Internet of Things: Security and Privacy
VerifiedAdded on 2020/03/04
|47
|11521
|119
AI Summary
This assignment delves into the crucial issues surrounding security and privacy within the Internet of Things (IoT). It examines the various challenges posed by interconnected devices, analyzes existing solutions and proposes potential future directions for ensuring a secure and private IoT ecosystem. The analysis draws upon relevant research papers and academic literature to provide a comprehensive understanding of this evolving field.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: PRIVACY AND SECURITY ISSUES IN IOT
Privacy and Security issues in IoT: A Systematic literature review
Name of the Student:
Name of the University:
Author note:
Privacy and Security issues in IoT: A Systematic literature review
Name of the Student:
Name of the University:
Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1PRIVACY AND SECURITY ISSUES IN IOT
Abstract
The use internet of things though is expected to be potential, major concern is the major invasion
for the privacy and security. The report is a systematic review of literature for security and
privacy preserving solutions, extracted from the media and literature. The same is expected to be
motivating to develop solution of the security and privacy, by the end users. The assumption’s
validity has to be proved, as it could not be assumed simply that the end users would have the
consistent will to the solutions engagement. This topic can also be a potential source for the
future research.
Abstract
The use internet of things though is expected to be potential, major concern is the major invasion
for the privacy and security. The report is a systematic review of literature for security and
privacy preserving solutions, extracted from the media and literature. The same is expected to be
motivating to develop solution of the security and privacy, by the end users. The assumption’s
validity has to be proved, as it could not be assumed simply that the end users would have the
consistent will to the solutions engagement. This topic can also be a potential source for the
future research.
2PRIVACY AND SECURITY ISSUES IN IOT
Acknowledgement
Conducting the research study enhances me to improve my knowledge as well as analytical
ability. It gave me the chance to face challenges all the while and conquer them. It will not be
possible to conduct the research without the significant direction of my professors, companions
and every one of who have added to this advancing knowledge. I also want to thank my
supervisor __________ for helping me in my research work as well as give their full support
during the research process. I would also thank all the participants within this study for giving
their time and helping me out. From the support of people, I am inspired to work on the research
in this subject area. Finally, thank you to my family members those help me and encourage me.
Thank You.
Acknowledgement
Conducting the research study enhances me to improve my knowledge as well as analytical
ability. It gave me the chance to face challenges all the while and conquer them. It will not be
possible to conduct the research without the significant direction of my professors, companions
and every one of who have added to this advancing knowledge. I also want to thank my
supervisor __________ for helping me in my research work as well as give their full support
during the research process. I would also thank all the participants within this study for giving
their time and helping me out. From the support of people, I am inspired to work on the research
in this subject area. Finally, thank you to my family members those help me and encourage me.
Thank You.
3PRIVACY AND SECURITY ISSUES IN IOT
Table of Contents
Chapter 1: Introduction........................................................................................................7
1.1 Background of the study............................................................................................7
1.2 Research Aims and Objectives..................................................................................8
1.2.1 Aims of the study....................................................................................................8
1.2.2 Objectives of the study...........................................................................................8
1.3 Research Questions....................................................................................................8
1.4 Problem Statement.....................................................................................................9
1.5 Rationale of the study................................................................................................9
1.6 Structure of the study...............................................................................................10
1.7 Related works..........................................................................................................11
Figure 1: Security and privacy in IOT.......................................................................13
Chapter 2: Research Methodology....................................................................................15
2.1 Preface.....................................................................................................................15
2.2 The process of methodology....................................................................................15
2.2.1 Planning the review..............................................................................................15
2.2.2 Reviewing objectives as well as research questions.............................................15
2.3 Search sources.........................................................................................................16
2.4 Search strategy.........................................................................................................17
2.5 Inclusion and exclusion criteria...............................................................................18
2.6 Conducting the review.............................................................................................19
2.7 Methodological quality assessment.........................................................................19
2.8 Ethical considerations..............................................................................................20
2.9 Time horizons..........................................................................................................20
2.10 Summary................................................................................................................20
Table of Contents
Chapter 1: Introduction........................................................................................................7
1.1 Background of the study............................................................................................7
1.2 Research Aims and Objectives..................................................................................8
1.2.1 Aims of the study....................................................................................................8
1.2.2 Objectives of the study...........................................................................................8
1.3 Research Questions....................................................................................................8
1.4 Problem Statement.....................................................................................................9
1.5 Rationale of the study................................................................................................9
1.6 Structure of the study...............................................................................................10
1.7 Related works..........................................................................................................11
Figure 1: Security and privacy in IOT.......................................................................13
Chapter 2: Research Methodology....................................................................................15
2.1 Preface.....................................................................................................................15
2.2 The process of methodology....................................................................................15
2.2.1 Planning the review..............................................................................................15
2.2.2 Reviewing objectives as well as research questions.............................................15
2.3 Search sources.........................................................................................................16
2.4 Search strategy.........................................................................................................17
2.5 Inclusion and exclusion criteria...............................................................................18
2.6 Conducting the review.............................................................................................19
2.7 Methodological quality assessment.........................................................................19
2.8 Ethical considerations..............................................................................................20
2.9 Time horizons..........................................................................................................20
2.10 Summary................................................................................................................20
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4PRIVACY AND SECURITY ISSUES IN IOT
Chapter 3: Findings and analysis.......................................................................................21
3.1 Preface.....................................................................................................................21
3.2 Qualitative analysis..................................................................................................21
Figure 3: Use of IOT..................................................................................................22
Figure 2: Barriers in IOT...........................................................................................25
Figure 4: Trends of IOT security...............................................................................28
Figure 5: IOT security challenges..............................................................................34
3.3 Summary..................................................................................................................36
Chapter 4: Conclusion and recommendations...................................................................38
4.1 Conclusion...............................................................................................................38
4.2 Linking with objective.............................................................................................38
4.3 Recommendations....................................................................................................39
4.4 Limitation and future scope.....................................................................................41
References......................................................................................................................42
Appendix........................................................................................................................48
Table 1: Gantt chart...................................................................................................48
Chapter 3: Findings and analysis.......................................................................................21
3.1 Preface.....................................................................................................................21
3.2 Qualitative analysis..................................................................................................21
Figure 3: Use of IOT..................................................................................................22
Figure 2: Barriers in IOT...........................................................................................25
Figure 4: Trends of IOT security...............................................................................28
Figure 5: IOT security challenges..............................................................................34
3.3 Summary..................................................................................................................36
Chapter 4: Conclusion and recommendations...................................................................38
4.1 Conclusion...............................................................................................................38
4.2 Linking with objective.............................................................................................38
4.3 Recommendations....................................................................................................39
4.4 Limitation and future scope.....................................................................................41
References......................................................................................................................42
Appendix........................................................................................................................48
Table 1: Gantt chart...................................................................................................48
5PRIVACY AND SECURITY ISSUES IN IOT
List of table and figures
Figure 1: Security and privacy in IOT...........................................................................................13
Figure 2: Barriers in IOT...............................................................................................................16
Figure 3: Use of IOT......................................................................................................................28
Figure 4: Trends of IOT security...................................................................................................31
Figure 5: IOT security challenges..................................................................................................34
Table 1: Gantt chart.......................................................................................................................48
List of table and figures
Figure 1: Security and privacy in IOT...........................................................................................13
Figure 2: Barriers in IOT...............................................................................................................16
Figure 3: Use of IOT......................................................................................................................28
Figure 4: Trends of IOT security...................................................................................................31
Figure 5: IOT security challenges..................................................................................................34
Table 1: Gantt chart.......................................................................................................................48
6PRIVACY AND SECURITY ISSUES IN IOT
Chapter 1: Introduction
1.1 Background of the study
Use of internet of things becomes an integral part of daily life. The forces driving it as
well as the advantages motivating it are increasingly numerous as a large number of
organization, industries as well as technologies catch the IoT big. An IoT Day – Smart home gets
ready by itself, for supporting the daily routine of the IoT user (Sicari et al. 2015). The alarm
gets activated and locking of the door by the Smartphone (Arias et al. 2015). Milk would be
added in the list, by the refrigerator to the regular list of the store shopping, for the parcels to get
ready to be picked, while on the way from the work to the home. The car is driven by itself, with
the help of numerous sensors embedded. It automatically directs itself to the spot of parking,
detected by it from the applications networked by the notifications received from the parking bay
sensors of the city.pri
However, all advantages of internet of things have brought huge risks of privacy loss as
well as security issues (Da Xu et al. 2014). The basic security weakness of internet of things is
increasing as the number of devices staying behind the firewall of network. As there are a large
number of devices attached with the process, there might be chances for hacking. On the other
hand, as internet of things applications usually collects huge number of data, data retrieval as
well as processing is integral part of entire IoT environment. In this case, most of the data is
personal as well as requires to be protected with the help of the encryption.
Chapter 1: Introduction
1.1 Background of the study
Use of internet of things becomes an integral part of daily life. The forces driving it as
well as the advantages motivating it are increasingly numerous as a large number of
organization, industries as well as technologies catch the IoT big. An IoT Day – Smart home gets
ready by itself, for supporting the daily routine of the IoT user (Sicari et al. 2015). The alarm
gets activated and locking of the door by the Smartphone (Arias et al. 2015). Milk would be
added in the list, by the refrigerator to the regular list of the store shopping, for the parcels to get
ready to be picked, while on the way from the work to the home. The car is driven by itself, with
the help of numerous sensors embedded. It automatically directs itself to the spot of parking,
detected by it from the applications networked by the notifications received from the parking bay
sensors of the city.pri
However, all advantages of internet of things have brought huge risks of privacy loss as
well as security issues (Da Xu et al. 2014). The basic security weakness of internet of things is
increasing as the number of devices staying behind the firewall of network. As there are a large
number of devices attached with the process, there might be chances for hacking. On the other
hand, as internet of things applications usually collects huge number of data, data retrieval as
well as processing is integral part of entire IoT environment. In this case, most of the data is
personal as well as requires to be protected with the help of the encryption.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7PRIVACY AND SECURITY ISSUES IN IOT
1.2 Research Aims and Objectives
1.2.1 Aims of the study
The research has aims to identify the privacy as well as security issues involved with the
use of internet of things. In order to address the issues, factors and challenge to minimize the
issues are achieved in the present research. The IoT day is going to make the dreamful days to be
materialized in the very near future. The research paper and report contributes the privacy related
research of an existing IoT as an overview, for identifying the focusing areas and highlighting
the areas, demanding higher priority of attention.
1.2.2 Objectives of the study
The objectives of the research can be explained as followed.
To find out the privacy as well as security issues included in the use of internet of
things
To identify and evaluate the factors responsible for creating privacy as well as
security issues involved with internet of things
To address the challenges faced while minimizing the issues in IoT
To recommend solutions for overcoming the challenges in IoT
1.3 Research Questions
The research questions can be listed as followed.
What are the privacy and security issues involved with applications of internet of
things?
What are the factors create privacy and security issues in internet of things?
What are the challenges faced while removing the security issues in IoT?
1.2 Research Aims and Objectives
1.2.1 Aims of the study
The research has aims to identify the privacy as well as security issues involved with the
use of internet of things. In order to address the issues, factors and challenge to minimize the
issues are achieved in the present research. The IoT day is going to make the dreamful days to be
materialized in the very near future. The research paper and report contributes the privacy related
research of an existing IoT as an overview, for identifying the focusing areas and highlighting
the areas, demanding higher priority of attention.
1.2.2 Objectives of the study
The objectives of the research can be explained as followed.
To find out the privacy as well as security issues included in the use of internet of
things
To identify and evaluate the factors responsible for creating privacy as well as
security issues involved with internet of things
To address the challenges faced while minimizing the issues in IoT
To recommend solutions for overcoming the challenges in IoT
1.3 Research Questions
The research questions can be listed as followed.
What are the privacy and security issues involved with applications of internet of
things?
What are the factors create privacy and security issues in internet of things?
What are the challenges faced while removing the security issues in IoT?
8PRIVACY AND SECURITY ISSUES IN IOT
How the security and privacy issues can be resolved?
1.4 Problem Statement
The IoT would sure make the typical life to be more convenient with less effort or even
effortless. However, the other dimension shows the data collection invisibility and other
concerns of processes of sharing and usage (Roman et al. 2013). The security and privacy of the
end user, ofIoT can easily be targeted. However, it is an undeniable fact that the personal
information has to be accessed by the service providers, towards the objective of tailored service
delivery. At the same time, the end user of the IoT expects to be enough secured, by protecting
their private information from any unauthorized access and prevented to be shared to the third
parties.
1.5 Rationale of the study
The new wave of connectivity is becoming applied beyond laptops as well as smart
phones. The innovation is going towards connected cars, connected wearable devices, smart
homes as well as connected healthcare. As per the report published by Gartner in 2020, the
connected devices across the technologies, it will reach up to 20.6 billion (Sadeghi et al. 2015).
