IoT Security and Privacy Concern A systematic Mapping Study

The extend of clever gadgets has accelerated touchy statistics trade on the Internet the usage of most of the time unsecured channels. Since a large use of RFID (Radio-frequency Identification) tags in the transportation and development industries from 1980 to 1990, with the multiplied use of the Internet with 2G/3G or 4G when you consider that 2000, we are witnessing a new generation of related objects. . This paper aims to understand and additionally grant continuing doe’s research topic, challenge, and Future Direction related to Iot security. A systematic mapping finds out about (SMS) is thus utilized on the way to organize the chosen Articles into the following classification: contribution type, Type of Research, Iot Security, and their approach. We take out an overall of twenty-four Articles in support of this systematic discover out about also they categorize the following described criterion. The findings of this SMS are mentioned and the researcher was once given hints on the possible route for future research

Author(s):  
Muawya N. Al Dalaien ◽  
Ameur Bensefia ◽  
Salam A. Hoshang ◽  
Abdul Rahman A. Bathaqili

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.


Author(s):  
Yasir Amer Abbas ◽  
Saad Albawi ◽  
Abdullah Thaier Abd ◽  
Ahmed K. Jameil

Background: Radio frequency identification (RFID) technology can be applied in identification, security and tracking system platforms due to its flexible and low-cost implementation. The sensing ability of this technology can also be used to monitor real-life environmental changes and physical phenomena. RFID is designed to work in open wireless communication. Therefore, this system can be attacked by different malware. Enhancing RFID with new security and privacy features is important at present. Objective: The current work is a systematic mapping study on RFID security. The types, contributions, facets and activities of research on RFID security were plotted. Method: The systematic mapping for a specific search area. For this purpose, we must identify the number of RQs. These RQs help researchers obtain comprehensive related studies. Researchers are responsible for determining the number and type of RQs, which must be selected depending on the research field. In addition, the RQs must be selected carefully because they determine the research direction and help rapidly obtain the required information and studies. Result: We gathered 2133 relevant studies and retained 92 primary papers after four filtering processes. We classified them into three facets. Results provide researchers and readers an overview of existing relevant studies and help them identify the properties in the focus area. Conclusion: The systematic mapping study used to report the design, execution, tool, application and results of a Radio frequency identification (RFID). We systematically choosing and deeply analyzed a all conceptance related (RFID) techniques and implementation methods which provide an complete about the (RFID) state and enviroment of studies . Firstly we collect 2133 From the initially searchbased on manual and automatic searches. We reduction to 92 papers depend on the inclusion and exclusion criteria for this review.


Author(s):  
Muawya N. Al Dalaien ◽  
Ameur Bensefia ◽  
Salam A. Hoshang ◽  
Abdul Rahman A. Bathaqili

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.


2021 ◽  
Vol 2021 ◽  
pp. 1-25
Author(s):  
Jee Young Lee ◽  
Jungwoo Lee

The smart mobile Internet-of-things (IoT) network lays the foundation of the fourth industrial revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this revolution gains momentum, the security of smart mobile IoT networks becomes an essential research topic. This study aimed to provide comprehensive insights on IoT security. To this end, we conducted a systematic mapping study of the literature to identify evolving trends in IoT security and determine research subjects. We reviewed the literature from January 2009 to August 2020 to identify influential researchers and trends of keywords. We additionally performed structural topic modeling to identify current research topics and the most promising ones via topic trend estimation. We synthesized and interpreted the results of the systematic mapping study to devise future research directions. The results obtained from this study are useful to understand current trends in IoT security and provide insights into research and development of IoT security.


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


2012 ◽  
pp. 608-619 ◽  
Author(s):  
Elizabeth Mazur ◽  
Margaret L. Signorella ◽  
Michelle Hough

Early research on older adult computer users focused on the possibility for technology to increase social interaction and alleviate loneliness. Subsequent research has been equivocal on the possible benefits of the Internet for well-being. Nonetheless, in spite of an initial “gray gap,” older adults are increasingly joining younger cohorts in using the Internet. Barriers to older adults’ use of the Internet remain, such as physical and cognitive limitations. Attitudinal barriers may exist, but it is unclear whether these result from lack of experience or differences in income or health status. Business researchers have found that older persons differ from other age groups in their Internet engagement patterns, including online buying. Future research directions include whether computers can improve cognitive functioning and quality of life, how to increase engagement levels, and if there will always be a lag in technology use among older adults.


