Total views : 660

Security and Privacy Challenges: Internet of Things

Affiliations

  • Department of Management and Information Technology, Ideal Institute of Management and Technology, Guru Gobind Singh Indraprastha University, Dwarka, Delhi-110078, India
  • Amity Institute of Information Technology, Amity University, Noida-201303 Uttar Pradesh, India

Abstract


Background/Objectives: This survey reports on the current research on the Internet of Things by examining the related literature, identifying current trends, challenges that threaten IoT and future directions. Findings: Most of the people use the Internet every day but little knows how it really works. Now a Days internet of things (IoT) has been area of research as many heterogeneous devices are connected through internet. This will capacitate the devices with new abilities. In such a case, the confidentiality of data plays an important role. It includes data validation and confidentiality, secrecy and reliability amongst various users and the constraints of security and privacy policies. Traditional security methods cannot be directly applied to IoT technologies due to the different standards and communication stacks involved. Moreover, the amount of more interconnected devices will lead to less adaptability; so a more modifiable structure is needed to deal with security threats in a drastically dynamic environment. Application/Improvements: The concept of loT brings a new challenge regarding privacy, security, confidentiality, reliability and trust. The major issues are lot of devices are not protected under mechanisms such as firewalls and are not following the specific standards. They are easily attacked by wireless channels. Such devices can be stolen and can be analysed by attackers to reveal their key material. Combining data from different sources is the other major issue since there is no guarantee of security between data providers and data consumers from very beginning. Secure exchange platform is required between IoT devices and consumers of their information.

Keywords

Adaptability, Heterogeneous Devices, Internet of Things, Privacy, Security.

Full Text:

 |  (PDF views: 761)

References


  • LiS, Da Xu, L, Zhao S. The internet of things: a survey. Information Systems Frontiers.2015; 17(2):243–59.
  • Liu D, Ning P, Li R. Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC). 2005;8(1): 41–77.
  • Miorandi D, Sicari S, De Pellegrini F, Chlamtac I. Internet of things: Vision, applications and research challenges. Ad Hoc Networks. 2012;10(7):1497–516.
  • Emmerson B. M2M: the Internet of 50 billion devices. WinWin Magazine. 2010;(1):19–22.
  • Weis S. A. Security and privacy in radio-frequency identification devices. Doctoral dissertation, Massachusetts Institute of Technology. 2003.
  • Weber R. H. Internet of Things–New security and privacy challenges. Computer Law & Security Review. 2010;26(1):23–30.
  • Saini R., Khari, M. Defining Malicious Behavior of a Node and its Defensive Techniques in Ad Hoc Networks. Journal of Smart Sensors and Adhoc Networks (IJSSAN). 2011;1:18–21.
  • Sinha A, Kumar P. A Novel Framework for Social Internet of Things. Indian Journal of Science and Technology. 9(36).

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.