The devices will bridge the gap between physical as well as digital world in order to enhance
quality as well as productivity of lie, society as well as industries. In addition, IoT catching up
Smart homes are usually considered as the most awaited implementations with brands already
getting into the competition with the smart appliances. However, the issues lie in the nature of
IoT itself. In addition, it is related to the remote gadgets and frameworks and gives an
information stream amongst gadgets and decentralized administration frameworks. The
information or even the gadgets will be joined into existing authoritative procedures to give data
How the security and privacy issues can be resolved?
1.4 Problem Statement
The IoT would sure make the typical life to be more convenient with less effort or even
effortless. However, the other dimension shows the data collection invisibility and other
concerns of processes of sharing and usage (Roman et al. 2013). The security and privacy of the
end user, ofIoT can easily be targeted. However, it is an undeniable fact that the personal
information has to be accessed by the service providers, towards the objective of tailored service
delivery. At the same time, the end user of the IoT expects to be enough secured, by protecting
their private information from any unauthorized access and prevented to be shared to the third
parties.
1.5 Rationale of the study
The new wave of connectivity is becoming applied beyond laptops as well as smart
phones. The innovation is going towards connected cars, connected wearable devices, smart
homes as well as connected healthcare. As per the report published by Gartner in 2020, the
connected devices across the technologies, it will reach up to 20.6 billion (Sadeghi et al. 2015).
The devices will bridge the gap between physical as well as digital world in order to enhance
quality as well as productivity of lie, society as well as industries. In addition, IoT catching up
Smart homes are usually considered as the most awaited implementations with brands already
getting into the competition with the smart appliances. However, the issues lie in the nature of
IoT itself. In addition, it is related to the remote gadgets and frameworks and gives an
information stream amongst gadgets and decentralized administration frameworks. The
information or even the gadgets will be joined into existing authoritative procedures to give data
9PRIVACY AND SECURITY ISSUES IN IOT
on the area, status, movement and usefulness of those frameworks, and data about the general
population who possess and work them.
The amount as well as type of data contrasts compared to distinctive arrangements of
enormous information originates from the social networking (Jing et al. 2014). It tends to touch
the base as making constant flow as well as unfaltering pace. Specifically, it has been explore
and analysed that most of the providers of the solutions assumed that the there would be effort of
preserving the privacy and enhancing the security, by the end users. However, it can land in
clumps such as test logs effectively processed as well as passed on straight away. In addition, it
generally comes in large quantities and accumulates fast.
The technology addressing the enormous information challenge as exist, as Hadoop or
NoSQL, providing flat versatility, high limit as well as parallel preparing at costs. It makes them
moderate along with practical (Thierer 2015). For the occasion, IT departments in undertakings
have not needed to manage IoT information like remarkable dataset in own particular right. The
basic arrangements of making up IoT information that are touching base in the capacity layer
similarly other unstructured information does. The result is traditional storage architecture as
well as management software treating IoT information as an indistinguishable path from them
treats other unstructured information. Thus, it is important to research on security as well as
privacy issues included in internet of things.
1.6 Structure of the study
The research includes five chapters like introduction, research methodology, findings and
analysis as well as conclusion and recommendations. Introduction chapter consists of research
aims and objectives, rationale, background and problem statement. Research methodology
on the area, status, movement and usefulness of those frameworks, and data about the general
population who possess and work them.
The amount as well as type of data contrasts compared to distinctive arrangements of
enormous information originates from the social networking (Jing et al. 2014). It tends to touch
the base as making constant flow as well as unfaltering pace. Specifically, it has been explore
and analysed that most of the providers of the solutions assumed that the there would be effort of
preserving the privacy and enhancing the security, by the end users. However, it can land in
clumps such as test logs effectively processed as well as passed on straight away. In addition, it
generally comes in large quantities and accumulates fast.
The technology addressing the enormous information challenge as exist, as Hadoop or
NoSQL, providing flat versatility, high limit as well as parallel preparing at costs. It makes them
moderate along with practical (Thierer 2015). For the occasion, IT departments in undertakings
have not needed to manage IoT information like remarkable dataset in own particular right. The
basic arrangements of making up IoT information that are touching base in the capacity layer
similarly other unstructured information does. The result is traditional storage architecture as
well as management software treating IoT information as an indistinguishable path from them
treats other unstructured information. Thus, it is important to research on security as well as
privacy issues included in internet of things.
1.6 Structure of the study
The research includes five chapters like introduction, research methodology, findings and
analysis as well as conclusion and recommendations. Introduction chapter consists of research
aims and objectives, rationale, background and problem statement. Research methodology
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10PRIVACY AND SECURITY ISSUES IN IOT
consists of the process of doing systematic literature review. Third chapter of the research
describes findings and analysis. Last chapter ends with conclusion and recommendations.
Proposed solution has been analyzed the deployed techniques and the extent of satisfying the
core principles of privacy. It has been found and analysed there are only very few solutions that
could satisfy all the core principles of the privacy and security. Several gaps of key knowledge
are also identified during the course of analysis
1.7 Related works
There are several related works taken place regarding internet of things that includes
definition, principle and its applications. The basic and tempting Internet of Things term got
coined by in Procter &Gamble, by Kevin Ashuthon, in the year 1999 (Whitmore et al. 2015). It
described the information service architecture, based on the internet. Usually, the IoT term refers
to the objects that are enabled by the internet and interact among them and cooperate for
numerous and specific goals to be achieved.
The term and so the technology claims to improve the lives of the people. Taking an
example, a simple tool can be used for the measurement of the body temperature and heart rate
and also communicate with the system of energy management, so that the temperature within the
room adjusted itself, according to the physiological status of the individual. Similarly, there can
be numerous tools smartly activated for surveillance cameras monitoring, smart streetlights and
controls the lights in the traffic. The information collected would be shared among numerous
stakeholders towards business intelligence and its improvement. Peppet (2014) stated that
internet of things is connecting more number of devices every day. The development carries
various advantages as it would change the method carry out tasks as well as potentially transform
the whole entire word. On contrary, with rapid development of IoT, security and privacy issues
consists of the process of doing systematic literature review. Third chapter of the research
describes findings and analysis. Last chapter ends with conclusion and recommendations.
Proposed solution has been analyzed the deployed techniques and the extent of satisfying the
core principles of privacy. It has been found and analysed there are only very few solutions that
could satisfy all the core principles of the privacy and security. Several gaps of key knowledge
are also identified during the course of analysis
1.7 Related works
There are several related works taken place regarding internet of things that includes
definition, principle and its applications. The basic and tempting Internet of Things term got
coined by in Procter &Gamble, by Kevin Ashuthon, in the year 1999 (Whitmore et al. 2015). It
described the information service architecture, based on the internet. Usually, the IoT term refers
to the objects that are enabled by the internet and interact among them and cooperate for
numerous and specific goals to be achieved.
The term and so the technology claims to improve the lives of the people. Taking an
example, a simple tool can be used for the measurement of the body temperature and heart rate
and also communicate with the system of energy management, so that the temperature within the
room adjusted itself, according to the physiological status of the individual. Similarly, there can
be numerous tools smartly activated for surveillance cameras monitoring, smart streetlights and
controls the lights in the traffic. The information collected would be shared among numerous
stakeholders towards business intelligence and its improvement. Peppet (2014) stated that
internet of things is connecting more number of devices every day. The development carries
various advantages as it would change the method carry out tasks as well as potentially transform
the whole entire word. On contrary, with rapid development of IoT, security and privacy issues
11PRIVACY AND SECURITY ISSUES IN IOT
become integral part of IoT applications. Present chapter deals with reviewing literature from
various sources like articles, journals and websites. Literatures related to internet of things, its
usage, advantages and limitations are explained. Moreover, principles of privacy and security
issues related to internet of things are explained in the present chapter.
Kumar and Patel (2014) mentioned that privacy can be defined as ‘an umbrella term that
refers to a disparate and wide related things’ group. Headlines are made from various breaches of
security and privacy, during the recent years, such as exposing of the hundreds of private lives of
consumers, by the unsecured webcams. Report of Hewlett Packard indicates that about 80% of
IoT devices have raised the concern of security and privacy.
Privacy is defined by Privacy International, as multidimensional concept, relating to the
four different elements, like as followed.
1. Information: The privacy of information is related to the personal data, collecting
and processing by one of the organizations, like credit card and medical record information.
2. Body: The focus of the bodily privacy is one the physical protection of the people,
against any possible harm from external sources.
3. Territory: Territorial privacy has the focus on the establishment of the limits or
boundaries over the property or physical space, like workplace, home and public places.
4. Communications: Communication privacy has the focus on the information
protection, carrying through any media, in between two different parties, among the three
different media, mail, email and telephone.
become integral part of IoT applications. Present chapter deals with reviewing literature from
various sources like articles, journals and websites. Literatures related to internet of things, its
usage, advantages and limitations are explained. Moreover, principles of privacy and security
issues related to internet of things are explained in the present chapter.
Kumar and Patel (2014) mentioned that privacy can be defined as ‘an umbrella term that
refers to a disparate and wide related things’ group. Headlines are made from various breaches of
security and privacy, during the recent years, such as exposing of the hundreds of private lives of
consumers, by the unsecured webcams. Report of Hewlett Packard indicates that about 80% of
IoT devices have raised the concern of security and privacy.
Privacy is defined by Privacy International, as multidimensional concept, relating to the
four different elements, like as followed.
1. Information: The privacy of information is related to the personal data, collecting
and processing by one of the organizations, like credit card and medical record information.
2. Body: The focus of the bodily privacy is one the physical protection of the people,
against any possible harm from external sources.
3. Territory: Territorial privacy has the focus on the establishment of the limits or
boundaries over the property or physical space, like workplace, home and public places.
4. Communications: Communication privacy has the focus on the information
protection, carrying through any media, in between two different parties, among the three
different media, mail, email and telephone.
12PRIVACY AND SECURITY ISSUES IN IOT
According to Westin, privacy of someone is something that is owned of the right for
controlling, the collection of personal information, regarding the same person, to be known the
others (Want et al. 2015). Concerns of privacy have been emerged, since the technology makes
the concern trivial for the people and organizations, towards digital files maintenance,
comprehending. The concern of the people is on various aspects, like what kind of data would be
collected, who accesses that data, how and controls that data and what the purpose of this data is.
Various studies can be carried out by Westin, regarding perceptions about security and privacy
from 1978 to 2004 and the ‘Privacy Index’ has been created by him.
Figure 1: Security and privacy in IOT
(Source: Ziegeldorf et al. 2014 p.624)
According to Westin, people are categorized into one of three categories,
1. Pragmatist: Pragmatist concern about the returns and they are interested to share
their personal information, only to the service providers, who are enough trusted.
According to Westin, privacy of someone is something that is owned of the right for
controlling, the collection of personal information, regarding the same person, to be known the
others (Want et al. 2015). Concerns of privacy have been emerged, since the technology makes
the concern trivial for the people and organizations, towards digital files maintenance,
comprehending. The concern of the people is on various aspects, like what kind of data would be
collected, who accesses that data, how and controls that data and what the purpose of this data is.
Various studies can be carried out by Westin, regarding perceptions about security and privacy
from 1978 to 2004 and the ‘Privacy Index’ has been created by him.
Figure 1: Security and privacy in IOT
(Source: Ziegeldorf et al. 2014 p.624)
According to Westin, people are categorized into one of three categories,
1. Pragmatist: Pragmatist concern about the returns and they are interested to share
their personal information, only to the service providers, who are enough trusted.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13PRIVACY AND SECURITY ISSUES IN IOT
2. Fundamentalist: Fundamentalists have serious concern about the information
collected and their accuracy and also on the uses made from the information (Skarmeta et al.
2014). Generally, they are favorable to the supporting privacy and security laws and frameworks
of privacy protection.
3. Unconcerned: Unconcerned people have no concerns of the security and privacy
and they trust the service providers and organizations, which collect the information of them and
trust that they are not abused (Ziegeldorf et al. 2014). The number of unconcerned people has
been decreasing, from last few years. It can be because of the increased awareness of technology
and various ways of preserving the privacy of them.
On the other hand, there are total 11 principles identified by OECD and ISO, from the
laws and regulations of privacy, according to the international guidelines that are defined for
providing the security and privacy. These 11 principles are further extended to 20 principles
(Botta et al. 2014). Their argument is to consider these principles as new services and new
products get developed. Certain principles are applicable, specifically to the Internet of Things,
like “Consent and Choice” and “Right to secrecy and confidentiality of communications” and
many more.
2. Fundamentalist: Fundamentalists have serious concern about the information
collected and their accuracy and also on the uses made from the information (Skarmeta et al.
2014). Generally, they are favorable to the supporting privacy and security laws and frameworks
of privacy protection.
