Analysis of Privacy and Security Issues in the Internet of Things

Verified

Added on  2020/03/04

|47
|11521
|119
Report
AI Summary
This report presents a systematic literature review focusing on the critical privacy and security issues within the Internet of Things (IoT). It explores the increasing integration of IoT devices in daily life, highlighting both the advantages and the associated risks of data breaches and privacy violations. The study investigates the research aims, objectives, and questions concerning the security and privacy of end-users. The report examines various factors contributing to these issues, challenges in mitigation, and potential solutions. It covers the background of the study, research methodology, findings and analysis, and conclusion with recommendations, including a review of related works and a discussion of the need for enhanced security measures. The report also includes figures and tables which provides additional insights into the core principles of privacy, its applications, and limitations.
Document Page
Running head: PRIVACY AND SECURITY ISSUES IN IOT
Privacy and Security issues in IoT: A Systematic literature review
Name of the Student:
Name of the University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1PRIVACY AND SECURITY ISSUES IN IOT
Abstract
The use internet of things though is expected to be potential, major concern is the major invasion
for the privacy and security. The report is a systematic review of literature for security and
privacy preserving solutions, extracted from the media and literature. The same is expected to be
motivating to develop solution of the security and privacy, by the end users. The assumption’s
validity has to be proved, as it could not be assumed simply that the end users would have the
consistent will to the solutions engagement. This topic can also be a potential source for the
future research.
Document Page
2PRIVACY AND SECURITY ISSUES IN IOT
Acknowledgement
Conducting the research study enhances me to improve my knowledge as well as analytical
ability. It gave me the chance to face challenges all the while and conquer them. It will not be
possible to conduct the research without the significant direction of my professors, companions
and every one of who have added to this advancing knowledge. I also want to thank my
supervisor __________ for helping me in my research work as well as give their full support
during the research process. I would also thank all the participants within this study for giving
their time and helping me out. From the support of people, I am inspired to work on the research
in this subject area. Finally, thank you to my family members those help me and encourage me.
Thank You.
Document Page
3PRIVACY AND SECURITY ISSUES IN IOT
Table of Contents
Chapter 1: Introduction........................................................................................................7
1.1 Background of the study............................................................................................7
1.2 Research Aims and Objectives..................................................................................8
1.2.1 Aims of the study....................................................................................................8
1.2.2 Objectives of the study...........................................................................................8
1.3 Research Questions....................................................................................................8
1.4 Problem Statement.....................................................................................................9
1.5 Rationale of the study................................................................................................9
1.6 Structure of the study...............................................................................................10
1.7 Related works..........................................................................................................11
Figure 1: Security and privacy in IOT.......................................................................13
Chapter 2: Research Methodology....................................................................................15
2.1 Preface.....................................................................................................................15
2.2 The process of methodology....................................................................................15
2.2.1 Planning the review..............................................................................................15
2.2.2 Reviewing objectives as well as research questions.............................................15
2.3 Search sources.........................................................................................................16
2.4 Search strategy.........................................................................................................17
2.5 Inclusion and exclusion criteria...............................................................................18
2.6 Conducting the review.............................................................................................19
2.7 Methodological quality assessment.........................................................................19
2.8 Ethical considerations..............................................................................................20
2.9 Time horizons..........................................................................................................20
2.10 Summary................................................................................................................20
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4PRIVACY AND SECURITY ISSUES IN IOT
Chapter 3: Findings and analysis.......................................................................................21
3.1 Preface.....................................................................................................................21
3.2 Qualitative analysis..................................................................................................21
Figure 3: Use of IOT..................................................................................................22
Figure 2: Barriers in IOT...........................................................................................25
Figure 4: Trends of IOT security...............................................................................28
Figure 5: IOT security challenges..............................................................................34
3.3 Summary..................................................................................................................36
Chapter 4: Conclusion and recommendations...................................................................38
