Internet of Things: Security and Privacy Challenges in Various Domains
VerifiedAdded on  2021/06/17
|18
|6173
|49
Report
AI Summary
This report delves into the critical security and privacy challenges within the Internet of Things (IoT) across various domains. It highlights key vulnerabilities such as lack of transport encryption, privacy concerns, and insufficient authentication, while also exploring the challenges of default credentials and insecure code practices. The report reviews existing literature, including research on smart homes, healthcare, and smart cities, to identify the multifaceted issues impacting the security of IoT systems. It emphasizes the need for secure systems development life cycle practices, periodic penetration testing, and secure coding practices to create robust IoT solutions. The analysis encompasses discussions on the impact of IoT on different sectors, including healthcare, manufacturing, and home automation. The report also addresses the importance of data management, machine learning, and communication protocols to ensure secure data transmission and user privacy. The paper concludes by proposing solutions to mitigate the identified challenges and promote the development of secure, reliable, and user-friendly IoT systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

IOT SECURITY AND PRIVACY
REGIME/CHALLENGES IN ALL DOMAINS OF IOT
1
REGIME/CHALLENGES IN ALL DOMAINS OF IOT
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Abstract
The security and privacy challenges for IoT
are captivating the organizations. It faces the
many security and privacy challenges and
issues in the entire domain. It has the rise to
challenges for privacy, security and
assurance in the IoT. This research the
security and privacy challenges and it is
used to arguable the significant challenge
and it fundamental to encourage the IoT
coordination and standardization. The
internets of things will become the core
component of future internet. The IoT is
used to sensing and actuating the capabilities
in internet and it creates the unique. The IoT
system should be secure and provide the
necessary privacy and controls to the users
and it is used to enabling the protocols and
technologies. It also analyzes the security
vulnerabilities and challenges of the
different underlying the protocols and
Technologies. This project is used to
identify the key challenges and needs for
privacy, security and governance. It also
surveys the existing research in IoT for
privacy, security and governance. The IoT
security is used to create the IoT solution
that can make the Mitigation design is
easier. The IoT plays a vital role on all
application domains. It is used to develop
the end to end solutions by support the IoT
based innovations. . This paper also
identifies the significant vulnerability to
access the network system accessibility. The
key and enhanced authentication
establishment scheme to provide the secure
IoT. The challenges of Security and privacy
for IoT solution is can be identified and
addressed by follows the secure systems
development life cycle practices, periodic
penetration testing activities and secure code
practices.
1. Introduction
IOT SECURITY AND PRIVACY
REGIME/CHALLENGES IN ALL
DOMAINS OF IOT
The security and privacy challenges for IoT
are captivating the organizations. It faces the
many security and privacy challenges and
issues in the entire domain. It has the rise to
challenges for privacy, security and
assurance in the IoT. This research the
security and privacy challenges and it is
used to arguable the significant challenge
and it fundamental to encourage the IoT
coordination and standardization. The
internets of things will become the core
component of future internet. The IoT is
used to sensing and actuating the capabilities
in internet and it creates the unique. The IoT
system should be secure and provide the
necessary privacy and controls to the users
and it is used to enabling the protocols and
technologies. It also analyzes the security
vulnerabilities and challenges of the
different underlying the protocols and
Technologies. This project is used to
identify the key challenges and needs for
privacy, security and governance. It also
surveys the existing research in IoT for
privacy, security and governance. The IoT
security is used to create the IoT solution
that can make the Mitigation design is
easier. The IoT plays a vital role on all
application domains. It is used to develop
the end to end solutions by support the IoT
based innovations. . This paper also
identifies the significant vulnerability to
access the network system accessibility. The
key and enhanced authentication
establishment scheme to provide the secure
IoT. The challenges of Security and privacy
for IoT solution is can be identified and
addressed by follows the secure systems
development life cycle practices, periodic
penetration testing activities and secure code
practices.
1. Introduction
IOT SECURITY AND PRIVACY
REGIME/CHALLENGES IN ALL
DOMAINS OF IOT

The internet of things is a concept
being increasingly supported by various
markets and stakeholder focuses. The IoT
idea is used to connect the different objects
and devices through wired and wireless
connections and unique addressing schemes.
It creates the pervasive environment to
interact the users at any time with physical
and digital world. The IoT decompresses the
virtual machines and virtual objects because
it has the evolving digital attributes and
personalities. It creates the new and exciting
opportunities to interaction between the
users and it operating at digital world. It also
creates the new legislative and technical
frameworks to control over such a complex
and large environment. It is used to avoiding
the unnecessary constraints to develop the
IoT market. It has various aspects like
privacy, security and governance and it
cannot be separated from the ethical aspects.
The IoT also used to identify and define the
overall framework. The IoT perform the
application domains and it expected to
transform every business domain like health
care, life sciences, logistics, manufacturing,
home automation, banking services,
financial services, retail services and
industrial services. The IoT develop the full
end to end solution and support the IoT
based innovations.
The IoT system should be secure and
provide the necessary privacy and controls
to the users. This paper discusses the IoT
security and privacy in all the domains at
different levels. It presents the exhaustive
survey of privacy and security issues in the
IoT systems and it used to enabling the
protocols and technologies. It also analyzes
the security vulnerabilities and challenges of
the different underlying the protocols and
technologies. It explores the current privacy
issues of IoT systems. It is also captivating
the organization because it transforms the
people and business lives. It comprises the
sensors and devices communication and
interaction with other environments, objects
and machines. The IoT systems analyzed
and processed the data to generate the
meaningful information and it performs the
actionable decision making.
This project is used to identify the key
challenges and needs for privacy, security
and governance. It also surveys the existing
research in IoT for privacy, security and
governance. It defines the framework
derived from the required research and it
also identifies the framework gaps and it
required for future research. This paper also
discusses the IoT trend and tries to
anticipate the major issues and challenges in
teams of reliability, security, usability and
being increasingly supported by various
markets and stakeholder focuses. The IoT
idea is used to connect the different objects
and devices through wired and wireless
connections and unique addressing schemes.
It creates the pervasive environment to
interact the users at any time with physical
and digital world. The IoT decompresses the
virtual machines and virtual objects because
it has the evolving digital attributes and
personalities. It creates the new and exciting
opportunities to interaction between the
users and it operating at digital world. It also
creates the new legislative and technical
frameworks to control over such a complex
and large environment. It is used to avoiding
the unnecessary constraints to develop the
IoT market. It has various aspects like
privacy, security and governance and it
cannot be separated from the ethical aspects.
The IoT also used to identify and define the
overall framework. The IoT perform the
application domains and it expected to
transform every business domain like health
care, life sciences, logistics, manufacturing,
home automation, banking services,
financial services, retail services and
industrial services. The IoT develop the full
end to end solution and support the IoT
based innovations.
The IoT system should be secure and
provide the necessary privacy and controls
to the users. This paper discusses the IoT
security and privacy in all the domains at
different levels. It presents the exhaustive
survey of privacy and security issues in the
IoT systems and it used to enabling the
protocols and technologies. It also analyzes
the security vulnerabilities and challenges of
the different underlying the protocols and
technologies. It explores the current privacy
issues of IoT systems. It is also captivating
the organization because it transforms the
people and business lives. It comprises the
sensors and devices communication and
interaction with other environments, objects
and machines. The IoT systems analyzed
and processed the data to generate the
meaningful information and it performs the
actionable decision making.
This project is used to identify the key
challenges and needs for privacy, security
and governance. It also surveys the existing
research in IoT for privacy, security and
governance. It defines the framework
derived from the required research and it
also identifies the framework gaps and it
required for future research. This paper also
discusses the IoT trend and tries to
anticipate the major issues and challenges in
teams of reliability, security, usability and