3. Unconcerned: Unconcerned people have no concerns of the security and privacy
and they trust the service providers and organizations, which collect the information of them and
trust that they are not abused (Ziegeldorf et al. 2014). The number of unconcerned people has
been decreasing, from last few years. It can be because of the increased awareness of technology
and various ways of preserving the privacy of them.
On the other hand, there are total 11 principles identified by OECD and ISO, from the
laws and regulations of privacy, according to the international guidelines that are defined for
providing the security and privacy. These 11 principles are further extended to 20 principles
(Botta et al. 2014). Their argument is to consider these principles as new services and new
products get developed. Certain principles are applicable, specifically to the Internet of Things,
like “Consent and Choice” and “Right to secrecy and confidentiality of communications” and
many more.
14PRIVACY AND SECURITY ISSUES IN IOT
Chapter 2: Research Methodology
2.1 Preface
Mackey and Gass (2015) stated that research methodology helps defining the most
suitable and proper approach that is required to adopt for attaining complete as well as detail
outcomes of the procedure. The theories and concepts are adopted in methodology of research
assists to have in depth analysis of research topic. The limits of the security and privacy that are
violated, potentially, by the IoT, are assessed through quantitative systematic literature review.
As per Pickering and Byrne (2016), this method is benefits, when compared to the narrative
style. The method can identify the areas that are covered through the research existing and helps
for gaps revealing. The method helped to approach and explores the literature, reviewed from
various prospective and delivery of varied insights is facilitated.
2.2 The process of methodology
In present research, major steps of systematic review such as planning, conducting as well as
reviewing of the results from the research is discussed.
2.2.1 Planning the review
The review has been planned through proposing the research questions related the
research objectives. Search strategy has been defined along with search string and inclusion or
exclusion criteria.
2.2.2 Reviewing objectives as well as research questions
Increased utilization of internet of things among individuals and organization is
considered as the most important for having several advantages. As defined by Trappe et al.
Chapter 2: Research Methodology
2.1 Preface
Mackey and Gass (2015) stated that research methodology helps defining the most
suitable and proper approach that is required to adopt for attaining complete as well as detail
outcomes of the procedure. The theories and concepts are adopted in methodology of research
assists to have in depth analysis of research topic. The limits of the security and privacy that are
violated, potentially, by the IoT, are assessed through quantitative systematic literature review.
As per Pickering and Byrne (2016), this method is benefits, when compared to the narrative
style. The method can identify the areas that are covered through the research existing and helps
for gaps revealing. The method helped to approach and explores the literature, reviewed from
various prospective and delivery of varied insights is facilitated.
2.2 The process of methodology
In present research, major steps of systematic review such as planning, conducting as well as
reviewing of the results from the research is discussed.
2.2.1 Planning the review
The review has been planned through proposing the research questions related the
research objectives. Search strategy has been defined along with search string and inclusion or
exclusion criteria.
2.2.2 Reviewing objectives as well as research questions
Increased utilization of internet of things among individuals and organization is
considered as the most important for having several advantages. As defined by Trappe et al.
15PRIVACY AND SECURITY ISSUES IN IOT
2015), use of internet of things provides several applications that makes life easier and tasks to
be completed effortlessly. However, security issues are involved with the use of internet of
things.
2.3 Search sources
Electronic databases Google Scholar, IEEE explore, Research Gate, ProQuest, Science Direct
and SCOPUS
Searched items Journal, conference and workshop
Search applied on Full text in order to avoid missing of papers not including the search
keywords in the titles
Language publication
period
English
(2013- Present)
Choosing the Database
Various academic journals have published the papers and accessed from the electronic
databases that include Web of Science, Google Scholar, Research Gate, ProQuest, Science Direct
and SCOPUS.
Choosing the Keywords
The important keywords considered for the systematic literature review are, ‘IoT,
‘Internet of Things’, various terms combination, like ‘trust’, ‘privacy’, ‘security’, ‘data’, ‘user’,
‘preserving’, ‘private’, ‘trust, ‘data’, ‘individual’, etc.
Choosing the Range of Time
The systematic literature review search is taken from the published papers, from 2009 to
2016.
2015), use of internet of things provides several applications that makes life easier and tasks to
be completed effortlessly. However, security issues are involved with the use of internet of
things.
2.3 Search sources
Electronic databases Google Scholar, IEEE explore, Research Gate, ProQuest, Science Direct
and SCOPUS
Searched items Journal, conference and workshop
Search applied on Full text in order to avoid missing of papers not including the search
keywords in the titles
Language publication
period
English
(2013- Present)
Choosing the Database
Various academic journals have published the papers and accessed from the electronic
databases that include Web of Science, Google Scholar, Research Gate, ProQuest, Science Direct
and SCOPUS.
Choosing the Keywords
The important keywords considered for the systematic literature review are, ‘IoT,
‘Internet of Things’, various terms combination, like ‘trust’, ‘privacy’, ‘security’, ‘data’, ‘user’,
‘preserving’, ‘private’, ‘trust, ‘data’, ‘individual’, etc.
Choosing the Range of Time
The systematic literature review search is taken from the published papers, from 2009 to
2016.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16PRIVACY AND SECURITY ISSUES IN IOT
RQ1: What are the privacy and security issues involved with applications of
internet of things?
RQ2: What are the factors create privacy and security issues in internet of things?
RQ3: What are the challenges faced while removing the security issues in IoT?
RQ4: How the security and privacy issues can be resolved?
2.4 Search strategy
The study by Trappe et al. (2015) has been used as guideline in order to carry out the research.
After giving the definition, the goals as well as questions of the research has been carried out.
After defining the research goals as well as questions, formulation of formal search strategy has
been generated. The study was initially retrieved from electronic devices as well as printed
proceedings. It has been achieved in order to detect different meaningful studies by reference
searches. In addition, it is important to develop supplementary strategy in order to add potential
works.
Choosing the Criteria of Exclusion
The review search is conducted within academic papers, published in English. The search
continued with additional research papers, like searching for the privacy reports and news
stories, towards accommodating the perspectives of violation of personal security and privacy.
1. Searching & Recording:
The information of authors is recorded in the format of author or authors, publication
year, name of the journal, country are mentioned for the each of the paper collected for review
(Brinkmann2014). Categorization of each paper is done, according to the used methods and the
kind of analysis, like qualitative, quantitative or mixed analysis.
RQ1: What are the privacy and security issues involved with applications of
internet of things?
RQ2: What are the factors create privacy and security issues in internet of things?
RQ3: What are the challenges faced while removing the security issues in IoT?
RQ4: How the security and privacy issues can be resolved?
2.4 Search strategy
The study by Trappe et al. (2015) has been used as guideline in order to carry out the research.
After giving the definition, the goals as well as questions of the research has been carried out.
After defining the research goals as well as questions, formulation of formal search strategy has
been generated. The study was initially retrieved from electronic devices as well as printed
proceedings. It has been achieved in order to detect different meaningful studies by reference
searches. In addition, it is important to develop supplementary strategy in order to add potential
works.
Choosing the Criteria of Exclusion
The review search is conducted within academic papers, published in English. The search
continued with additional research papers, like searching for the privacy reports and news
stories, towards accommodating the perspectives of violation of personal security and privacy.
1. Searching & Recording:
The information of authors is recorded in the format of author or authors, publication
year, name of the journal, country are mentioned for the each of the paper collected for review
(Brinkmann2014). Categorization of each paper is done, according to the used methods and the
kind of analysis, like qualitative, quantitative or mixed analysis.
17PRIVACY AND SECURITY ISSUES IN IOT
The remaining criteria would be related to the topic of the research, ‘security and privacy
issues in IoT’ and it categorizes the area of application, as automation of home, smart
manufacturing, automotive, smart cities, health care, wearable devices and the kind of used
technology, like nano, sensor, RFID or embedded technology that is enough intelligent. Also
recorded are the protection of security and privacy, violations, threats and perceptions associated
with each of the technology. Categorization of the perceptions is done according to the three
categories of Westin, Pragmatic, Fundamentalist and Unconcerned.
2. Pattern Identification:
The uncovering of the pattern is done based on the analysis carried out, towards
identification of the gaps, foci and suggests recommendations for research in the future.
2.5 Inclusion and exclusion criteria
In order to determine study that needs to include inclusion as well as exclusion criteria
that is used in the research.
Inclusion criteria: In the study, there is peer-reviewed papers publication and English
language written journal have been selected for research. In addition, it is related to the search
terms. On the other hand, the study is an empirical research paper and experience report. On the
other hand, the study that has been published after 2013 has been selected as secondary source
and doing systematic literature review.
Exclusion criteria: The studies not focusing explicitly on privacy as well as security
issues in internet of things. The studies do not meeting the inclusion criteria as well as opinion,
keynote and editorials, viewpoints, comments as well as tutorials along with anecdote papers
along with presentations in the slide formats without having any related studies.
The remaining criteria would be related to the topic of the research, ‘security and privacy
issues in IoT’ and it categorizes the area of application, as automation of home, smart
manufacturing, automotive, smart cities, health care, wearable devices and the kind of used
technology, like nano, sensor, RFID or embedded technology that is enough intelligent. Also
recorded are the protection of security and privacy, violations, threats and perceptions associated
with each of the technology. Categorization of the perceptions is done according to the three
categories of Westin, Pragmatic, Fundamentalist and Unconcerned.
2. Pattern Identification:
The uncovering of the pattern is done based on the analysis carried out, towards
identification of the gaps, foci and suggests recommendations for research in the future.
2.5 Inclusion and exclusion criteria
In order to determine study that needs to include inclusion as well as exclusion criteria
that is used in the research.
Inclusion criteria: In the study, there is peer-reviewed papers publication and English
language written journal have been selected for research. In addition, it is related to the search
terms. On the other hand, the study is an empirical research paper and experience report. On the
other hand, the study that has been published after 2013 has been selected as secondary source
and doing systematic literature review.
Exclusion criteria: The studies not focusing explicitly on privacy as well as security
issues in internet of things. The studies do not meeting the inclusion criteria as well as opinion,
keynote and editorials, viewpoints, comments as well as tutorials along with anecdote papers
along with presentations in the slide formats without having any related studies.
18PRIVACY AND SECURITY ISSUES IN IOT
2.6 Conducting the review
The present chapter of the research findings of search as well as extraction of the information
from the related sources as well as databases is gathered.
Search as well as selection
Through selected strategy, selected electronic databases have been searched and retried. In
addition, an extensive inspection regarding the title of the study as well as abstracts was
developed by the researcher. It is applied with the inclusion criteria. It results substantial number
of the results. Moreover, in order to review the particular agreements as well as disagreements by
the researcher in the particular study. In this perspective, 110 pre-selected after the procedure of
exclusion criteria. Out of those 20 papers were excluded on the ground.
Data extraction and synthesis
As per the guidelines given by Trappe et al. (2015), data extraction process for identifying
related information from included primary studies the research questions. The data extraction
procedure consists of setting up form to record the ideas, concepts along with findings. After
completion of the extraction process, thematic analysis has been achieved.
2.7 Methodological quality assessment
The systematic review has been utilized for quality criteria in order to assess the methodological
quality. The quality questions provide measure for extent to which the specific study is
satisfactory.
2.6 Conducting the review
The present chapter of the research findings of search as well as extraction of the information
from the related sources as well as databases is gathered.
Search as well as selection
Through selected strategy, selected electronic databases have been searched and retried. In
addition, an extensive inspection regarding the title of the study as well as abstracts was
developed by the researcher. It is applied with the inclusion criteria. It results substantial number
of the results. Moreover, in order to review the particular agreements as well as disagreements by
the researcher in the particular study. In this perspective, 110 pre-selected after the procedure of
exclusion criteria. Out of those 20 papers were excluded on the ground.
Data extraction and synthesis
As per the guidelines given by Trappe et al. (2015), data extraction process for identifying
related information from included primary studies the research questions. The data extraction
procedure consists of setting up form to record the ideas, concepts along with findings. After
completion of the extraction process, thematic analysis has been achieved.
2.7 Methodological quality assessment
The systematic review has been utilized for quality criteria in order to assess the methodological
quality. The quality questions provide measure for extent to which the specific study is
satisfactory.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19PRIVACY AND SECURITY ISSUES IN IOT
2.8 Ethical considerations
During the procedure of research methodology, a researcher requires to follow a code of
conduct, which assists in addressing right and wrong set of approaches needed to adopt at the
time of process (Tuohy et al. 2013). Data are obtained through study of the topic is helpful in
comprehension of present concerns related to privacy and security issues involved with internet
of things applications.
2.9 Time horizons
(Refer to Appendix)
2.10 Summary
In the present chapter of the research, systematic literature review is achieved. It helps
proper way of pursuing the research. In addition, selection of effective research approaches such
as research philosophy, approach and design are selected that would assist to get appropriate
outcome of the research. Forming of timeline would be helpful to continue the research within
allocated time.
