Security and Privacy Issues in the Internet of Things

Security and Privacy Issues in the Internet of Things

Sridevi, Apoorva Shripad Patil
DOI: 10.4018/978-1-6684-3921-0.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The internet of things describes the connection of distinctive embedded computing devices within the internet. It is the network of connection of physical things that has electronics that have been embedded within their architecture in order to sense and communicate to an external environment. IoT has turned up as a very powerful and promising technology, which brings up significant economic, social, and technical development. Meanwhile, it also brings up various security challenges. At present, nearly nine billion ‘things' (physical objects) are connected to the internet. Security is the major concern nowadays as the risks have very high consequences. This chapter presents a detailed view on the internet of things and the advancements of various technologies like cloud, fog, edge computing, IoT architectures, along with various technologies used to prevent and resolve these security and privacy issues of IoT. Finally, future research opportunities and challenges are discussed.
Chapter Preview
Top

Introduction

There have been a lot of technical breakthroughs which have made people to adapt to automated technology and make their living easier. Through the sensor network, IoTs collect a significant amount of data. By 2025, the IIoT is estimated to produce “75.44 billion devices” and generate “79.4 zettabytes” data (Columbus, 2016). Because of additional sensors, higher computational power, and dependable communication, IoTs are rapidly increasing and will also increase in the upcoming years, which is shown in Figure 1. The increased use of IoTs has resulted in the unavoidable exchange of personal information, potentially leading to a data breach.

Figure 1.

Increase in the number of IoT devices(Khanna & Kaur, 2019)

978-1-6684-3921-0.ch004.f01

Data collection, Data transfer, and Data evaluation are the three important stages of the IoT system. The first stage i.e the data collection stage gathers data and helps in transmission, it includes sensor antennae and microcontrollers. The gateway and IoT hub or network, is utilized in the second stage where data transfer is done. The last stage has User interfaces and the back-end system, such as the cloud which is used for data analysis. Critical information from IoT devices will leak if there is a breach in these stages. Due to the lack of an effective encryption and authentication system, much vulnerability in IoT devices are recently emerged. Unfortunately, no complete security solutions to protect against security assaults are currently available in the market.

Top

Background

Evolution of IoT

A computer network, which was invented in the early 1960s, allowed two computers to communicate with each other. TCP/IP was introduced in the 1980s. In the 1980s, people began using the internet. Later, in 1991, the World Wide Web (WWW) became available, increasing the popularity of the internet. Business started happening online. The term “mobile internet” was introduced, where the mobile phones were connected to the internet. Through the internet the end users were connected via connecting devices as the result of their use of social networking. As indicated in Figure 2, the next stage in IoT is to connect all of the things in an environment and interact through the internet. The internet is connected to all smart objects in IoT. With the help of humans, they converse with each other. The IoT is quickly becoming the most popular and well-known IT concept. It draws users' attention by allowing them to connect from anyplace in the world and by giving each thing a unique identity (Aggarwal, 2012).

Figure 2.

Evolution of Internet of Things (Gomathi et al., 2018)

978-1-6684-3921-0.ch004.f02
Top

Internet Of Things

The technology is playing a very significant role in our lives today. Today, the Internet has widespread to everywhere. Internet has not only changed the lifestyle of the people but has also created a comfortable life. The way of our living has been greatly influenced by the introduction of new technologies. The discovery of internet has revolutionized the world. At present the whole world depends on the internet and computer to perform various operations.

Key Terms in this Chapter

Artificial Intelligence: It is one of the major branches of computer science which is concerned on creating machines which are smart and intelligent. These machines perform various tasks that would require human intelligence.

Fog Computing: It is the decentralized infrastructure where the data, storage, compute are being located somewhere in between the cloud and the data source, but are not always, being placed near the network's edge.

Privacy: It is the ability to control who can access the data on the system. Only the authorized users must be able to access the data.

Intrusion Detection System (IDS): IDS generates alerts if there are any suspicious activity being carried out by continuously monitoring the system.

Internet of Things: Through the internet these devices communicate with one another. The devices are nothing but the physical objects that have sensors, the processing power, software, and other technologies.

Edge Computing: It is the distributed computer paradigm that brings up the data storage and the computation closer the place where the data is being generated.

Cloud Computing: Cloud computing is the process where various computing facilties such as servers, databases, analytics, networking, etc. are provided over the internet (“the cloud”) to provide resources that are flexible, faster innovation etc.

Security: System must be secured by preventing it from being attacked by the unauthorized users hence ensuring the safety of the data in the system.

Complete Chapter List

Search this Book:
Reset