An Extensive Survey of Privacy in the Internet of Things

Author(s):  
Jayashree K. ◽  
Babu R.

The internet of things comprises billions of devices, people, and services and entitles each to connect through sensor devices. These sensor devices influence the real world by administering critical network infrastructure and sometimes may collect sensitive private information about individuals. Managing this data authentication of who can access the device data and under what circumstances it can be found and used by others is one of the major threats for consumers and businesses. So, the internet of things services deliver new privacy challenges in our day-to-day lives. Though information systems discipline addressed research in privacy to a great extent, there still prevails no robust approach for the inspection of privacy breaches in the internet of things services. This chapter provides a detailed view on the privacy concerns in various aspects and scrutinizes the challenges to be addressed to ensure that the internet of things becomes true in near future.

2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


Author(s):  
Ali Osman Serdar Citak

The history of the development of the Internet of Things (IoT) covers the last twenty years. Despite the short of time, the concept and implementation of the Internet of Things have widely spread all over the world. The impetus of the dissemination of the concept has exponential speed. In the near future, billions of smart sensors and devices will interact with one another without human intervention. The early impact of the Internet of Things has been observed and discussed in the areas of technology, transportation, production, and marketing. The prospective effect of the Internet of Things on the finance sector has been discussed recently. In this study, the development of the concept of the Internet of Things and it is effect on the finance sector and specifically the insurance and banking sectors and future expectations have been evaluated.


2021 ◽  
pp. 7-19
Author(s):  
Hayder A. Naser ◽  
Alaa Thaer Lateef ◽  
Falah A. Bida ◽  
Mohammed Zorah

Internet of nano things (IoNT) is a new and modern part of the internet of things (IoT). Applications that operate in the field of nano scale show a new advantage in communication networks. IoNT opened the door to many applications in various fields with new features derived from the advantages of nanotechnology. In this work, a description of the IoNT during 2015-2021 was achieved, including taxonomy, architecture, motives, applications and challenges, in addition to recommendations. The architecture of the IoNT and the most important technologies used in Nano communication networks have been identified, with an indication of the advantages of each. This study, we hope, will make a contribution to this field of science, thus contributing to providing assistance to researchers in this emerging field and covering the challenges they face in this way. That would permit communication between nano-devices to be conventional, making these calibrations to be implemented in various IoNT applications. Until the IoNT system is designed without any problems in the near future, which if achieved, will provide great services, especially in medical applications and other applications.


Nanomaterials ◽  
2021 ◽  
Vol 11 (12) ◽  
pp. 3431
Author(s):  
Haichao Yuan ◽  
Hongyong Yu ◽  
Xiangyu Liu ◽  
Hongfa Zhao ◽  
Yiping Zhang ◽  
...  

Harvesting acoustic energy in the environment and converting it into electricity can provide essential ideas for self-powering the widely distributed sensor devices in the age of the Internet of Things. In this study, we propose a low-cost, easily fabricated and high-performance coniform Helmholtz resonator-based Triboelectric Nanogenerator (CHR-TENG) with the purpose of acoustic energy harvesting. Output performances of the CHR-TENG with varied geometrical sizes were systematically investigated under different acoustic energy conditions. Remarkably, the CHR-TENG could achieve a 58.2% higher power density per unit of sound pressure of acoustic energy harvesting compared with the ever-reported best result. In addition, the reported CHR-TENG was demonstrated by charging a 1000 μF capacitor up to 3 V in 165 s, powering a sensor for continuous temperature and humidity monitoring and lighting up as many as five 0.5 W commercial LED bulbs for acoustic energy harvesting. With a collection features of high output performance, lightweight, wide frequency response band and environmental friendliness, the cleverly designed CHR-TENG represents a practicable acoustic energy harvesting approach for powering sensor devices in the age of the Internet of Things.