2.8 Ethical considerations
During the procedure of research methodology, a researcher requires to follow a code of
conduct, which assists in addressing right and wrong set of approaches needed to adopt at the
time of process (Tuohy et al. 2013). Data are obtained through study of the topic is helpful in
comprehension of present concerns related to privacy and security issues involved with internet
of things applications.
2.9 Time horizons
(Refer to Appendix)
2.10 Summary
In the present chapter of the research, systematic literature review is achieved. It helps
proper way of pursuing the research. In addition, selection of effective research approaches such
as research philosophy, approach and design are selected that would assist to get appropriate
outcome of the research. Forming of timeline would be helpful to continue the research within
allocated time.
20PRIVACY AND SECURITY ISSUES IN IOT
Chapter 3: Findings and analysis
3.1 Preface
In the present section of research, data has been collected from various secondary sources
such as books, journals, articles and websites. After gathering of the data, theme has been formed
in order to make qualitative analysis (Trappe et al. 2015). On the other hand, literatures on the
topic have been selected in order to get opinion regarding privacy and security issues in IoT.
Thematic analysis would be helpful to get appropriate solutions regarding the issue and
according to the outcome, theme are formed and fulfill objectives of the research. In addition,
there are total 90 original research papers identified and conducted the research over the Internet
of Things privacy and security. Presented in this section are characteristics, geographic scope,
threats, methods, user privacy perceptions and solutions.
3.2 Qualitative analysis
Theme 1: Use of Internet of tings in real life
The research papers covered the Internet of Things characteristics assessment that
includes the characteristics, like IoT technologies, areas of application and kinds of protection of
security and privacy. Most of the papers discussed the use for the sensory technology majorly
and also the RFID technology. Other technologies covered are the smart cities, home automation,
health care, manufacturing, wearable and automotive.
An important concern related to the concerns of the users is regarding the secure services,
provided by the technology of the IoT (Cui 2016). The study and review carried out has revealed
the comparison of both the privacy protection and security solutions and the perceptions about
Chapter 3: Findings and analysis
3.1 Preface
In the present section of research, data has been collected from various secondary sources
such as books, journals, articles and websites. After gathering of the data, theme has been formed
in order to make qualitative analysis (Trappe et al. 2015). On the other hand, literatures on the
topic have been selected in order to get opinion regarding privacy and security issues in IoT.
Thematic analysis would be helpful to get appropriate solutions regarding the issue and
according to the outcome, theme are formed and fulfill objectives of the research. In addition,
there are total 90 original research papers identified and conducted the research over the Internet
of Things privacy and security. Presented in this section are characteristics, geographic scope,
threats, methods, user privacy perceptions and solutions.
3.2 Qualitative analysis
Theme 1: Use of Internet of tings in real life
The research papers covered the Internet of Things characteristics assessment that
includes the characteristics, like IoT technologies, areas of application and kinds of protection of
security and privacy. Most of the papers discussed the use for the sensory technology majorly
and also the RFID technology. Other technologies covered are the smart cities, home automation,
health care, manufacturing, wearable and automotive.
An important concern related to the concerns of the users is regarding the secure services,
provided by the technology of the IoT (Cui 2016). The study and review carried out has revealed
the comparison of both the privacy protection and security solutions and the perceptions about
21PRIVACY AND SECURITY ISSUES IN IOT
the IoT, by the individuals. When the security protection levels are considered, it is mentioned in
most of the papers and presented the authentication and techniques of authentication as the
commonly used practices for the securities, adopted in the Internet of Things. However, when
reviewed in other dimension, it is found that the protection mechanism for the privacy and
security are increased, like form the information manipulation, cryptographic techniques, for
context awareness or privacy awareness, for the control of access.
Figure 3: Use of IOT
(Source: Cui 2016 p.113)
Kumar, Vealey and Srivastava (2016) stated that most of the research reviewed is
considered by the lack of security and protection of privacy, as vital and important challenges.
About half of the solutions are for smart products home automation and other from healthcare,
smart cities, automotive and the rest is from manufacturing and wearable. Smart home is one of
the applications where internet of things can be used.
the IoT, by the individuals. When the security protection levels are considered, it is mentioned in
most of the papers and presented the authentication and techniques of authentication as the
commonly used practices for the securities, adopted in the Internet of Things. However, when
reviewed in other dimension, it is found that the protection mechanism for the privacy and
security are increased, like form the information manipulation, cryptographic techniques, for
context awareness or privacy awareness, for the control of access.
Figure 3: Use of IOT
(Source: Cui 2016 p.113)
Kumar, Vealey and Srivastava (2016) stated that most of the research reviewed is
considered by the lack of security and protection of privacy, as vital and important challenges.
About half of the solutions are for smart products home automation and other from healthcare,
smart cities, automotive and the rest is from manufacturing and wearable. Smart home is one of
the applications where internet of things can be used.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
22PRIVACY AND SECURITY ISSUES IN IOT
Recent studies exhibit significant advantages from associated restorative gadgets. One
workshop member said that "a standout amongst the most huge advantages that we have from
this associated world the capacity to attract the patients and draw in them in their own particular
care." Another member portrayed a clinical trial demonstrating that, when diabetic patients
utilized associated glucose screens, and their doctors got that information, those doctors were
five times more prone to modify solutions, bringing about better sickness administration and
generous budgetary reserve funds for patients. Cui (2016) expressed that the clinical trial showed
that diabetic patients utilizing the associated glucose screen diminished their normal glucose
levels by two focuses and that, by examination, the Food and Drug Administration ("FDA")
considers pharmaceuticals that diminish glucose by as meager as one half point to be fruitful. 30
Shoppers can get advantages by the IoT in different ways. It is notwithstanding alarming
mortgage holders if their protection appears to be insufficient contrasted with that of their
neighbors, in this way engaging purchasers to settle on making better choices regarding the
process that they utilize electricity (Clarke et al. 2014). Home mechanization frameworks can
give customers a solitary stage that can interface the greater part of the gadgets inside the home,
a solitary application for controlling them. Associated stoves enable buyers to set temperatures
remotely, go from heat to cook and screen items from different areas inside and outside home.
Sensors known as "water bugs" can tell buyers if their cellars have overflowed and wine
epicureans can screen the temperature in their wine basements to save their finest vintages.
Theme 2: Principles, Threats, Perceptions and Solutions of internet of things
In most of the research papers, the important concern that has been identified is the
increased data collection for the individuals. The concern is especially is done for the threats
imposed to the various individuals and these threats are caused from their personal data analysis
Recent studies exhibit significant advantages from associated restorative gadgets. One
workshop member said that "a standout amongst the most huge advantages that we have from
this associated world the capacity to attract the patients and draw in them in their own particular
care." Another member portrayed a clinical trial demonstrating that, when diabetic patients
utilized associated glucose screens, and their doctors got that information, those doctors were
five times more prone to modify solutions, bringing about better sickness administration and
generous budgetary reserve funds for patients. Cui (2016) expressed that the clinical trial showed
that diabetic patients utilizing the associated glucose screen diminished their normal glucose
levels by two focuses and that, by examination, the Food and Drug Administration ("FDA")
considers pharmaceuticals that diminish glucose by as meager as one half point to be fruitful. 30
Shoppers can get advantages by the IoT in different ways. It is notwithstanding alarming
mortgage holders if their protection appears to be insufficient contrasted with that of their
neighbors, in this way engaging purchasers to settle on making better choices regarding the
process that they utilize electricity (Clarke et al. 2014). Home mechanization frameworks can
give customers a solitary stage that can interface the greater part of the gadgets inside the home,
a solitary application for controlling them. Associated stoves enable buyers to set temperatures
remotely, go from heat to cook and screen items from different areas inside and outside home.
Sensors known as "water bugs" can tell buyers if their cellars have overflowed and wine
epicureans can screen the temperature in their wine basements to save their finest vintages.
Theme 2: Principles, Threats, Perceptions and Solutions of internet of things
In most of the research papers, the important concern that has been identified is the
increased data collection for the individuals. The concern is especially is done for the threats
imposed to the various individuals and these threats are caused from their personal data analysis
23PRIVACY AND SECURITY ISSUES IN IOT
through the techniques of the data mining.Maras (2015) argued that the systematic literature
review on the research topic has indicated, by about one third of the papers, the concerns related
to the tracking of the location, the important individuals concern would be the unanonymised
data sharing. There are also various concerns reviewed, regarding the profiling, other concerns
are attacks of inventory, presentation and interaction, transitions of lifestyle and linkages.
The emergence of information system generally raises issues in information security.
Rand Report R-609 is the first published document by DARPA in order to widen opportunity of
information security. On the other hand, NSTISSI No 4011 is one of the widely accepted
evaluation standard for security related to IS. There are several characteristics of information
such as;
Availability
Authenticity
Confidentiality
Integrity
Utility
Accuracy
Possession
The security and principles have intended in order to provide high level guide to the
security as well as privacy program. Permitting the principles is considered as traditional core
components of the information security like confidentiality, integrity as well as availability.
Integrity principle ensures information reliable as well as accurate. On the other hand,
availability principle makes sure availability of the data when required. Accountability and
through the techniques of the data mining.Maras (2015) argued that the systematic literature
review on the research topic has indicated, by about one third of the papers, the concerns related
to the tracking of the location, the important individuals concern would be the unanonymised
data sharing. There are also various concerns reviewed, regarding the profiling, other concerns
are attacks of inventory, presentation and interaction, transitions of lifestyle and linkages.
The emergence of information system generally raises issues in information security.
Rand Report R-609 is the first published document by DARPA in order to widen opportunity of
information security. On the other hand, NSTISSI No 4011 is one of the widely accepted
evaluation standard for security related to IS. There are several characteristics of information
such as;
Availability
Authenticity
Confidentiality
Integrity
Utility
Accuracy
Possession
The security and principles have intended in order to provide high level guide to the
security as well as privacy program. Permitting the principles is considered as traditional core
components of the information security like confidentiality, integrity as well as availability.
Integrity principle ensures information reliable as well as accurate. On the other hand,
availability principle makes sure availability of the data when required. Accountability and
24PRIVACY AND SECURITY ISSUES IN IOT
responsibility for security as well as privacy of information need to be clearly defined as well as
acknowledged (Bernabe et al. 2014). Multidisciplinary principle ensures security as well as
privacy governance that can address and consider the viewpoints of each interested party. It is
also referred as Democracy Principle.
Figure 2: Barriers in IOT
(Source: Yan et al. 2014 p.441)
On the other hand, proportionality principle ensures security as well as privacy
safeguards in order to be proportionate to risks. Security as well as privacy design along with
implementation needs to be coordinated as well as integrated with the particular system of the
safeguards along with like of information asset (Gubbi et al. 2013). It is referred as security
management principle or the principle of security safeguards is included under integration
principle. Timeliness principle ensures parties acting in timely as well as coordinated manner in
responsibility for security as well as privacy of information need to be clearly defined as well as
acknowledged (Bernabe et al. 2014). Multidisciplinary principle ensures security as well as
privacy governance that can address and consider the viewpoints of each interested party. It is
also referred as Democracy Principle.
Figure 2: Barriers in IOT
(Source: Yan et al. 2014 p.441)
On the other hand, proportionality principle ensures security as well as privacy
safeguards in order to be proportionate to risks. Security as well as privacy design along with
implementation needs to be coordinated as well as integrated with the particular system of the
safeguards along with like of information asset (Gubbi et al. 2013). It is referred as security
management principle or the principle of security safeguards is included under integration
principle. Timeliness principle ensures parties acting in timely as well as coordinated manner in
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
25PRIVACY AND SECURITY ISSUES IN IOT
order to prevent or respond to the braches as well as threats to security along with having
privacy.
The principle of evaluation ensures risks to the information that can be evaluated initially
and reevaluated periodically. The right as well as dignity of individuals is respected during
carrying out the security as well as goals of privacy (Yan et al. 2014). On the other hand, notice
principle informs regarding privacy policies as well as processes along with addresses the
purposes for which information of individuals is collected, utilized, disclosed as well as retained.
Choice and consent principle gains implicit as well as explicit consent from the information of
individuals. The information is generally utilized for secondary purposes and disclosed to third
party.
In addition, use and retention principle utilizes information of individuals as outlined in
the notice. It keeps information as long as essential for fulfilling the purposes (Lee et al. 2014).
Disclosure limitation principle ensures disclose of the information to the third parties for the
organziatiom (Lake et al. 2014). Access principle provides access to individual in order to review
as well as update the dat in the organization. On the other hand, monitoring and enforcement
principle monitors compliance as well as procedures in order to address complaints along with
disputes.
There are various and wider range of approaches explored and proposed towards the user
privacy and security conservation. About half of these approaches are not evaluated or tested and
most of them remain still at the stage of proposal, essentially. When seen in another dimension,
there are nearly 39 solutions evaluated, such as, control tools for access management,
cryptographic algorithms, protocols of context or privacy awareness, etc.
order to prevent or respond to the braches as well as threats to security along with having
privacy.