4.1 Conclusion...............................................................................................................38
4.2 Linking with objective.............................................................................................38
4.3 Recommendations....................................................................................................39
4.4 Limitation and future scope.....................................................................................41
References......................................................................................................................42
Appendix........................................................................................................................48
Table 1: Gantt chart...................................................................................................48
Document Page
5PRIVACY AND SECURITY ISSUES IN IOT
List of table and figures
Figure 1: Security and privacy in IOT...........................................................................................13
Figure 2: Barriers in IOT...............................................................................................................16
Figure 3: Use of IOT......................................................................................................................28
Figure 4: Trends of IOT security...................................................................................................31
Figure 5: IOT security challenges..................................................................................................34
Table 1: Gantt chart.......................................................................................................................48
Document Page
6PRIVACY AND SECURITY ISSUES IN IOT
Chapter 1: Introduction
1.1 Background of the study
Use of internet of things becomes an integral part of daily life. The forces driving it as
well as the advantages motivating it are increasingly numerous as a large number of
organization, industries as well as technologies catch the IoT big. An IoT Day – Smart home gets
ready by itself, for supporting the daily routine of the IoT user (Sicari et al. 2015). The alarm
gets activated and locking of the door by the Smartphone (Arias et al. 2015). Milk would be
added in the list, by the refrigerator to the regular list of the store shopping, for the parcels to get
ready to be picked, while on the way from the work to the home. The car is driven by itself, with
the help of numerous sensors embedded. It automatically directs itself to the spot of parking,
detected by it from the applications networked by the notifications received from the parking bay
sensors of the city.pri
However, all advantages of internet of things have brought huge risks of privacy loss as
well as security issues (Da Xu et al. 2014). The basic security weakness of internet of things is
increasing as the number of devices staying behind the firewall of network. As there are a large
number of devices attached with the process, there might be chances for hacking. On the other
hand, as internet of things applications usually collects huge number of data, data retrieval as
well as processing is integral part of entire IoT environment. In this case, most of the data is
personal as well as requires to be protected with the help of the encryption.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7PRIVACY AND SECURITY ISSUES IN IOT
1.2 Research Aims and Objectives
1.2.1 Aims of the study
The research has aims to identify the privacy as well as security issues involved with the
use of internet of things. In order to address the issues, factors and challenge to minimize the
issues are achieved in the present research. The IoT day is going to make the dreamful days to be
materialized in the very near future. The research paper and report contributes the privacy related
research of an existing IoT as an overview, for identifying the focusing areas and highlighting
the areas, demanding higher priority of attention.
1.2.2 Objectives of the study
The objectives of the research can be explained as followed.
To find out the privacy as well as security issues included in the use of internet of
things
To identify and evaluate the factors responsible for creating privacy as well as
security issues involved with internet of things
To address the challenges faced while minimizing the issues in IoT
To recommend solutions for overcoming the challenges in IoT
1.3 Research Questions
The research questions can be listed as followed.
What are the privacy and security issues involved with applications of internet of
things?
What are the factors create privacy and security issues in internet of things?
What are the challenges faced while removing the security issues in IoT?
Document Page
8PRIVACY AND SECURITY ISSUES IN IOT
How the security and privacy issues can be resolved?
1.4 Problem Statement
The IoT would sure make the typical life to be more convenient with less effort or even
effortless. However, the other dimension shows the data collection invisibility and other
concerns of processes of sharing and usage (Roman et al. 2013). The security and privacy of the
end user, ofIoT can easily be targeted. However, it is an undeniable fact that the personal
information has to be accessed by the service providers, towards the objective of tailored service
delivery. At the same time, the end user of the IoT expects to be enough secured, by protecting
their private information from any unauthorized access and prevented to be shared to the third
parties.
1.5 Rationale of the study
The new wave of connectivity is becoming applied beyond laptops as well as smart
phones. The innovation is going towards connected cars, connected wearable devices, smart
homes as well as connected healthcare. As per the report published by Gartner in 2020, the
connected devices across the technologies, it will reach up to 20.6 billion (Sadeghi et al. 2015).
The devices will bridge the gap between physical as well as digital world in order to enhance
quality as well as productivity of lie, society as well as industries. In addition, IoT catching up
Smart homes are usually considered as the most awaited implementations with brands already
getting into the competition with the smart appliances. However, the issues lie in the nature of
IoT itself. In addition, it is related to the remote gadgets and frameworks and gives an
information stream amongst gadgets and decentralized administration frameworks. The
information or even the gadgets will be joined into existing authoritative procedures to give data
Document Page
9PRIVACY AND SECURITY ISSUES IN IOT
on the area, status, movement and usefulness of those frameworks, and data about the general
population who possess and work them.
