IoT Security and Privacy Regime - Understanding the Challenges and Solutions
VerifiedAdded on 2023/06/12
|22
|6191
|261
AI Summary
This research project aims to understand the security and privacy regime of Internet of Things (IoT). The paper discusses the various privacy and security concerns and their solutions. The challenges are categorized into seven sections, including identification, localization and tracking, profiling, privacy-violating interaction and presentation, lifestyle transitions, inventory attack, and linkage. The paper also presents various privacy principles and approaches to address the privacy concerns of end-users and service providers.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: IOT SECURITY AND PRIVACY REGIME
IOT SECURITY AND PRIVACY REGIME
NAMBURU GOPICHAND
University Name
Author Note:
IOT SECURITY AND PRIVACY REGIME
NAMBURU GOPICHAND
University Name
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2
IOT SECURITY AND PRIVACY REGIME
Milestone 1
Executive Summary
The major objective of this research project is to understand about the security and privacy
regime of Internet of Things or IoT. This Internet of Things or IoT can be easily defined as the
network of vehicles, home appliances, physical devices or any other product, which is
subsequently embedded with the software, sensors, electronics, actuators and connectivity, which
help in enabling each and every object in the proper connection and exchanging of data. Due to
the explicit and higher demand of technology, the internet of things is considered to be the best
and the most effective technologies in the entire technological world. However, there are privacy
and security regime within the technology that has made it so popular and well accepted by all.
Relevant details regarding the privacy and security regime are provided within the research
project.
IOT SECURITY AND PRIVACY REGIME
Milestone 1
Executive Summary
The major objective of this research project is to understand about the security and privacy
regime of Internet of Things or IoT. This Internet of Things or IoT can be easily defined as the
network of vehicles, home appliances, physical devices or any other product, which is
subsequently embedded with the software, sensors, electronics, actuators and connectivity, which
help in enabling each and every object in the proper connection and exchanging of data. Due to
the explicit and higher demand of technology, the internet of things is considered to be the best
and the most effective technologies in the entire technological world. However, there are privacy
and security regime within the technology that has made it so popular and well accepted by all.
Relevant details regarding the privacy and security regime are provided within the research
project.
3
IOT SECURITY AND PRIVACY REGIME
Milestone 2
Introduction of problems
Internet of things is widely populated as an emerging internet based information
architecture which provides services such as exchange of facility and goods. It encourages
policymakers and others to develop new and high disruptive digital technologies however some
problems are occurring in security field of Economics, legal norms and Social (Da Xu, He & Li,
2014). The technical factors of IOT are widely available however there is lack of existence of
legal framework. These innovative technologies are raise new safety and privacy concern. Some
of the security and privacy concerns are legitimist and need immediate overlook while taking
care of the innovation, economic growth, consumer choice, entrepreneurialism and price growth.
In this paper, thread is categorized by mainly seven section as identification, Localization and
tracking, Profiling, Privacy-violating interaction and presentation, lifestyle transitions, inventory
attack and linkage to focus on the overlap and dependencies among different challenges (Lee et
al., 2015). Identification signifies the challenges associate with an identifier and the threats of
specific privacy violation context. This privacy concerns are most dominant because it involves
risk of tracking and profiling of individuals. In the information processing phase at the backend,
the information are stored in a resolute place which is situates outside of subject’s control. The
collection and interaction phase is also become the aspect of concern that may impact over the
interconnection identification and thread and evolving technologies. Tracking and localization is
also one of the dominant challenge associate with IOT. This thread implies the possibility of
compromise and record individual’s location through space and time (Gaur et al., 2015).
Tracking is not a new kind of thread as many individuals are already affected through GPS
stalking. However tracking and localization is a vital functionality of IOT. Though it does not
concern with direct compromising of information but IOT technologies will not only support the
IOT SECURITY AND PRIVACY REGIME
Milestone 2
Introduction of problems
Internet of things is widely populated as an emerging internet based information
architecture which provides services such as exchange of facility and goods. It encourages
policymakers and others to develop new and high disruptive digital technologies however some
problems are occurring in security field of Economics, legal norms and Social (Da Xu, He & Li,
2014). The technical factors of IOT are widely available however there is lack of existence of
legal framework. These innovative technologies are raise new safety and privacy concern. Some
of the security and privacy concerns are legitimist and need immediate overlook while taking
care of the innovation, economic growth, consumer choice, entrepreneurialism and price growth.
In this paper, thread is categorized by mainly seven section as identification, Localization and
tracking, Profiling, Privacy-violating interaction and presentation, lifestyle transitions, inventory
attack and linkage to focus on the overlap and dependencies among different challenges (Lee et
al., 2015). Identification signifies the challenges associate with an identifier and the threats of
specific privacy violation context. This privacy concerns are most dominant because it involves
risk of tracking and profiling of individuals. In the information processing phase at the backend,
the information are stored in a resolute place which is situates outside of subject’s control. The
collection and interaction phase is also become the aspect of concern that may impact over the
interconnection identification and thread and evolving technologies. Tracking and localization is
also one of the dominant challenge associate with IOT. This thread implies the possibility of
compromise and record individual’s location through space and time (Gaur et al., 2015).
Tracking is not a new kind of thread as many individuals are already affected through GPS
stalking. However tracking and localization is a vital functionality of IOT. Though it does not
concern with direct compromising of information but IOT technologies will not only support the
4
IOT SECURITY AND PRIVACY REGIME
development of Location Based System and improve their accuracy but also expand those
services to indoor environments e.g. for smart retail. The impact of the evolving feature in IOT
effects the explosion of data source (Baccelli et al., 2014). Profiling signifies the challenges of
compiling information associate with certain individuals in order to gather welfares by
association with other profiles and data. In IOT profiling methods are usually used for
personalization of e-commerce in advertisement, newsletters and recommender system. Profiling
challenges for privacy including data perturbation, anonymization, client-side personalization
and encrypted information (Farooq et al., 2015). Another most occurred problem is privacy
violating interaction where the private information can be compromised through a public
medium. Applications of IOT such as transportation, envision, healthcare and smart retail needs
dense contact with user for efficiency where information is available through smart environment.
However, many third party can observe those mechanism that becomes a highly privacy concern.
Privacy and security can be affected by the smart things from lifecycle transitions. Inventory
attacks are also an emerging challenge associate with the privacy and security concern (Gubbi
et al., 2013). It involves with unauthorized collection of data related to other individual private
things. While linkage associate with the sources reveals (truthful or erroneous) information that
the subject did not disclose to the previously isolated sources.
