logo

IoT Security and Privacy Regime - Understanding the Challenges and Solutions

Choose a topic related to IoT and submit a research project not exceeding 6000 words.

22 Pages6191 Words261 Views
   

Added on  2023-06-12

About This Document

This research project aims to understand the security and privacy regime of Internet of Things (IoT). The paper discusses the various privacy and security concerns and their solutions. The challenges are categorized into seven sections, including identification, localization and tracking, profiling, privacy-violating interaction and presentation, lifestyle transitions, inventory attack, and linkage. The paper also presents various privacy principles and approaches to address the privacy concerns of end-users and service providers.

IoT Security and Privacy Regime - Understanding the Challenges and Solutions

Choose a topic related to IoT and submit a research project not exceeding 6000 words.

   Added on 2023-06-12

ShareRelated Documents
Running head: IOT SECURITY AND PRIVACY REGIME
IOT SECURITY AND PRIVACY REGIME
NAMBURU GOPICHAND
University Name
Author Note:
IoT Security and Privacy Regime - Understanding the Challenges and Solutions_1
2
IOT SECURITY AND PRIVACY REGIME
Milestone 1
Executive Summary
The major objective of this research project is to understand about the security and privacy
regime of Internet of Things or IoT. This Internet of Things or IoT can be easily defined as the
network of vehicles, home appliances, physical devices or any other product, which is
subsequently embedded with the software, sensors, electronics, actuators and connectivity, which
help in enabling each and every object in the proper connection and exchanging of data. Due to
the explicit and higher demand of technology, the internet of things is considered to be the best
and the most effective technologies in the entire technological world. However, there are privacy
and security regime within the technology that has made it so popular and well accepted by all.
Relevant details regarding the privacy and security regime are provided within the research
project.
IoT Security and Privacy Regime - Understanding the Challenges and Solutions_2
3
IOT SECURITY AND PRIVACY REGIME
Milestone 2
Introduction of problems
Internet of things is widely populated as an emerging internet based information
architecture which provides services such as exchange of facility and goods. It encourages
policymakers and others to develop new and high disruptive digital technologies however some
problems are occurring in security field of Economics, legal norms and Social (Da Xu, He & Li,
2014). The technical factors of IOT are widely available however there is lack of existence of
legal framework. These innovative technologies are raise new safety and privacy concern. Some
of the security and privacy concerns are legitimist and need immediate overlook while taking
care of the innovation, economic growth, consumer choice, entrepreneurialism and price growth.
In this paper, thread is categorized by mainly seven section as identification, Localization and
tracking, Profiling, Privacy-violating interaction and presentation, lifestyle transitions, inventory
attack and linkage to focus on the overlap and dependencies among different challenges (Lee et
al., 2015). Identification signifies the challenges associate with an identifier and the threats of
specific privacy violation context. This privacy concerns are most dominant because it involves
risk of tracking and profiling of individuals. In the information processing phase at the backend,
the information are stored in a resolute place which is situates outside of subject’s control. The
collection and interaction phase is also become the aspect of concern that may impact over the
interconnection identification and thread and evolving technologies. Tracking and localization is
also one of the dominant challenge associate with IOT. This thread implies the possibility of
compromise and record individual’s location through space and time (Gaur et al., 2015).
Tracking is not a new kind of thread as many individuals are already affected through GPS
stalking. However tracking and localization is a vital functionality of IOT. Though it does not
concern with direct compromising of information but IOT technologies will not only support the
IoT Security and Privacy Regime - Understanding the Challenges and Solutions_3
4
IOT SECURITY AND PRIVACY REGIME
development of Location Based System and improve their accuracy but also expand those
services to indoor environments e.g. for smart retail. The impact of the evolving feature in IOT
effects the explosion of data source (Baccelli et al., 2014). Profiling signifies the challenges of
compiling information associate with certain individuals in order to gather welfares by
association with other profiles and data. In IOT profiling methods are usually used for
personalization of e-commerce in advertisement, newsletters and recommender system. Profiling
challenges for privacy including data perturbation, anonymization, client-side personalization
and encrypted information (Farooq et al., 2015). Another most occurred problem is privacy
violating interaction where the private information can be compromised through a public
