Privacy in the Internet of Things

Privacy in the Internet of Things

Jayashree Kanniappan, Babu Rajendiran
Copyright: © 2017 |Pages: 16
DOI: 10.4018/978-1-5225-2104-4.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet of Things technology is rapidly gaining popularity, not only in industrial and commercial environments, but also in personal life by means of smart devices at home. The Internet of Things (IoT) spawn new businesses and make buildings, cities and transport smarter. The IoT allows for ubiquitous data collection or tracking, but these useful features are also examples of privacy threats that are already limiting the success of the IoT vision when not implemented correctly. Privacy should be protected in the device, in storage, during communication, and at processing. The privacy of users and their data protection have been identified as one of the important challenges that need to be addressed in the IoT. The chapter presents the IoT technology, the various applications, and privacy issues. Various other issues such as security and performance are also addressed.
Chapter Preview
Top

Introduction

The Internet of Things (IoT) paradigm envisions the pervasive interconnection and cooperation of smart things over the Internet infrastructure. Realization of IoT paradigm depends on integration of Radio Frequency Identification (RFID) systems for tracing and addressing items non-contact and automatically, Wireless Sensor Networks (WSN) for integrating distributed information collection, transmission and processing, Machine to Machine systems and intelligent signal processing and nanometer technologies (Dey et al., 2015). The IoT encompasses a set of technologies that enable a wide range of appliances, devices, and objects to interact and communicate among themselves using networking technologies (Tarouco et al., 2012).

The IoT enables many new services for people’s everyday lives, spawns new businesses and makes buildings, cities and transportation systems smarter. It is based on intelligent and self-configuring nodes interconnected in a dynamic and global network infrastructure that relies on sensory, communication, networking, and information processing technologies (Ziegeldorf et al., 2014). The IoT is generally characterized by small things with limited storage and processing capacity, and issues regarding reliability, performance, security, and privacy have been a challenge.

Examples of IoT systems includes healthcare, emergency, advanced building management systems, smart home, smart grids for energy distribution, intelligent transport systems, public surveillance and data acquisition, smart factory and smart retail stores (Zanella et al., 2014). By employing the IoT technologies in the activities of healthcare servicing, doctors are able to access different kinds of data resources online quickly and easily, make emergency medical decisions, and reduce costs in the process (Xu et al., 2014). Health-related IoT applications are used to monitor the conditions of patients inside hospitals and old people at home (Khanna & Misra, 2014). For example, a tiny, wearable device can detect a person’s vital signs and send an alert to a healthcare professional if a certain threshold is reached or if a person has fallen down. Also, when an accident occurs, the victim’s medical journals are automatically made available to the ambulances to ensure that optimal treatment can be provided (Virkki & Chen, 2013).

The vision for the IoT is to make our everyday lives easier and boost the efficiency and productivity of businesses and employees. The data collected will help us to make smarter decisions. The ubiquity and interactions involved in the IoT provides many conveniences and useful services for individuals and organizations, but it is vulnerable to privacy. One of the most significant challenges in convincing users to adopt emerging technologies is the protection of data and privacy (Badkas et al., 2015). To solve the privacy problems created by IoT applications of the future, the privacy policies for each system domain must be specified. Once specified, either the individual IoT application or the IoT infrastructure must enforce privacy. The IoT system must be able to elicit users’ requests for data access and the policies, and evaluate the requests against the policies in order to decide if they should be granted or denied.

In this chapter various issues related to IoT will be discussed. IoT privacy challenges and open problems will be elaborated. Finally, possible solutions and recommendations will be discussed.

Complete Chapter List

Search this Book:
Reset