The principle of evaluation ensures risks to the information that can be evaluated initially
and reevaluated periodically. The right as well as dignity of individuals is respected during
carrying out the security as well as goals of privacy (Yan et al. 2014). On the other hand, notice
principle informs regarding privacy policies as well as processes along with addresses the
purposes for which information of individuals is collected, utilized, disclosed as well as retained.
Choice and consent principle gains implicit as well as explicit consent from the information of
individuals. The information is generally utilized for secondary purposes and disclosed to third
party.
In addition, use and retention principle utilizes information of individuals as outlined in
the notice. It keeps information as long as essential for fulfilling the purposes (Lee et al. 2014).
Disclosure limitation principle ensures disclose of the information to the third parties for the
organziatiom (Lake et al. 2014). Access principle provides access to individual in order to review
as well as update the dat in the organization. On the other hand, monitoring and enforcement
principle monitors compliance as well as procedures in order to address complaints along with
disputes.
There are various and wider range of approaches explored and proposed towards the user
privacy and security conservation. About half of these approaches are not evaluated or tested and
most of them remain still at the stage of proposal, essentially. When seen in another dimension,
there are nearly 39 solutions evaluated, such as, control tools for access management,
cryptographic algorithms, protocols of context or privacy awareness, etc.
26PRIVACY AND SECURITY ISSUES IN IOT
Among these solutions, there are total 11 principles of privacy and security is identified,
by OECD (Ning et al. 2013). Very few of these solutions are considered most of the principles of
privacy and security, on the models proposed and most of them have their focus on most, 10
principles. The solutions remaining show focus over half of the principles of privacy and
security.
Having the assumptions regarding the individuals, who have no control of power of their
personal data and protect the own privacy of them, the violation of privacy of the data get
collected by the smart devices became a concern that is important and significant for the public
(Mineraud et al. 2016). The collected papers are classified and recorded for representing these
concerns, according to the respondents, with the help of the categories of Westin, as the
following.
Several research papers have offered frameworks for preserving the privacy and increase
the security and discussed the threats of the security and privacy and demonstrated important
concern regarding the collected data and made use by the Internet of Things as fundamentalist.
Certain papers are allocated according to the pragmatic, by encouraging the trust over the smart
devices security level and privacy level, having no awareness of the personal data collected, to
the same category (Henze et al. 2016). Two of the research papers presented argument about the
smart environment benefits and used the argument of ‘nothing to hide’ and these authors were
unconcerned.
Among these solutions, there are total 11 principles of privacy and security is identified,
by OECD (Ning et al. 2013). Very few of these solutions are considered most of the principles of
privacy and security, on the models proposed and most of them have their focus on most, 10
principles. The solutions remaining show focus over half of the principles of privacy and
security.
Having the assumptions regarding the individuals, who have no control of power of their
personal data and protect the own privacy of them, the violation of privacy of the data get
collected by the smart devices became a concern that is important and significant for the public
(Mineraud et al. 2016). The collected papers are classified and recorded for representing these
concerns, according to the respondents, with the help of the categories of Westin, as the
following.
Several research papers have offered frameworks for preserving the privacy and increase
the security and discussed the threats of the security and privacy and demonstrated important
concern regarding the collected data and made use by the Internet of Things as fundamentalist.
Certain papers are allocated according to the pragmatic, by encouraging the trust over the smart
devices security level and privacy level, having no awareness of the personal data collected, to
the same category (Henze et al. 2016). Two of the research papers presented argument about the
smart environment benefits and used the argument of ‘nothing to hide’ and these authors were
unconcerned.
27PRIVACY AND SECURITY ISSUES IN IOT
Figure 4: Trends of IOT security
(Source: Perera, Liu and Jayawardena 2015 p.618)
Most of the research papers could be categorized as fundamentalist, even including the
reports and news, presented by non-IoT specialists and very few research papers were indicating
pragmatic and least number of papers has demonstrated unconcern. As most of the papers in the
first category is explained, they are written by the professionals of privacy, proposing the models
for protection of privacy of individuals in the Internet of Things.
Theme 3: Security challenge in IOT
In spite of having several advantages, there is several security issues involve with IOT.
Potential security issues associated with IOT can be described as followed.
(1) Unapproved access as well as abusing individual data;
Figure 4: Trends of IOT security
(Source: Perera, Liu and Jayawardena 2015 p.618)
Most of the research papers could be categorized as fundamentalist, even including the
reports and news, presented by non-IoT specialists and very few research papers were indicating
pragmatic and least number of papers has demonstrated unconcern. As most of the papers in the
first category is explained, they are written by the professionals of privacy, proposing the models
for protection of privacy of individuals in the Internet of Things.
Theme 3: Security challenge in IOT
In spite of having several advantages, there is several security issues involve with IOT.
Potential security issues associated with IOT can be described as followed.
(1) Unapproved access as well as abusing individual data;
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
28PRIVACY AND SECURITY ISSUES IN IOT
(2) Encouraging dangers on frameworks
(3) Making threats
Perera, Liu and Jayawardena (2015) stated threats exist with the systems, uplifted in the
IoT, as clarified facilitate beneath. Thus, it is important to take proper actions regarding that
(Henze et al. 2014). Plausibility is related to the devices that could be utilized in order to send
malignant type messages.
Although the threats of now might be low, they could be expanded as completely
computerized autos, and other robotized physical items, turn out to be more predominant (Singh
et al. 2016). Unapproved access to the Internet-associated cameras as well as infant screens
raises potential physical concerns.
In this way, unapproved access to the information gauged by wellness as well as different
gadgets track customers' area few time laters that could imperil physical security of buyers
(Shafagh et al. 2015). Plausibility is that a cheat could remotely get to specific information
(Caron et al. 2016). These potential dangers are exacerbated by the way that securing associated
IoT gadgets may be more testing than securing a home PC, for two principle reasons. To start
with, as a few specialists noted, organizations entering the IoT market might not have
involvement in managing security issues. Second, albeit some IoT gadgets are profoundly
complex, numerous others may be cheap and basically expendable. In those cases, if a
helplessness were found after make, it might be troublesome or difficult to refresh the product or
apply a fix. Also, if a refresh is accessible, numerous customers may never catch wind of it.
Relatedly, numerous companies – especially those growing low-end gadgets – may need
(2) Encouraging dangers on frameworks
(3) Making threats
Perera, Liu and Jayawardena (2015) stated threats exist with the systems, uplifted in the
IoT, as clarified facilitate beneath. Thus, it is important to take proper actions regarding that
(Henze et al. 2014). Plausibility is related to the devices that could be utilized in order to send
malignant type messages.
Although the threats of now might be low, they could be expanded as completely
computerized autos, and other robotized physical items, turn out to be more predominant (Singh
et al. 2016). Unapproved access to the Internet-associated cameras as well as infant screens
raises potential physical concerns.
In this way, unapproved access to the information gauged by wellness as well as different
gadgets track customers' area few time laters that could imperil physical security of buyers
(Shafagh et al. 2015). Plausibility is that a cheat could remotely get to specific information
(Caron et al. 2016). These potential dangers are exacerbated by the way that securing associated
IoT gadgets may be more testing than securing a home PC, for two principle reasons. To start
with, as a few specialists noted, organizations entering the IoT market might not have
involvement in managing security issues. Second, albeit some IoT gadgets are profoundly
complex, numerous others may be cheap and basically expendable. In those cases, if a
helplessness were found after make, it might be troublesome or difficult to refresh the product or
apply a fix. Also, if a refresh is accessible, numerous customers may never catch wind of it.
Relatedly, numerous companies – especially those growing low-end gadgets – may need
29PRIVACY AND SECURITY ISSUES IN IOT
financial impetuses to give continuous help or programming security refreshes by any means,
leaving customers with unsupported or, on the other hand powerless gadgets not long after buy.
Riggins and Wamba (2015) commented that as the IoT takes over our day to day life,
even retaining our privacy would be harder. The ways the organizations access the data of the
individuals, become pervasive and IoT would be addition to this. Most commonly enumerated
privacy threats are mentioned in his literature review, as the following.
1. Tracking and Localization are the basic and potential threats to the privacy the
individuals, through various ways, like internet traffic, GPS or location found through
Smartphone.
2. Identification of the individuals is the most potential and dominant threat,
connecting the identifiers, like address and name with the individual’s entity.
3. Interaction and Presentation stand as the numerous smart things and new
interaction ways with the feedback provision for the system to the users (Perera et al. 2015). It
would be a serious privacy threat, while exchange of the private data is done, in between the
users and system.
4. Transaction of Lifestyle occurs, while the items of IoT would be sold and is used
by the owner of it and get disposed of, finally (Dong et al. 2017). The assumption here can be
that all the data and information would be deleted from the object, however, huge data amounts
are stored often by the smart devices, regarding the own history of them, for the entire lifecycle
of them. Personal videos, photos may be included and these are not deleted after the ownership is
transferred.
financial impetuses to give continuous help or programming security refreshes by any means,
leaving customers with unsupported or, on the other hand powerless gadgets not long after buy.
Riggins and Wamba (2015) commented that as the IoT takes over our day to day life,
even retaining our privacy would be harder. The ways the organizations access the data of the
individuals, become pervasive and IoT would be addition to this. Most commonly enumerated
privacy threats are mentioned in his literature review, as the following.
1. Tracking and Localization are the basic and potential threats to the privacy the
individuals, through various ways, like internet traffic, GPS or location found through
Smartphone.
2. Identification of the individuals is the most potential and dominant threat,
connecting the identifiers, like address and name with the individual’s entity.
3. Interaction and Presentation stand as the numerous smart things and new
interaction ways with the feedback provision for the system to the users (Perera et al. 2015). It
would be a serious privacy threat, while exchange of the private data is done, in between the
users and system.
4. Transaction of Lifestyle occurs, while the items of IoT would be sold and is used
by the owner of it and get disposed of, finally (Dong et al. 2017). The assumption here can be
that all the data and information would be deleted from the object, however, huge data amounts
are stored often by the smart devices, regarding the own history of them, for the entire lifecycle
of them. Personal videos, photos may be included and these are not deleted after the ownership is
transferred.
30PRIVACY AND SECURITY ISSUES IN IOT
5. Attacks of Inventory apply to the access unauthorized and data collection
regarding the characteristics and presence of the things, related to the personal life. Inventory
data can be easily used by the burglars, for casing the property, towards finding the break in safe
and best time.
6. Alqassem and Svetinovic (2014) commented that profiling is an important set of
personal information, which contains the information with personalization that includes even
financial credentials in the e-commerce, like in advertisements, newsletters, etc. Usually,
information is compiled, for each individual, so that interests are inferred through association
with other data sources combined with the profiles.
7. Linkage is another important aspect that links various systems, the possibilities of
access through unorganized resources and private data leaks, growing while the systems get
linked, for combining different sources of data.
Theme 4: Solution for minimizing threat in internet of things
For addressing the concerns of privacy and security, of the end-users and considerations
of the privacy and security of the service providers and many approaches are proposed by the
community of research.
1. Information Manipulation and Cryptographic Techniques
Cryptography stands as the dominant one still, in the solutions that are current and
proposed, although many years are spent by the researcher, for proposal of the novel schemes of
the preservation of the privacy and better the security (Kang et al. 2014). It is done, though they
5. Attacks of Inventory apply to the access unauthorized and data collection
regarding the characteristics and presence of the things, related to the personal life. Inventory
data can be easily used by the burglars, for casing the property, towards finding the break in safe
and best time.
6. Alqassem and Svetinovic (2014) commented that profiling is an important set of
personal information, which contains the information with personalization that includes even
financial credentials in the e-commerce, like in advertisements, newsletters, etc. Usually,
information is compiled, for each individual, so that interests are inferred through association
with other data sources combined with the profiles.
7. Linkage is another important aspect that links various systems, the possibilities of
access through unorganized resources and private data leaks, growing while the systems get
linked, for combining different sources of data.
Theme 4: Solution for minimizing threat in internet of things
For addressing the concerns of privacy and security, of the end-users and considerations
of the privacy and security of the service providers and many approaches are proposed by the
community of research.
1. Information Manipulation and Cryptographic Techniques
Cryptography stands as the dominant one still, in the solutions that are current and
proposed, although many years are spent by the researcher, for proposal of the novel schemes of
the preservation of the privacy and better the security (Kang et al. 2014). It is done, though they
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
31PRIVACY AND SECURITY ISSUES IN IOT
may face the obstacles for everything and though adequate security protocols are not offered by
most of the sensor, because of the limited storage and resources of computation.
2. Context Awareness or Privacy Awareness
Privacy and security awareness solutions are focused majorly over the applications of the
individuals, providing the basic awareness of privacy, to the respective users that the smart
devices, like wearable fitness, smart TV and health monitory systems can collect the data that is
personal regarding them (Singh et al. 2014). For example, a SeCoMan framework had been
proposed recently, for acting as a third party that is trusted by and for the users, as the
applications, are usually, unreliable with the information of location, they are managing.