medium. Applications of IOT such as transportation, envision, healthcare and smart retail needs
dense contact with user for efficiency where information is available through smart environment.
However, many third party can observe those mechanism that becomes a highly privacy concern.
Privacy and security can be affected by the smart things from lifecycle transitions. Inventory
attacks are also an emerging challenge associate with the privacy and security concern (Gubbi
et al., 2013). It involves with unauthorized collection of data related to other individual private
things. While linkage associate with the sources reveals (truthful or erroneous) information that
the subject did not disclose to the previously isolated sources.
Structure
This section provides the clear definition of the structure followed in this report. There are
several section of this report for clearly describing the security and privacy regime in IOT. In
every section there is proper heading with suitable subheading to demonstrate the broad about
security and privacy regime associate with IOT. The demonstration of the followed structure is
following-
IoT Security and Privacy Regime - Understanding the Challenges and Solutions_4
5
IOT SECURITY AND PRIVACY REGIME
Executive summary: this section the executive summary is widely described with
specification of the report purpose. This section also describes the broad about the chosen
topic and expected format. In the last part, the problem statements are illustrated.
Literature review: In the next section, the literature review is illustrated associate with the
privacy and security with help of previous report published in the web. The present and
past research associates with the IOT security, are evaluates. This section presents a
broad about the chosen topic with the help of previous research results.
Methodology: Then the methodology section describes the methodologies which are used
in the past and present literatures relevant to the chosen topic.
Next section compromises the methodologies describes in the previous section from
perspective on the efficiency, simplicity, extension into other applications, time saving
when used, cost saving when used, feasibility, connectivity, commercialization issues,
The chosen methodology is illustrate in this section based on various factors with proper
justifications includes tables and graphs.
Conclusion: At last the results are concluded in the conclusion section to support your
justification and argument.
Literature Review:
Introduction
The literature review presents a board about the security and privacy regime associate
with IOT (Abomhara & Køien, 2014). This section will be widely discussing about the
IoT Security and Privacy Regime - Understanding the Challenges and Solutions_5
6
IOT SECURITY AND PRIVACY REGIME
causalities and associate problems of the IOT. Nowadays we are surrounding with the devices,
this devices are now become essential for every day. Successful implementation of IOT
application is associated with many spectsabd needs huge number of consideration. This aspects
are involves technologies which are utilized in daily life for communication, transfer and
receiving purpose. However with emerging technology the security risks are also increasing. The
seamless interaction between human and such devices are gradually increasing (Rehman et al.,
2016). The security concern is also growing as every device is connected with each other for
communicating and various reasons. Attackers take advantage of this situation to compromise
any system for ant desire or particular goal. To ensure the proper implementation of Internet of
things privacy and security aspects are needs to be measured in order to make those devices
effective and efficient. Every device and system must be secured and must provide embedded
security to user and their personal information (Fan et al., 2014). This paper will discuss about
the security issues of different level of IOT system. It also taking considers of current IOT
structure to elaborates and analyze the security concerns and privacy issues of IOT system.
Past and Present Work
In 2013, Jayavardhana et al “Internet of Things (IoT): A vision, architectural elements,
and future directions”. The ubiquitous detection activated by wireless network technologies
(WSN) covers many areas of modern life (Kumar & Patel, 2014). This paper makes it easier to
understand measure and infer the security and privacy. The information of many individual is
surrounding us in form of text and image which are needs to protect in order to provide a secure
platform. The proliferation of these devices in a communication actuation network creates
Internet of Things (IoT), the actuators and sensors compete perfectly with each other and the
surrounding we are living in (Roman, Zhou & Lopez, 2013). that also develop common
IoT Security and Privacy Regime - Understanding the Challenges and Solutions_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IoT Security and Privacy Regime/Challenges in All Domains of IoT
|6
|6888
|416

Internet of Things Security and Privacy
|16
|4358
|255

IoT Security and Privacy - PDF
|9
|2288
|224

Internet of Things Assignment PDF
|35
|8516
|1832

The Main Concept of loT is Wireless Sensor Networks
|8
|1673
|42

Analyzing The Security Challenges of IoT Devices
|12
|4267
|74