Internet of Things (IoT) Security and Privacy

Internet of Things (IoT) Security and Privacy

Muawya N. Al Dalaien (Higher Colleges of Technology, UAE), Ameur Bensefia (Higher Colleges of Technology, UAE), Salam A. Hoshang (Higher Colleges of Technology, UAE) and Abdul Rahman A. Bathaqili (Higher Colleges of Technology, UAE)
Copyright: © 2018 |Pages: 21
DOI: 10.4018/978-1-5225-2799-2.ch010
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.
Chapter Preview
Top

Background

The convenience, ease of access and interactive communication with a wide variety of devices including home appliances, surveillance cameras, monitoring sensors & displays, and vehicles and, enabled by the IoT technology is expected to boost the development of even more cutting-age smart application of this technology to provide new services to citizens’ corporates and public authorities. Such new services would both utilize and generate enormous variety and large amount of data.

This paradigm spans across many different application domains, such as home automation, industrial automation, healthcare, automotive, intelligent energy management and smart grids, traffic management, and many others (Sundmaeker et al. 2010). In theory, every single domain in peoples’ life could find some opportunities to exploit IoT in some ways to its advantage or solve some of its problems.

In a recent study, (Mitchell et.al, 2013) Cisco calculated potential value of the IoT if applied in 21 core use cases spanning five areas of business (employee productivity, customer experience, asset utilization, supply chain and logistics and innovation). It was found that the IoT has the potential to deliver $14.4 trillion of value (net profits) for private sector companies globally, between 2013 and 2022. This value is based on the ability to secure lower costs while gaining higher revenues from IoT strategies and applications. The study used cases that cover areas such as smart grid, smart buildings, connected healthcare and patient monitoring, smart factories, connected private education, connected ground vehicles, connected marketing and advertising, and connected gaming and entertainment (Mitchell et al. 2013).

However, not all applications seem to be equally achievable in the near future. While, the traceability of agricultural animals for instance and their movements during outbreaks of contagious diseases, utilizing IoT real-time detection technologies is one of those relatively simple applications. Considering the required technologies are already available and the existence of financial interest for the stakeholders, such applications are already in use today (Sundmaeker et al. 2010).

Complete Chapter List

Search this Book:
Reset