Investigating the IoT Security and Privacy Challenges: Summary and Recommendations

  • Abstract
  • PDF
  • Literature Map
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

With the development of innovative technology transformation like cloud and Internet of Things (IoT), more technology companies are pursuing research in employing such innovations. Smart homes and cities are just two examples of the many systems and technologies that the IoT can endorse. IoT - based smart objects communicate with other parts, such as proxies, portable devices, as well as data collectors. Although these components help to tackle a number of societal issues and offer users new, cutting-edge services, their confined processing power makes them susceptible to well-known privacy and security attacks. This in turn highlights the demand for a strong technical as well as legislative foundation and asserts the significance of validity and reliability in IoT. This paper provides an insight of the IoT, security, as well as privacy challenges, and also discusses the recommendations for IoT solutions. Further we also highlighting some unresolved problems that require further study.

Similar Papers
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 1
  • 10.55524/ijircst.2024.12.2.18
Blockchain for Enhancing IoT Privacy and Security
  • Mar 1, 2024
  • International Journal of Innovative Research in Computer Science and Technology
  • Shweta Sinha

The technological advancements in the network technologies that deal with interconnected computing devices has led to the dramatic increase in the number of Internet of Things (IoT) devices. It promises to improve the convenience of our lives by leveraging to modernize the way day to day items are connected to various elements of existence by converting it to smart object. However, with the unprecedented convenience, accessibility, and efficiency, IoT has caused acute security and privacy threats in recent years, and it must be addressed properly. Due to the massive scale and distributed nature of IoT networks, overlooking these privacy and security issues will negatively impact many elements of our existence that involves our surroundings, and these effects will influence our own masses too. The national or jurisdictional boundaries are not restricted to the centralized cloud infrastructure that provides interconnectivity of IoT items, hence maintaining robustness, authentication and security becomes crucial. Recently, the development of blockchain technology is a plausible solution to offer such features. Security, authentication, and maintenance issues can be solved by the secure decentralization of blockchain and overcome the current IoT ecosystem's drawbacks. This paper highlights the IoT features and presents a IoT security and privacy problems are examined and classified in accordance with the IoT layered architecture. Further, we explore the IoT security and privacy challenges and examine blockchain technology towards a solution that help solve many of the IoT privacy and security issues

  • Research Article
  • Cite Count Icon 6
  • 10.3390/fi16110389
Health IoT Threats: Survey of Risks and Vulnerabilities
  • Oct 23, 2024
  • Future Internet
  • Samaneh Madanian + 5 more

The secure and efficient collection of patients’ vital information is a challenge faced by the healthcare industry. Through the adoption and application of Internet of Things (IoT), the healthcare industry has seen an improvement in the quality of delivered services and patient safety. However, IoT utilization in healthcare is challenging due to the sensitive nature of patients’ clinical information and communicating this across heterogeneous networks and among IoT devices. We conducted a semi-systematic literature review to provide an overview of IoT security and privacy challenges in the healthcare sector over time. We collected 279 studies from 5 scientific databases, of which 69 articles met the requirements for inclusion. We performed thematic and qualitative content analysis to extract trends and information. According to our analysis, the vulnerabilities in IoT in healthcare are classified into three main layers: perception, network, and application. We comprehensively reviewed IoT privacy and security threats on each layer. Different technological advancements were suggested to address the identified vulnerabilities in healthcare. This review has practical implications, emphasizing that healthcare organizations, software developers, and device manufacturers must prioritize healthcare IoT security and privacy. A comprehensive, multilayered security approach, security-by-design principles, and training for staff and end-users must be adopted. Regulators and policy makers must also establish and enforce standards and regulations that promote the security and privacy of healthcare IoT. Overall, this study underscores the importance of ensuring the security and privacy of healthcare IoT, with stakeholders’ coordinated efforts to address the complex and evolving security and privacy threats in this field. This can enhance healthcare IoT trust and reliability, reduce the risks of security and privacy issues and attacks, and ultimately improve healthcare delivery quality and safety.