Structure
This section provides the clear definition of the structure followed in this report. There are
several section of this report for clearly describing the security and privacy regime in IOT. In
every section there is proper heading with suitable subheading to demonstrate the broad about
security and privacy regime associate with IOT. The demonstration of the followed structure is
following-
IOT SECURITY AND PRIVACY REGIME
development of Location Based System and improve their accuracy but also expand those
services to indoor environments e.g. for smart retail. The impact of the evolving feature in IOT
effects the explosion of data source (Baccelli et al., 2014). Profiling signifies the challenges of
compiling information associate with certain individuals in order to gather welfares by
association with other profiles and data. In IOT profiling methods are usually used for
personalization of e-commerce in advertisement, newsletters and recommender system. Profiling
challenges for privacy including data perturbation, anonymization, client-side personalization
and encrypted information (Farooq et al., 2015). Another most occurred problem is privacy
violating interaction where the private information can be compromised through a public
medium. Applications of IOT such as transportation, envision, healthcare and smart retail needs
dense contact with user for efficiency where information is available through smart environment.
However, many third party can observe those mechanism that becomes a highly privacy concern.
Privacy and security can be affected by the smart things from lifecycle transitions. Inventory
attacks are also an emerging challenge associate with the privacy and security concern (Gubbi
et al., 2013). It involves with unauthorized collection of data related to other individual private
things. While linkage associate with the sources reveals (truthful or erroneous) information that
the subject did not disclose to the previously isolated sources.
Structure
This section provides the clear definition of the structure followed in this report. There are
several section of this report for clearly describing the security and privacy regime in IOT. In
every section there is proper heading with suitable subheading to demonstrate the broad about
security and privacy regime associate with IOT. The demonstration of the followed structure is
following-
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5
IOT SECURITY AND PRIVACY REGIME
Executive summary: this section the executive summary is widely described with
specification of the report purpose. This section also describes the broad about the chosen
topic and expected format. In the last part, the problem statements are illustrated.
Literature review: In the next section, the literature review is illustrated associate with the
privacy and security with help of previous report published in the web. The present and
past research associates with the IOT security, are evaluates. This section presents a
broad about the chosen topic with the help of previous research results.
Methodology: Then the methodology section describes the methodologies which are used
in the past and present literatures relevant to the chosen topic.
Next section compromises the methodologies describes in the previous section from
perspective on the efficiency, simplicity, extension into other applications, time saving
when used, cost saving when used, feasibility, connectivity, commercialization issues,
The chosen methodology is illustrate in this section based on various factors with proper
justifications includes tables and graphs.
Conclusion: At last the results are concluded in the conclusion section to support your
justification and argument.
Literature Review:
Introduction
The literature review presents a board about the security and privacy regime associate
with IOT (Abomhara & Køien, 2014). This section will be widely discussing about the
IOT SECURITY AND PRIVACY REGIME
Executive summary: this section the executive summary is widely described with
specification of the report purpose. This section also describes the broad about the chosen
topic and expected format. In the last part, the problem statements are illustrated.
Literature review: In the next section, the literature review is illustrated associate with the
privacy and security with help of previous report published in the web. The present and
past research associates with the IOT security, are evaluates. This section presents a
broad about the chosen topic with the help of previous research results.
Methodology: Then the methodology section describes the methodologies which are used
in the past and present literatures relevant to the chosen topic.
Next section compromises the methodologies describes in the previous section from
perspective on the efficiency, simplicity, extension into other applications, time saving
when used, cost saving when used, feasibility, connectivity, commercialization issues,
The chosen methodology is illustrate in this section based on various factors with proper
justifications includes tables and graphs.
Conclusion: At last the results are concluded in the conclusion section to support your
justification and argument.
Literature Review:
Introduction
The literature review presents a board about the security and privacy regime associate
with IOT (Abomhara & Køien, 2014). This section will be widely discussing about the
6
IOT SECURITY AND PRIVACY REGIME
causalities and associate problems of the IOT. Nowadays we are surrounding with the devices,
this devices are now become essential for every day. Successful implementation of IOT
application is associated with many spectsabd needs huge number of consideration. This aspects
are involves technologies which are utilized in daily life for communication, transfer and
receiving purpose. However with emerging technology the security risks are also increasing. The
seamless interaction between human and such devices are gradually increasing (Rehman et al.,
2016). The security concern is also growing as every device is connected with each other for
communicating and various reasons. Attackers take advantage of this situation to compromise
any system for ant desire or particular goal. To ensure the proper implementation of Internet of
things privacy and security aspects are needs to be measured in order to make those devices
effective and efficient. Every device and system must be secured and must provide embedded
security to user and their personal information (Fan et al., 2014). This paper will discuss about
the security issues of different level of IOT system. It also taking considers of current IOT
structure to elaborates and analyze the security concerns and privacy issues of IOT system.
Past and Present Work
In 2013, Jayavardhana et al “Internet of Things (IoT): A vision, architectural elements,
and future directions”. The ubiquitous detection activated by wireless network technologies
(WSN) covers many areas of modern life (Kumar & Patel, 2014). This paper makes it easier to
understand measure and infer the security and privacy. The information of many individual is
surrounding us in form of text and image which are needs to protect in order to provide a secure
platform. The proliferation of these devices in a communication actuation network creates
Internet of Things (IoT), the actuators and sensors compete perfectly with each other and the
surrounding we are living in (Roman, Zhou & Lopez, 2013). that also develop common
IOT SECURITY AND PRIVACY REGIME
causalities and associate problems of the IOT. Nowadays we are surrounding with the devices,
this devices are now become essential for every day. Successful implementation of IOT
application is associated with many spectsabd needs huge number of consideration. This aspects
are involves technologies which are utilized in daily life for communication, transfer and
receiving purpose. However with emerging technology the security risks are also increasing. The
seamless interaction between human and such devices are gradually increasing (Rehman et al.,
2016). The security concern is also growing as every device is connected with each other for
communicating and various reasons. Attackers take advantage of this situation to compromise
any system for ant desire or particular goal. To ensure the proper implementation of Internet of
things privacy and security aspects are needs to be measured in order to make those devices
effective and efficient. Every device and system must be secured and must provide embedded
security to user and their personal information (Fan et al., 2014). This paper will discuss about
the security issues of different level of IOT system. It also taking considers of current IOT
structure to elaborates and analyze the security concerns and privacy issues of IOT system.