3. Access Control
In addition to the awareness of the privacy, security and encryption, access control stands
to be an important and viable solution to use. It gives the power to the users for managing the
own data of them. This approach can be seen in CapBAC. Essentially, this approach is
distributed approach, where fine-grained decisions of authorization can be made by the smart
things, themselves.
4. Minimization of Data
The “Data Minimization” principle means that the service provider of the Internet of
Things has to limit their personal information collection to only purpose of the direct relevance.
The data should be retained by them only till the necessity of fulfilling the purposes (Li et al.
2016). So, they have to make only the collection of personal data, till they have requirement and
have to keep them, until it is needed.
may face the obstacles for everything and though adequate security protocols are not offered by
most of the sensor, because of the limited storage and resources of computation.
2. Context Awareness or Privacy Awareness
Privacy and security awareness solutions are focused majorly over the applications of the
individuals, providing the basic awareness of privacy, to the respective users that the smart
devices, like wearable fitness, smart TV and health monitory systems can collect the data that is
personal regarding them (Singh et al. 2014). For example, a SeCoMan framework had been
proposed recently, for acting as a third party that is trusted by and for the users, as the
applications, are usually, unreliable with the information of location, they are managing.
3. Access Control
In addition to the awareness of the privacy, security and encryption, access control stands
to be an important and viable solution to use. It gives the power to the users for managing the
own data of them. This approach can be seen in CapBAC. Essentially, this approach is
distributed approach, where fine-grained decisions of authorization can be made by the smart
things, themselves.
4. Minimization of Data
The “Data Minimization” principle means that the service provider of the Internet of
Things has to limit their personal information collection to only purpose of the direct relevance.
The data should be retained by them only till the necessity of fulfilling the purposes (Li et al.
2016). So, they have to make only the collection of personal data, till they have requirement and
have to keep them, until it is needed.
32PRIVACY AND SECURITY ISSUES IN IOT
Many other solutions are proposed that stand out of the four categories, specified above
and it is hitchhiking. This approach is a new one and used for ensuring the users anonymity, for
them, who provide the locations of them (Kang et al. 2015). The objective of the application of
the hitchhiking is handling the personal location information as an entity of interest. It helps
removing the fidelity trade-off, since the information about the person and respective location
would be unnecessary.
One more example is the technique of introspection, which protects the personal
information of the users, proactively, by the VM activities. It helps analyzing and gathering the
every VM state of CPU, the contents of memory, activity of input and output file, information of
the network, which is delivered through hypervisor and detects VM malicious software. If
integrity of the IoT device is lost, because of the malicious attack, it ends up with the security
and privacy risks.
Mukhopadhyay and Suryadevara (2014) commented that data minimization is referred as
the concept followed by the organizations to make a limitation in collecting and retaining data as
well as disclosing as no longer require it. However, some of the participants are expressed
concern regarding data minimization that could curtail innovative utilization of data. Data
minimization can assist as guard against the two privacy related risks. There is an increased
amount of risks, which the data would be utilized in such way that has to depart from reasonable
expectations of the customers.
Many other solutions are proposed that stand out of the four categories, specified above
and it is hitchhiking. This approach is a new one and used for ensuring the users anonymity, for
them, who provide the locations of them (Kang et al. 2015). The objective of the application of
the hitchhiking is handling the personal location information as an entity of interest. It helps
removing the fidelity trade-off, since the information about the person and respective location
would be unnecessary.
One more example is the technique of introspection, which protects the personal
information of the users, proactively, by the VM activities. It helps analyzing and gathering the
every VM state of CPU, the contents of memory, activity of input and output file, information of
the network, which is delivered through hypervisor and detects VM malicious software. If
integrity of the IoT device is lost, because of the malicious attack, it ends up with the security
and privacy risks.
Mukhopadhyay and Suryadevara (2014) commented that data minimization is referred as
the concept followed by the organizations to make a limitation in collecting and retaining data as
well as disclosing as no longer require it. However, some of the participants are expressed
concern regarding data minimization that could curtail innovative utilization of data. Data
minimization can assist as guard against the two privacy related risks. There is an increased
amount of risks, which the data would be utilized in such way that has to depart from reasonable
expectations of the customers.
33PRIVACY AND SECURITY ISSUES IN IOT
Figure 5: IOT security challenges
(Source: Matharu,Upadhyay and Chaudhary 2014 p.1452)
In order to reduce the risks, organizations need to analyze data practices as well as
business requires along with develop policies and practices imposed to reasonable limits on
collection as well as retention of customer data. Matharu,Upadhyay and Chaudhary (2014)
argued that recognizing the requirement for balancing future, the use of data and privacy can
provide advantages to the individual along with the organization. If an organization determines
that none of the options can fulfill the business goals, it seeks with the consent to collect extra
and unexpected categories of data.
Theme 5: Legislation in minimizing privacy and security concerns in IOT
Organizations or individuals are required to consider whether legislation over the
applications and use of internet of things are appropriate or not. There are different opinions
regarding the matter. Commission staffs involved with the matter agrees with the matter
commenter that there is a great possibility of innovation in this field (Sicari et al. 2016). In
addition, IoT specific legislation are included in the primary stage and would be premature. The
Figure 5: IOT security challenges
(Source: Matharu,Upadhyay and Chaudhary 2014 p.1452)
In order to reduce the risks, organizations need to analyze data practices as well as
business requires along with develop policies and practices imposed to reasonable limits on
collection as well as retention of customer data. Matharu,Upadhyay and Chaudhary (2014)
argued that recognizing the requirement for balancing future, the use of data and privacy can
provide advantages to the individual along with the organization. If an organization determines
that none of the options can fulfill the business goals, it seeks with the consent to collect extra
and unexpected categories of data.
Theme 5: Legislation in minimizing privacy and security concerns in IOT
Organizations or individuals are required to consider whether legislation over the
applications and use of internet of things are appropriate or not. There are different opinions
regarding the matter. Commission staffs involved with the matter agrees with the matter
commenter that there is a great possibility of innovation in this field (Sicari et al. 2016). In
addition, IoT specific legislation are included in the primary stage and would be premature. The
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
34PRIVACY AND SECURITY ISSUES IN IOT
staffs are agreed with the growth of self-regulatory programs in order to design specific
industries. It helps to encourage the process of adoption of privacy as well as security sensitivity
practices.
On the other hand, in the light of ongoing threats to the data security emerging IOT
technologies can amplify threats as well as staff reiterates with providing recommendations of
the previous commission for enacting strong, flexible and technology natural federal legislation
in order to empower the existing data security. On the other hand, legislation about data security
requires protection against unauthorized access to private and confidential information along
with device functionality. On the other hand, inescapability of data collection and use of IOT
makes conceivable fortifies with the need for benchmark norms of protection. The commission
can prescribe protection report in this aspect (Raza et al. 2014). The commission right to move
with the IOT related practices. There are also specific basic protections that appear duplicity. In
addition, it is important to utilize present instruments in order to ensure that the organizations
keeping consideration about security as well as protection issues as they develop new devices.
Law implementation: In this perspective, the commission needs authorization regarding
FTC act, Hi-tech act as well as FCRA act. Online policy for children usage as well as other laws
needs to apply for security of IOT applications. In addition, the commission needs to use its
power in order to develop against any type of performers. The motivation needs to accept about
the law.
Customer and business instruction: In the aspect, the staffs of commission develop new
customers as well as business training materials. Thus, it is important to consider all the aspects
lied on customer as well as business instructions. As internet of things and its applications are
staffs are agreed with the growth of self-regulatory programs in order to design specific
industries. It helps to encourage the process of adoption of privacy as well as security sensitivity
practices.
On the other hand, in the light of ongoing threats to the data security emerging IOT
technologies can amplify threats as well as staff reiterates with providing recommendations of
the previous commission for enacting strong, flexible and technology natural federal legislation
in order to empower the existing data security. On the other hand, legislation about data security
requires protection against unauthorized access to private and confidential information along
with device functionality. On the other hand, inescapability of data collection and use of IOT
makes conceivable fortifies with the need for benchmark norms of protection. The commission
can prescribe protection report in this aspect (Raza et al. 2014). The commission right to move
with the IOT related practices. There are also specific basic protections that appear duplicity. In
addition, it is important to utilize present instruments in order to ensure that the organizations
keeping consideration about security as well as protection issues as they develop new devices.
Law implementation: In this perspective, the commission needs authorization regarding
FTC act, Hi-tech act as well as FCRA act. Online policy for children usage as well as other laws
needs to apply for security of IOT applications. In addition, the commission needs to use its
power in order to develop against any type of performers. The motivation needs to accept about
the law.
Customer and business instruction: In the aspect, the staffs of commission develop new
customers as well as business training materials. Thus, it is important to consider all the aspects
lied on customer as well as business instructions. As internet of things and its applications are
35PRIVACY AND SECURITY ISSUES IN IOT
growing rapidly with the customers along with the business, effective measures are required for
improving the experience of internet of things.
Interest on multi-player gathering: The staffs of commission have interest on multi-
player business approach. In addition, it is required to endeavor with the use of internet of things
with implementing effective security in the applications of internet of things.
Advocacy: The commission staffs will search for getting promotional openings with the
distinctive enterprises and stating the governing bodies as well as courts for advancing assurance.
3.3 Summary
From the above discussion, it can be summarized that privacy and security issues become
great concern for people in using internet of things. There are several security issues discussed in
the above chapter. Unapproved people may misuse security vulnerabilities in order to make
threats to the physical security at times. Thus, it is important to take appropriate actions against
the security issues.
growing rapidly with the customers along with the business, effective measures are required for
improving the experience of internet of things.
Interest on multi-player gathering: The staffs of commission have interest on multi-
player business approach. In addition, it is required to endeavor with the use of internet of things
with implementing effective security in the applications of internet of things.
Advocacy: The commission staffs will search for getting promotional openings with the
distinctive enterprises and stating the governing bodies as well as courts for advancing assurance.
3.3 Summary
From the above discussion, it can be summarized that privacy and security issues become
great concern for people in using internet of things. There are several security issues discussed in
the above chapter. Unapproved people may misuse security vulnerabilities in order to make
threats to the physical security at times. Thus, it is important to take appropriate actions against
the security issues.
36PRIVACY AND SECURITY ISSUES IN IOT
Chapter 4: Conclusion and recommendations
4.1 Conclusion
Multiple m1ethods and several studies are used for collection of the data. The data
collected are from the reports and news also. It helps to understand different views from various
authors and helps to understand and present and past circumstances of privacy issues lied in
Internet of Things. Thus, it can identify to address current trends of attacks and way to get rid of
it.
The time of getting up is accessed from the diary by the alarm. The total time of stay at
home before getting out from the house can be analyzed and obtained by the alarm, according to
the collection of data from the all, fine tuned by the timings of consultation, during the previous
days. The light gets on and brewing of the coffee machine gets started, for the routine dark roast.
After waking, dressing and having the breakfast the autonomous car gets ready by it and waits
for owner to get in. Increasing access of IOT generates security issues in IOT. Thus, it is
important to take effective measures that would be helpful to follow the principle and security in
IOT.
4.2 Linking with objective
Objective 1: To find out the privacy and security issues included in internet of things
In literature review section, privacy and security issues are described in detailed. In addition, in
theme 3, there is a critical analysis taken place for finding out privacy and security issues
involved with IoT. Thus, selection of the objective is justified in the research.
Chapter 4: Conclusion and recommendations
4.1 Conclusion
Multiple m1ethods and several studies are used for collection of the data. The data
collected are from the reports and news also. It helps to understand different views from various
authors and helps to understand and present and past circumstances of privacy issues lied in
Internet of Things. Thus, it can identify to address current trends of attacks and way to get rid of
it.
The time of getting up is accessed from the diary by the alarm. The total time of stay at
home before getting out from the house can be analyzed and obtained by the alarm, according to
the collection of data from the all, fine tuned by the timings of consultation, during the previous
days. The light gets on and brewing of the coffee machine gets started, for the routine dark roast.
After waking, dressing and having the breakfast the autonomous car gets ready by it and waits
for owner to get in. Increasing access of IOT generates security issues in IOT. Thus, it is
important to take effective measures that would be helpful to follow the principle and security in
IOT.
4.2 Linking with objective
Objective 1: To find out the privacy and security issues included in internet of things
In literature review section, privacy and security issues are described in detailed. In addition, in
theme 3, there is a critical analysis taken place for finding out privacy and security issues
involved with IoT. Thus, selection of the objective is justified in the research.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
37PRIVACY AND SECURITY ISSUES IN IOT
Objective 2: To identify and evaluate the factors responsible for creating privacy and security
issues involved with internet of things
The factors are described in the second chapter of research. Along with this, thematic analysis is
carried for fulfilling the objective. Hence, selection of the objective is justified.