  • Conference Article
  • Cite Count Icon 12
  • 10.1109/wf-iot54382.2022.10152044
IoT Driving New Business Model, and IoT Security, Privacy, and Awareness Challenges
  • Oct 26, 2022
  • Mehrdad S Sharbaf

Internet of Things (IoT) or Internet of Intelligent Things is one of the most buzzing and discussed topic in business and research field today. The Internet of Things (IoT) refers to systems that involve computation, sensing, communication, and it involves the connection between humans, non-human physical objects, enabling monitoring, automation, and decision making within organization. The Internet of Things (IoT) is a network of ‘smart’ devices that connect and communicate via the Internet. The concept of the IoT is to establish a pervasive and ubiquitous environment (i.e., an IoT ecosystem) with a variety of things or objects (e.g., RFID tags, sensors and actuators, smart phones, washing machines, smart TV, etc.) that can autonomously collaborate, and cooperate to reach common goals providing smart services for the benefit of humankind. Because of lack of awareness within the public about devices, lack of standardization for devices, and characteristics of IoT are highly dynamic, and continuously change because of mobility, for that reasons IoT alleviates concerns about security, and privacy. In this paper research is mainly focusing on the concept of IoT, architecture, new business model and security and privacy issues with suggested countermeasure and cyber security awareness in IoT threats, also outlines recommendations for how to mitigate or reduce the effects of these IoT concerns.

  • Book Chapter
  • Cite Count Icon 203
  • 10.1007/978-3-030-18732-3_8
IoT Security, Privacy, Safety and Ethics
  • Jul 23, 2019
  • Hany F Atlam + 1 more

The Internet of Things (IoT) represents a revolution of the Internet which can connect nearly all environment devices over the Internet to share their data to create novel services and applications for improving our quality of life. Using cheap sensors, the IoT enables various devices and objects around us to be addressable, recognizable and locatable. Although the IoT brought infinite benefits, it creates several challenges, especially in security and privacy. Handling these issues and ensuring security and privacy for IoT products and services must be a fundamental priority. Users need to trust IoT devices and related services are secure. Moreover, the IoT safety must be considered to prevent the IoT system and its components from causing an unacceptable risk of injury or physical damage and at the same time considering social behaviour and ethical use of IoT technologies to enable effective security and safety. This chapter provides a discussion of IoT security, privacy, safety and ethics. It starts by providing an overview of the IoT system, its architecture and essential characteristics. This is followed by discussing IoT security challenges, requirements and best practices to protect IoT devices. The IoT privacy is also discussed by highlighting various IoT privacy threats and solutions to preserve the privacy of IoT devices. The IoT safety, ethics, the need for the ethical design and challenges encountered are also discussed. In the end, smart cities are introduced as a case study to investigate various security threats and suggested solutions to maintain a good security level in a smart city.

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 46
  • 10.3390/electronics11121893
Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications
  • Jun 16, 2022
  • Electronics
  • Umar Zaman + 5 more