The amount as well as type of data contrasts compared to distinctive arrangements of
enormous information originates from the social networking (Jing et al. 2014). It tends to touch
the base as making constant flow as well as unfaltering pace. Specifically, it has been explore
and analysed that most of the providers of the solutions assumed that the there would be effort of
preserving the privacy and enhancing the security, by the end users. However, it can land in
clumps such as test logs effectively processed as well as passed on straight away. In addition, it
generally comes in large quantities and accumulates fast.
The technology addressing the enormous information challenge as exist, as Hadoop or
NoSQL, providing flat versatility, high limit as well as parallel preparing at costs. It makes them
moderate along with practical (Thierer 2015). For the occasion, IT departments in undertakings
have not needed to manage IoT information like remarkable dataset in own particular right. The
basic arrangements of making up IoT information that are touching base in the capacity layer
similarly other unstructured information does. The result is traditional storage architecture as
well as management software treating IoT information as an indistinguishable path from them
treats other unstructured information. Thus, it is important to research on security as well as
privacy issues included in internet of things.
1.6 Structure of the study
The research includes five chapters like introduction, research methodology, findings and
analysis as well as conclusion and recommendations. Introduction chapter consists of research
aims and objectives, rationale, background and problem statement. Research methodology
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10PRIVACY AND SECURITY ISSUES IN IOT
consists of the process of doing systematic literature review. Third chapter of the research
describes findings and analysis. Last chapter ends with conclusion and recommendations.
Proposed solution has been analyzed the deployed techniques and the extent of satisfying the
core principles of privacy. It has been found and analysed there are only very few solutions that
could satisfy all the core principles of the privacy and security. Several gaps of key knowledge
are also identified during the course of analysis
1.7 Related works
There are several related works taken place regarding internet of things that includes
definition, principle and its applications. The basic and tempting Internet of Things term got
coined by in Procter &Gamble, by Kevin Ashuthon, in the year 1999 (Whitmore et al. 2015). It
described the information service architecture, based on the internet. Usually, the IoT term refers
to the objects that are enabled by the internet and interact among them and cooperate for
numerous and specific goals to be achieved.
The term and so the technology claims to improve the lives of the people. Taking an
example, a simple tool can be used for the measurement of the body temperature and heart rate
and also communicate with the system of energy management, so that the temperature within the
room adjusted itself, according to the physiological status of the individual. Similarly, there can
be numerous tools smartly activated for surveillance cameras monitoring, smart streetlights and
controls the lights in the traffic. The information collected would be shared among numerous
stakeholders towards business intelligence and its improvement. Peppet (2014) stated that
internet of things is connecting more number of devices every day. The development carries
various advantages as it would change the method carry out tasks as well as potentially transform
the whole entire word. On contrary, with rapid development of IoT, security and privacy issues
Document Page
11PRIVACY AND SECURITY ISSUES IN IOT
become integral part of IoT applications. Present chapter deals with reviewing literature from
various sources like articles, journals and websites. Literatures related to internet of things, its
usage, advantages and limitations are explained. Moreover, principles of privacy and security
issues related to internet of things are explained in the present chapter.
Kumar and Patel (2014) mentioned that privacy can be defined as ‘an umbrella term that
refers to a disparate and wide related things’ group. Headlines are made from various breaches of
security and privacy, during the recent years, such as exposing of the hundreds of private lives of
consumers, by the unsecured webcams. Report of Hewlett Packard indicates that about 80% of
IoT devices have raised the concern of security and privacy.
Privacy is defined by Privacy International, as multidimensional concept, relating to the
four different elements, like as followed.
1. Information: The privacy of information is related to the personal data, collecting
and processing by one of the organizations, like credit card and medical record information.
2. Body: The focus of the bodily privacy is one the physical protection of the people,
against any possible harm from external sources.
3. Territory: Territorial privacy has the focus on the establishment of the limits or
boundaries over the property or physical space, like workplace, home and public places.
4. Communications: Communication privacy has the focus on the information
protection, carrying through any media, in between two different parties, among the three
different media, mail, email and telephone.
chevron_up_icon
1 out of 47
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]