Past and Present Work
In 2013, Jayavardhana et al “Internet of Things (IoT): A vision, architectural elements,
and future directions”. The ubiquitous detection activated by wireless network technologies
(WSN) covers many areas of modern life (Kumar & Patel, 2014). This paper makes it easier to
understand measure and infer the security and privacy. The information of many individual is
surrounding us in form of text and image which are needs to protect in order to provide a secure
platform. The proliferation of these devices in a communication actuation network creates
Internet of Things (IoT), the actuators and sensors compete perfectly with each other and the
surrounding we are living in (Roman, Zhou & Lopez, 2013). that also develop common
7
IOT SECURITY AND PRIVACY REGIME
operational image known as COP by utilizing share across platform. Where RIFD tags and
integrated system adoption has been enable the wireless technologies to breakthrough typical
communication system. The demand of utilizing sophisticated ingenuity query is growing
dramatically while moving from www to web2 and web3 can also be stays as from static web
page to social network and ubiquitous computer web. That’s also increase the cloud-centric
vision in all over the world for the implementation of IOT (Desai, Sheth & Anantharam, 2015).
The authors conclude our IoT vision by developing the need for convergence of WSN, Internet
and distributed computing directed towards the technology research community. The
proliferation of devices with communication actuation capabilities brings Internet vision closer
to things, where actuation and detection functions blend perfectly in the background and new
functionality is made possible by access to new sources of rich information.
Privacy Threats
In this modern decade, it has been hard to protect data to retain privacy as the internet of
things technologies take over our daily lives (Alrawais et al., 2017). Ziegeldorf’s literature
review enumerates the most common privacy threats in the Internet of Things:
Tracking and Localization: is one of the dominant threats as GPS, internet traffics are
installed in most of the devices which can be utilized to compromise the individual’s location.
Identification is also one of the threats that connects the identifier and capable of
compromising the address and name of a certain individual with a user entity.
Lifecycle transitions: when an IOT devices is sold this is used by some other user
previously. They consider that all the information is deleted before handing the device over such
as Smartphone (Bellavista et al., 2013). Other cases, when user does not use their devices and
IOT SECURITY AND PRIVACY REGIME
operational image known as COP by utilizing share across platform. Where RIFD tags and
integrated system adoption has been enable the wireless technologies to breakthrough typical
communication system. The demand of utilizing sophisticated ingenuity query is growing
dramatically while moving from www to web2 and web3 can also be stays as from static web
page to social network and ubiquitous computer web. That’s also increase the cloud-centric
vision in all over the world for the implementation of IOT (Desai, Sheth & Anantharam, 2015).
The authors conclude our IoT vision by developing the need for convergence of WSN, Internet
and distributed computing directed towards the technology research community. The
proliferation of devices with communication actuation capabilities brings Internet vision closer
to things, where actuation and detection functions blend perfectly in the background and new
functionality is made possible by access to new sources of rich information.
Privacy Threats
In this modern decade, it has been hard to protect data to retain privacy as the internet of
things technologies take over our daily lives (Alrawais et al., 2017). Ziegeldorf’s literature
review enumerates the most common privacy threats in the Internet of Things:
Tracking and Localization: is one of the dominant threats as GPS, internet traffics are
installed in most of the devices which can be utilized to compromise the individual’s location.
Identification is also one of the threats that connects the identifier and capable of
compromising the address and name of a certain individual with a user entity.
Lifecycle transitions: when an IOT devices is sold this is used by some other user
previously. They consider that all the information is deleted before handing the device over such
as Smartphone (Bellavista et al., 2013). Other cases, when user does not use their devices and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8
IOT SECURITY AND PRIVACY REGIME
want to rid of, they delete all the information manually (Jing et al., 2014). However, all
information cannot be deleted by user as smart devices often stores huge amount of data
throughout the lifecycle. This data includes personal image, videos and other information.
Presentation and interaction: refer to numbers of smart things which are interacting with
systems and presenting feedback to users (Datta, Bonnet & Nikaein, 2014). It could lead to a
dominant threat as the data transition between system and user is exchanged.
Profiling: profiling features are mostly used in the newsletter and advertisement for
personalization organizations compile information about individuals to infer interests by
association with other profiles and data sources. This information also can be used to track user
activity and compromise their personal data.
Linkage consist of linking system which associate with linking different systems that
increase the chance of unauthorized access and leaks of private information (Biswas &
Giaffreda, 2014).
Privacy principles:
The OECD and ISO has recognized more over eleven security principle from the charter,
guidelines and rules from the global standard boards associate with the protect privacy. Some of
the applications are directly applicable with IOT such as “consent and choice” which explains
People should not be denied goods or services or offered them on a less preferential basis which
is violated by TOSHIBA (Cirani et al., 2015). Other one is “Right to confidentiality and secrecy
of communications” which is violated by the Samsung in recent year. These causalities are also
reflecting the essence of privacy preserving. There are several approaches explains in many
research paper in order to address the privacy concern of end-user and service provider.
IOT SECURITY AND PRIVACY REGIME
want to rid of, they delete all the information manually (Jing et al., 2014). However, all
information cannot be deleted by user as smart devices often stores huge amount of data
throughout the lifecycle. This data includes personal image, videos and other information.
Presentation and interaction: refer to numbers of smart things which are interacting with
systems and presenting feedback to users (Datta, Bonnet & Nikaein, 2014). It could lead to a
dominant threat as the data transition between system and user is exchanged.
Profiling: profiling features are mostly used in the newsletter and advertisement for
personalization organizations compile information about individuals to infer interests by
association with other profiles and data sources. This information also can be used to track user
activity and compromise their personal data.
Linkage consist of linking system which associate with linking different systems that
increase the chance of unauthorized access and leaks of private information (Biswas &
Giaffreda, 2014).
Privacy principles:
The OECD and ISO has recognized more over eleven security principle from the charter,
guidelines and rules from the global standard boards associate with the protect privacy. Some of
the applications are directly applicable with IOT such as “consent and choice” which explains
People should not be denied goods or services or offered them on a less preferential basis which
is violated by TOSHIBA (Cirani et al., 2015). Other one is “Right to confidentiality and secrecy
of communications” which is violated by the Samsung in recent year. These causalities are also
reflecting the essence of privacy preserving. There are several approaches explains in many
research paper in order to address the privacy concern of end-user and service provider.
9
IOT SECURITY AND PRIVACY REGIME
Context and Privacy Awareness: Devices such as smart TV, health and fitness associate
devices and wearable technologies are also can propose security risk. The privacy awareness
solution has been focused on end user applications which are used daily for ease the effort or
entertainment. Such devices can compromise personal data (Borgohain, Kumar & Sanyal, 2015).
Recently, a framework has been proposed named SeCoMan to act as a trusted third party
application. However the applications may not be real able protect personal information which it
uses to work effectively such as location information.
Information manipulation and Cryptographic techniques: researchers are spend lot of
years to implement proper privacy preserving schema which are letter delivered as novel.
However, they are not able to propose the perfect solution yet. They faced certain obstacles
because many sensors cannot offer adequate security protocols due to the limited amount of
storage and computation resources.
