The future of data privacy and security concerns in Internet of Things

A global, immersive, invisible, ambient network-computing environment built through the continued proliferation of smart sensors, cameras, software, databases, and massive data centers in a world-spanning information fabric known as the Internet of Things. The idea is to live in connected world. Altogether varieties of connected objects from smart home appliances like televisions, laundry machines, thermostats, refrigerators to Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) are going to conserve the potential of IoT connectivity in all paces of future smart world. However, it has high importance to preserve adherence of enormous benefits of IoT connectivity, which might lead to unseen security and privacy issues and vulnerabilities that will cause various malicious attacks including waterhole, ransomware, eavesdropping, and others to exploit the potential of smart objects. This paper will present and forecast advanced concepts for end-to end security and privacy issues in a highly distributed, heterogeneous and dynamic network of IoT devices, which may reveal a holistic approach of device identification, authentication, and management, security, and privacy concerns.

[1]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[2]  H. Vincent Poor,et al.  Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices , 2013, IEEE Journal on Selected Areas in Communications.

[3]  Yacine Challal,et al.  A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.

[4]  Shyamal Patel,et al.  Mercury: a wearable sensor network platform for high-fidelity motion analysis , 2009, SenSys '09.

[5]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[6]  Syed Faiz Ahmed,et al.  Remote access of SCADA with online video streaming , 2013, 2013 8th International Conference on Computer Science & Education.

[7]  D. Barren,et al.  The President'S National Security Telecommunications Advisory Committee , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[8]  Zulfiqar Ali Solangi,et al.  The study of Internet of Things (IoT)-based healthcare acceptance in Pakistan , 2017, 2017 IEEE 3rd International Conference on Engineering Technologies and Social Sciences (ICETSS).

[9]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[10]  Zulfiqar Ali Solangi,et al.  An empirical study of Internet of Things (IoT) — Based healthcare acceptance in Pakistan: PILOT study , 2017, 2017 IEEE 3rd International Conference on Engineering Technologies and Social Sciences (ICETSS).

[11]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[12]  Prabal Dutta,et al.  AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages , 2010, SenSys '10.

[13]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[14]  Frédéric Cuppens,et al.  Interoperability, Safety and Security in IoT , 2017, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

[15]  Mani B. Srivastava,et al.  Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment , 2011, CHI.

[16]  Lyman Chapin,et al.  The Internet of Things: An Overview , 2015 .

[17]  Scott R. Peppet Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security & Consent , 2014 .

[18]  Lyman Chapin,et al.  THE INTERNET OF THINGS : AN OVERVIEW Understanding the Issues and Challenges of a More Connected World , 2015 .

[19]  Mirjana Maksimovic,et al.  A custom Internet of Things healthcare system , 2015, 2015 10th Iberian Conference on Information Systems and Technologies (CISTI).