performance. It also address the data
management, machine learning, privacy,
security, communication and storage aspects
because it enabling the data security for the
internet of things. It has the potential to
provide the unprecedented and huge
amounts of personal information. It also
defines the potential actions to implement
the new opportunities that are used to
deliver the security and privacy of the users.
The IoT security is used to create the IoT
solution that can make the mitigation design
is easier. The challenges of Security and
privacy for IoT solution is can be identified
and addressed by follows the secure systems
development life cycle practices, periodic
penetration testing activities and secure code
practices.
2. Literature Review
According to this paper (Alur et al.,
2018), the internet of things has the potential
challenges and these are addressed to have a
profound impact on our daily lives like for
managing our natural resources, for
transportation, for health and for home.
These are largely driven by the ideas and
information generated by people. These are
sensing the hardware have enabled
computers to more easily observer the
digital and physical world. The IoT require
the broad approach that expertise in
hardware and sensing, human computer
interaction, privacy, security, machine
learning and networked systems. The IoT
making the strategies and spurring its
ultimate adoption also it requires the
multifaceted approach with concerns over
public privacy, public, data security and
regulatory issues. It searches the best
practices to building the secure and robust
system is insufficient to identify the new
challenges that IoT systems. The IoT system
creates the opportunities like an internet of
health care things, smart homes and smart
cities. The Internet of healthcare things
opportunities can spur a revolution in
consumer health, healthcare delivery and
medicine. It provide the improved, cost
effective, personalized medical care,
wellness and pervasive. The IoT also
improves the nursing homes, continuous
care, assisted living and hospitals.
Generally, the IoT infrastructure has the
potential to revolutionize the medicine
practices. The smart home opportunity has
the dream for decades but the lack of
compelling user experiences and practical
technology. The emerging IoT technologies
to have the possibility to identify the
security and privacy challenge by enabling
the consumers to instrument their own
management, machine learning, privacy,
security, communication and storage aspects
because it enabling the data security for the
internet of things. It has the potential to
provide the unprecedented and huge
amounts of personal information. It also
defines the potential actions to implement
the new opportunities that are used to
deliver the security and privacy of the users.
The IoT security is used to create the IoT
solution that can make the mitigation design
is easier. The challenges of Security and
privacy for IoT solution is can be identified
and addressed by follows the secure systems
development life cycle practices, periodic
penetration testing activities and secure code
practices.
2. Literature Review
According to this paper (Alur et al.,
2018), the internet of things has the potential
challenges and these are addressed to have a
profound impact on our daily lives like for
managing our natural resources, for
transportation, for health and for home.
These are largely driven by the ideas and
information generated by people. These are
sensing the hardware have enabled
computers to more easily observer the
digital and physical world. The IoT require
the broad approach that expertise in
hardware and sensing, human computer
interaction, privacy, security, machine
learning and networked systems. The IoT
making the strategies and spurring its
ultimate adoption also it requires the
multifaceted approach with concerns over
public privacy, public, data security and
regulatory issues. It searches the best
practices to building the secure and robust
system is insufficient to identify the new
challenges that IoT systems. The IoT system
creates the opportunities like an internet of
health care things, smart homes and smart
cities. The Internet of healthcare things
opportunities can spur a revolution in
consumer health, healthcare delivery and
medicine. It provide the improved, cost
effective, personalized medical care,
wellness and pervasive. The IoT also
improves the nursing homes, continuous
care, assisted living and hospitals.
Generally, the IoT infrastructure has the
potential to revolutionize the medicine
practices. The smart home opportunity has
the dream for decades but the lack of
compelling user experiences and practical
technology. The emerging IoT technologies
to have the possibility to identify the
security and privacy challenge by enabling
the consumers to instrument their own
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

homes. The smart cities opportunities are
used to provide the major uses for the IoT.
The IoT systems also create the dramatic
business opportunities and provide the best
benefits for society. It improving the
existing IoT systems by requires the high
quality and new complexities.
This paper (Mendez, Papapanagiotou
& Yang, 2018) describes the internet of
things is intended for different entities to
provide the efficient and effective solutions
for network and security devices challenging
issues. The IoT system significant
challenges are emerged as security and
privacy of IoT. This research is used to
provide the survey related to the security
and privacy challenges of the Internet of
things. It also focuses on IoT intrinsic
vulnerabilities and security challenges of
different layers based on the security
principles of data availability, integrity and
confidentiality. The huge number of aspects
are involves the successful implementation
of the IoT consideration by using the
technology. These technologies are used for
communication by using various
communication protocols. The backbone of
IoT is used for embedded devices, software
and communication. It makes the IoT
vulnerable and risky under the terms of
security in the IoT. The IoT uses the
technical platforms and it divide into three
components like hardware, presentation and
middleware. These are used to determining
the paradigm of the IoT. The IoT systems
are composed of three layers like
application, network and perception layers.
The IoT devices the security issues based on
different instances like privacy, ethical and
technological concerns. The on-demand IoT
devices are has the set of security
requirement to secure the authentication,
bootstrapping, data transmission, access to
data by authorized persons and IoT data.
The Security requirement for IoT includes
the attach resiliency, intrusion detection
technology access control, client privacy and
data authentication. It is used to secure the
embedded computer devices by using the
different terminologies.
According to this paper (Subramanian,
Vellore Gopal & Muthusamy, 2018)
describes the security and privacy
challenges of IoT enabled solutions. The IoT
is potential to rapidly transform the people
and business lives. Generally the IoT
comprises the sensors and devices are
interacting and communicating with the
environments, objects and machines. The
IoT plays a vital role on all application
domains. It is used to develop the end to end
used to provide the major uses for the IoT.
The IoT systems also create the dramatic
business opportunities and provide the best
benefits for society. It improving the
existing IoT systems by requires the high
quality and new complexities.
This paper (Mendez, Papapanagiotou
& Yang, 2018) describes the internet of
things is intended for different entities to
provide the efficient and effective solutions
for network and security devices challenging
issues. The IoT system significant
challenges are emerged as security and
privacy of IoT. This research is used to
provide the survey related to the security
and privacy challenges of the Internet of
things. It also focuses on IoT intrinsic
vulnerabilities and security challenges of
different layers based on the security
principles of data availability, integrity and
confidentiality. The huge number of aspects
are involves the successful implementation
of the IoT consideration by using the
technology. These technologies are used for
communication by using various
communication protocols. The backbone of
IoT is used for embedded devices, software
and communication. It makes the IoT
vulnerable and risky under the terms of
security in the IoT. The IoT uses the
technical platforms and it divide into three
components like hardware, presentation and
middleware. These are used to determining
the paradigm of the IoT. The IoT systems
are composed of three layers like
application, network and perception layers.
The IoT devices the security issues based on
different instances like privacy, ethical and
technological concerns. The on-demand IoT
devices are has the set of security
requirement to secure the authentication,
bootstrapping, data transmission, access to
data by authorized persons and IoT data.
The Security requirement for IoT includes
the attach resiliency, intrusion detection
technology access control, client privacy and
data authentication. It is used to secure the
embedded computer devices by using the
different terminologies.
According to this paper (Subramanian,
Vellore Gopal & Muthusamy, 2018)
describes the security and privacy
challenges of IoT enabled solutions. The IoT
is potential to rapidly transform the people
and business lives. Generally the IoT
comprises the sensors and devices are
interacting and communicating with the
environments, objects and machines. The
IoT plays a vital role on all application
domains. It is used to develop the end to end