With the growth of computing and communication technologies, the information processing paradigm of the healthcare environment is evolving. The patient information is stored electronically, making it convenient to store and retrieve patient information remotely when needed. However, evolving the healthcare systems into smart healthcare environments comes with challenges and additional pressures. Internet of Things (IoT) connects things, such as computing devices, through wired or wireless mediums to form a network. There are numerous security vulnerabilities and risks in the existing IoT-based systems due to the lack of intrinsic security technologies. For example, patient medical data, data privacy, data sharing, and convenience are considered imperative for collecting and storing electronic health records (EHR). However, the traditional IoT-based EHR systems cannot deal with these paradigms because of inconsistent security policies and data access structures. Blockchain (BC) technology is a decentralized and distributed ledger that comes in handy in storing patient data and encountering data integrity and confidentiality challenges. Therefore, it is a viable solution for addressing existing IoT data security and privacy challenges. BC paves a tremendous path to revolutionize traditional IoT systems by enhancing data security, privacy, and transparency. The scientific community has shown a variety of healthcare applications based on artificial intelligence (AI) that improve health diagnosis and monitoring practices. Moreover, technology companies and startups are revolutionizing healthcare with AI and related technologies. This study illustrates the implication of integrated technologies based on BC, IoT, and AI to meet growing healthcare challenges. This research study examines the integration of BC technology with IoT and analyzes the advancements of these innovative paradigms in the healthcare sector. In addition, our research study presents a detailed survey on enabling technologies for the futuristic, intelligent, and secure internet of health things (IoHT). Furthermore, this study comprehensively studies the peculiarities of the IoHT environment and the security, performance, and progression of the enabling technologies. First, the research gaps are identified by mapping security and performance benefits inferred by the BC technologies. Secondly, practical issues related to the integration process of BC and IoT devices are discussed. Third, the healthcare applications integrating IoT, BC, and ML in healthcare environments are discussed. Finally, the research gaps, future directions, and limitations of the enabling technologies are discussed.

  • Conference Article
  • Cite Count Icon 8
  • 10.1109/citisia50690.2020.9371828
Study of Security and Privacy Issues in Internet of Things
  • Nov 25, 2020
  • Muhammad Hassam Khalid + 2 more

With the advancement of technology and the internet, almost every device is connected to internet. Internet of Things (IoT) can be explained as an extension of the internet in which smart devices are interconnected with each other. While each smart device has unique identifiers, which makes every device unique. Now, IoT has helped in developing smart architectures whether its home, healthcare, financial institutions or industries. There are smart devices everywhere. These smart devices can also communicate to each other in a network and they work together thus eliminating the need for human interaction. IoT is relatively new and is still developing rapidly. So, there are numerous privacy concerns in IoT. IoT can be divided into different architectural layers depending where the IoT is being used. The IoT model discussed in this research report is Service Oriented Architecture (SOA) which is divided into three layers, application, Network and perception layer. In 2020, during the COVID pandemic the reliability on IoT has increased as people are working from home and many of the tasks has been automated using IoT. The number of security attacks on IoT has also been increased in 2020 alone, which has affected many IoT devices. The objective of this research report is to discuss a number of security and privacy challenges in IoT based on the three SOA layers, the objective of this report also covers discussion on the above mentioned three layers, different technologies used in each layer for communication and different attacks and methods which target each specific layer also discussing different security attacks on IoT which occur ed in 2020 during the COVID pandemic phase. This topic is chosen because Internet of Things is becoming important and is impacting everything around us. It is expected that the total number of IoT devices will cross 20 Billion in 2020 and will have an impact of more than $11 Trillion by 2025. Thus, the security of IoT is to be discussed.

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 118
  • 10.1109/access.2020.3006358
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
  • Jan 1, 2020
  • IEEE Access
  • Bin Liao + 4 more

Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, actuators, transceivers, or other wearable devices. Data in the IoT environment is susceptible to many threats, attacks, and risks. Therefore, a robust security mechanism is indispensable to cope with attacks, vulnerabilities, security, and privacy challenges related to IoT. In this research, a systematic literature review has been conducted to analyze the security of IoT devices and to provide the countermeasures in response to security problems and challenges by using mobile computing. A comprehensive and in-depth security analysis of IoT devices has been made in light of mobile computing, which is a novel approach. Mobile computing’s technological infrastructures such as smartphones, services, policies, strategies, and applications are employed to tackle and mitigate these potential security threats. In this paper, the security challenges and problems of IoT devices are identified by a systematic literature review. Then, mobile computing has been used to address these challenges by providing potential security measures and solutions. Hardware and software-based solutions furnished by mobile computing towards the IoT security challenges have been elaborated. To the best of our knowledge, this is the first attempt to analyze the security issues and challenges of IoT in light of mobile computing and it will open a gateway towards future research.

  • Book Chapter
  • 10.58532/v3bdio7p3ch2
IOT PRIVACY AND SECURITY
  • Mar 5, 2024
  • Mr C Iyyappan + 1 more

The Internet of Things (IoT) has witnessed rapid proliferation, revolutionizing the way we interact with technology in various domains of life. This ubiquitous network of interconnected devices, however, presents serious challenges concerning privacy and security. As IoT devices gather vast amounts of sensitive data and share it across networks, ensuring the protection of user privacy and guarding against potential security breaches becomes paramount. This abstract delves into the primary concerns surrounding IoT privacy and security, addressing issues such as data collection, user consent, data ownership, and vulnerability to cyber-attacks. Furthermore, it explores potential solutions, including encryption, blockchain technology, and the implementation of robust authentication mechanisms to safeguard IoT ecosystems. Acknowledging the significance of effective regulation and industry collaboration, this abstract concludes by emphasizing the need for continued research and proactive measures to address the evolving landscape of IoT privacy and security challenges.

  • Research Article
  • Cite Count Icon 4
  • 10.1002/spy2.409
Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review
  • May 7, 2024
  • SECURITY AND PRIVACY
  • Rizwan Uz Zaman Wani + 2 more

The Internet of Things (IoT) is a rapidly expanding network of interconnected things that use embedded sensors to gather and share data in real‐time. IoT technologies have given rise to many networking applications in our everyday life such as smart homes, smart cities, smart transport, and so forth. Smart healthcare is one such application that has been revolutionized by the IoT, introducing a new branch of IoT known as the Internet of Medical Things (IoMT). IoMT encompasses an entire ecosystem consisting of smart wearable, implantable sensing equipment's or devices, transmitters that are critical for monitoring the patients remotely and continuing the real‐time and has opened the door to new innovative smart healthcare approaches while improving patient care outcomes. IoMT wearable and embedded sensing devices are commonly utilized in smart healthcare to capture medical data and transmit the medical data in a communication network stored in the cloud. The large volume of data generated and transmitted by these IoMT devices is rising at an exponential rate, resulting in an increase in security and privacy vulnerabilities of healthcare data. To ensure the Confidentiality and integrity of the IoMT devices and the sensitive medical data, there should be proper security and privacy measures such as access control, passwords, multifactor authentication, and encryption of data generated, transmitted, or processed in the IoMT framework. In this paper, we identified the internet of things and its applications in smart healthcare systems. Additionally, the paper focuses on the architecture of IoMT, and several challenges, including the IoMT security and privacy requirements, and attack taxonomy. Furthermore, the paper thoroughly investigates both cryptographic and non‐cryptographic based security and privacy‐enhancing techniques for IoMT or healthcare systems with particular emphasis on advancements in key areas such as Homomorphic Encryption, Differential Privacy, and Federated Learning.

  • Book Chapter
  • 10.1201/9781003193838-38
Block chain: IoT security, privacy and resource challenges
  • Jun 19, 2021
  • Prabira Kumar Sethy + 4 more

The purpose of the paper is to provide a vague overview of the latest blockchain use cases in the information technology industry, in particular, the Internet of Things (IoT). Respective use cases have been discussed in current research articles, Master Theses, business white papers, and industry expert blogs. The paper also provides an overview of the technical aspects of the blockchain and IoT. This paper offers a comprehensive overview of the history and current situation of IoT security, privacy, and resource challenges centred on blockchain technology. It helps understand the need for a comprehensive blockchain feasibility model to be created.

  • Conference Article
  • Cite Count Icon 15
  • 10.1109/uemcon47517.2019.8993096
Security Architecture Framework for Internet of Things (IoT)
  • Oct 1, 2019
  • Muath Obaidat + 4 more

The Internet of Things (IoT) nowadays plays an essential and critical role in our lives and is beginning to dominate Internet communications. The twenty-first century will continue to witness exponential growth and dependence on IoT systems in all aspects of life from smart homes, smart vehicles, e-health, smart cities, and smart grid to wearables, and medical devices that are becoming more microscopic due to the increase in processing ability and communications capabilities. The massive deployment of IoT devices in various domains has increased security threats to IoT devices and systems and created internet of vulnerabilities. Different bodies have proposed several fundamental architectural models for IoT. Privacy and security requirements and challenges of IoT are different from any other types of communications. Building trust between different entities and systems is the motive behind this work. This paper proposes a novel security architecture framework for IoT.