Objective 3: To address the challenges faced while minimizing the issues in IoT
The challenges are identified in the literature review section and the objective is covered in
theme 2 and 4. Thus, the objective is successfully justified.
Objective 4: To recommend solutions for overcoming the challenges in IoT
Recommendations are given in order to overcome the challenges and issues faced while using
internet of things.
4.3 Recommendations
The literature that is gone through shown the insights into what, how and where the
research is conducted and the say it was made possible for gaps identification. In this aspect,
some recommendations can be provided in order to overcome the privacy and security concerns
in IOT.
Focus of Primary Research
Till date, most of the research is conducted in Asia and Europe, in the countries, where
English is non-spoken, like Italy, France, Italy, China, Germany, Spain and China. It indicates
that the concerns of the individual privacy are just not limited to the countries, like non-English
speaking. According to the results, it can be suggested that the countries having strictest
measures of the personal privacy, like in Europe, look to attempt most of the research in the
Objective 2: To identify and evaluate the factors responsible for creating privacy and security
issues involved with internet of things
The factors are described in the second chapter of research. Along with this, thematic analysis is
carried for fulfilling the objective. Hence, selection of the objective is justified.
Objective 3: To address the challenges faced while minimizing the issues in IoT
The challenges are identified in the literature review section and the objective is covered in
theme 2 and 4. Thus, the objective is successfully justified.
Objective 4: To recommend solutions for overcoming the challenges in IoT
Recommendations are given in order to overcome the challenges and issues faced while using
internet of things.
4.3 Recommendations
The literature that is gone through shown the insights into what, how and where the
research is conducted and the say it was made possible for gaps identification. In this aspect,
some recommendations can be provided in order to overcome the privacy and security concerns
in IOT.
Focus of Primary Research
Till date, most of the research is conducted in Asia and Europe, in the countries, where
English is non-spoken, like Italy, France, Italy, China, Germany, Spain and China. It indicates
that the concerns of the individual privacy are just not limited to the countries, like non-English
speaking. According to the results, it can be suggested that the countries having strictest
measures of the personal privacy, like in Europe, look to attempt most of the research in the
38PRIVACY AND SECURITY ISSUES IN IOT
security and privacy concern in the Internet of Things. The study methods deployed in this area
have fallen into any of the categories, like solution proposal towards protection of the privacy of
the users in Internet of Things.
Analysis of threats and privacy violation
The wide range of research conducted and demonstrated in the research shows growing
awareness in terms of potential of violation of privacy. Eventually, mechanisms for protection of
privacy have been exploring by the researchers. The wider ranged and hugely varied products of
the IoT and sheer range of them, each over the platforms that are bespoken, leaves the security
and privacy issues of the IoT, as a challenging field, towards proposing and conducting the best
solution. Several research papers reviewed and examined, in this systematic literature review
have the publications, usually, in the academic venues. But, several news reports have been
included towards gauging the concerns of the consumer, in terms of security and privacy too.
Eventually, it could be concluded reasonably that the concerns related security and privacy are
raised, not only by the professionals of technology, but also by the individual consumers,
themselves, having less expertise in the technology.
Focus of Threat
Most of the reports during the research have reported the threats, focusing over the
collection of data done, related to the individuals themselves, like profiling, location or identities.
The same individual identification can possibly used towards attempting the harm to the users,
through burglaries or identity theft. Most of the techniques and applications proposed for the
privacy protection and security show that these proposals of solutions are for health monitoring
or smart devices that have been applied in homes. These smart devices are Smart Metes, Smart
TVs, Smart remote health monitors, temperature or light control or drug tracking. The focus with
security and privacy concern in the Internet of Things. The study methods deployed in this area
have fallen into any of the categories, like solution proposal towards protection of the privacy of
the users in Internet of Things.
Analysis of threats and privacy violation
The wide range of research conducted and demonstrated in the research shows growing
awareness in terms of potential of violation of privacy. Eventually, mechanisms for protection of
privacy have been exploring by the researchers. The wider ranged and hugely varied products of
the IoT and sheer range of them, each over the platforms that are bespoken, leaves the security
and privacy issues of the IoT, as a challenging field, towards proposing and conducting the best
solution. Several research papers reviewed and examined, in this systematic literature review
have the publications, usually, in the academic venues. But, several news reports have been
included towards gauging the concerns of the consumer, in terms of security and privacy too.
Eventually, it could be concluded reasonably that the concerns related security and privacy are
raised, not only by the professionals of technology, but also by the individual consumers,
themselves, having less expertise in the technology.
Focus of Threat
Most of the reports during the research have reported the threats, focusing over the
collection of data done, related to the individuals themselves, like profiling, location or identities.
The same individual identification can possibly used towards attempting the harm to the users,
through burglaries or identity theft. Most of the techniques and applications proposed for the
privacy protection and security show that these proposals of solutions are for health monitoring
or smart devices that have been applied in homes. These smart devices are Smart Metes, Smart
TVs, Smart remote health monitors, temperature or light control or drug tracking. The focus with
39PRIVACY AND SECURITY ISSUES IN IOT
such restrictions can be attributed to various situations, like, the healthcare or homes smart
devices are not needed for control, by better authority, as done in the manufacturing and smart
cities and all of them should be controlled by either private organizations or government. The
easy access and availability of the health care or homes smart devices
4.4 Limitation and future scope
Research for security and privacy issues in IoT is carried from total 2 countries, with
domination of Eurpoe, as most of the research papers are from Australia and New Zealand. Thus,
if the research would be conducted on broader aspect, it might give more cases and issues that
help to find more number of factors and challenges in IOT. On the other hand, limited time and
money becomes major obstacle to do the research in effective way. However, the research would
be helpful for the future researchers to take help as secondary sources. In addition, implementing
security measures in using IOT would be helpful for getting outcome of the research.
such restrictions can be attributed to various situations, like, the healthcare or homes smart
devices are not needed for control, by better authority, as done in the manufacturing and smart
cities and all of them should be controlled by either private organizations or government. The
easy access and availability of the health care or homes smart devices
4.4 Limitation and future scope
Research for security and privacy issues in IoT is carried from total 2 countries, with
domination of Eurpoe, as most of the research papers are from Australia and New Zealand. Thus,
if the research would be conducted on broader aspect, it might give more cases and issues that
help to find more number of factors and challenges in IOT. On the other hand, limited time and
money becomes major obstacle to do the research in effective way. However, the research would
be helpful for the future researchers to take help as secondary sources. In addition, implementing
security measures in using IOT would be helpful for getting outcome of the research.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
40PRIVACY AND SECURITY ISSUES IN IOT
References
Arias, O., Wurm, J., Hoang, K. and Jin, Y., 2015. Privacy and security in internet of things and
wearable devices. IEEE Transactions on Multi-Scale Computing Systems, 1(2), pp.99-109.
Bauer, G.R., 2014. Incorporating intersectionality theory into population health research
methodology: challenges and the potential to advance health equity. Social Science &
Medicine, 110, pp.10-17.
Bernabe, J.B., Hernández, J.L., Moreno, M.V. and Gomez, A.F.S., 2014, December. Privacy-
preserving security framework for a social-aware internet of things. In International conference
on ubiquitous computing and ambient intelligence (pp. 408-415). Springer, Cham.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2014, August. On the integration of cloud
computing and internet of things. In Future Internet of Things and Cloud (FiCloud), 2014
International Conference on (pp. 23-30). IEEE.
Caron, X., Bosua, R., Maynard, S.B. and Ahmad, A., 2016. The Internet of Things (IoT) and its
impact on individual privacy: An Australian perspective. Computer Law & Security
Review, 32(1), pp.4-15.
Clarke, J., Gritzalis, S., Zhou, J. and Roman, R., 2014. Protecting the internet of things. Security
and Communication Networks, 7(12), pp.2637-2638.
Cui, X., 2016. The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-68).
Palgrave Macmillan, London.
Da Xu, L., He, W. and Li, S., 2014. Internet of things in industries: A survey. IEEE Transactions
on industrial informatics, 10(4), pp.2233-2243.
References
Arias, O., Wurm, J., Hoang, K. and Jin, Y., 2015. Privacy and security in internet of things and
wearable devices. IEEE Transactions on Multi-Scale Computing Systems, 1(2), pp.99-109.
Bauer, G.R., 2014. Incorporating intersectionality theory into population health research
methodology: challenges and the potential to advance health equity. Social Science &
Medicine, 110, pp.10-17.
Bernabe, J.B., Hernández, J.L., Moreno, M.V. and Gomez, A.F.S., 2014, December. Privacy-
preserving security framework for a social-aware internet of things. In International conference
on ubiquitous computing and ambient intelligence (pp. 408-415). Springer, Cham.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2014, August. On the integration of cloud
computing and internet of things. In Future Internet of Things and Cloud (FiCloud), 2014
International Conference on (pp. 23-30). IEEE.
Caron, X., Bosua, R., Maynard, S.B. and Ahmad, A., 2016. The Internet of Things (IoT) and its
impact on individual privacy: An Australian perspective. Computer Law & Security
Review, 32(1), pp.4-15.
Clarke, J., Gritzalis, S., Zhou, J. and Roman, R., 2014. Protecting the internet of things. Security
and Communication Networks, 7(12), pp.2637-2638.
Cui, X., 2016. The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-68).
Palgrave Macmillan, London.
Da Xu, L., He, W. and Li, S., 2014. Internet of things in industries: A survey. IEEE Transactions
on industrial informatics, 10(4), pp.2233-2243.
41PRIVACY AND SECURITY ISSUES IN IOT
Dong, X., Dong, X., Chang, Y., Chang, Y., Wang, Y., Wang, Y., Yan, J. and Yan, J., 2017.
Understanding usage of Internet of Things (IOT) systems in China: Cognitive experience and
affect experience as moderator. Information Technology & People, 30(1), pp.117-138.
Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
pp.1645-1660.
Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B. and Wehrle, K., 2016. A
comprehensive approach to privacy in the cloud-based Internet of Things. Future Generation
Computer Systems, 56, pp.701-718.
Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B. and Wehrle, K., 2014,
August. User-driven privacy enforcement for cloud-based services in the internet of things.
In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on (pp. 191-
196). IEEE.
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the internet of things:
Perspectives and challenges. Wireless Networks, 20(8), pp.2481-2501.
Kang, K., Pang, Z., Da Xu, L., Ma, L. and Wang, C., 2014. An interactive trust model for
application market of the internet of things. IEEE Transactions on Industrial Informatics, 10(2),
pp.1516-1526.
Kumar, J.S. and Patel, D.R., 2014. A survey on internet of things: Security and privacy
issues. International Journal of Computer Applications, 90(11).
Dong, X., Dong, X., Chang, Y., Chang, Y., Wang, Y., Wang, Y., Yan, J. and Yan, J., 2017.
Understanding usage of Internet of Things (IOT) systems in China: Cognitive experience and
affect experience as moderator. Information Technology & People, 30(1), pp.117-138.
Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
pp.1645-1660.
Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B. and Wehrle, K., 2016. A
comprehensive approach to privacy in the cloud-based Internet of Things. Future Generation
Computer Systems, 56, pp.701-718.
Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B. and Wehrle, K., 2014,
August. User-driven privacy enforcement for cloud-based services in the internet of things.
In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on (pp. 191-
196). IEEE.
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the internet of things:
Perspectives and challenges. Wireless Networks, 20(8), pp.2481-2501.
Kang, K., Pang, Z., Da Xu, L., Ma, L. and Wang, C., 2014. An interactive trust model for
application market of the internet of things. IEEE Transactions on Industrial Informatics, 10(2),
pp.1516-1526.
Kumar, J.S. and Patel, D.R., 2014. A survey on internet of things: Security and privacy
issues. International Journal of Computer Applications, 90(11).
42PRIVACY AND SECURITY ISSUES IN IOT
Lake, D., Milito, R.M.R., Morrow, M. and Vargheese, R., 2014. Internet of things: Architectural
framework for ehealth security. Journal of ICT Standardization, 1(3), pp.301-328.
Li, S., Tryfonas, T. and Li, H., 2016. The internet of things: a security point of view. Internet
Research, 26(2), pp.337-359.
Maras, M.H., 2015. Internet of Things: security and privacy implications. International Data
Privacy Law, 5(2), p.99.
Mineraud, J., Mazhelis, O., Su, X. and Tarkoma, S., 2016. A gap analysis of Internet-of-Things
platforms. Computer Communications, 89, pp.5-16.
Mukhopadhyay, S.C. and Suryadevara, N.K., 2014. Internet of things: Challenges and
opportunities. In Internet of Things (pp. 1-17). Springer International Publishing.
Nia, A.M. and Jha, N.K., 2016. A comprehensive study of security of internet-of-things. IEEE
Transactions on Emerging Topics in Computing.
Ning, H., Liu, H. and Yang, L.T., 2013. Cyberentity security in the internet of
things. Computer, 46(4), pp.46-53.
