Regulation and governance of the Internet of Things in India

Purpose The purpose of this study is to highlight the importance of Internet of Things (IoT) in India. The purpose also includes providing insights regarding policy framing for IoTs with a focus on regulation and governance. Design/methodology/approach A qualitative approach has been taken here for understanding the issues of IoT policy for India so far as regulations and governance are concerned. Findings This study highlights that the draft IoT policy of India, 2015 is to be improved. Attention is to be focused on regulation and governance for addressing security and privacy issues among other issues. For proper enablement of IoT technology, arrangements of funds are essential. Research limitations/implications IoT-related technologies in India have immense potential for the industries. This study implies the importance of security and privacy issues. If these issues are properly addressed, the industries will flourish further. Practical implications The study provides insights covering how usage of IoT technology would help the industry to grow up, how research and development organizations would be able to strengthen IoT technology for further development and to what extent it will improve the human daily activities. Social implications IoT would influence lives of millions of people of India. IoT-related policies would have huge social implication in terms of human–device interactions and communications. This research is a contemporary study on the implication of IoT policy toward the future growth of IoT-enabled devices in India. Originality/value The Government of India is expected to frame a comprehensive IoT policy with the help of draft IoT policy of 2015. This paper has taken a unique attempt to provide effective inputs to develop a comprehensive IoT policy for India.

[1]  Klaus Wehrle,et al.  Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.

[2]  Beomsoo Kim,et al.  Adoption of broadband Internet in Korea: the role of experience in building attitudes , 2003, J. Inf. Technol..

[3]  Christel Koop,et al.  What is regulation?: An interdisciplinary concept analysis , 2017 .

[4]  A. C. Pigou Economics of welfare , 1920 .

[5]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[6]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[7]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[8]  Chunling Sun Application of RFID Technology for Logistics on Internet of Things , 2012 .

[9]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[10]  Ronald J. Vetter,et al.  Internet Kiosk- Computer-Controlled Devices Reach the Internet , 1995, Computer.

[11]  Ravindra D. Gudi,et al.  Production Scheduling of an Air Separation Plant , 2016 .

[12]  Donn B. Parker,et al.  Fighting computer crime - a new framework for protecting information , 1998 .

[13]  Julia Black,et al.  Critical reflections on regulation , 2002 .

[14]  Jiri Hosek,et al.  On perspective of security and privacy-preserving solutions in the internet of things , 2016, Comput. Networks.

[15]  Vinton G. Cerf,et al.  Access Control and the Internet of Things , 2015, IEEE Internet Comput..

[16]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[17]  Florian Michahelles,et al.  An Architectural Approach Towards the Future Internet of Things , 2011, Architecting the Internet of Things.

[18]  Peter Friess,et al.  Internet of Things Strategic Research Roadmap , 2011 .

[19]  Leandros A. Maglaras,et al.  Social Internet of Vehicles for Smart Cities , 2016, J. Sens. Actuator Networks.

[20]  Chaudron Stephane,et al.  Kaleidoscope on the Internet of Toys: Safety, security, privacy and societal insights , 2016 .

[21]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[22]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[23]  David Murphy,et al.  Introduction , 2018, Interventions.

[24]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[25]  Towards a definition of the Internet of Things ( IoT ) , 2015 .

[26]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[27]  Ramjee Prasad,et al.  Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges , 2010, CNSA.

[28]  David Hutchison,et al.  Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines , 2010, Comput. Networks.

[29]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[30]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[31]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[32]  Alexis Olivereau,et al.  Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of Things , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[33]  Geir M. Køien,et al.  Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[34]  RomanRodrigo,et al.  Securing the Internet of Things , 2011 .

[35]  Florian Michahelles,et al.  Architecting the Internet of Things , 2011 .