  • Research Article
  • Cite Count Icon 17
  • 10.1016/j.hcc.2024.100220
A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond)
  • Mar 12, 2024
  • High-Confidence Computing
  • Lakshmi Priya Rachakonda + 2 more

A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond)

  • Research Article
  • Cite Count Icon 7
  • 10.2139/ssrn.3492690
Mitigating IoT Security and Privacy Challenges Using Distributed Ledger Based Blockchain (Dl-BC) Technology
  • Jan 1, 2017
  • SSRN Electronic Journal
  • Anil Lamba + 4 more

The internet of things (IoT) enabled a common operating picture (COP) across the various applications of modern day living. The COP is achieved through the advancements seen in wireless sensor network devices that were able to communicate through the network thereby exchanging information and performing various analysis. In IoT, the exchange of information and data authentication is only done through the central server there by leading to the security and privacy concerns. Chances of device spoofing, false authentication, less reliability in data sharing could happen. To address such security and privacy concerns, a central server concept is eliminated and blockchain (BC) technology is introduced as a part of IoT. This paper elaborates the possible security and privacy issues considering the component interaction in IoT and studies how the distributed ledger based blockchain (DLBC) technology contribute to it. Applications of BC with respect to focused sectors and category were clearly studied here. Various challenges specific to IoT and IoT with BC were also discussed to understand blockchain technology contribution.

  • PDF Download Icon
  • Research Article
  • 10.32350/icr.0101.04
Security and Privacy Challenges for theIOT-based Smart Homes with Limited Resources and Adoption Immaturity
  • Jun 30, 2021
  • Innovative Computing Review
  • Farzana Kausar Gondal

The Internet of Things (IoT) is technically a developing model looking at the connectivity of different devices or “things” to each other, as well as with the users and also with the Internet. IoT is projected to be an important necessity for the advancement of intelligent smart homes to facilitate home owners because it provides opportuneness and effectiveness in order to help them attain an improved quality of life. The incorporation of IoT into smart homes entails integrating devices with the Internet. Even though it offers many advantages to the users, it also poses new security and privacy challenges based on connectivity, confidentiality, integrity, authenticity, resource limitation, and adoption immaturity. These challenges make the IoT-based smart homes with limited resources enormously susceptible to diverse forms of security vulnerabilities. Thus, it is pivotal to detect the probable security threats to establish a comprehensive and secure status of smart IOT-based homes. This paper incorporates the security risk assessment approach in order to evaluate the potential security and privacy risks and challenges faced by smart homes. The basic goal of this study is to identify and point up diverse security and privacy threats to smart homes and to unveil the risks for their residents. The paper also presents methods to mitigate the recognized dangers. This study provides a foundation to future applications aimed at refining the security necessities of the IoT-based smart homes.

  • Conference Article
  • Cite Count Icon 32
  • 10.1109/cais.2018.8442002
IoT Security and Privacy Issues
  • Apr 1, 2018
  • Abeer Assiri + 1 more

Internet of Things (IoT) represents the future of technology where objects will be able to communicate with each other and connect to the internet to create self-configuration, intelligent system. Beside IoT development benefits, there is still great doubt about security and privacy which are considered major challenges facing the adaption and development of IoT architecture. Security and privacy issues are the most critical challenge that needs to be addressed in each IoT layer and it is not fully addressed yet. There have been many studies propose solutions to address security issues. Protecting IoT require appropriate security framework that covers all IoT layer-security issues. This paper presents a review of security and privacy issues and challenges in IoT. It also shed a light on security requirements relevant to IoT environment and some proposed solutions.

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon
Setting-up Chat
Loading Interface