Data minimization: IOT service provider stores all the relevant data such as user personal
data for the principle of data minimization (Blaauw et al., 2014). They retain this type of data as
much they need them for providing proper services. They should keep this data till they need
them.
Access Control: For addition encryption and privacy awareness access control is one of
the most useful solutions. This approach assist user to manage their own data. CapBAc is an
example which is proposed by the, Hernandez, Moreno and Skarmeta. It is essential to distribute
approach h in which smart things themselves are able to make fine-grained authorization
decisions.
IOT SECURITY AND PRIVACY REGIME
Context and Privacy Awareness: Devices such as smart TV, health and fitness associate
devices and wearable technologies are also can propose security risk. The privacy awareness
solution has been focused on end user applications which are used daily for ease the effort or
entertainment. Such devices can compromise personal data (Borgohain, Kumar & Sanyal, 2015).
Recently, a framework has been proposed named SeCoMan to act as a trusted third party
application. However the applications may not be real able protect personal information which it
uses to work effectively such as location information.
Information manipulation and Cryptographic techniques: researchers are spend lot of
years to implement proper privacy preserving schema which are letter delivered as novel.
However, they are not able to propose the perfect solution yet. They faced certain obstacles
because many sensors cannot offer adequate security protocols due to the limited amount of
storage and computation resources.
Data minimization: IOT service provider stores all the relevant data such as user personal
data for the principle of data minimization (Blaauw et al., 2014). They retain this type of data as
much they need them for providing proper services. They should keep this data till they need
them.
Access Control: For addition encryption and privacy awareness access control is one of
the most useful solutions. This approach assist user to manage their own data. CapBAc is an
example which is proposed by the, Hernandez, Moreno and Skarmeta. It is essential to distribute
approach h in which smart things themselves are able to make fine-grained authorization
decisions.
10
IOT SECURITY AND PRIVACY REGIME
There are other proposed solutions that do not fall into the above solution. Hitchhiking
can be a solution. This is a new approach to ensure the anonymity of individuals. This
application assist user to safe-keep their location information (Catarinucci et al., 2015). The
knowledge of user location is particularly unnecessary for most of the application. Hitchhiking
can be used to run that application without compromising the user certain location.
Introspection technique is also an effective approach to protect user personal data. it is
highly applicable to secure the data transition. Introspection technique examines the VM in order
to ensure the security. It closely examines the CPU state of VM, I/O activity and content files
and network information (Karimi & Atkinson, 2013). That is delivered via detects malicious
software and hyper visor on VM. Most of the casualties occur by malicious attacks over the IOT
devices. These aspects are creating risk to user privacy as there is a huge chance of losing
personal information.
Methodology:
To evaluate the limits of security that are potentially violated by the IOT, a systematic
quantitative literature was conducted in order to understand the broad about the security and
privacy regime. This method is very effective and capable of identifying the areas illustrate in the
existing research (Chiang & Zhang, 2016). According to the Byrne and Pickering this method
has exclusive benefits compared to narrative styles. It is effective to identify the areas which are
deeply covered in the research and also reveal the gaps. The approaches taken by this method is
slightly different from typical methods that facilities delivery of new insights.
IOT SECURITY AND PRIVACY REGIME
There are other proposed solutions that do not fall into the above solution. Hitchhiking
can be a solution. This is a new approach to ensure the anonymity of individuals. This
application assist user to safe-keep their location information (Catarinucci et al., 2015). The
knowledge of user location is particularly unnecessary for most of the application. Hitchhiking
can be used to run that application without compromising the user certain location.
Introspection technique is also an effective approach to protect user personal data. it is
highly applicable to secure the data transition. Introspection technique examines the VM in order
to ensure the security. It closely examines the CPU state of VM, I/O activity and content files
and network information (Karimi & Atkinson, 2013). That is delivered via detects malicious
software and hyper visor on VM. Most of the casualties occur by malicious attacks over the IOT
devices. These aspects are creating risk to user privacy as there is a huge chance of losing
personal information.
Methodology:
To evaluate the limits of security that are potentially violated by the IOT, a systematic
quantitative literature was conducted in order to understand the broad about the security and
privacy regime. This method is very effective and capable of identifying the areas illustrate in the
existing research (Chiang & Zhang, 2016). According to the Byrne and Pickering this method
has exclusive benefits compared to narrative styles. It is effective to identify the areas which are
deeply covered in the research and also reveal the gaps. The approaches taken by this method is
slightly different from typical methods that facilities delivery of new insights.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
11
IOT SECURITY AND PRIVACY REGIME
Methodology 1
Figure 1: Choose Databases
(Source: Chi et al., 2014)
Choose Database: previous research paper published in academic journals was collected
from electronics database including web of science, research gate, ScoPus and Google Scholar.
Choose Keyword: keyword used for research were ‘Internet of Things’, ‘IoT’, and a
combination of terms including ‘trust’, ‘privacy’ ,‘awareness’, ‘data’, ‘security’ ‘protection’,
‘preserving’, ‘individual’, ‘private’ and ‘user’.
Choose Time Range: The search results were restricted to papers published between 2013
to current year (Kelly, Suryadevara & Mukhopadhyay, 2013).
Choose Exclusion Criteria: The academic search was restricted to papers published in
English. In addition to the research papers, a search for news stories and privacy reports were
also included in order to accommodate personal privacy violation perspectives. Review papers
were excluded but their reference lists were followed to ensure all the research in this field was
consulted. Searching & Recording: For each collected paper, the following information was
recorded including author(s), year of publication, journal, country where the research was carried
out (Krco, Pokric & Carrez, 2014). Each paper was categorized based on the methods used nd
whether analysis was quantitative, qualitative, or mixed. The rest of the criteria are related to the
IOT SECURITY AND PRIVACY REGIME
Methodology 1
Figure 1: Choose Databases
(Source: Chi et al., 2014)
Choose Database: previous research paper published in academic journals was collected
from electronics database including web of science, research gate, ScoPus and Google Scholar.
Choose Keyword: keyword used for research were ‘Internet of Things’, ‘IoT’, and a
combination of terms including ‘trust’, ‘privacy’ ,‘awareness’, ‘data’, ‘security’ ‘protection’,
‘preserving’, ‘individual’, ‘private’ and ‘user’.
Choose Time Range: The search results were restricted to papers published between 2013
to current year (Kelly, Suryadevara & Mukhopadhyay, 2013).
