Skip to main content

Privacy Challenges and Their Solutions in IoT

  • Chapter
  • First Online:
Internet of Things (IoT)

Abstract

IoT (Internet of Things) is connecting inter-related computing devices and the main idea for this concept is to connect each device via internet so that it will be easy for the devices to communicate and share info among them. These days IoT has grown up to a massive extent and new and emerging topic in research. IoT is the new and vast technology for the upcoming future as almost all devices will be connected to each other and share data among them via internet. This chapter identifies various privacy challenges in IoT, and their respective solutions presented by several researches over the time. It presents various issues related to privacy and security in IoT like standardization, networking and addressing ones. The chapter also deals within solutions provided for academic, technical and industrial aspects for IoT enabled environment. The importance of data security and protection to overcome the vulnerabilities which can come for an IoT based environment and can reduce the risk for IoT infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Abomhara, M., & Køien, G. M. (2014). Security and privacy in the Internet of Things: Current status and open issues. International Conference on Privacy and Security in Mobile Systems (PRISMS). IEEE.

    Google Scholar 

  • Aldowah, H., et al. (2017). Internet of Things in higher education: A study on future learning. In: Journal of Physics: Conference Series. IOP Publishing.

    Google Scholar 

  • Bandyopadhyay, D., & Sen, J. (2011). Internet of Things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58(1), 49–69.

    Article  Google Scholar 

  • Biswas, K., Muthukkumarasamy, V. (2016). Securing smart cities using blockchain technology. In: IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/Smart City/DSS). IEEE.

    Google Scholar 

  • Botta, A., et al. (2016). Integration of cloud computing and Internet of Things: A survey. Future Generation Computing Systems, 56, 684–700.

    Article  Google Scholar 

  • Bull, P., et al. (2016). Flow based security for IoT devices using an SDN gateway. In: IEEE 4thInternational Conference on Future Internet of Things and Cloud (FiCloud). IEEE.

    Google Scholar 

  • Gen, H.P.-C.S.A. Controllers, R. (2015). Hewlett-Packard Enterprise Development LP. Citeseer.

    Google Scholar 

  • Gubbi, J., et al. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computing Systems, 29(7), 1645–1660.

    Article  Google Scholar 

  • Haitao, L. B. C. H. W., & Ying, F. (2012). Security analysis and security model research on IOT. Computer & Digital Engineering, 11, 006.

    Google Scholar 

  • Harbor White Paper. (2016). Security for the Internet of Things. The Harbor Restaurant, 16, 1–16.

    Google Scholar 

  • Henze, M., et al. (2016). A comprehensive approach to privacy in the cloud-based Internet of Things. Future Generation Computing Systems, 56, 701–718.

    Article  Google Scholar 

  • Hernández-Ramos, J. L., et al. (2016). DCapBAC: embedding authorization logic into smart things through ECC optimizations. International Journal of Computer Mathematics, 93(2), 345–366.

    Article  Google Scholar 

  • Issarny, V., et al. (2011). Service-oriented middleware for the future internet: State of the art and research directions. Journal of Internet Services and Applications, 2(1), 23–45.

    Article  Google Scholar 

  • Jan, S., et al. (2016). Applications and challenges faced by Internet of Things – A survey. International Journal of Engineering Trends and Applications,. ISSN: 2393–9516.

    Google Scholar 

  • Jara, A. J., Kafle, V. P., & Skarmeta, A. F. (2013). Secure and scalable mobility management scheme for the Internet of Things integration in the future internet architecture. International Journal of Ad Hoc and Ubiquitous Computing, 13(3–4), 228–242.

    Article  Google Scholar 

  • Jha, A., & Sunil, M. (2014). Security considerations for Internet of Things. Vadodara: L&T Technology Services.

    Google Scholar 

  • Jing, Q., et al. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481–2501.

    Article  Google Scholar 

  • Kim, J. T. (2015). Requirement of security for IoT application based on gateway system. Communications, 9(10), 201–208.

    Google Scholar 

  • Kim, J. T. (2016). Analyses of requirement for secure IoT gateway and assessment. International information institute (Tokyo). Information, 19(3), 833.

