Communal Acts of IoT Consumers: A Potential Threat to Security and Privacy

Consumer Electronics Internet of Things (CEIoT) products, implemented with improper security measures and inadequate privacy-preserving mechanisms, let the hackers or intruders to access and misuse consumer’s personal information. In this paper, we present a framework and perspective to study and address Internet of Things (IoT) consumer’s security and privacy violation from seemingly five different angles; borrow, rent, gift, resale, and retire. In the act of borrow, an IoT consumer takes and uses another consumer’s CEIoT products with the intention of return after usage. In the act of rent, a consumer offers his CEIoT products to other people for temporary usage and charges regular payment for the service. In the act of gift, a consumer willingly gives or presents his used CEIoT products to his friends or relatives without payment. In the act of resale, IoT consumers sell their previously bought or used CEIoT products. In the act of retire, IoT consumers dispose of or throw their used CEIoT products when they become out of service or after the end of product’s life. This act could raise serious privacy concerns, since “IoT waste” may become an attractive gateway for cybercriminals to access private information. Moreover, we also present challenges with the above-mentioned five acts of security and privacy violation. And finally, we suggest some recommendations to preserve the security and privacy of IoT consumers.

[1]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[2]  Yier Jin,et al.  Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.

[3]  W. Marsden I and J , 2012 .

[4]  Aleksandr Ometov,et al.  Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things , 2017, IEEE Internet of Things Journal.

[5]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[6]  Fahad Bin Muhaya,et al.  A Comprehensive Study of Email Spam Botnet Detection , 2015, IEEE Communications Surveys & Tutorials.

[7]  Muhammad Khurram Khan,et al.  Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions , 2018, IEEE Consumer Electronics Magazine.

[8]  Hyoungshick Kim,et al.  Security and Privacy Challenges in the Internet of Things [Security and Privacy Matters] , 2017, IEEE Consumer Electronics Magazine.

[9]  Yacine Challal,et al.  A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.

[10]  Muhammad Khurram Khan,et al.  Five acts of consumer behavior: A potential security and privacy threat to Internet of Things , 2018, 2018 IEEE International Conference on Consumer Electronics (ICCE).

[11]  Muhammad Khurram Khan,et al.  When social objects collaborate: Concepts, processing elements, attacks and challenges , 2017, Comput. Electr. Eng..

[12]  T. Cooper Inadequate Life?Evidence of Consumer Attitudes to Product Obsolescence , 2004 .

[13]  Peter M. Corcoran,et al.  A privacy framework for the Internet of Things , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[14]  Antonio Iera,et al.  SIoT: Giving a Social Structure to the Internet of Things , 2011, IEEE Communications Letters.

[15]  Barbara Krumay,et al.  The E-Waste-Privacy Challenge - A Grounded Theory Approach , 2016, APF.

[16]  Sherali Zeadally,et al.  Privacy Issues and Solutions for Consumer Wearables , 2018, IT Professional.

[17]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[18]  Michael I. Norton,et al.  Social Recycling Transforms Unwanted Goods into Happiness , 2017, Journal of the Association for Consumer Research.

[19]  Abdul Boztas,et al.  Smart TV forensics: Digital traces on televisions , 2015, Digit. Investig..

[20]  Hamada H. Ghenniwa,et al.  Ambient Systems , Networks and Technologies ( ANT 2015 ) Privacy in Internet of Things : A Model and Protection Framework , 2015 .

[21]  W. Z. Khan,et al.  Enabling Consumer Trust Upon Acceptance of IoT Technologies Through Security and Privacy Model , 2016 .

[22]  Stefanie Pötzsch,et al.  Privacy Awareness: A Means to Solve the Privacy Paradox? , 2008, FIDIS.