Skip to main content

Future Privacy and Trust Challenges for IoE Networks

  • Chapter
  • First Online:
Cybersecurity Vigilance and Security Engineering of Internet of Everything

Part of the book series: Internet of Things ((ITTCC))

  • 137 Accesses

Abstract

Internet of Everything (IoE) is a newly emerging trend, especially for future networks. Such a rapid adoption of these networks offered new services where devices are equipped with specialized sensors based on intelligent transactions and control of services systems to improve the quality of life. The rapid adoption of these networks opens new security and protection threats for maintaining end nodes’ or users’ privacy and trust against disruptive attacks designed to incur financial losses. These networks are connected with edge and cloud networks where the trustworthiness of these devices is another challenge for IoE networks. Despite IoE connecting trillion users, devices, systems, objects, and interfaces for autonomous Internet-based services, it suffers from implementation issues and vulnerabilities of security, trust, and privacy along with architectural and infrastructural considerations. IoE is designed to benefit valuable users by creating compound impacts through close and handy interconnectivity and interoperability among processes, things, data, systems, institutes, and individuals over heterogeneous platforms. This chapter presents the future user privacy and trust research challenges that still need to be addressed for IoE networks. This chapter also discusses the new trend and usage of blockchain and artificial intelligence in IoE networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Flores FFS, de Lemos Meira SR Ethical Software Engineering: A critical review about Software Engineering in face of Security Requirements in the IoT/IoE Society. In: 2021 IEEE International Systems Conference (SysCon), 2021. IEEE, pp 1–8

    Google Scholar 

  2. Ilgi GS, Ever YK (2020) Critical analysis of security and privacy challenges for the Internet of drones: a survey. In: Drones in smart-cities. Elsevier, pp 207–214

    Google Scholar 

  3. ALiero MS, Qureshi KN, Pasha MF, Jeon G (2021) Smart Home Energy Management Systems in Internet of Things networks for green cities demands and services. Environmental Technology & Innovation:101443. doi:https://doi.org/10.1016/j.eti.2021.101443

  4. Qureshi KN, Alhudhaif A, Hussain A, Iqbal S, Jeon G (2021) Trust aware energy management system for smart homes appliances. Computers & Electrical Engineering:107641. doi:https://doi.org/10.1016/j.compeleceng.2021.107641

  5. Qureshi KN, Alhudhaif A, Haider SW, Majeed S, Jeon G (2022) Secure Data Communication for Wireless Mobile Nodes in Intelligent Transportation Systems. Microprocessors and Microsystems:104501. doi:https://doi.org/10.1016/j.micpro.2022.104501

  6. Mazzoccoli A, Naldi M (2022) An Overview of Security Breach Probability Models. Risks 10 (11):220

    Article  Google Scholar 

  7. Cisco U (2021) Cisco annual internet report (2018–2023) white paper. 2020. Acessado em 10 (01)

    Google Scholar 

  8. Gabilondo García Á, Fernández Z, Viola R, Martín Á, Zorrilla M, Angueira Buceta P, Montalbán Sánchez J (2022) Traffic Classification for Network Slicing in Mobile Networks.

    Google Scholar 

  9. Luiijf E, Klaver M (2021) Analysis and lessons identified on critical infrastructures and dependencies from an empirical data set. International Journal of Critical Infrastructure Protection 35:100471

    Article  Google Scholar 

  10. Karie NM, Sahri NM, Yang W, Valli C, Kebande VR (2021) A review of security standards and frameworks for IoT-based smart environments. IEEE Access

    Google Scholar 

  11. Kong X, Wu Y, Wang H, Xia F (2022) Edge Computing for Internet of Everything: A Survey. IEEE Internet of Things Journal 9 (23):23472–23485

    Article  Google Scholar 

  12. Shahzad K, Aseeri AO, Shah MA (2022) A Blockchain-Based Authentication Solution for 6G Communication Security in Tactile Networks. Electronics 11 (9):1374

    Article  Google Scholar 

  13. Un Nisa K, Alhudhaif A, Qureshi KN, Hadi HJ, Jeon G (2022) Security Provision for Protecting Intelligent Sensors and Zero Touch Devices by using Blockchain Method for the Smart Cities. Microprocessors and Microsystems:104503. doi:https://doi.org/10.1016/j.micpro.2022.104503