Author(s):  
Isis Chong ◽  
Aiping Xiong ◽  
Robert W. Proctor

The “Internet of things” (IoT) refers to Internet-enabled technologies designed to increase the efficiency of users’ lives by communicating with other objects and elements in a system. The growth in these interconnected devices has been matched with increases in the use and aggregation of data collected by vendors or third parties. The number of hackers attempting to access users’ private information also has grown. Although attempts have been made to increase IoT security, the role users can play in protecting their information has been overlooked. We illustrate the necessity of taking a user-centered approach to privacy and security when designing and developing IoT technologies.


2018 ◽  
Vol 2018 ◽  
pp. 1-27 ◽  
Author(s):  
Emanuel Ferreira Jesus ◽  
Vanessa R. L. Chicarino ◽  
Célio V. N. de Albuquerque ◽  
Antônio A. de A. Rocha

The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transaction models, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain.


Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 511 ◽  
Author(s):  
Anuroop Gaddam ◽  
Tim Wilkin ◽  
Maia Angelova ◽  
Jyotheesh Gaddam

The Internet of Things (IoT) has gained significant recognition to become a novel sensing paradigm to interact with the physical world in this Industry 4.0 era. The IoTs are being used in many diverse applications that are part of our life and is growing to become the global digital nervous systems. It is quite evident that in the near future, hundreds of millions of individuals and businesses with billions will have smart-sensors and advanced communication technology, and these things will expand the boundaries of current systems. This will result in a potential change in the way we work, learn, innovate, live and entertain. The heterogeneous smart sensors within the Internet of Things are indispensable parts, which capture the raw data from the physical world by being the first port of contact. Often the sensors within the IoT are deployed or installed in harsh environments. This inevitably means that the sensors are prone to failure, malfunction, rapid attrition, malicious attacks, theft and tampering. All of these conditions cause the sensors within the IoT to produce unusual and erroneous readings, often known as outliers. Much of the current research has been done in developing the sensor outlier and fault detection models exclusively for the Wireless Sensor Networks (WSN), and adequate research has not been done so far in the context of the IoT. Wireless sensor network’s operational framework differ greatly when compared to IoT’s operational framework, using some of the existing models developed for WSN cannot be used on IoT’s for detecting outliers and faults. Sensor faults and outlier detection is very crucial in the IoT to detect the high probability of erroneous reading or data corruption, thereby ensuring the quality of the data collected by sensors. The data collected by sensors are initially pre-processed to be transformed into information and when Artificially Intelligent (AI), Machine Learning (ML) models are further used by the IoT, the information is further processed into applications and processes. Any faulty, erroneous, corrupted sensor readings corrupt the trained models, which thereby produces abnormal processes or outliers that are significantly distinct from the normal behavioural processes of a system. In this paper, we present a comprehensive review of the detecting sensor faults, anomalies, outliers in the Internet of Things and the challenges. A comprehensive guideline to select an adequate outlier detection model for the sensors in the IoT context for various applications is discussed.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6471
Author(s):  
Chien-Lung Hsu ◽  
Wei-Xin Chen ◽  
Tuan-Vinh Le

As the Internet of Things (IoT) has become prevalent, a massive number of logs produced by IoT devices are transmitted and processed every day. The logs should contain important contents and private information. Moreover, these logs may be used as evidences for forensic investigations when cyber security incidents occur. However, evidence legality and internal security issues in existing works were not properly addressed. This paper proposes an autonomous log storage management protocol with blockchain mechanism and access control for the IoT. Autonomous model allows sensors to encrypt their logs before sending it to gateway and server, so that the logs are not revealed to the public during communication process. Along with blockchain, we introduce the concept “signature chain”. The integration of blockchain and signature chain provides efficient management functions with valuable security properties for the logs, including robust identity verification, data integrity, non-repudiation, data tamper resistance, and the legality. Our work also employs attribute-based encryption to achieve fine-grained access control and data confidentiality. The results of security analysis using AVSIPA toolset, GNY logic and semantic proof indicate that the proposed protocol meets various security requirements. Providing good performance with elliptic curve small key size, short BLS signature, efficient signcryption method, and single sign-on solution, our work is suitable for the IoT.


Sign in / Sign up

Export Citation Format

Share Document