solutions by support the IoT based
innovations. Basically, the IoT is
interconnected in a home, business,
industrial setting and it is used to gather the
information and state for IoT capability to
send the other systems. The IoT network and
cloud infrastructure is connected with
internet protocol system like gateways,
repeaters and routers. The network and
cloud infrastructure is used to provide
required hardware and processing power and
capacity for IoT. This paper addresses the
security and privacy challenges and concern
for IoT. Generally IoT promises to gives the
ubiquitous and unprecedented access to the
users. The major challenge for IoT is
insufficient authorization and authentication,
default credentials, lack of transport
encryption and privacy concerns.
This paper (Lin & Bergmann, 2018)
says the IoT privacy and security challenges
for smart home environment. The IoT is
considered as a domain with purposed
solutions and it intended to be applied across
a wide range of applications. The security
and privacy needs the infrastructure and
sensitive commercial operations. The human
and financial resources are used to
implement the privacy and security issues
between the application domains. It
enhancing the IoT security and identifies the
key future requirement for IoT. The IoT has
the high system availability to reduce the
security and privacy issues. The IoT uses the
gained traction to describe the connection of
non-traditional devices like domestic
appliances, factory machinery and medical
equipment. This paper also identifies the
significant vulnerability to access the
network system accessibility. The key and
enhanced authentication establishment
scheme to provide the secure IoT. The IoT
security directions work underway to
provide the secure mission critical IoT
applications. It was developing the IP
compatible secure communication networks.
This paper describes the security approaches
in IoT provide the secure smart home
applications. It makes the effective security
mechanisms and policies to develop,
maintain, enforce and implement the IoT
systems.
3. Issues/ Challenges/ Solutions
3.1 Security and privacy challenges
in IoT
Generally, IoT promises to gives the
ubiquitous and unprecended access to the
devices and it is used to create everything
from transportation systems, health and
wellness devices and assembly lines. The
innovations. Basically, the IoT is
interconnected in a home, business,
industrial setting and it is used to gather the
information and state for IoT capability to
send the other systems. The IoT network and
cloud infrastructure is connected with
internet protocol system like gateways,
repeaters and routers. The network and
cloud infrastructure is used to provide
required hardware and processing power and
capacity for IoT. This paper addresses the
security and privacy challenges and concern
for IoT. Generally IoT promises to gives the
ubiquitous and unprecedented access to the
users. The major challenge for IoT is
insufficient authorization and authentication,
default credentials, lack of transport
encryption and privacy concerns.
This paper (Lin & Bergmann, 2018)
says the IoT privacy and security challenges
for smart home environment. The IoT is
considered as a domain with purposed
solutions and it intended to be applied across
a wide range of applications. The security
and privacy needs the infrastructure and
sensitive commercial operations. The human
and financial resources are used to
implement the privacy and security issues
between the application domains. It
enhancing the IoT security and identifies the
key future requirement for IoT. The IoT has
the high system availability to reduce the
security and privacy issues. The IoT uses the
gained traction to describe the connection of
non-traditional devices like domestic
appliances, factory machinery and medical
equipment. This paper also identifies the
significant vulnerability to access the
network system accessibility. The key and
enhanced authentication establishment
scheme to provide the secure IoT. The IoT
security directions work underway to
provide the secure mission critical IoT
applications. It was developing the IP
compatible secure communication networks.
This paper describes the security approaches
in IoT provide the secure smart home
applications. It makes the effective security
mechanisms and policies to develop,
maintain, enforce and implement the IoT
systems.
3. Issues/ Challenges/ Solutions
3.1 Security and privacy challenges
in IoT
Generally, IoT promises to gives the
ubiquitous and unprecended access to the
devices and it is used to create everything
from transportation systems, health and
wellness devices and assembly lines. The

Major privacy and security challenges are
listed in below (Alur et al., 2018).
ï‚· Lack of transport encryption
It is most common challenges
in IoT. Most of the IoT devices are
fail to encrypt the data that are being
transferred when IoT devices
connected to the internet. So, here
occurs the lack of transport
encryption
ï‚· Privacy concerns
In health care, the IoT
devices are collect the at least one
personal information, but sometimes
the vast majority IoT devices are
collect only the personal information
like username and date of birth and
the information are transmit across
the network with encryption. So,
here makes the more privacy risk.
This is one main privacy challenges
in IoT.
ï‚· Lack of secure code practices
The business and services
logics are developed without
adhering the secure code practices.
So, here also occur the security
challenges (Mendez, Papapanagiotou
& Yang, 2018).
ï‚· Insufficient Authorization and
Authentication
Generally, huge number of
users is uses the simple passwords
and authorization on IoT devices.
So, it creates the insufficient
authentication. Many devices are
simply accepting the passwords as
"1234".
ï‚· Default Credentials
Most of devices are use the
default username and passwords and
it creates the default credentials
issues on IoT. Because, most of
devices and sensors are configured to
uses the default passwords and
username.
ï‚· Insecure web/mobile interface
In device management, the
most of IoT based solutions are has
the web and mobile interface to
consumption the aggregated data.
But, here web interfaces are found to
be prone to open web application
with contains the vulnerabilities like
cross site scripting vulnerabilities,
weak default credentials and poor
session management.
The IoT expands the critical national
infrastructure to provide the secure systems
and it is based on IoT principles from CIA
information security. The CIA expanded in
to confidentiality, integrity and availability.
listed in below (Alur et al., 2018).
ï‚· Lack of transport encryption
It is most common challenges
in IoT. Most of the IoT devices are
fail to encrypt the data that are being
transferred when IoT devices
connected to the internet. So, here
occurs the lack of transport
encryption
ï‚· Privacy concerns
In health care, the IoT
devices are collect the at least one
personal information, but sometimes
the vast majority IoT devices are
collect only the personal information
like username and date of birth and
the information are transmit across
the network with encryption. So,
here makes the more privacy risk.
This is one main privacy challenges
in IoT.
ï‚· Lack of secure code practices
The business and services
logics are developed without
adhering the secure code practices.
So, here also occur the security
challenges (Mendez, Papapanagiotou
& Yang, 2018).
ï‚· Insufficient Authorization and
Authentication
Generally, huge number of
users is uses the simple passwords
and authorization on IoT devices.
So, it creates the insufficient
authentication. Many devices are
simply accepting the passwords as
"1234".
ï‚· Default Credentials
Most of devices are use the
default username and passwords and
it creates the default credentials
issues on IoT. Because, most of
devices and sensors are configured to
uses the default passwords and
username.
ï‚· Insecure web/mobile interface
In device management, the
most of IoT based solutions are has
the web and mobile interface to
consumption the aggregated data.
But, here web interfaces are found to
be prone to open web application
with contains the vulnerabilities like
cross site scripting vulnerabilities,
weak default credentials and poor
session management.
The IoT expands the critical national
infrastructure to provide the secure systems
and it is based on IoT principles from CIA
information security. The CIA expanded in
to confidentiality, integrity and availability.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

