Abstract
IoT (Internet of Things) is connecting inter-related computing devices and the main idea for this concept is to connect each device via internet so that it will be easy for the devices to communicate and share info among them. These days IoT has grown up to a massive extent and new and emerging topic in research. IoT is the new and vast technology for the upcoming future as almost all devices will be connected to each other and share data among them via internet. This chapter identifies various privacy challenges in IoT, and their respective solutions presented by several researches over the time. It presents various issues related to privacy and security in IoT like standardization, networking and addressing ones. The chapter also deals within solutions provided for academic, technical and industrial aspects for IoT enabled environment. The importance of data security and protection to overcome the vulnerabilities which can come for an IoT based environment and can reduce the risk for IoT infrastructure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abomhara, M., & Køien, G. M. (2014). Security and privacy in the Internet of Things: Current status and open issues. International Conference on Privacy and Security in Mobile Systems (PRISMS). IEEE.
Aldowah, H., et al. (2017). Internet of Things in higher education: A study on future learning. In: Journal of Physics: Conference Series. IOP Publishing.
Bandyopadhyay, D., & Sen, J. (2011). Internet of Things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58(1), 49–69.
Biswas, K., Muthukkumarasamy, V. (2016). Securing smart cities using blockchain technology. In: IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/Smart City/DSS). IEEE.
Botta, A., et al. (2016). Integration of cloud computing and Internet of Things: A survey. Future Generation Computing Systems, 56, 684–700.
Bull, P., et al. (2016). Flow based security for IoT devices using an SDN gateway. In: IEEE 4thInternational Conference on Future Internet of Things and Cloud (FiCloud). IEEE.
Gen, H.P.-C.S.A. Controllers, R. (2015). Hewlett-Packard Enterprise Development LP. Citeseer.
Gubbi, J., et al. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computing Systems, 29(7), 1645–1660.
Haitao, L. B. C. H. W., & Ying, F. (2012). Security analysis and security model research on IOT. Computer & Digital Engineering, 11, 006.
Harbor White Paper. (2016). Security for the Internet of Things. The Harbor Restaurant, 16, 1–16.
Henze, M., et al. (2016). A comprehensive approach to privacy in the cloud-based Internet of Things. Future Generation Computing Systems, 56, 701–718.
Hernández-Ramos, J. L., et al. (2016). DCapBAC: embedding authorization logic into smart things through ECC optimizations. International Journal of Computer Mathematics, 93(2), 345–366.
Issarny, V., et al. (2011). Service-oriented middleware for the future internet: State of the art and research directions. Journal of Internet Services and Applications, 2(1), 23–45.
Jan, S., et al. (2016). Applications and challenges faced by Internet of Things – A survey. International Journal of Engineering Trends and Applications,. ISSN: 2393–9516.
Jara, A. J., Kafle, V. P., & Skarmeta, A. F. (2013). Secure and scalable mobility management scheme for the Internet of Things integration in the future internet architecture. International Journal of Ad Hoc and Ubiquitous Computing, 13(3–4), 228–242.
Jha, A., & Sunil, M. (2014). Security considerations for Internet of Things. Vadodara: L&T Technology Services.
Jing, Q., et al. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481–2501.
Kim, J. T. (2015). Requirement of security for IoT application based on gateway system. Communications, 9(10), 201–208.
Kim, J. T. (2016). Analyses of requirement for secure IoT gateway and assessment. International information institute (Tokyo). Information, 19(3), 833.
Minoli, D. (2013). Building the Internet of Things with IPv6 and MIPv6: The evolving World ofM2M communications. Hoboken: Wiley.
Miorandi, D., et al. (2012). Internet of Things: vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.
Ning, H., & Liu, H. (2012). Cyber-physical-social based security architecture for future Internet of Things. Advances in Internet of Things, 2(01), 1.
Puthal, D., et al. (2017). A dynamic prime number based efficient security mechanism for big sensing data streams. Journal of Computer and System Sciences, 83(1), 22–42.
Ramirez, E. (2015). Privacy and the IoT: Navigating policy issues. Washington: US FTC.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed Internet of Things. Computer Networks, 57(10), 2266–2279.
Schaub, F., et al. (2015). A design space for effective privacy notices. In: Eleventh Symposium on Usable Privacy and Security (SOUPS 2015) Security in Internet of Things: Issues, Challenges and Solutions 405
Shipley, A. (2015). Security in the Internet of Things. Wind River, September 2014.
Sicari, S., et al. (2015). Security, privacy and trust in Internet of Things: the road ahead. Computer Networks, 76, 146–164.
Sundmaeker, H., et al. (2010). Vision and challenges for realising the Internet of Things. Cluster of European research projects on the Internet of Things. Brussels: European Commission.
Suo, H., et al. (2013). Security and privacy in mobile cloud computing. In: 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE.
Szczechowiak, P., et al. (2008). NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In Wireless sensor networks (pp. 305–320). Berlin: Springer.
Tan, Y., & Han, J. (2011). Service-oriented middleware model for Internet of Things. Computer Science, 38(3), 23–45.
Ul Rehman, A., & Manickam, S. (2016). A study of smart home environment and its security threats. International Journal of Reliability, Quality and Safety Engineering, 23(03), 1640005.
Usman, M., et al. (2017). Sit: a lightweight encryption algorithm for secure Internet of Things. arXiv preprint arXiv:1704.08688.
Van Kranenburg, R. (2008). A critique of ambient technology and the all-seeing network of RFID. Amsterdam: The Netherlands Institute of Network Culture.
Vasilomanolakis, E., et al. (2015). On the security and privacy of Internet of Things architectures and systems. In: 2015 International Workshop on Secure Internet of Things (SIoT). IEEE.
Wan, J., et al. (2013). From machine-to-machine communications towards cyber-physical systems. Computer Science and Information Systems, 10(3), 1105–1128.
Wan, J., et al. (2014). VCMIA: a novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing. Mobile Networks and Applications, 19(2), 153–160.
Ye, N., et al. (2014). An efficient authentication and access control scheme for perception layer of Internet of Things. Applied Mathematics & Information Sciences, 8(4), 1617.
Yue, X., et al. (2015). Cloud-assisted industrial cyber-physical systems: An insight. Microprocessors and Microsystems, 39(8), 1262–1270.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Hasan, N., Chamoli, A., Alam, M. (2020). Privacy Challenges and Their Solutions in IoT. In: Alam, M., Shakil, K., Khan, S. (eds) Internet of Things (IoT). Springer, Cham. https://doi.org/10.1007/978-3-030-37468-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-37468-6_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37467-9
Online ISBN: 978-3-030-37468-6
eBook Packages: Computer ScienceComputer Science (R0)