Peppet, S.R., 2014. Regulating the internet of things: first steps toward managing discrimination,
privacy, security and consent. Tex. L. Rev., 93, p.85.
Perera, C., Ranjan, R., Wang, L., Khan, S.U. and Zomaya, A.Y., 2015. Big data privacy in the
internet of things era. IT Professional, 17(3), pp.32-39.
Lake, D., Milito, R.M.R., Morrow, M. and Vargheese, R., 2014. Internet of things: Architectural
framework for ehealth security. Journal of ICT Standardization, 1(3), pp.301-328.
Li, S., Tryfonas, T. and Li, H., 2016. The internet of things: a security point of view. Internet
Research, 26(2), pp.337-359.
Maras, M.H., 2015. Internet of Things: security and privacy implications. International Data
Privacy Law, 5(2), p.99.
Mineraud, J., Mazhelis, O., Su, X. and Tarkoma, S., 2016. A gap analysis of Internet-of-Things
platforms. Computer Communications, 89, pp.5-16.
Mukhopadhyay, S.C. and Suryadevara, N.K., 2014. Internet of things: Challenges and
opportunities. In Internet of Things (pp. 1-17). Springer International Publishing.
Nia, A.M. and Jha, N.K., 2016. A comprehensive study of security of internet-of-things. IEEE
Transactions on Emerging Topics in Computing.
Ning, H., Liu, H. and Yang, L.T., 2013. Cyberentity security in the internet of
things. Computer, 46(4), pp.46-53.
Peppet, S.R., 2014. Regulating the internet of things: first steps toward managing discrimination,
privacy, security and consent. Tex. L. Rev., 93, p.85.
Perera, C., Ranjan, R., Wang, L., Khan, S.U. and Zomaya, A.Y., 2015. Big data privacy in the
internet of things era. IT Professional, 17(3), pp.32-39.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
43PRIVACY AND SECURITY ISSUES IN IOT
Perera, C., Liu, C.H. and Jayawardena, S., 2015. The emerging internet of things marketplace
from an industrial perspective: A survey. IEEE Transactions on Emerging Topics in
Computing, 3(4), pp.585-598.
Raza, S., Duquennoy, S., Höglund, J., Roedig, U. and Voigt, T., 2014. Secure communication for
the Internet of Things—a comparison of link‐layer security and IPsec for 6LoWPAN. Security
and Communication Networks, 7(12), pp.2654-2668.
Reynolds, D., Creemers, B., Nesselrodt, P.S., Shaffer, E.C., Stringfield, S. and Teddlie, C. eds.,
2014. Advances in school effectiveness research and practice. Elsevier.
Roman, R., Zhou, J. and Lopez, J., 2013. On the features and challenges of security and privacy
in distributed internet of things. Computer Networks, 57(10), pp.2266-2279.
Shafagh, H., Hithnawi, A., Dröscher, A., Duquennoy, S. and Hu, W., 2015, September. Poster:
Towards encrypted query processing for the Internet of Things. In Proceedings of the 21st
Annual International Conference on Mobile Computing and Networking (pp. 251-253). ACM.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust in
Internet of Things: The road ahead. Computer Networks, 76, pp.146-164.
Sicari, S., Cappiello, C., De Pellegrini, F., Miorandi, D. and Coen-Porisini, A., 2016. A security-
and quality-aware system architecture for Internet of Things. Information Systems
Frontiers, 18(4), pp.665-677.
Singh, J., Pasquier, T., Bacon, J., Ko, H. and Eyers, D., 2016. Twenty security considerations for
cloud-supported Internet of Things. IEEE Internet of Things Journal, 3(3), pp.269-284.
Perera, C., Liu, C.H. and Jayawardena, S., 2015. The emerging internet of things marketplace
from an industrial perspective: A survey. IEEE Transactions on Emerging Topics in
Computing, 3(4), pp.585-598.
Raza, S., Duquennoy, S., Höglund, J., Roedig, U. and Voigt, T., 2014. Secure communication for
the Internet of Things—a comparison of link‐layer security and IPsec for 6LoWPAN. Security
and Communication Networks, 7(12), pp.2654-2668.
Reynolds, D., Creemers, B., Nesselrodt, P.S., Shaffer, E.C., Stringfield, S. and Teddlie, C. eds.,
2014. Advances in school effectiveness research and practice. Elsevier.
Roman, R., Zhou, J. and Lopez, J., 2013. On the features and challenges of security and privacy
in distributed internet of things. Computer Networks, 57(10), pp.2266-2279.
Shafagh, H., Hithnawi, A., Dröscher, A., Duquennoy, S. and Hu, W., 2015, September. Poster:
Towards encrypted query processing for the Internet of Things. In Proceedings of the 21st
Annual International Conference on Mobile Computing and Networking (pp. 251-253). ACM.
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust in
Internet of Things: The road ahead. Computer Networks, 76, pp.146-164.
Sicari, S., Cappiello, C., De Pellegrini, F., Miorandi, D. and Coen-Porisini, A., 2016. A security-
and quality-aware system architecture for Internet of Things. Information Systems
Frontiers, 18(4), pp.665-677.
Singh, J., Pasquier, T., Bacon, J., Ko, H. and Eyers, D., 2016. Twenty security considerations for
cloud-supported Internet of Things. IEEE Internet of Things Journal, 3(3), pp.269-284.
44PRIVACY AND SECURITY ISSUES IN IOT
Thierer, A.D., 2015. The internet of things and wearable technology: Addressing privacy and
security concerns without derailing innovation.
Trappe, W., Howard, R. and Moore, R.S., 2015. Low-energy security: Limits and opportunities
in the internet of things. IEEE Security & Privacy, 13(1), pp.14-21.
Want, R., Schilit, B.N. and Jenson, S., 2015. Enabling the internet of things. Computer, 48(1),
pp.28-35.
Whitmore, A., Agarwal, A. and Da Xu, L., 2015. The Internet of Things—A survey of topics and
trends. Information Systems Frontiers, 17(2), pp.261-274.
Yan, Z., Zhang, P. and Vasilakos, A.V., 2014. A survey on trust management for Internet of
Things. Journal of network and computer applications, 42, pp.120-134.
Ziegeldorf, J.H., Morchon, O.G. and Wehrle, K., 2014. Privacy in the Internet of Things: threats
and challenges. Security and Communication Networks, 7(12), pp.2728-2742.
Singh, D., Tripathi, G. and Jara, A.J., 2014, March. A survey of Internet-of-Things: Future
vision, architecture, challenges and services. In Internet of things (WF-IoT), 2014 IEEE world
forum on (pp. 287-292). IEEE.
Skarmeta, A.F., Hernandez-Ramos, J.L. and Moreno, M.V., 2014, March. A decentralized
approach for security and privacy challenges in the internet of things. In Internet of Things (WF-
IoT), 2014 IEEE World Forum on (pp. 67-72). IEEE.
Lee, J.Y., Lin, W.C. and Huang, Y.H., 2014, May. A lightweight authentication protocol for
internet of things. In Next-Generation Electronics (ISNE), 2014 International Symposium on (pp.
1-2). IEEE.
Thierer, A.D., 2015. The internet of things and wearable technology: Addressing privacy and
security concerns without derailing innovation.
Trappe, W., Howard, R. and Moore, R.S., 2015. Low-energy security: Limits and opportunities
in the internet of things. IEEE Security & Privacy, 13(1), pp.14-21.
Want, R., Schilit, B.N. and Jenson, S., 2015. Enabling the internet of things. Computer, 48(1),
pp.28-35.
Whitmore, A., Agarwal, A. and Da Xu, L., 2015. The Internet of Things—A survey of topics and
trends. Information Systems Frontiers, 17(2), pp.261-274.
Yan, Z., Zhang, P. and Vasilakos, A.V., 2014. A survey on trust management for Internet of
Things. Journal of network and computer applications, 42, pp.120-134.
Ziegeldorf, J.H., Morchon, O.G. and Wehrle, K., 2014. Privacy in the Internet of Things: threats
and challenges. Security and Communication Networks, 7(12), pp.2728-2742.
Singh, D., Tripathi, G. and Jara, A.J., 2014, March. A survey of Internet-of-Things: Future
vision, architecture, challenges and services. In Internet of things (WF-IoT), 2014 IEEE world
forum on (pp. 287-292). IEEE.
Skarmeta, A.F., Hernandez-Ramos, J.L. and Moreno, M.V., 2014, March. A decentralized
approach for security and privacy challenges in the internet of things. In Internet of Things (WF-
IoT), 2014 IEEE World Forum on (pp. 67-72). IEEE.
Lee, J.Y., Lin, W.C. and Huang, Y.H., 2014, May. A lightweight authentication protocol for
internet of things. In Next-Generation Electronics (ISNE), 2014 International Symposium on (pp.
1-2). IEEE.
45PRIVACY AND SECURITY ISSUES IN IOT
Alqassem, I. and Svetinovic, D., 2014, December. A taxonomy of security and privacy
requirements for the Internet of Things (IoT). In Industrial Engineering and Engineering
Management (IEEM), 2014 IEEE International Conference on (pp. 1244-1248). IEEE.
Matharu, G.S., Upadhyay, P. and Chaudhary, L., 2014, December. The Internet of Things:
challenges & security issues. In Emerging Technologies (ICET), 2014 International Conference
on (pp. 54-59). IEEE.
Riggins, F.J. and Wamba, S.F., 2015, January. Research directions on the adoption, usage, and
impact of the internet of things through the use of big data analytics. In System Sciences
(HICSS), 2015 48th Hawaii International Conference on (pp. 1531-1540). IEEE.
Sadeghi, A.R., Wachsmann, C. and Waidner, M., 2015, June. Security and privacy challenges in
industrial internet of things. In Design Automation Conference (DAC), 2015 52nd
ACM/EDAC/IEEE (pp. 1-6). IEEE.
Kang, R., Dabbish, L., Fruchter, N. and Kiesler, S., 2015, July. my data just goes everywhere:”
user mental models of the internet and implications for privacy and security. In Symposium on
Usable Privacy and Security (SOUPS)(pp. 39-52). Berkeley, CA: USENIX Association.
Kumar, S.A., Vealey, T. and Srivastava, H., 2016, January. Security in internet of things:
Challenges, solutions and future directions. In System Sciences (HICSS), 2016 49th Hawaii
International Conference on (pp. 5772-5781). IEEE.
Alqassem, I. and Svetinovic, D., 2014, December. A taxonomy of security and privacy
requirements for the Internet of Things (IoT). In Industrial Engineering and Engineering
Management (IEEM), 2014 IEEE International Conference on (pp. 1244-1248). IEEE.
Matharu, G.S., Upadhyay, P. and Chaudhary, L., 2014, December. The Internet of Things:
challenges & security issues. In Emerging Technologies (ICET), 2014 International Conference
on (pp. 54-59). IEEE.
Riggins, F.J. and Wamba, S.F., 2015, January. Research directions on the adoption, usage, and
impact of the internet of things through the use of big data analytics. In System Sciences
(HICSS), 2015 48th Hawaii International Conference on (pp. 1531-1540). IEEE.
Sadeghi, A.R., Wachsmann, C. and Waidner, M., 2015, June. Security and privacy challenges in
industrial internet of things. In Design Automation Conference (DAC), 2015 52nd
ACM/EDAC/IEEE (pp. 1-6). IEEE.
Kang, R., Dabbish, L., Fruchter, N. and Kiesler, S., 2015, July. my data just goes everywhere:”
user mental models of the internet and implications for privacy and security. In Symposium on
Usable Privacy and Security (SOUPS)(pp. 39-52). Berkeley, CA: USENIX Association.
Kumar, S.A., Vealey, T. and Srivastava, H., 2016, January. Security in internet of things:
Challenges, solutions and future directions. In System Sciences (HICSS), 2016 49th Hawaii
International Conference on (pp. 5772-5781). IEEE.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
46PRIVACY AND SECURITY ISSUES IN IOT
Appendix
Milestones in the Research 1st
Week
2nd
Week
3rd
Week
4thWeek 5thWeek 6thWeek 7thWeek
Selection of the Topic
Collection of Data from secondary
sources
Preparing the layout
Review of Literature
Developing plan for the research
Selecting appropriate techniques
for research
Collection of secondary data
Data Analysis & Interpretation
Findings and Discussion
Conclusion to the study
Preparing Rough Draft
Completion of Final Work
Table 1: Gantt chart
(Source: Created by the author)
Appendix
Milestones in the Research 1st
Week
2nd
Week
3rd
Week
4thWeek 5thWeek 6thWeek 7thWeek
Selection of the Topic
Collection of Data from secondary
sources
Preparing the layout
Review of Literature
Developing plan for the research
Selecting appropriate techniques
for research
Collection of secondary data
Data Analysis & Interpretation
Findings and Discussion
Conclusion to the study
Preparing Rough Draft
Completion of Final Work
Table 1: Gantt chart
(Source: Created by the author)
1 out of 47
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.