Author(s):  
W. Benjamin Porr ◽  
Robert E. Ployhart

This chapter presents a framework through which ethical Internet-based organizational research can be conducted. Organizational constraints that promote the use of the Internet for applied research are identified, followed by potential benefits and drawbacks. The chapter then discusses the ethical issues that must be considered when conducting Internet-based organizational research; these include concerns about privacy, confidentiality, anonymity, informed consent and providing a debriefing. A case study illustrates these issues, and the chapter concludes with directions for future research. Numerous tables and figures are used to serve as a quick reference for the key points of the chapter.


Author(s):  
Kamil Yagci ◽  
Mahmut Efendi ◽  
Sureyya Akçay

In addition to the development of social technology and the widespread use of the internet, the fact that people are getting used to sharing their goods and services has made the concept of sharing economy a popular issue. Sharing economy is “a potential new way for sustainability,” and it is noted that it would disrupt the unsustainable hyper-consumption practices directing capitalist economies. In this regard, the importance of sharing economy becomes prominent. In this study, first of all, basic information was given about sharing economy and then the concepts about how it made progress were introduced. In the next step, the definitions of sharing economy were given, the importance of sharing was mentioned, and then the products used in sharing economy were mentioned. In the following stage, the benefits of sharing economy to nature were addressed, and the weaknesses and dark sides of sharing economy were revealed. Finally, the impact of the sharing economy on the service sector was emphasized, and opinions were presented for future research on this subject.


2018 ◽  
Vol 20 (4) ◽  
pp. 323-336 ◽  
Author(s):  
Sumedha Chauhan ◽  
Parul Gupta ◽  
Mahadeo Jaiswal

Purpose This paper aims to explore the factors inhibiting the internet adoption among base of pyramid (BoP) and to develop further insights of such factors. Design/methodology/approach Researchers used a mixed-method study with QUAL/QUAN sequence in this research. Given the dearth of research on the internet usage by the BoP segment in India, the authors began with the exploratory qualitative study. Semi-structured interviews in local language were carried out with the people belonging to the BoP segment in India using common interview protocol. Face-to-face interviews were conducted for 20-30 min with ten people. Thematic analysis (Braun and Clarke, 2006) was conducted on the interview transcripts which lead to five themes. These themes were identified as the potential inhibitors to the internet adoption by the BoP segment in India. This step was further followed by a confirmatory quantitative study. Findings The results confirm that the factors such as lack of digital literacy, complexity and language barrier play a significant role in inhibiting the internet adoption by the BoP segment. However, there is no impact of perceived risk and cost on the internet adoption. The significant relationship between lack of digital literacy and intention to use implies that if the BoP segment is capable to locate, evaluate and use digital information, it is more likely to use the internet. Similarly, the relationship between complexity and the intention to use suggests that if the BoP segment finds it easy to use and understand the internet, it is more likely to use it. Practical implications This research has the implications for government departments and policymakers that are responsible for promoting use of the internet. Therefore, such departments and policymakers are advised to channelize their effort on resting the digital literacy, especially in terms of internet adoption. Findings of this study show that digital literacy, complexity and language barriers are major inhabitants in the internet adoption. Directed and focused government policies and initiatives such as subsidized seminars and training programmes specially designed for the BoP segment can help in increasing internet adoption. Social implications The adoption and use of the internet services by BoP have major implications for digital equality. Therefore, it would be important to explore the factors inhibiting the internet adoption among BoP. Originality/value This paper not only explores the factors inhibiting internet adoption among BoP in developing countries such as India but also provides deeper insights to these factors by collecting first-hand information from target segment. The finding of this research provides meaningful inputs to policymakers and also to industry to remove digital divide in the target population. This is how this research adds value to the existing knowledge available in this domain and it also provides agenda for future research.


Sign in / Sign up

Export Citation Format

Share Document