Choose Exclusion Criteria: The academic search was restricted to papers published in
English. In addition to the research papers, a search for news stories and privacy reports were
also included in order to accommodate personal privacy violation perspectives. Review papers
were excluded but their reference lists were followed to ensure all the research in this field was
consulted. Searching & Recording: For each collected paper, the following information was
recorded including author(s), year of publication, journal, country where the research was carried
out (Krco, Pokric & Carrez, 2014). Each paper was categorized based on the methods used nd
whether analysis was quantitative, qualitative, or mixed. The rest of the criteria are related to the
12
IOT SECURITY AND PRIVACY REGIME
researched topic, it classifies the application area as home automation, smart cities, smart
manufacturing, health care, automotive, or wearable devices, the type of technology used (RFID,
sensor, nano, or intelligent embedded technology). The privacy protections, threats, violations,
and perceptions for each type of technology were also recorded (Yi, Qin & Li, 2015).
Perceptions were categorized based on Westin’s three categories: fundamentalist, pragmatic, and
unconcerned.
Identifying Patterns: An analysis was carried out to uncover patterns in order to identify
foci, gaps and to make recommendations for future research.
Methodology 2: Making the hardware used for IoT temper resistant:
It is seen that most of the hardware are working in an environment where they are not at
all attended and are subjected to various kinds of security threats. The devices should be kept in
an isolated position so as to allow few designated or authorized person to have physical access to
the device and this is to be done for the IoT devices which are completely unattended (Suo et al.,
2012). Besides this it is very much advantageous to make the IoT devices temper resistant or
temper evident. By this kind of endpoint hardening it is possible to block intruders from reaching
the data which are important. This type of end point security would also be stopping the hackers
in buying the devices and then weaponing them. This type of end point security might include
the use of small simple plastic devices, port locks and camera covers, which lock out USB and
Ethernet ports and cover webcam apertures. Ports locks helps in the prevention of coming of
unwanted malware. The best practice of securing the end point hardening would be by obtaining
the layered approach where the attacker needs to overcome a series of obstacles which are
mainly designed for eth purpose of protecting the devices and the data from any kind of
unwanted access or use (Madakam, Ramaswamy & Tripathi, 2015). In cases when there is a
IOT SECURITY AND PRIVACY REGIME
researched topic, it classifies the application area as home automation, smart cities, smart
manufacturing, health care, automotive, or wearable devices, the type of technology used (RFID,
sensor, nano, or intelligent embedded technology). The privacy protections, threats, violations,
and perceptions for each type of technology were also recorded (Yi, Qin & Li, 2015).
Perceptions were categorized based on Westin’s three categories: fundamentalist, pragmatic, and
unconcerned.
Identifying Patterns: An analysis was carried out to uncover patterns in order to identify
foci, gaps and to make recommendations for future research.
Methodology 2: Making the hardware used for IoT temper resistant:
It is seen that most of the hardware are working in an environment where they are not at
all attended and are subjected to various kinds of security threats. The devices should be kept in
an isolated position so as to allow few designated or authorized person to have physical access to
the device and this is to be done for the IoT devices which are completely unattended (Suo et al.,
2012). Besides this it is very much advantageous to make the IoT devices temper resistant or
temper evident. By this kind of endpoint hardening it is possible to block intruders from reaching
the data which are important. This type of end point security would also be stopping the hackers
in buying the devices and then weaponing them. This type of end point security might include
the use of small simple plastic devices, port locks and camera covers, which lock out USB and
Ethernet ports and cover webcam apertures. Ports locks helps in the prevention of coming of
unwanted malware. The best practice of securing the end point hardening would be by obtaining
the layered approach where the attacker needs to overcome a series of obstacles which are
mainly designed for eth purpose of protecting the devices and the data from any kind of
unwanted access or use (Madakam, Ramaswamy & Tripathi, 2015). In cases when there is a
13
IOT SECURITY AND PRIVACY REGIME
need of shipping the device might be protected by making use of the tamper-evident packaging.
This would allow the owner of the device to know if the package has been opened before arrival
or not.
Method 3: Divide networks into segments
Separation of the network into smaller local networks by making use of the VLANs, IP
address ranges, or a combination thereof can be very much helpful (Margelis et al., 2015). The
utilization of the Network segmentation by the next-generation firewall security policies in order
to clearly identify one or more than one source along with the destination interfaces on the
platform. It is necessary to assign each interface on the firewall to a security zone before it is
capable of doing the processing of the traffic. This would be initially responsible for allowing the
various organizations to create security zones which would be representing different segments
that are being connected to, and controlled by, the firewall. A separate, detached private network
for a security system, perhaps with a dedicated channel to a "home base" in the case of a home
security system, might suffice (Blaauw et al., 2014). If the system must use the Internet, a virtual
private network (VPN) might be implemented.
Method 4: Perform dynamic testing
The testing of the IoT devices acts as a crucial factor. This is to be done in order to
establish minimum baseline that is required for the security. The intention and design of Static
testing is not made in order to find the various kinds of vulnerabilities which are present in off-
the-shelf components which includes the processors and memory. These components might as an
overall component of all the applications (Farooq et al., 2015). Contrarily the dynamic testing is
capable of exposing the weakness in the code along with any kind of underlying defects or
vulnerabilities which are introduced by hardware. This type of defects might not be visible to
IOT SECURITY AND PRIVACY REGIME
need of shipping the device might be protected by making use of the tamper-evident packaging.
This would allow the owner of the device to know if the package has been opened before arrival
or not.
Method 3: Divide networks into segments
Separation of the network into smaller local networks by making use of the VLANs, IP
address ranges, or a combination thereof can be very much helpful (Margelis et al., 2015). The
utilization of the Network segmentation by the next-generation firewall security policies in order
to clearly identify one or more than one source along with the destination interfaces on the
platform. It is necessary to assign each interface on the firewall to a security zone before it is
capable of doing the processing of the traffic. This would be initially responsible for allowing the
various organizations to create security zones which would be representing different segments
that are being connected to, and controlled by, the firewall. A separate, detached private network
for a security system, perhaps with a dedicated channel to a "home base" in the case of a home
security system, might suffice (Blaauw et al., 2014). If the system must use the Internet, a virtual
private network (VPN) might be implemented.
Method 4: Perform dynamic testing
The testing of the IoT devices acts as a crucial factor. This is to be done in order to
establish minimum baseline that is required for the security. The intention and design of Static
testing is not made in order to find the various kinds of vulnerabilities which are present in off-
the-shelf components which includes the processors and memory. These components might as an
overall component of all the applications (Farooq et al., 2015). Contrarily the dynamic testing is
capable of exposing the weakness in the code along with any kind of underlying defects or
vulnerabilities which are introduced by hardware. This type of defects might not be visible to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
14
IOT SECURITY AND PRIVACY REGIME
static analysis. Dynamic testing is capable of discovering the vulnerabilities which are created
whenever a new code is used on processors which are older. It is recommended that the
manufacturers who purchase hardware and software from others should perform dynamic testing
in order to make sure that the items are secure.