  14. Conti M, Kumar G, Nerurkar P, Saha R, Vigneri L (2022) A survey on security challenges and solutions in the IOTA. Journal of Network Computer Applications:103383

    Google Scholar 

  15. Paleri P (2022) Threat, Risk and Uncertainty: Triad of Chaotic Balance in a Chancy, Chancy World. In: Revisiting National Security. Springer, pp 155–193

    Google Scholar 

  16. Qureshi KN, Ahmad A, Piccialli F, Casolla G, Jeon G (2020) Nature-inspired algorithm-based secure data dissemination framework for smart city networks. Neural Computing and Applications. doi:https://doi.org/10.1007/s00521-020-04900-z

  17. Sachdev R Towards security and privacy for edge AI in IoT/IoE based digital marketing environments. In: 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), 2020. IEEE, pp 341–346

    Google Scholar 

  18. El-Masri M, Hussain EMA (2021) Blockchain as a mean to secure Internet of Things ecosystems–a systematic literature review. Journal of Enterprise Information Management 34 (5):1371–1405

    Article  Google Scholar 

  19. Hatfield JM (2019) Virtuous human hacking: The ethics of social engineering in penetration-testing. Computers Security 83:354–366

    Article  Google Scholar 

  20. Formosa P, Wilson M, Richards DJC, Security (2021) A principlist framework for cybersecurity ethics. 109:102382

    Google Scholar 

  21. Abe N, Soltys M (2019) Deploying health campaign strategies to defend against social engineering threats. Procedia Computer Science 159:824–831

    Article  Google Scholar 

  22. Shuvo MMH (2022) Edge AI: Leveraging the full potential of deep learning. In: Recent Innovations in Artificial Intelligence and Smart Applications. Springer, pp 27–46

    Chapter  Google Scholar 

  23. Kokkonen H, Lovén L, Motlagh NH, Partala J, González-Gil A, Sola E, Angulo I, Liyanage M, Leppänen T, Nguyen T (2022) Autonomy and Intelligence in the Computing Continuum: Challenges, Enablers, and Future Directions for Orchestration. arXiv preprint arXiv:01423

    Google Scholar 

  24. Chinchawade AJ, Lamba OS (2021) Security and privacy challenges in internet of everything (ioe) with security requirements. Journal of Engineering Technology-Suresh Gyan Vihar University 7 (2)

    Google Scholar 

  25. Desai S, Alhadad R, Chilamkurti N, Mahmood A (2019) A survey of privacy preserving schemes in IoE enabled smart grid advanced metering infrastructure. Cluster Computing 22:43–69

    Article  Google Scholar 

  26. Stellios I, Kotzanikolaou P, Psarakis M, Alcaraz C, Lopez J (2018) A survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services. IEEE Communications Surveys Tutorials 20 (4):3453–3495

    Article  Google Scholar 

  27. Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Communications Surveys Tutorials 22 (3):1646–1685

    Article  Google Scholar 

  28. Shankhpal SV, Brahmananda S (2022) Systematic analysis and review of trust management schemes for IoT security. International Journal of Wireless Mobile Computing 23 (1):33–45

    Article  Google Scholar 

  29. Farias da Costa VC, Oliveira L, de Souza J (2021) Internet of everything (IoE) taxonomies: A survey and a novel knowledge-based taxonomy. Sensors 21 (2):568

    Article  Google Scholar 

  30. Saba T, Rehman A, Haseeb K, Alam T, Jeon G (2023) Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence. Cluster Computing:1–11

    Google Scholar 

  31. Jimo S, Abdullah T, Jamal A IoE Security Risk Analysis in a Modern Hospital Ecosystem. In: Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022, 2023. Springer, pp 451–467

    Google Scholar 

  32. Juszczyk O, Shahzad K (2022) Blockchain technology for renewable energy: principles, applications and prospects. Energies 15 (13):4603

    Article  Google Scholar 

  33. Alqasemi F, Al-Hagree S, Shaddad RQ, Zahary AT An IEEE Xplore Database Literature Review Concerning Internet of Everything During 2020–2021. In: 2021 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE), 2021. IEEE, pp 1–8

