IoT Security, Privacy, Safety and Ethics

The Internet of Things (IoT) represents a revolution of the Internet which can connect nearly all environment devices over the Internet to share their data to create novel services and applications for improving our quality of life. Using cheap sensors, the IoT enables various devices and objects around us to be addressable, recognizable and locatable. Although the IoT brought infinite benefits, it creates several challenges, especially in security and privacy. Handling these issues and ensuring security and privacy for IoT products and services must be a fundamental priority. Users need to trust IoT devices and related services are secure. Moreover, the IoT safety must be considered to prevent the IoT system and its components from causing an unacceptable risk of injury or physical damage and at the same time considering social behaviour and ethical use of IoT technologies to enable effective security and safety. This chapter provides a discussion of IoT security, privacy, safety and ethics. It starts by providing an overview of the IoT system, its architecture and essential characteristics. This is followed by discussing IoT security challenges, requirements and best practices to protect IoT devices. The IoT privacy is also discussed by highlighting various IoT privacy threats and solutions to preserve the privacy of IoT devices. The IoT safety, ethics, the need for the ethical design and challenges encountered are also discussed. In the end, smart cities are introduced as a case study to investigate various security threats and suggested solutions to maintain a good security level in a smart city.

[1]  Pritee Parwekar,et al.  Detection of Sinkhole Attack in Wireless Sensor Network , 2016 .

[2]  Ricardo Neisse,et al.  Ethical Design in the Internet of Things , 2016, Science and Engineering Ethics.

[3]  Saleem Ullah,et al.  Security Issues in the Internet of Things (IoT): A Comprehensive Study , 2017 .

[4]  Alexandros André Chaaraoui,et al.  Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..

[5]  Hany F. Atlam,et al.  Integration of Color and Texture Features in CBIR System , 2017 .

[6]  Gary B. Wills,et al.  Validation of an adaptive risk-based access control model for the Internet of Things , 2018 .

[7]  Manas Ranjan Patra,et al.  Cloud Computing: Security Issues and Research Challenges , 2011 .

[8]  Aman Waqas Modeling Adaptive Security in IoT Driven eHealth , 2013 .

[9]  Gary B. Wills,et al.  An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things , 2017, IoTBDS.

[10]  Amarsinh Vidhate,et al.  Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[11]  Gary B. Wills,et al.  Internet of Nano Things: Security Issues and Applications , 2018, ICCBDC.

[12]  Tajana Simunic,et al.  Scalable-Application Design for the IoT , 2017, IEEE Software.

[13]  Aikaterini Mitrokotsa,et al.  Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.

[14]  Carsten Maple,et al.  Security and privacy in the internet of things , 2017 .

[15]  Gary B. Wills,et al.  Integration of Cloud Computing with Internet of Things: Challenges and Open Issues , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[16]  Max Senges,et al.  IoT Safety and Security as Shared Responsibility , 2016 .

[17]  Radha Shankarmani,et al.  Architecture for Internet of Things to minimize human intervention , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[18]  Gary B. Wills,et al.  XACML for Building Access Control Policies in Internet of Things , 2018, IoTBDS.

[19]  Marek Neruda,et al.  Software Implementation of Secure Firmware Update in IoT Concept , 2017 .

[20]  Yang Wang,et al.  Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.

[21]  Klaus Wehrle,et al.  Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.

[22]  Mircea Georgescu,et al.  INTERNET OF THINGS – SOME ETHICAL ISSUES , 2013 .

[23]  Honorio Martín,et al.  An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms , 2014, IEEE Transactions on Industrial Informatics.

[24]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[25]  Gary B. Wills,et al.  Developing an Adaptive Risk-Based Access Control Model for the Internet of Things , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[26]  Robert John Walters,et al.  Internet of Things: State-of-the-art, Challenges, Applications, and Open Issues , 2018, International Journal of Intelligent Computing Research.

[27]  Gary B. Wills,et al.  Intelligence of Things: Opportunities & Challenges , 2018, 2018 3rd Cloudification of the Internet of Things (CIoT).

[28]  Lida Xu,et al.  CLOUDQUAL: A Quality Model for Cloud Services , 2014, IEEE Transactions on Industrial Informatics.

[29]  Peter Friess,et al.  Internet of Things Strategic Research Roadmap , 2011 .

[30]  David M. Eyers,et al.  Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.

[31]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[32]  Madini O. Alassafi,et al.  Blockchain with Internet of Things: Benefits, Challenges, and Future Directions , 2018, International Journal of Intelligent Systems and Applications.

[33]  R. Kitchin,et al.  The (In)Security of Smart Cities: Vulnerabilities, Risks, Mitigation, and Prevention , 2019, Smart Cities and Innovative Urban Technologies.

[34]  Yijun Yu,et al.  Goal Modelling for Security Problem Matching and Pattern Enforcement , 2017, Int. J. Secur. Softw. Eng..

[35]  Magdy A. Bayoumi,et al.  A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches , 2017 .

[36]  Sherali Zeadally,et al.  Cybersecurity and Privacy Solutions in Smart Cities , 2017, IEEE Communications Magazine.

[37]  Marilyn Wolf,et al.  Safety and Security of Cyber-Physical and Internet of Things Systems [Point of View] , 2017, Proc. IEEE.

[38]  Nawal A. El-Fishawy,et al.  Comparative Study on CBIR based on Color Feature , 2013, International Journal of Computer Applications.

[39]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[40]  Gary B. Wills,et al.  The Impact of Cloud Forensic Readiness on Security , 2017, CLOSER.

[41]  Robert John Walters,et al.  Fog Computing and the Internet of Things: A Review , 2018, Big Data Cogn. Comput..

[42]  Benjamin K. S. Khoo,et al.  RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[43]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[44]  Gary B. Wills,et al.  Toward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing , 2017 .

[45]  Karen Renaud,et al.  Privacy of the Internet of Things: A Systematic Literature Review , 2016, HICSS.

[46]  Mansoor Ahmed,et al.  Smart Cities: A Survey on Security Concerns , 2016 .