Selection of Methodology
The best methodology for the security and privacy regime of Internet of Things is
dynamic testing (Sicari et al., 2015). It is the specific type of technique that is used for software
testing with the help of the dynamic behavior of the code. When this particular type of testing is
done for the devices of internet of things, the security and the privacy of the internet of things
devices are properly maintained. The entire process is extremely easier. The dynamic testing
could be easily done by simply testing the software that is to be executed as well as compiled and
also comprise of various parameters like memory usages, usage of the central processing unit,
performance of the software and better response time. The most significant reason of selecting
the methodology of dynamic testing is that it is responsible for improving the overall quality of
the software as dynamic testing refers to the proper execution of software code and all the bugs
of the code are easily eliminated in the process (Desai, Sheth & Anantharam, 2015). The second
important reason is that the technology provides error free solutions and hence the software is
ensured of error free. This eventually increases the chance of the best result and thus is termed as
the best methodology in respect to the other three methodologies.
IOT SECURITY AND PRIVACY REGIME
static analysis. Dynamic testing is capable of discovering the vulnerabilities which are created
whenever a new code is used on processors which are older. It is recommended that the
manufacturers who purchase hardware and software from others should perform dynamic testing
in order to make sure that the items are secure.
Selection of Methodology
The best methodology for the security and privacy regime of Internet of Things is
dynamic testing (Sicari et al., 2015). It is the specific type of technique that is used for software
testing with the help of the dynamic behavior of the code. When this particular type of testing is
done for the devices of internet of things, the security and the privacy of the internet of things
devices are properly maintained. The entire process is extremely easier. The dynamic testing
could be easily done by simply testing the software that is to be executed as well as compiled and
also comprise of various parameters like memory usages, usage of the central processing unit,
performance of the software and better response time. The most significant reason of selecting
the methodology of dynamic testing is that it is responsible for improving the overall quality of
the software as dynamic testing refers to the proper execution of software code and all the bugs
of the code are easily eliminated in the process (Desai, Sheth & Anantharam, 2015). The second
important reason is that the technology provides error free solutions and hence the software is
ensured of error free. This eventually increases the chance of the best result and thus is termed as
the best methodology in respect to the other three methodologies.
15
IOT SECURITY AND PRIVACY REGIME
Figure 2: Dynamic Testing
(Source: Sadeghi, Wachsmann &Waidner, 2015)
The above describes about the various parts of Dynamic Testing. The four parts are unit
testing, integrated testing, system testing and acceptance testing. Due to the presence of all these
testing, the software is absolutely safe and secured and hence is termed as the most secured
methodology (Sadeghi, Wachsmann &Waidner, 2015). Thus, Dynamic Testing is the most
effective testing for maintaining the security and privacy regime of internet of things.
Conclusion
Therefore from the discussion, conclusion can be drawn that internet of things of IoT is
the basic requirement in the modern technological world. It is the significant system where any
specific item within the physical world or the sensors is eventually attached to the items. These
sensors eventually help the user in proper connection to the physical world. There are various
items that are being linked to the Internet connection with the proper help of either wireless or
wired connectivity of the Internet. All of these sensors have the ability of utilizing the several
kinds of local area connections like wireless fidelity or Wi Fi, Bluetooth connection, Zigbee
IOT SECURITY AND PRIVACY REGIME
Figure 2: Dynamic Testing
(Source: Sadeghi, Wachsmann &Waidner, 2015)
The above describes about the various parts of Dynamic Testing. The four parts are unit
testing, integrated testing, system testing and acceptance testing. Due to the presence of all these
testing, the software is absolutely safe and secured and hence is termed as the most secured
methodology (Sadeghi, Wachsmann &Waidner, 2015). Thus, Dynamic Testing is the most
effective testing for maintaining the security and privacy regime of internet of things.
Conclusion
Therefore from the discussion, conclusion can be drawn that internet of things of IoT is
the basic requirement in the modern technological world. It is the significant system where any
specific item within the physical world or the sensors is eventually attached to the items. These
sensors eventually help the user in proper connection to the physical world. There are various
items that are being linked to the Internet connection with the proper help of either wireless or
wired connectivity of the Internet. All of these sensors have the ability of utilizing the several
kinds of local area connections like wireless fidelity or Wi Fi, Bluetooth connection, Zigbee
16
IOT SECURITY AND PRIVACY REGIME
protocol, Near Field Communications or NFC, radio frequency identifier or RFID and many
more. All of these sensors have the specific Wide area connection like GPRS, GSM, 3G and
finally LTE. The various usages of the Internet of Things are proper connection of living things
and inanimate things that means it connects the industrial equipments with the regular objects,
utilizing sensors for the proper collection of data or information that means each and every
sensor can easily monitor or track the particular condition like location, vibration, motion and
temperature. Within internet of things, all of these sensors are easily connected to one another
and also to the specific systems, which could easily understand or even present the information
from the data feed of the sensor. The third important advantage of the internet of things
technology is that it can easily alter the kinds of items that are being communicated on the IP
network. In spite of having such important and popular usability, internet of things do comprise
of several important challenges. These challenges are mainly related to the security and privacy
of the technology. Attackers take advantage of this situation to compromise any system for ant
desire or particular goal. To ensure the proper implementation of Internet of things privacy and
security aspects are needs to be measured in order to make those devices effective and efficient.
Every device and system must be secured and must provide embedded security to user and their
personal information There are various issues that make this particular technology extremely
vulnerable for the society and thus are often avoided by various users. The above research
project has clearly outlined the broad concept of security and privacy regime of Internet of things
technology. Several methodologies are present and all of them are well described in the research
report. The most significant methodologies for the determination of security and privacy regime
of internet of things are dynamic testing, division of networks into segments, choosing database
IOT SECURITY AND PRIVACY REGIME
protocol, Near Field Communications or NFC, radio frequency identifier or RFID and many
more. All of these sensors have the specific Wide area connection like GPRS, GSM, 3G and
finally LTE. The various usages of the Internet of Things are proper connection of living things
and inanimate things that means it connects the industrial equipments with the regular objects,
utilizing sensors for the proper collection of data or information that means each and every
sensor can easily monitor or track the particular condition like location, vibration, motion and
temperature. Within internet of things, all of these sensors are easily connected to one another
and also to the specific systems, which could easily understand or even present the information
from the data feed of the sensor. The third important advantage of the internet of things
technology is that it can easily alter the kinds of items that are being communicated on the IP
network. In spite of having such important and popular usability, internet of things do comprise
of several important challenges. These challenges are mainly related to the security and privacy
of the technology. Attackers take advantage of this situation to compromise any system for ant
desire or particular goal. To ensure the proper implementation of Internet of things privacy and
security aspects are needs to be measured in order to make those devices effective and efficient.