    Google Scholar 

  34. Puthal D, Damiani E, Mohanty SP Secure and Scalable Collaborative Edge Computing using Decision Tree. In: 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2022. IEEE, pp 247–252

    Google Scholar 

  35. Aldawsari H, Artoli AM (2021) A Reliable Lightweight Trust Evaluation Scheme for IoT Security. International Journal of Advanced Computer Science Applications 12 (11)

    Google Scholar 

  36. Tanwar S, Popat A, Bhattacharya P, Gupta R, Kumar N (2022) A taxonomy of energy optimization techniques for smart cities: Architecture and future directions. Expert Systems with Applications 39 (5):e12703

    Google Scholar 

  37. Uribe S, Moreno F, Hernández G, Álvarez F (2022) Personalised Interaction or How We Can Improve Migrants’ Experience When Using a Digital Companion Through a Mobile App. In: Information and Communications Technology in Support of Migration. Springer, pp 229–247

    Chapter  Google Scholar 

  38. Mohanty SP, Yanambaka VP, Kougianos E, Puthal D (2020) PUFchain: A hardware-assisted blockchain for sustainable simultaneous device and data security in the internet of everything (IoE). IEEE Consumer Electronics Magazine 9 (2):8–16. doi:https://doi.org/10.1109/MCE.2019.2953758

    Article  Google Scholar 

  39. Swathi GC, Kumar GK, Kumar AS (2022) Estimating Botnet Impact on IoT/IoE networks using Traffic flow Features. Computers Electrical Engineering 102:108209

    Article  Google Scholar 

  40. Rustagi A, Manchanda C, Sharma N IoE: A boon & threat to the mankind. In: 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), 2020. IEEE, pp 114–119

    Google Scholar 

  41. Kouicem DE, Bouabdallah A, Lakhlef H An efficient architecture for trust management in IoE based systems of systems. In: 2018 13th Annual Conference on System of Systems Engineering (SoSE), 2018. IEEE, pp 138–143

    Google Scholar 

  42. Fortino G, Fotia L, Messina F, Rosaci D, Sarné GM (2020) Trust and reputation in the internet of things: State-of-the-art and research challenges. IEEE Access 8:60117–60125

    Article  Google Scholar 

  43. Elsayed MA, Zulkernine M (2020) PredictDeep: security analytics as a service for anomaly detection and prediction. IEEE Access 8:45184–45197

    Article  Google Scholar 

  44. Khan WZ, Rafique W, Haider N, Hakak S, Imran M (2022) Internet of Everything: Enabling Technologies, Applications, Security and Challenges. TechRxiv Preprint. doi:https://doi.org/10.36227/techrxiv.21341796.v1

  45. Ryoo J, Kim S, Cho J, Kim H, Tjoa S, DeRobertis C IoE security threats and you. In: 2017 International Conference on Software Security and Assurance (ICSSA), 2017. IEEE, pp 13–19. doi:https://doi.org/10.1109/ICSSA.2017.28

  46. Janbi N, Katib I, Albeshri A, Mehmood R (2020) Distributed artificial intelligence-as-a-service (DAIaaS) for smarter IoE and 6G environments. Sensors 20 (20):5796

    Article  Google Scholar 

  47. Mohanty SP (2020) Security and Privacy by Design is Key in the Internet of Everything (IoE) Era. IEEE Consumer Electron Mag 9 (2):4–5

    Article  Google Scholar 

  48. Bera B, Das AK, Obaidat MS, Vijayakumar P, Hsiao K-F, Park Y (2020) AI-enabled blockchain-based access control for malicious attacks detection and mitigation in IoE. IEEE Consumer Electronics Magazine 10 (5):82–92

    Article  Google Scholar 

  49. Jameii SM, Zamirnaddafi RS, Rezabakhsh R (2022) Internet of Flying Things security: A systematic review. Concurrency Computation: Practice Experience 34 (24):e7213

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kashif Naseer Qureshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Iftikhar, A., Qureshi, K.N. (2024). Future Privacy and Trust Challenges for IoE Networks. In: Naseer Qureshi, K., Newe, T., Jeon, G., Chehri, A. (eds) Cybersecurity Vigilance and Security Engineering of Internet of Everything. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-031-45162-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-45162-1_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-45161-4

  • Online ISBN: 978-3-031-45162-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics