How to Cite?
Sanjaa Bold, Batchimeg Sosorbaram, "Security and Privacy Concerns of the Internet of Things? (IoT) in IT and its Help in the Various Sectors across the World," International Journal of Computer Trends and Technology, vol. 68, no. 4, pp. 266-272, 2020. Crossref, https://doi.org/10.14445/22312803/IJCTT-V68I4P142
Abstract
The so called internet of things (IoT) is a form of technology advancement that has a capacity for driving change in our daily lives in a variety of sectors. The fantastic opportunity will help in the collection of data that is relatively exponential and in a manner that is continuous to present changes that are significant on the lives. Devices growth and the speed in which they are developed to attain the IoT era of technology offers the challenges of security and the battling of freedom as people establish policies and governance that rebuilds the developments without interfering with the innovations. Among the issues, includes the concerns on the security and privacy brought by the technology. The vulnerabilities of security that are experienced by the IoT devices are as a result of the contributing factors like the low capabilities of the devices in terms of energy and the capabilities of computing, the wireless channels are seemingly unreliable, and the vulnerabilities on the physical nature of the devices. This paper will focus on the IoT evolution, the definitions attached to IoT, and some of the many applications of IoT. It will create an emphasis on the considerations of security and privacy, including the challenges that are tied to the general IoT and the IoT application context. A critical assessment of the works done for IoT is presented by the literature review on the perspective of the developmental era and the evaluation of the trend. The paper will also give the IoT security risks taxonomy, mechanisms, and attacks related to the technology.
Keywords
Internet of things, threats, privacy, security, encryption, trust, protocols, authorization, data integrity, confidentiality, authentication.
Reference
[1] ABI Research. 2017. “What Is the Internet of Things?” Accessed July 4, 2017. https://www.abiresearch.com/pages/what-is-internet-things.
[2] Alaa, M., Zaidan, A. A., Zaidan, B. B., Talal, M., & Kiah, M. L. M. (2017). “A review of smart home applications based on Internet of Things”. Journal of Network and Computer Applications, 97, 48-65.
[3] Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). “Internet of Things security: A survey”. Journal of Network and Computer Applications, 88, 10-28. https://www.researchgate.net/profile/Alaba_Fadele/publication/315835782_Internet_of_things_Security_A_Survey/links/58eb0ecf0f7e9b978f840e72/Internet-of-things-Security-A-Survey
[4] Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). “Fog computing for the internet of things: Security and privacy issues”. IEEE Internet Computing, 21(2), 34-42. https://www.researchgate.net/profile/Chunqiang_Hu/publication/314162879_Fog_Computing_for_the_Internet_of_Things_Security_and_Privacy_Issues/links/594924170f7e9b1d9b2765f8/Fog-Computing-for-the-Internet-of-Things-Security-and-Privacy-Issues.pdf
[5] Bertino, E., & Islam, N. (2017). “Botnets and internet of things security”. Computer, 50(2), 76-79.
[6] BITAG. 2016. “Internet of Things (IoT) Security and Privacy Recommendations.” BITAG Broadband Internet Technical Advisory Group, November 2016. http://www.bitag.org/documents/BITAG_Report_-_Internet_of_Things_(IoT)_Security_and_Privacy_Recommendations.pdf.
[7] British Land. 2017. “Smart Offices | British Land – The Office Agenda.” Accessed July 4, 2017. http://officeagenda.britishland.com/smart-offices.
[8] Chen, J., Hu, K., Wang, Q., Sun, Y., Shi, Z., & He, S. (2017). “Narrowband internet of things: Implementations and applications”. IEEE Internet of Things Journal, 4(6), 2309-2314.
[9] Guedalia, I. D., Guedalia, J., Chandhok, R. P., & Glickfield, S. (2018). U.S. Patent No. 9,900,171. Washington, DC: U.S. Patent and Trademark Office. https://patentimages.storage.googleapis.com/01/32/2e/64461abca6c4a2/US9900171.pdf
[10] James, S. D., Fregly, A., & Cathrow, A. (2018). U.S. Patent No. 10,083,291. Washington, DC: U.S. Patent and Trademark Office. https://patentimages.storage.googleapis.com/d6/9b/8e/75d2a5949af424/US10083291.pdf
[11] Jindal, F., Jamar, R., & Churi, P. (2018). “Future and challenges of internet of things”. International Journal of Computer Science & Information Technology (IJCSIT) Vol, 10, 13-25. http://www.academia.edu/download/57176429/10218ijcsit02.pdf
[12] Kumar, N., Madhuri, J., & ChanneGowda, M. (2017, May). “Review on security and privacy concerns in internet of things”. In 2017 International Conference on IoT and Application (ICIOT) (pp. 1-5). IEEE.
