Security and Privacy Issues of the Internet of Things

2013 ◽  
Vol 416-417 ◽  
pp. 1429-1433 ◽  
Author(s):  
Chun Cheng Niu ◽  
Kuan Cheng Zou ◽  
Yuan Ling Ou Yang ◽  
Guan Jie Tang ◽  
Yi Zou

nternet of Things is known to be the third wave of the world information industry following the computers and the Internet. In China, The development of things already elevated to the height of the national strategy. With the application of things more and more widely, security and privacy of The Internet of Things is increasingly a cause for concern. It has also become one of the decisive factors of sustainable development networking industry. Analysis focus on the perception layer of Things layers of security issues and the security policy. Analysis of the privacy issues involved in the Internet of Things applications to the response options. Efforts in the direction pointed out that for the security and privacy issues of Things. On study of the safety of the perception layer, one attack model of perception layer based on attack tree are put forward.

Author(s):  
Martin Victor K ◽  
J. Immanuel Johnraja ◽  
Getzi Jeba Leelipushpam ◽  
J. Jebaveerasingh Jebadurai ◽  
I. Bildass Santhosam

Author(s):  
Muawya N. Al Dalaien ◽  
Ameur Bensefia ◽  
Salam A. Hoshang ◽  
Abdul Rahman A. Bathaqili

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.


Author(s):  
Shravani Devarakonda ◽  
Malka N. Halgamuge ◽  
Azeem Mohammad

In this chapter, the authors collected data from issues related to threats in the applications of IoT-based technologies that describe the security and privacy issues from 30 peer reviewed publications from 2014 to 2017. Further, they analyzed each threat type and its percentages in each application of the internet of things. The results indicated that the applications of smart transportation (20%) face the highest amount of security and privacy issues followed by smart home (19%) and smart cities (18%) compared to the rest of the applications. Further, they determined that the biggest threats were denial of service attack (9%) followed by eavesdropping (5%), man in the middle (4%), and replay (4%). Denial of service attacks and man in the middle attack are active attacks that can severely damage human life whereas eavesdropping is a passive attack that steals information. This study has found that privacy issues have the biggest impacts on people. Therefore, researchers need to find possible solutions to these threats to improve the quality of IoT applications.


Author(s):  
Shravani Devarakonda ◽  
Malka N. Halgamuge ◽  
Azeem Mohammad

In this chapter, the authors collected data from issues related to threats in the applications of IoT-based technologies that describe the security and privacy issues from 30 peer reviewed publications from 2014 to 2017. Further, they analyzed each threat type and its percentages in each application of the internet of things. The results indicated that the applications of smart transportation (20%) face the highest amount of security and privacy issues followed by smart home (19%) and smart cities (18%) compared to the rest of the applications. Further, they determined that the biggest threats were denial of service attack (9%) followed by eavesdropping (5%), man in the middle (4%), and replay (4%). Denial of service attacks and man in the middle attack are active attacks that can severely damage human life whereas eavesdropping is a passive attack that steals information. This study has found that privacy issues have the biggest impacts on people. Therefore, researchers need to find possible solutions to these threats to improve the quality of IoT applications.


Author(s):  
Muawya N. Al Dalaien ◽  
Ameur Bensefia ◽  
Salam A. Hoshang ◽  
Abdul Rahman A. Bathaqili

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.


2017 ◽  
pp. 189-204
Author(s):  
Sudhosil Panda

The Internet of Things (IoT) aims at connecting a large number of communication and information systems. With the further development of pervasive computing, these systems can be integrated into everyday objects, such as household devices and tools. When complex systems are interconnected, it is complicated to keep track of how secure a system or connection is and to distinguish which devices are connected within the IoT and which devices are not. As to the security, the IoT will be faced with more severe challenges. There are the following reasons: 1) the IoT extends the ‘internet' through the traditional internet, mobile network and sensor network and so on, 2) every ‘thing' will be connected to this ‘internet' and 3) these ‘things' will communicate with each other. Therefore, the new security and privacy problems will arise out of which authentication and access control are the most vital security issues that need to be taken care of. Therefore, we should pay more attention to the issues for confidentiality, authenticity and integrity of data in the IoT.


2018 ◽  
Vol 2018 ◽  
pp. 1-27 ◽  
Author(s):  
Emanuel Ferreira Jesus ◽  
Vanessa R. L. Chicarino ◽  
Célio V. N. de Albuquerque ◽  
Antônio A. de A. Rocha

The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transaction models, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain.


Sign in / Sign up

Export Citation Format

Share Document