It IoT securing systems also based on five
pillars of information’s assurance like
confidentiality, non- repudiation, authority,
availability and integrity. These are used to
compromises the information assets in IoT.
The IoT principles are used to provide the
reliability, safety, robustness, performability
and survivability. These components are
considered to provide the security in
complex physical system like IoT. The
privacy is a major concern in IoT because
the IoT has the enormous quantity of data to
establish the IoT intentions and
opportunities (Subramanian, Vellore Gopal
& Muthusamy, 2018). It also provide the
great opportunities for improved services
and desire the privacy, because vital
consumers are trust the IoT services they
engage with to respect their privacy. The
detailed security and privacy challenges are
discussed in below.
Context based privacy and security
challenges
The context based privacy and security
is able to address the changes in the IoT
context that it IoT context do not support the
processing and collection of data from
sensor. So, here they must be IoT devices
are address and provide the information
about context changes to the users. For
example, the surveillance camera provides
information about the bad quality images
that produce the false result. So, IoT must be
ensures the trust and security of the system.
The privacy and security framework for IoT
is used to provide the features to access the
context granularity information and their
conditions to evaluate the access rules and
access capability token. It is used to enhance
the context awareness and it needs to
support the integration and orchestration of
various services. It use the defined security
and privacy technologies for a context in
incorrect way, so it generating the
vulnerabilities (Lin & Bergmann, 2018).
IoT and Cyber Physical Systems
The IoT facing the challenges in cyber
physical systems, because the deployment
and development of technologies and
systems that provides the tight coupling
between the physical environments and
computing devices. For example, the sensors
are used to monitoring the person’s health
and increase the safety on workplaces. The
cyber physical systems provide the services
that impact the citizens safety but, sometime
the cyber physical systems does not provide
the safety of the person that time it creates
the risk.
Distributed environment identification
The identification in distributed
environment is the closed tied to IoT
pillars of information’s assurance like
confidentiality, non- repudiation, authority,
availability and integrity. These are used to
compromises the information assets in IoT.
The IoT principles are used to provide the
reliability, safety, robustness, performability
and survivability. These components are
considered to provide the security in
complex physical system like IoT. The
privacy is a major concern in IoT because
the IoT has the enormous quantity of data to
establish the IoT intentions and
opportunities (Subramanian, Vellore Gopal
& Muthusamy, 2018). It also provide the
great opportunities for improved services
and desire the privacy, because vital
consumers are trust the IoT services they
engage with to respect their privacy. The
detailed security and privacy challenges are
discussed in below.
Context based privacy and security
challenges
The context based privacy and security
is able to address the changes in the IoT
context that it IoT context do not support the
processing and collection of data from
sensor. So, here they must be IoT devices
are address and provide the information
about context changes to the users. For
example, the surveillance camera provides
information about the bad quality images
that produce the false result. So, IoT must be
ensures the trust and security of the system.
The privacy and security framework for IoT
is used to provide the features to access the
context granularity information and their
conditions to evaluate the access rules and
access capability token. It is used to enhance
the context awareness and it needs to
support the integration and orchestration of
various services. It use the defined security
and privacy technologies for a context in
incorrect way, so it generating the
vulnerabilities (Lin & Bergmann, 2018).
IoT and Cyber Physical Systems
The IoT facing the challenges in cyber
physical systems, because the deployment
and development of technologies and
systems that provides the tight coupling
between the physical environments and
computing devices. For example, the sensors
are used to monitoring the person’s health
and increase the safety on workplaces. The
cyber physical systems provide the services
that impact the citizens safety but, sometime
the cyber physical systems does not provide
the safety of the person that time it creates
the risk.
Distributed environment identification
The identification in distributed
environment is the closed tied to IoT

security and privacy. The IoT multiple
layers are uses the different forms of
identification that are key component for
IoT. These components are identified from
embedded in the end device and it used to
enabling the message discovery and routing.
The IoT use the form of identification and it
has the set of influencing factors to create
the IoT divergence. It exploits the
established applications and elements and it
creates the advantageous for IoT (Maple,
2018). But, the distributed environments are
challenging because it uses the functional
and interoperable technologies. So, the IoT
faces the test such as variety of technologies
and their characteristics, variety of near edge
and edge domain functionalities, breadth of
legacy applications and opaque shareholder
value propositions.
Device Authentication
Many systems are bind in IoT
actuators and a sensor on proxy concept that
is sensors are communicate to powerful
entity that will be authenticates the sensors
on behalf. It effectively remains the
unprotected barrier to guaranteeing the
important security properties. The Many
devices are has the open issues like
lightweight solutions. It is occur on sensors
network domain because it does not
produced the secure.
Data Information and Correlation
Retrieval
Generally, the IoT generates the data
in many contexts and it combining the
context data may support the types of
security mechanisms. The security
mechanisms are used to allow for
enforcement of more complex security
policies. It has the ability to allow the more
complex generation for large variety of data
and also allow the detailed user profile for
large data. But, it has privacy risks based on
context data ("Internet Privacy Issues and
Why Security Is Important - CUJO", 2018).
User Data Anonymization in a Mobile
and Distributed Environment
Generally, it has two common
challenges for anonymization in IoT. First
one is related to process of data collection
during anonymize the data because it
requires the additional technology to do
anonymization. Another one is to
identification risks from data anonymizes
aggregation.
Protocol Metadata Anonymization in a
Mobile and distributed environment
Basically, communication protocols
are use the aforementioned used data as the
input because the user data’s are observed
by communicating the outsider and parties
and it must be minimized as well. The
layers are uses the different forms of
identification that are key component for
IoT. These components are identified from
embedded in the end device and it used to
enabling the message discovery and routing.
The IoT use the form of identification and it
has the set of influencing factors to create
the IoT divergence. It exploits the
established applications and elements and it
creates the advantageous for IoT (Maple,
2018). But, the distributed environments are
challenging because it uses the functional
and interoperable technologies. So, the IoT
faces the test such as variety of technologies
and their characteristics, variety of near edge
and edge domain functionalities, breadth of
legacy applications and opaque shareholder
value propositions.
Device Authentication
Many systems are bind in IoT
actuators and a sensor on proxy concept that
is sensors are communicate to powerful
entity that will be authenticates the sensors
on behalf. It effectively remains the
unprotected barrier to guaranteeing the
important security properties. The Many
devices are has the open issues like
lightweight solutions. It is occur on sensors
network domain because it does not
produced the secure.
Data Information and Correlation
Retrieval
Generally, the IoT generates the data
in many contexts and it combining the
context data may support the types of
security mechanisms. The security
mechanisms are used to allow for
enforcement of more complex security
policies. It has the ability to allow the more
complex generation for large variety of data
and also allow the detailed user profile for
large data. But, it has privacy risks based on
context data ("Internet Privacy Issues and
Why Security Is Important - CUJO", 2018).
User Data Anonymization in a Mobile
and Distributed Environment
Generally, it has two common
challenges for anonymization in IoT. First
one is related to process of data collection
during anonymize the data because it
requires the additional technology to do
anonymization. Another one is to
identification risks from data anonymizes
aggregation.
Protocol Metadata Anonymization in a
Mobile and distributed environment
Basically, communication protocols
are use the aforementioned used data as the
input because the user data’s are observed
by communicating the outsider and parties
and it must be minimized as well. The