    Google Scholar 

  • Minoli, D. (2013). Building the Internet of Things with IPv6 and MIPv6: The evolving World ofM2M communications. Hoboken: Wiley.

    Book  Google Scholar 

  • Miorandi, D., et al. (2012). Internet of Things: vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.

    Article  Google Scholar 

  • Ning, H., & Liu, H. (2012). Cyber-physical-social based security architecture for future Internet of Things. Advances in Internet of Things, 2(01), 1.

    Article  Google Scholar 

  • Puthal, D., et al. (2017). A dynamic prime number based efficient security mechanism for big sensing data streams. Journal of Computer and System Sciences, 83(1), 22–42.

    Article  MathSciNet  Google Scholar 

  • Ramirez, E. (2015). Privacy and the IoT: Navigating policy issues. Washington: US FTC.

    Google Scholar 

  • Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed Internet of Things. Computer Networks, 57(10), 2266–2279.

    Article  Google Scholar 

  • Schaub, F., et al. (2015). A design space for effective privacy notices. In: Eleventh Symposium on Usable Privacy and Security (SOUPS 2015) Security in Internet of Things: Issues, Challenges and Solutions 405

    Google Scholar 

  • Shipley, A. (2015). Security in the Internet of Things. Wind River, September 2014.

    Google Scholar 

  • Sicari, S., et al. (2015). Security, privacy and trust in Internet of Things: the road ahead. Computer Networks, 76, 146–164.

    Article  Google Scholar 

  • Sundmaeker, H., et al. (2010). Vision and challenges for realising the Internet of Things. Cluster of European research projects on the Internet of Things. Brussels: European Commission.

    Google Scholar 

  • Suo, H., et al. (2013). Security and privacy in mobile cloud computing. In: 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE.

    Google Scholar 

  • Szczechowiak, P., et al. (2008). NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In Wireless sensor networks (pp. 305–320). Berlin: Springer.

    Chapter  Google Scholar 

  • Tan, Y., & Han, J. (2011). Service-oriented middleware model for Internet of Things. Computer Science, 38(3), 23–45.

    Google Scholar 

  • Ul Rehman, A., & Manickam, S. (2016). A study of smart home environment and its security threats. International Journal of Reliability, Quality and Safety Engineering, 23(03), 1640005.

    Article  Google Scholar 

  • Usman, M., et al. (2017). Sit: a lightweight encryption algorithm for secure Internet of Things. arXiv preprint arXiv:1704.08688.

    Google Scholar 

  • Van Kranenburg, R. (2008). A critique of ambient technology and the all-seeing network of RFID. Amsterdam: The Netherlands Institute of Network Culture.

    Google Scholar 

  • Vasilomanolakis, E., et al. (2015). On the security and privacy of Internet of Things architectures and systems. In: 2015 International Workshop on Secure Internet of Things (SIoT). IEEE.

    Google Scholar 

  • Wan, J., et al. (2013). From machine-to-machine communications towards cyber-physical systems. Computer Science and Information Systems, 10(3), 1105–1128.

    Article  Google Scholar 

  • Wan, J., et al. (2014). VCMIA: a novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing. Mobile Networks and Applications, 19(2), 153–160.

    Article  MathSciNet  Google Scholar 

  • Ye, N., et al. (2014). An efficient authentication and access control scheme for perception layer of Internet of Things. Applied Mathematics & Information Sciences, 8(4), 1617.

    Article  Google Scholar 

  • Yue, X., et al. (2015). Cloud-assisted industrial cyber-physical systems: An insight. Microprocessors and Microsystems, 39(8), 1262–1270.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nabeela Hasan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hasan, N., Chamoli, A., Alam, M. (2020). Privacy Challenges and Their Solutions in IoT. In: Alam, M., Shakil, K., Khan, S. (eds) Internet of Things (IoT). Springer, Cham. https://doi.org/10.1007/978-3-030-37468-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37468-6_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37467-9

  • Online ISBN: 978-3-030-37468-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics