Skip to main content

Data Acquisition and Knowledge Management in IoT: Security Issues, Challenges, and Road Map Ahead

  • Chapter
  • First Online:
Security Issues and Privacy Threats in Smart Ubiquitous Computing

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 341))

  • 310 Accesses

Abstract

In this digital era of IoT data storing and management is not a big issue however protecting of information and applying strong security on data is a major issue. The security issue and challenges in the Internet of things are directly linked to the large application of IoT system. This chapter starts with the introduction of IoT statistics, some IoT application domaina architecture, and feature of IoT safety. This chapter presents quite a few safety challenges and issues of IoT that live in the layered IoT architecture. In IoT data acquisition each IoT object that gathers information is a precious benefit. It is necessary to make sure that devices cannot disclose data to unauthorized users or parties. Thus the safety measures as well as major security challenges are concerned at all there layer in IoT architecture ithat is iphysical layer, network layer, and application layer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gaikwad, P.P., Gabhane, J.P., Golait, S.S.: A survey based on Smart Homes system using Internet-of-Things. In: 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC) (pp. 0330-0335). IEEE (2015)

    Google Scholar 

  2. Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity authentication and capability based access control (iacac) for the internet of things. J. Cyber Secur. Mob. 1(4), 309–348 (2013)

    Google Scholar 

  3. Padmavathi, D.G., Shanmugapriya, M.: A survey of attacks, security mechanisms and challenges in wireless sensor networks (2009). arXiv preprint arXiv:0909.0576

    Google Scholar 

  4. Liu, L.A., Lai, S.L.: ALOHA-based anti-collision algorithms used in RFID system. In: Proceedings of the IEEE International Conference on Networking and Mobile Computing, pp. 1–4, 2006

    Google Scholar 

  5. Atzori, L., Iera, A., Morabito, G., Nitti, M.: The social internet of things (siot)–when social networks meet the internet of things: concept, architecture and network characterization. Comput. Netw. 56(16), 3594–3608 (2012)

    Article  Google Scholar 

  6. Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 663–667. IEEE (2013)

    Google Scholar 

  7. Da Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inf. 10(4), 2233–2243 (2014)

    Article  Google Scholar 

  8. Ali, M., Ali, R., Khan, W.A., Han, S.C., Bang, J., Hur, T., Kang, B.H.: A data-driven knowledge acquisition system: An end-to-end knowledge engineering process for generating production rules. IEEE Access 6, 15587–15607 (2018)

    Article  Google Scholar 

  9. Soni, M., Kumar, K., Sharma, A.: A review on security and privacy in application of IOT in Smart City (2018)

    Google Scholar 

  10. Qiang, C., Quan, G.R., Yu, B., Yang, L.: Research on security issues of the internet of things. Int. J. Fut. Gen. Commun. Netw. 6(6), 1–10 (2013)

    Google Scholar 

  11. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)

    Article  Google Scholar 

  12. Mukaddam, A., Elhajj, I., Kayssi, A., Chehab, A.: Ip spoofing detection using modifiehop count. In: Proceedings of 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, May 2014

    Google Scholar 

  13. Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94–100 (2007)

    Article  Google Scholar 

  14. Bhupendra Singh, T., Chaudhary, S.: Content sniffing attack detection in client and server side: a survey. Int. J. Adv. Comput. Res. 3(2) (2013)

    Google Scholar 

  15. Qu, J., Athanasios, V., Jiafu, W., Jingwei, L., Dechao, Q..: Security of the Internet of Things: perspectives and challenges. Published online: 17 June 2014 Springer Science+Business Media New York 2014.

    Google Scholar 

  16. Maleh, Y., Ezzati, A.: A review of security attacks and intrusion detection schemes in wireless sensor networks. Int. J. Wirel. Mobile Netw. (IJWMN) 5(6) (2013)

    Google Scholar 

  17. Benjamin, K.: RFID as an enabler of the internet of things: issues of security and privacy. In: IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing, 2011.

    Google Scholar 

  18. Li, L.: Study on security architecture in the Internet of Things. In: Doyle, W.D.: (eds.) International Conference on Measurement, Information and Control (MIC), 2012 “Magnetization Reversal in Films with Biaxial Anisotropy, in 1987 Proceedings of the INTERMAG Conference, pp. 2.2-1–2.2-6

    Google Scholar 

  19. Ravindran, R., Yomas, J., Jubin Sebastian, E.: IoT: a review on security issues and measures. IRACST: Eng. Sci. Technol.: Int. J. (ESTIJ) 5(6) (2015). ISSN:2250-3498

    Google Scholar 

  20. Aminesh, P., Park, J.M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Netw. 51(2) (2007)

    Google Scholar 

  21. Abbasi, M.A., Memon, Z.A., Memon, J., Syed, T.Q., Alshboul, R.: Addressing the future data management challenges in iot: A proposed framework. Int. J. Adv. Comput. Sci. Appl. 8(5), 197–207 (2017)

    Google Scholar 

  22. Ahmed, N., Kanhere, S.S., Jha, S.: The holes problem in wireless sensor networks: a survey. ACM Sigmobile Mobile Comput. Commun. Rev. 9(2), 4–18 (2005)

    Article  Google Scholar 

  23. Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: Security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180–187. IEEE (2015)

    Google Scholar 

  24. https://smart.electronicsforu.com/2017/11/03/3087

  25. Wang, X., Yu, W., Champion, A., Fu, X., Xuan, D.: Detecting worms via mining dynamic program execution. In: Proceedings of Third International Conference on Security and Privacy in Communications Networks, 2007

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ganesh Shivaji Pise .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pise, G.S., Babar, S.D. (2021). Data Acquisition and Knowledge Management in IoT: Security Issues, Challenges, and Road Map Ahead. In: Mahalle, P.N., Shinde, G.R., Dey, N., Hassanien, A.E. (eds) Security Issues and Privacy Threats in Smart Ubiquitous Computing. Studies in Systems, Decision and Control, vol 341. Springer, Singapore. https://doi.org/10.1007/978-981-33-4996-4_5

Download citation

Publish with us

Policies and ethics