anonymization of user data is not provides
the protection from distributed environment
element. The anonymization and encryption
of user data guaranteed the communication
of Meta data becomes the issues in IoT. So,
resolving these issues to replacing the long
term hardware and software identifiers to
minimizing the tracking in IoT devices
("The Internet of Things (IoT): An
Overview", 2018).
Device Scalability challenges in IoT
Basically, IoT has to master to connect
the systems, resource constraints and
communication technologies. It faces the
challenges based on interaction patterns of
substantial differences and unbounded
number of interacting entities. It use the
Attribute based access control and role
based access control systems to fully
identifies the challenges by providing the
efficient, scalable, effective and manageable
access control mechanisms.
Secure setup and configuration challenges
The secure setup and configuration are
related to solving the challenge of scalability
for the IoT. To secure the IoT setup and
configuration on devices requires the
security architecture with appropriate
mechanisms. It also requires the
cryptographic credentials to process the
bootstrapping to install the IoT devices and
it effectively presents the significant
challenges in IoT environment ("Advantages
of IoT | Disadvantages of IoT | Internet of
Things", 2018).
IoT in Critical Infrastructure
The Critical infrastructure in IoT is
used to describe the security and privacy
aspect to use of IoT in critical infrastructure.
It also defines the IoT evaluation that may
impact the management and deployment of
critical infrastructures. The IoT has the
critical infrastructure issues to assess the
new risks based on deployment of IoT
devices and technologies in critical
infrastructures. It also has the privacy and
security vulnerabilities to deployment the
issues.
IoT in an Evolving Internet
The IoT is to considering the influence
of the Internet evolution and it surely
affected itself by the internet evolution. It
has two principles like how internet is used
and technical platform configuration
elements. The evolving internet creates the
challenges for surveillance, law enforcement
and big data etc.
3.2 Security and privacy Issues in
IoT
The security and privacy issues in IoT
discussed in below.
the protection from distributed environment
element. The anonymization and encryption
of user data guaranteed the communication
of Meta data becomes the issues in IoT. So,
resolving these issues to replacing the long
term hardware and software identifiers to
minimizing the tracking in IoT devices
("The Internet of Things (IoT): An
Overview", 2018).
Device Scalability challenges in IoT
Basically, IoT has to master to connect
the systems, resource constraints and
communication technologies. It faces the
challenges based on interaction patterns of
substantial differences and unbounded
number of interacting entities. It use the
Attribute based access control and role
based access control systems to fully
identifies the challenges by providing the
efficient, scalable, effective and manageable
access control mechanisms.
Secure setup and configuration challenges
The secure setup and configuration are
related to solving the challenge of scalability
for the IoT. To secure the IoT setup and
configuration on devices requires the
security architecture with appropriate
mechanisms. It also requires the
cryptographic credentials to process the
bootstrapping to install the IoT devices and
it effectively presents the significant
challenges in IoT environment ("Advantages
of IoT | Disadvantages of IoT | Internet of
Things", 2018).
IoT in Critical Infrastructure
The Critical infrastructure in IoT is
used to describe the security and privacy
aspect to use of IoT in critical infrastructure.
It also defines the IoT evaluation that may
impact the management and deployment of
critical infrastructures. The IoT has the
critical infrastructure issues to assess the
new risks based on deployment of IoT
devices and technologies in critical
infrastructures. It also has the privacy and
security vulnerabilities to deployment the
issues.
IoT in an Evolving Internet
The IoT is to considering the influence
of the Internet evolution and it surely
affected itself by the internet evolution. It
has two principles like how internet is used
and technical platform configuration
elements. The evolving internet creates the
challenges for surveillance, law enforcement
and big data etc.
3.2 Security and privacy Issues in
IoT
The security and privacy issues in IoT
discussed in below.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Security and Privacy Issues in Health
care
Security issues in health care are
recently increased because number of
attacks carried out in the hospital. They have
a myriad of actual and potential attacks on
individual connected devices like pace
makers, insulin pumps, electronic health
implants and delivery systems. Basically,
the attacks are carried out that are targeted
communications protocols and devices.
Because, the security flows are found in the
communication protocols. The hackers are
consider the black mail and extortion of
people with the illnesses and the similar
attacks are carried out on the availability,
integrity and confidentiality of IoT enabled
well-being like impact from the breaches on
integrity and availability ("The advantages
and disadvantages of Internet Of Things",
2018).
Security and Privacy Issues in Industry
In Industry, IoT has the security and
privacy issues and it has been heralded as a
transformation al moves to the autonomy,
data and connectivity that are used to creates
the revolution of fourth industrial. But, it has
the exits number of threats to the cyber
physical systems. It similarly has the attacks
on computer and it has confidentiality of
information to lead the loss of competitive
advantage in the market (Gaglio & Lo Re,
2014).
Security and Privacy Issues in Logistics
Generally, the IoT provides the
business opportunity and significant
efficiency in logistics. It has many
applications to makes the large attack
surface. The attacks are recongized that will
be manipulated into embedded data by
malicious substitution of tags. It is used to
modify the tag information because it faces
the risks. The recognized data for logistics
also involve the sea, rail and air. So, it has
particular vulnerability concerns about the
modification of ship details like mobile
maritime service identity, speed, name,
flagged country, cargo, position, name and
position. So, it creates the fake vessel with
risks. To resolve this issue to compromised
the integrity and confidentiality of the
system.
Security and Privacy issues in
autonomous and connected vehicles
The connected and autonomous area is
has small and simple services running on the
few component through the global services.
It is very complex and involves the various
kinds of infrastructure, communication
protocols, actuators, sensors and services. It
is also involving the significant parts of the
critical infrastructure. (Acharjya & Geetha,
care
Security issues in health care are
recently increased because number of
attacks carried out in the hospital. They have
a myriad of actual and potential attacks on
individual connected devices like pace
makers, insulin pumps, electronic health
implants and delivery systems. Basically,
the attacks are carried out that are targeted
communications protocols and devices.
Because, the security flows are found in the
communication protocols. The hackers are
consider the black mail and extortion of
people with the illnesses and the similar
attacks are carried out on the availability,
integrity and confidentiality of IoT enabled
well-being like impact from the breaches on
integrity and availability ("The advantages
and disadvantages of Internet Of Things",
2018).
Security and Privacy Issues in Industry
In Industry, IoT has the security and
privacy issues and it has been heralded as a
transformation al moves to the autonomy,
data and connectivity that are used to creates
the revolution of fourth industrial. But, it has
the exits number of threats to the cyber
physical systems. It similarly has the attacks
on computer and it has confidentiality of
information to lead the loss of competitive
advantage in the market (Gaglio & Lo Re,
2014).
Security and Privacy Issues in Logistics
Generally, the IoT provides the
business opportunity and significant
efficiency in logistics. It has many
applications to makes the large attack
surface. The attacks are recongized that will
be manipulated into embedded data by
malicious substitution of tags. It is used to
modify the tag information because it faces
the risks. The recognized data for logistics
also involve the sea, rail and air. So, it has
particular vulnerability concerns about the
modification of ship details like mobile
maritime service identity, speed, name,
flagged country, cargo, position, name and
position. So, it creates the fake vessel with
risks. To resolve this issue to compromised
the integrity and confidentiality of the
system.
Security and Privacy issues in
autonomous and connected vehicles
The connected and autonomous area is
has small and simple services running on the
few component through the global services.
It is very complex and involves the various
kinds of infrastructure, communication
protocols, actuators, sensors and services. It
is also involving the significant parts of the
critical infrastructure. (Acharjya & Geetha,