[13] Li, N., Liu, D., & Nepal, S. (2017). “Lightweight mutual authentication for IoT and its applications”. IEEE Transactions on Sustainable Computing, 2(4), 359-370.
[14] Maple, C. (2017). “Security and privacy in the internet of things”. Journal of Cyber Policy, 2(2), 155-184. https://www.tandfonline.com/doi/full/10.1080/23738871.2017.1366536?scroll=top&needAccess=true&
[15] Mendez, D. M., Papapanagiotou, I., & Yang, B. (2017). “Internet of things: Survey on security and privacy”. arXiv preprint arXiv:1707.01879. https://arxiv.org/pdf/1707.01879
[16] Miraz, M. H., Ali, M., Excell, P. S., & Picking, R. (2018). “Internet of Nano-Things, things and everything: Future growth trends”. Future Internet, 10(8), 68. https://www.mdpi.com/1999-5903/10/8/68/pdf
[17] Ni, J., Zhang, K., Lin, X., & Shen, X. S. (2017). “Securing fog computing for internet of things applications: Challenges and solutions.” IEEE Communications Surveys & Tutorials, 20(1), 601-628. https://bccl.ir/wp-content/uploads/2018/07/Securing-Fog-Computing-for-Internet-of-Things-Applications-Challenges-and-Solutions.pdf
[18] Razzaq, M. A., Gill, S. H., Qureshi, M. A., & Ullah, S. (2017). “Security issues in the Internet of Things (IoT): a comprehensive study”. International Journal of Advanced Computer Science and Applications (IJACSA), 8(6), 383-388. https://pdfs.semanticscholar.org/c192/7578a61df3c5a33f6bca9f9bd5c181e1d5ac.pdf
[19] Sahmim, S., & Gharsellaoui, H. (2017). “Privacy and security in internet-based computing: cloud computing, internet of things, cloud of things: a review”. Procedia computer science, 112, 1516-1522. https://www.sciencedirect.com/science/article/pii/S1877050917313923/pdf?md5=739a8c53ba3155cb85e808e6cc77624d&pid=1-s2.0-S1877050917313923-main.pdf&_valck=1
[20] Singh, B., Bhattacharya, S., Chowdhary, C. L., & Jat, D. S. (2017). “A review on internet of things and its applications in healthcare”. Journal of Chemical and Pharmaceutical Sciences, 10(1), 447-452.
[21] Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). “A review of Internet of Things for smart home: Challenges and solutions”. Journal of Cleaner Production, 140, 1454-1464. https://iotiran.com/media/k2/attachments/A_review_of_Internet_of_Things_for_smart_home_Challenges_and_solutions.pdf
[22] Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., & Wang, G. (2018). “Security and privacy in the medical internet of things: a review”. Security and Communication Networks, 2018. http://downloads.hindawi.com/journals/scn/2018/5978636.pdf
[23] Xiaojiang, X., Jianli, W., & Mingdong, L. (2020). “Services and key technologies of the Internet of Things”. ZTE Communications, 8(2), 26-29.
[24] Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). “A survey on security and privacy issues in Internet-of-Things”. IEEE Internet of Things Journal, 4(5), 1250-1258. https://www.researchgate.net/profile/Longfei_Wu3/publication/316173391_A_Survey_on_Security_and_Privacy_Issues_in_Internet-of-Things/links/5a256ec10f7e9b71dd087b26/A-Survey-on-Security-and-Privacy-Issues-in-Internet-of-Things.pdf
[25] Yu, Y., Li, Y., Tian, J., & Liu, J. (2018). “Blockchain-based solutions to security and privacy issues in the Internet of Things”. IEEE Wireless Communications, 25(6), 12-18.