Every device and system must be secured and must provide embedded security to user and their
personal information There are various issues that make this particular technology extremely
vulnerable for the society and thus are often avoided by various users. The above research
project has clearly outlined the broad concept of security and privacy regime of Internet of things
technology. Several methodologies are present and all of them are well described in the research
report. The most significant methodologies for the determination of security and privacy regime
of internet of things are dynamic testing, division of networks into segments, choosing database
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
17
IOT SECURITY AND PRIVACY REGIME
and making hardware temper resistant. The best selected methodology amongst all of these is
dynamic testing. Proper justifications re also provided for the selection.
IOT SECURITY AND PRIVACY REGIME
and making hardware temper resistant. The best selected methodology amongst all of these is
dynamic testing. Proper justifications re also provided for the selection.
18
IOT SECURITY AND PRIVACY REGIME
References
Abomhara, M., &Køien, G. M. (2014, May). Security and privacy in the Internet of Things:
Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS),
2014 International Conference on (pp. 1-8). IEEE.
Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the internet of
things: Security and privacy issues. IEEE Internet Computing, 21(2), 34-42.
Baccelli, E., Mehlis, C., Hahm, O., Schmidt, T. C., & Wählisch, M. (2014, September).
Information centric networking in the IoT: experiments with NDN in the wild.
In Proceedings of the 1st ACM Conference on Information-Centric Networking (pp. 77-
86). ACM.
Bellavista, P., Cardone, G., Corradi, A., & Foschini, L. (2013). Convergence of MANET and
WSN in IoT urban scenarios. IEEE Sensors Journal, 13(10), 3558-3567.
Biswas, A. R., & Giaffreda, R. (2014, March). IoT and cloud convergence: Opportunities and
challenges. In Internet of Things (WF-IoT), 2014 IEEE World Forum on (pp. 375-376).
IEEE.
Blaauw, D., Sylvester, D., Dutta, P., Lee, Y., Lee, I., Bang, S., ... & Yoon, D. (2014, June). IoT
design space challenges: Circuits and systems. In VLSI Technology (VLSI-Technology):
Digest of Technical Papers, 2014 Symposium on (pp. 1-2). IEEE.
Borgohain, T., Kumar, U., &Sanyal, S. (2015). Survey of security and privacy issues of Internet
of Things. arXiv preprint arXiv:1501.02211.
IOT SECURITY AND PRIVACY REGIME
References
Abomhara, M., &Køien, G. M. (2014, May). Security and privacy in the Internet of Things:
Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS),
2014 International Conference on (pp. 1-8). IEEE.
Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the internet of
things: Security and privacy issues. IEEE Internet Computing, 21(2), 34-42.
Baccelli, E., Mehlis, C., Hahm, O., Schmidt, T. C., & Wählisch, M. (2014, September).
Information centric networking in the IoT: experiments with NDN in the wild.
In Proceedings of the 1st ACM Conference on Information-Centric Networking (pp. 77-
86). ACM.
Bellavista, P., Cardone, G., Corradi, A., & Foschini, L. (2013). Convergence of MANET and
WSN in IoT urban scenarios. IEEE Sensors Journal, 13(10), 3558-3567.
Biswas, A. R., & Giaffreda, R. (2014, March). IoT and cloud convergence: Opportunities and
challenges. In Internet of Things (WF-IoT), 2014 IEEE World Forum on (pp. 375-376).
IEEE.
Blaauw, D., Sylvester, D., Dutta, P., Lee, Y., Lee, I., Bang, S., ... & Yoon, D. (2014, June). IoT
design space challenges: Circuits and systems. In VLSI Technology (VLSI-Technology):
Digest of Technical Papers, 2014 Symposium on (pp. 1-2). IEEE.
Borgohain, T., Kumar, U., &Sanyal, S. (2015). Survey of security and privacy issues of Internet
of Things. arXiv preprint arXiv:1501.02211.
19
IOT SECURITY AND PRIVACY REGIME
Catarinucci, L., De Donno, D., Mainetti, L., Palano, L., Patrono, L., Stefanizzi, M. L., &
Tarricone, L. (2015). An IoT-aware architecture for smart healthcare systems. IEEE
Internet of Things Journal, 2(6), 515-526.
Chi, Q., Yan, H., Zhang, C., Pang, Z., & Da Xu, L. (2014). A reconfigurable smart sensor
interface for industrial WSN in IoT environment. IEEE transactions on industrial
informatics, 10(2), 1417-1425.
Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE
Internet of Things Journal, 3(6), 854-864.
Cirani, S., Picone, M., Gonizzi, P., Veltri, L., & Ferrari, G. (2015). Iot-oas: An oauth-based
authorization service architecture for secure services in iot scenarios. IEEE sensors
journal, 15(2), 1224-1234.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions
on industrial informatics, 10(4), 2233-2243.
Datta, S. K., Bonnet, C., & Nikaein, N. (2014, March). An IoT gateway centric architecture to
provide novel M2M services. In Internet of Things (WF-IoT), 2014 IEEE World Forum
on (pp. 514-519). IEEE.
Desai, P., Sheth, A., & Anantharam, P. (2015, June). Semantic gateway as a service architecture
for iot interoperability. In Mobile Services (MS), 2015 IEEE International Conference
on(pp. 313-319). IEEE.
Fan, Y. J., Yin, Y. H., Da Xu, L., Zeng, Y., & Wu, F. (2014). IoT-based smart rehabilitation
system. IEEE transactions on industrial informatics, 10(2), 1568-1577.
IOT SECURITY AND PRIVACY REGIME
Catarinucci, L., De Donno, D., Mainetti, L., Palano, L., Patrono, L., Stefanizzi, M. L., &
Tarricone, L. (2015). An IoT-aware architecture for smart healthcare systems. IEEE
Internet of Things Journal, 2(6), 515-526.
Chi, Q., Yan, H., Zhang, C., Pang, Z., & Da Xu, L. (2014). A reconfigurable smart sensor
interface for industrial WSN in IoT environment. IEEE transactions on industrial
informatics, 10(2), 1417-1425.
Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE
Internet of Things Journal, 3(6), 854-864.
Cirani, S., Picone, M., Gonizzi, P., Veltri, L., & Ferrari, G. (2015). Iot-oas: An oauth-based
authorization service architecture for secure services in iot scenarios. IEEE sensors
journal, 15(2), 1224-1234.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions
on industrial informatics, 10(4), 2233-2243.