2017) It encompasses the potential system
and it implemented the attacks. It also
highlights the most significant attacks on
connected and autonomous vehicles. Most
of connected and autonomous vehicles are
integrated with electronic control units for
applications like engine control, suspension,
transmission, braking and steering.
Generally, the likelihood of cyber-attacks
are carried out in connected vehicle and it
increasing the importance of those vehicles.
But, it creates the significant emerging risks
to the availability and integrity of connected
and autonomous systems.
Security and Privacy issues in homes,
offices and building
Generally, the vast range of devices for
smart homes is used to providing the
intelligent resource efficiency through the
instant and remote access and control. These
services are used to provides the financial
and economic benefits and but it increase
the security risks that is devices are
represent to privacy and confidentiality
(BAKIR, 2018). It uses the high energy
consumption to provide the profiling
inferences. In homes, offices and building,
the IoT uses the connected home device and
their contribution, so it creates the Dyn
attacks because the devices are connected
with the door bells, routers, printers, camera,
weighing scale and many others. It creates
the lack of availability of devices that are
inconvenient. The hackers are target the
smart homes and offices that will be
building the automation and control systems,
because the attackers are utilizing the access
to control systems with internet connected
devices.
Security and Privacy issues in Smart Grid
The smart grid in IoT has security and
privacy issues. The hackers are attacks the
smart grid on critical national infrastructure
for energy. It attempts to disrupt the
availability in the cyber physical systems.
The attacks are identified by using the smart
grid technologies. The attacks are always at
the critical national infrastructure level but it
can occur on down the architecture. To
utilize these issues to use the CEMS and it is
used to determine and balance the
requirements of community power like
generators sizes, capacity and transmission
lines. It also meets the demand. The CEMS
have to display the vulnerable to Denial of
services attacks and it compromising the
both integrity and availability (Chaouchi,
2013).
3.3 Mitigating the Privacy and
Security Challenges
The IoT devices and products are
make securely in production life cycle
and it implemented the attacks. It also
highlights the most significant attacks on
connected and autonomous vehicles. Most
of connected and autonomous vehicles are
integrated with electronic control units for
applications like engine control, suspension,
transmission, braking and steering.
Generally, the likelihood of cyber-attacks
are carried out in connected vehicle and it
increasing the importance of those vehicles.
But, it creates the significant emerging risks
to the availability and integrity of connected
and autonomous systems.
Security and Privacy issues in homes,
offices and building
Generally, the vast range of devices for
smart homes is used to providing the
intelligent resource efficiency through the
instant and remote access and control. These
services are used to provides the financial
and economic benefits and but it increase
the security risks that is devices are
represent to privacy and confidentiality
(BAKIR, 2018). It uses the high energy
consumption to provide the profiling
inferences. In homes, offices and building,
the IoT uses the connected home device and
their contribution, so it creates the Dyn
attacks because the devices are connected
with the door bells, routers, printers, camera,
weighing scale and many others. It creates
the lack of availability of devices that are
inconvenient. The hackers are target the
smart homes and offices that will be
building the automation and control systems,
because the attackers are utilizing the access
to control systems with internet connected
devices.
Security and Privacy issues in Smart Grid
The smart grid in IoT has security and
privacy issues. The hackers are attacks the
smart grid on critical national infrastructure
for energy. It attempts to disrupt the
availability in the cyber physical systems.
The attacks are identified by using the smart
grid technologies. The attacks are always at
the critical national infrastructure level but it
can occur on down the architecture. To
utilize these issues to use the CEMS and it is
used to determine and balance the
requirements of community power like
generators sizes, capacity and transmission
lines. It also meets the demand. The CEMS
have to display the vulnerable to Denial of
services attacks and it compromising the
both integrity and availability (Chaouchi,
2013).
3.3 Mitigating the Privacy and
Security Challenges
The IoT devices and products are
make securely in production life cycle

because the IoT security is embedded in the
production life cycle. The IoT based security
solutions are based to security review to
detect the network and system
vulnerabilities. The mitigating security and
privacy challenges are listed below,
ï‚· Network traffic verification
Basically the wired and
wireless network traffics are should
be analyzed for unencrypted,
modified and intercept able data to
compromise the security and
performance. It uses the lightweight
encryption algorithms to cater the
performance requirements.
ï‚· Secure Code review
The mitigation techniques
leads to the secure code reviews
because it impact the areas like
encryption modules, security
enforcement and boot process based
on sensitive and security areas and it
should go through secure code
reviews. It is used to reduce the
security vulnerability and defect the
security during the development
cycle.
ï‚· Base device platform analysis
It is weak platform
configuration and it leads to
compromises the privilege
escalation. It is operating the system
and its features, configurations and
properties. It should be verified
against the requirements of base line
information security. It needs to
ensure the test interfaces from the
hardware.
ï‚· Trust fault injection and boundary
review
IoT uses the negative test
cases to trust the all boundaries
across the signal path and it should
be reviewed and subject to fault
injection. Generally, trust boundaries
are verified by using the penetration
techniques (Mahalle & Railkar,
2015).
ï‚· End to end penetration test
This test should be conducted
across the signal path to identify the
vulnerabilities in the cloud interface,
web interface and mobile interface of
the IoT solutions.
ï‚· Verification of functional security
requirements
It uses the high level
functional requirements and it should
be validated and it should subject to
negative testing. The IoT solutions
use the software as a service to
production life cycle. The IoT based security
solutions are based to security review to
detect the network and system
vulnerabilities. The mitigating security and
privacy challenges are listed below,
ï‚· Network traffic verification
Basically the wired and
wireless network traffics are should
be analyzed for unencrypted,
modified and intercept able data to
compromise the security and
performance. It uses the lightweight
encryption algorithms to cater the
performance requirements.
ï‚· Secure Code review
The mitigation techniques
leads to the secure code reviews
because it impact the areas like
encryption modules, security
enforcement and boot process based
on sensitive and security areas and it
should go through secure code
reviews. It is used to reduce the
security vulnerability and defect the
security during the development
cycle.
ï‚· Base device platform analysis
It is weak platform
configuration and it leads to
compromises the privilege
escalation. It is operating the system
and its features, configurations and
properties. It should be verified
against the requirements of base line
information security. It needs to
ensure the test interfaces from the
hardware.
ï‚· Trust fault injection and boundary
review
IoT uses the negative test
cases to trust the all boundaries
across the signal path and it should
be reviewed and subject to fault
injection. Generally, trust boundaries
are verified by using the penetration
techniques (Mahalle & Railkar,
2015).
ï‚· End to end penetration test
This test should be conducted
across the signal path to identify the
vulnerabilities in the cloud interface,
web interface and mobile interface of
the IoT solutions.
ï‚· Verification of functional security
requirements
It uses the high level
functional requirements and it should
be validated and it should subject to
negative testing. The IoT solutions
use the software as a service to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

