business data. Some argue that the use of “Big Data” in agriculture provides opportunities for smaller operations and shareholders. These opportunities include increased power in a market driven for many years by the mantra “bigger is better” and increased production of food staples across the world—both in a more environmentally-friendly fashion. While the benefits of technology and Big Data in the agricultural sector unarguably exist, questions remain as to how to best manage data privacy concerns in an industry where there is little specific law or regulation tied to collection, use, and ownership of this valuable agricultural production data. In the following pages, this Article discusses what types of data are currently being gathered in the agricultural sector and how some of that data can and is being used. In addition, it focuses on unique considerations tied to the use of agricultural data and why privacy concerns continue to increase for many producers. As the Article looks at potential solutions to privacy concerns, it summarizes privacy-related legislation that currently exists and ends by looking at whether any of the current privacy-related laws might be used or adapted within the agricultural sector to address potential misuse of agricultural data.


Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 854
Author(s):  
Manas Kumar Yogi ◽  
Y Himatej ◽  
M Mahesh reddy

The Internet Of Things describes the ever-growing number of intelligent objects that are being connected to the internet and each other, smartphones, tablets, wearable technology and smart home devices are adopted into our everyday lives. The security of IOT is becoming more complex and may have a serious consequence. So, now we have many security challenges like privacy concerns, routine cryptography, passive data collection etc. Many people hide personal data in social media to eliminate these sort of privacy issues but common man nowadays is becoming a passive participant due to lack of security in these IOT devices that are surrounding us.


Sign in / Sign up

Export Citation Format

Share Document