Datta, S. K., Bonnet, C., & Nikaein, N. (2014, March). An IoT gateway centric architecture to
provide novel M2M services. In Internet of Things (WF-IoT), 2014 IEEE World Forum
on (pp. 514-519). IEEE.
Desai, P., Sheth, A., & Anantharam, P. (2015, June). Semantic gateway as a service architecture
for iot interoperability. In Mobile Services (MS), 2015 IEEE International Conference
on(pp. 313-319). IEEE.
Fan, Y. J., Yin, Y. H., Da Xu, L., Zeng, Y., & Wu, F. (2014). IoT-based smart rehabilitation
system. IEEE transactions on industrial informatics, 10(2), 1568-1577.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
20
IOT SECURITY AND PRIVACY REGIME
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security
concerns of internet of things (IoT). International Journal of Computer
Applications, 111(7).
Gaur, A., Scotney, B., Parr, G., & McClean, S. (2015). Smart city architecture and its
applications based on IoT. Procedia computer science, 52, 1089-1094.
Gubbi, J., Buyya, R., Marusic, S., &Palaniswami, M. (2013). Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
1645-1660.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., &Qiu, D. (2014). Security of the Internet of Things:
perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Karimi, K., & Atkinson, G. (2013). What the Internet of Things (IoT) needs to become a
reality. White Paper, FreeScale and ARM, 1-16.
Kelly, S. D. T., Suryadevara, N. K., & Mukhopadhyay, S. C. (2013). Towards the
implementation of IoT for environmental condition monitoring in homes. IEEE Sensors
Journal, 13(10), 3846-3853.
Krco, S., Pokric, B., & Carrez, F. (2014, March). Designing IoT architecture (s): A European
perspective. In Internet of Things (WF-IoT), 2014 IEEE World Forum on (pp. 79-84).
IEEE.
Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy
issues. International Journal of Computer Applications, 90(11).
IOT SECURITY AND PRIVACY REGIME
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security
concerns of internet of things (IoT). International Journal of Computer
Applications, 111(7).
Gaur, A., Scotney, B., Parr, G., & McClean, S. (2015). Smart city architecture and its
applications based on IoT. Procedia computer science, 52, 1089-1094.
Gubbi, J., Buyya, R., Marusic, S., &Palaniswami, M. (2013). Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
1645-1660.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., &Qiu, D. (2014). Security of the Internet of Things:
perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Karimi, K., & Atkinson, G. (2013). What the Internet of Things (IoT) needs to become a
reality. White Paper, FreeScale and ARM, 1-16.
Kelly, S. D. T., Suryadevara, N. K., & Mukhopadhyay, S. C. (2013). Towards the
implementation of IoT for environmental condition monitoring in homes. IEEE Sensors
Journal, 13(10), 3846-3853.
Krco, S., Pokric, B., & Carrez, F. (2014, March). Designing IoT architecture (s): A European
perspective. In Internet of Things (WF-IoT), 2014 IEEE World Forum on (pp. 79-84).
IEEE.
Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy
issues. International Journal of Computer Applications, 90(11).
21
IOT SECURITY AND PRIVACY REGIME
Lee, K., Kim, D., Ha, D., Rajput, U., & Oh, H. (2015, September). On security and privacy
issues of fog computing supported Internet of Things environment. In Network of the
Future (NOF), 2015 6th International Conference on the (pp. 1-3). IEEE.
Madakam, S., Ramaswamy, R., & Tripathi, S. (2015). Internet of Things (IoT): A literature
review. Journal of Computer and Communications, 3(05), 164.
Margelis, G., Piechocki, R., Kaleshi, D., & Thomas, P. (2015, December). Low throughput
networks for the IoT: Lessons learned from industrial implementations. In Internet of
Things (WF-IoT), 2015 IEEE 2nd World Forum on (pp. 181-186). IEEE.
Rehman, S. U., Khan, I. U., Moiz, M., & Hasan, S. (2016). Security and privacy issues in
IoT. International journal of communication networks and information security, 8(3),
147.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy
in distributed internet of things. Computer Networks, 57(10), 2266-2279.
Sadeghi, A. R., Wachsmann, C., &Waidner, M. (2015, June). Security and privacy challenges in
industrial internet of things. In Proceedings of the 52nd annual design automation
conference (p. 54). ACM.
Sicari, S., Rizzardi, A., Grieco, L. A., &Coen-Porisini, A. (2015). Security, privacy and trust in
Internet of Things: The road ahead. Computer networks, 76, 146-164.
Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a review.
In Computer Science and Electronics Engineering (ICCSEE), 2012 international
conference on (Vol. 3, pp. 648-651). IEEE.
IOT SECURITY AND PRIVACY REGIME
Lee, K., Kim, D., Ha, D., Rajput, U., & Oh, H. (2015, September). On security and privacy
issues of fog computing supported Internet of Things environment. In Network of the
Future (NOF), 2015 6th International Conference on the (pp. 1-3). IEEE.
Madakam, S., Ramaswamy, R., & Tripathi, S. (2015). Internet of Things (IoT): A literature
review. Journal of Computer and Communications, 3(05), 164.
Margelis, G., Piechocki, R., Kaleshi, D., & Thomas, P. (2015, December). Low throughput
networks for the IoT: Lessons learned from industrial implementations. In Internet of
Things (WF-IoT), 2015 IEEE 2nd World Forum on (pp. 181-186). IEEE.
Rehman, S. U., Khan, I. U., Moiz, M., & Hasan, S. (2016). Security and privacy issues in
IoT. International journal of communication networks and information security, 8(3),
147.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy
in distributed internet of things. Computer Networks, 57(10), 2266-2279.
Sadeghi, A. R., Wachsmann, C., &Waidner, M. (2015, June). Security and privacy challenges in
industrial internet of things. In Proceedings of the 52nd annual design automation
conference (p. 54). ACM.
Sicari, S., Rizzardi, A., Grieco, L. A., &Coen-Porisini, A. (2015). Security, privacy and trust in
Internet of Things: The road ahead. Computer networks, 76, 146-164.
Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a review.
In Computer Science and Electronics Engineering (ICCSEE), 2012 international
conference on (Vol. 3, pp. 648-651). IEEE.
22
IOT SECURITY AND PRIVACY REGIME
Yi, S., Qin, Z., & Li, Q. (2015, August). Security and privacy issues of fog computing: A survey.
In International Conference on Wireless Algorithms, Systems, and Applications (pp. 685-
695). Springer, Cham.
IOT SECURITY AND PRIVACY REGIME
Yi, S., Qin, Z., & Li, Q. (2015, August). Security and privacy issues of fog computing: A survey.
In International Conference on Wireless Algorithms, Systems, and Applications (pp. 685-
695). Springer, Cham.
1 out of 22
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.