identify the authorization and
authentication requirements.
4. Future Research
The goal to achieve the security and
privacy in IoT is requires the significant
research is needed. It research some key
areas such as health care, big data, homes,
office, buildings, logistics, connected and
autonomous vehicle, industry and smart
grid. These are uses the large number of IoT
devices that are connected with together.
But, the results are to affect the system
utilization because the IoT has security and
privacy issues and challenges. So, it needs to
scaling the system and research work need
to be done and it provides the successful
working of Internet of things. The IoT does
not have standard architecture and it use the
billions of objects that are getting attached
with the internet ("IEEE Internet of Things
Journal", 2016). But, the architecture is very
important because which is adequate in
nature and it allows user to easily
communicate, control and connected the
internet. So, IoT should have architecture in
future. Generally, the IoT needs the devices
to contain the identity manager. The identity
manager is needs the fast encryption to
reduce the security and privacy issues and
challenges. To mitigate the security and
privacy challenges by using the different
method as compared to the existing one. The
research work also needs to done on the
entire domain. The IoT use the identification
of privacy requirement is a key component
for IoT and it uses the IoT system to keep
away from the security and privacy related
threats. The IoT also uses the different
interconnection and it could be on the
heterogeneity issues and its implementation.
The IoT security and privacy issues are
should be research on the capacity, storage
and data transmission issues and it will get
the increased on IoT.
5. Advantages and disadvantages
Advantages of IoT
ï‚· The network benefit is used to
provide the advantages for
individual, stake holders, businesses,
society and more due to it save the
money and time. It improves the
quality of life. The IoT systems are
used to deliver the accurate and
faster with minimum utilization of
energy.
ï‚· The IoT is generally used in
shipping, energy conservation,
inventory control, asset and
individual tracking.
authentication requirements.
4. Future Research
The goal to achieve the security and
privacy in IoT is requires the significant
research is needed. It research some key
areas such as health care, big data, homes,
office, buildings, logistics, connected and
autonomous vehicle, industry and smart
grid. These are uses the large number of IoT
devices that are connected with together.
But, the results are to affect the system
utilization because the IoT has security and
privacy issues and challenges. So, it needs to
scaling the system and research work need
to be done and it provides the successful
working of Internet of things. The IoT does
not have standard architecture and it use the
billions of objects that are getting attached
with the internet ("IEEE Internet of Things
Journal", 2016). But, the architecture is very
important because which is adequate in
nature and it allows user to easily
communicate, control and connected the
internet. So, IoT should have architecture in
future. Generally, the IoT needs the devices
to contain the identity manager. The identity
manager is needs the fast encryption to
reduce the security and privacy issues and
challenges. To mitigate the security and
privacy challenges by using the different
method as compared to the existing one. The
research work also needs to done on the
entire domain. The IoT use the identification
of privacy requirement is a key component
for IoT and it uses the IoT system to keep
away from the security and privacy related
threats. The IoT also uses the different
interconnection and it could be on the
heterogeneity issues and its implementation.
The IoT security and privacy issues are
should be research on the capacity, storage
and data transmission issues and it will get
the increased on IoT.
5. Advantages and disadvantages
Advantages of IoT
ï‚· The network benefit is used to
provide the advantages for
individual, stake holders, businesses,
society and more due to it save the
money and time. It improves the
quality of life. The IoT systems are
used to deliver the accurate and
faster with minimum utilization of
energy.
ï‚· The IoT is generally used in
shipping, energy conservation,
inventory control, asset and
individual tracking.

ï‚· The IoT also used for patient
monitoring that is used the many
types of wireless sensors are
installed on the patient body to
communicate with the IoT network
and it used to provides the patient
full information under the treatment.
ï‚· The concept of IoT is used to home
security device because it monitored
and controlled the applications either
remotely and locally on the mobile
phones. The IoT devices are used in
home automation environment like
security sensors, door lock, camera,
sensor, alarm and more.
ï‚· The IoT is also useful for indicating
the locations and conditions for
communications.
Disadvantage of IoT
ï‚· Basically, the IoT managed and run
by many technologies. So, multiple
vendors are involved in it due to
privacy and security concern. The
users are using the security
algorithms, certain precautions to
avoid the security based on threats in
IoT network.
ï‚· It takes some time for IoT system to
become completely stable and
upcoming standards being integrated
in the IoT system.
ï‚· It has the complexity because the IoT
have the various opportunities for
failure with complex systems.
ï‚· The security and privacy is a very
big issue with IoT because all the
data must be encrypted.
6. Conclusion
In this paper we have discussed the
security and privacy issues and challenges in
IoT. The Security and privacy major
challenges are identified and it is used to
standardization and a single overall vision in
the IoT environment. It has the rise to
challenges for privacy, security and
assurance in the IoT. This research is used to
arguable the significant challenge and it
fundamental to encourage the IoT
coordination and standardization. The
internets of things will become the core
component of future internet. The IoT is
used to sensing and actuating the capabilities
in internet and it creates the unique. The
Internet of things acts as bridge to connect
the both virtual and real words. It considered
the large number privacy and security
problems and information security problems
before applying the IoT. It creates the
smarter and more prevalent objects to ensure
that these objects are non-hostile
environment. It has security and privacy
challenges that are ensure that the outcomes
monitoring that is used the many
types of wireless sensors are
installed on the patient body to
communicate with the IoT network
and it used to provides the patient
full information under the treatment.
ï‚· The concept of IoT is used to home
security device because it monitored
and controlled the applications either
remotely and locally on the mobile
phones. The IoT devices are used in
home automation environment like
security sensors, door lock, camera,
sensor, alarm and more.
ï‚· The IoT is also useful for indicating
the locations and conditions for
communications.
Disadvantage of IoT
ï‚· Basically, the IoT managed and run
by many technologies. So, multiple
vendors are involved in it due to
privacy and security concern. The
users are using the security
algorithms, certain precautions to
avoid the security based on threats in
IoT network.
ï‚· It takes some time for IoT system to
become completely stable and
upcoming standards being integrated
in the IoT system.
ï‚· It has the complexity because the IoT
have the various opportunities for
failure with complex systems.
ï‚· The security and privacy is a very
big issue with IoT because all the
data must be encrypted.
6. Conclusion
In this paper we have discussed the
security and privacy issues and challenges in
IoT. The Security and privacy major
challenges are identified and it is used to
standardization and a single overall vision in
the IoT environment. It has the rise to
challenges for privacy, security and
assurance in the IoT. This research is used to
arguable the significant challenge and it
fundamental to encourage the IoT
coordination and standardization. The
internets of things will become the core
component of future internet. The IoT is
used to sensing and actuating the capabilities
in internet and it creates the unique. The
Internet of things acts as bridge to connect
the both virtual and real words. It considered
the large number privacy and security
problems and information security problems
before applying the IoT. It creates the
smarter and more prevalent objects to ensure
that these objects are non-hostile
environment. It has security and privacy
challenges that are ensure that the outcomes

are acceptable and relevant to all domain. It
is used to provide the users a way to have
control and choice regarding their data. The
IoT uses the communication protocol but it
not allows services to create an illusion of
security and privacy issues while gathering
the personal data on the each domain. It
recognized the data that has any issues they
can be resolved and provide the part of the
solution and implementing the standard
alone and adequate protection. To resolving
security and privacy issues by using the
privacy enhancing tools. The IoT maximize
the probability of industry adoption and user
acceptance by using the protocol to manage
the consent in the IoT. It should be
developed around the firmly agreed
principles to ensure the there is not mission,
it also developed the legal and regulatory
compliance and it useful for financial
implication and compliance requirement to
provide the efficient IoT. The IoT has the
key area that requires the immediate
attention for low area and low power IoT
aspects. It facing the IoT challenges in
developing the attack resistant solutions and
it has ability to recover, detect and diagnose
from the attacks. Identification and
authentication in IoT system is fundamental
for privacy and security because the IoT
systems are based on biometric
identification and it prone advantageous
compared to existing systems to ensure the
IoT systems is secure. It also ensures the
authenticity of the services, streams and
devices in the IoT. The IoT has function and
authentication that are needs to be easy
repeatable and evaluate for the security
purposes. It is used to address the issues of
compliance, interoperability, scalability with
protocols. The IoT presents the opportunity
to revolutionize the way to work and live. It
has the significant challenges to ensure the
potential practices and guidelines for
privacy and security issues in IoT.
is used to provide the users a way to have
control and choice regarding their data. The
IoT uses the communication protocol but it
not allows services to create an illusion of
security and privacy issues while gathering
the personal data on the each domain. It
recognized the data that has any issues they
can be resolved and provide the part of the
solution and implementing the standard
alone and adequate protection. To resolving
security and privacy issues by using the
privacy enhancing tools. The IoT maximize
the probability of industry adoption and user
acceptance by using the protocol to manage
the consent in the IoT. It should be
developed around the firmly agreed
principles to ensure the there is not mission,
it also developed the legal and regulatory
compliance and it useful for financial
implication and compliance requirement to
provide the efficient IoT. The IoT has the
key area that requires the immediate
attention for low area and low power IoT
aspects. It facing the IoT challenges in
developing the attack resistant solutions and
it has ability to recover, detect and diagnose
from the attacks. Identification and
authentication in IoT system is fundamental
for privacy and security because the IoT
systems are based on biometric
identification and it prone advantageous
compared to existing systems to ensure the
IoT systems is secure. It also ensures the
authenticity of the services, streams and
devices in the IoT. The IoT has function and
authentication that are needs to be easy
repeatable and evaluate for the security
purposes. It is used to address the issues of
compliance, interoperability, scalability with
protocols. The IoT presents the opportunity
to revolutionize the way to work and live. It
has the significant challenges to ensure the
potential practices and guidelines for
privacy and security issues in IoT.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

References
Acharjya, D., & Geetha, M. (2017). Internet
of Things. Cham: Springer International
Publishing.
Advantages of IoT | Disadvantages of IoT |
Internet of Things. (2018). Retrieved
from http://www.rfwireless-
world.com/Terminology/Advantages-
and-Disadvantages-of-IoT-Internet-Of-
Things.html
Alur, R., Berger, E., W. Drobnis, A., Fix, L.,
Fu, K., & D. Hager, G. et al. (2018).
Systems Computing Challenges in the
Internet of Things. Retrieved from
https://cra.org/ccc/wp-content/uploads/s
ites/2/2015/09/IoTSystemsChallenges.p
df
BAKIR, A. (2018). PROGRAM THE
INTERNET OF THINGS WITH SWIFT
FOR IOS. [S.l.]: APRESS.
Chaouchi, H. (2013). The Internet of Things.
London: Wiley.
Gaglio, S., & Lo Re, G. (2014). Advances
onto the Internet of Things. Cham:
Springer International Publishing.
IEEE Internet of Things Journal.
(2016). IEEE Internet Of Things
Journal, 3(4), C2-C2. doi:
10.1109/jiot.2016.2591761
Internet Privacy Issues and Why Security Is
Important - CUJO. (2018). Retrieved
from
https://www.getcujo.com/blog/internet-
privacy-issues-and-why-security-is-
important/
Lin, H., & Bergmann, N. (2018). IoT
Privacy and Security Challenges for
Smart Home Environments. Retrieved
from
https://www.researchgate.net/publicatio
n/301287500_The_Security_Challenges
_in_the_IoT_enabled_Cyber-
Physical_Systems_and_Opportunities_f
or_Evolutionary_Computing_Other_Co
mputational_Intelligence
Mahalle, P., & Railkar, P. (2015). Identity
Management for Internet of Things.
Aalborg: River Publishers.
Maple, C. (2018). Security and privacy in
the internet of things. Retrieved from
https://www.tandfonline.com/doi/full/1
0.1080/23738871.2017.1366536
Mendez, D., Papapanagiotou, I., & Yang, B.
(2018). Internet of Things: Survey on
Security and Privacy. Retrieved from
https://arxiv.org/pdf/1707.01879.pdf
Acharjya, D., & Geetha, M. (2017). Internet
of Things. Cham: Springer International
Publishing.
Advantages of IoT | Disadvantages of IoT |
Internet of Things. (2018). Retrieved
from http://www.rfwireless-
world.com/Terminology/Advantages-
and-Disadvantages-of-IoT-Internet-Of-
Things.html
Alur, R., Berger, E., W. Drobnis, A., Fix, L.,
Fu, K., & D. Hager, G. et al. (2018).
Systems Computing Challenges in the
Internet of Things. Retrieved from
https://cra.org/ccc/wp-content/uploads/s
ites/2/2015/09/IoTSystemsChallenges.p
df
BAKIR, A. (2018). PROGRAM THE
INTERNET OF THINGS WITH SWIFT
FOR IOS. [S.l.]: APRESS.
Chaouchi, H. (2013). The Internet of Things.
London: Wiley.
Gaglio, S., & Lo Re, G. (2014). Advances
onto the Internet of Things. Cham:
Springer International Publishing.
IEEE Internet of Things Journal.
(2016). IEEE Internet Of Things
Journal, 3(4), C2-C2. doi:
10.1109/jiot.2016.2591761
Internet Privacy Issues and Why Security Is
Important - CUJO. (2018). Retrieved
from
https://www.getcujo.com/blog/internet-
privacy-issues-and-why-security-is-
important/
Lin, H., & Bergmann, N. (2018). IoT
Privacy and Security Challenges for
Smart Home Environments. Retrieved
from
https://www.researchgate.net/publicatio
n/301287500_The_Security_Challenges
_in_the_IoT_enabled_Cyber-
Physical_Systems_and_Opportunities_f
or_Evolutionary_Computing_Other_Co
mputational_Intelligence
Mahalle, P., & Railkar, P. (2015). Identity
Management for Internet of Things.
Aalborg: River Publishers.
Maple, C. (2018). Security and privacy in
the internet of things. Retrieved from
https://www.tandfonline.com/doi/full/1
0.1080/23738871.2017.1366536
Mendez, D., Papapanagiotou, I., & Yang, B.
(2018). Internet of Things: Survey on
Security and Privacy. Retrieved from
https://arxiv.org/pdf/1707.01879.pdf

Subramanian, S., Vellore Gopal, V., &
Muthusamy, M. (2018). Security and
Privacy Challenges of IoT-enabled
Solutions, 4. Retrieved from
https://www.isaca.org/Journal/archives/
2015/Volume-4/Pages/security-and-
privacy-challenges-of-iot-enabled-
solutions.aspx
The advantages and disadvantages of
Internet Of Things. (2018). Retrieved
from https://e27.co/advantages-
disadvantages-internet-things-
20160615/
The Internet of Things (IoT): An Overview.
(2018). Retrieved from
https://www.internetsociety.org/resourc
es/doc/2015/iot-overview
Muthusamy, M. (2018). Security and
Privacy Challenges of IoT-enabled
Solutions, 4. Retrieved from
https://www.isaca.org/Journal/archives/
2015/Volume-4/Pages/security-and-
privacy-challenges-of-iot-enabled-
solutions.aspx
The advantages and disadvantages of
Internet Of Things. (2018). Retrieved
from https://e27.co/advantages-
disadvantages-internet-things-
20160615/
The Internet of Things (IoT): An Overview.
(2018). Retrieved from
https://www.internetsociety.org/resourc
es/doc/2015/iot-overview
1 out of 18
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.