Beyond the Hype: Internet of Things Concepts, Security and Privacy Concerns

  • Amit Kumar TyagiEmail author
  • G. Rekha
  • N. Sreenath
Conference paper
Part of the Learning and Analytics in Intelligent Systems book series (LAIS, volume 3)


Today’s Internet of Things (IoTs) has occupied maximum fields/areas where they are working a tremendous works, i.e., providing better life experience to human beings. For example, in e-healthcare, IoT devices are providing a lot of data to doctor, also helping doctors to identify certified medicine or discusses or helping doctors to remember various certain activities of a patients, etc. Similarly, chatting applications (online social networking) have made communication easier among human beings. IoTs are with everything (applications) in this physical world and they are connected on a large scale and integrated securely through Internet infrastructure. But, are we satisfied with this security (security in IoTs)? On another side, these devices (IoTs) or applications are collecting a data from your every movement/tracking your (humans) movement. This data is stored as large data (called big data) and used or sold to third parties (like organization) to make profit for them (via analytics process). These devices have an issue of leaking your movement or person to unknown users, which is a serious issue. This work (or article) will discuss some facts like about IoTs, which may protect people or provide awareness to people or protect them when they are visiting any website/browsing or coming online (for working something or making a communication).


Internet of Things Security Privacy Big data Privacy in virtual world 


  1. 1.
  2. 2.
    Tyagi AK, Nandula A, Rekha G, Sharma S, Sreenath N (2019) How a user will look at the connection of internet of things devices?: a smarter look of smarter environment. In: ICACSE: 2019: 2nd international conference on advanced computing and software engineering, KNIT Sultanpur, India, 8–9 February 2019Google Scholar
  3. 3.
    TELEFÓNICA I + D: Internet of Things + Internet of Services (2008)Google Scholar
  4. 4.
  5. 5.
    Tyagi AK, Shamila M (2019) Spy in the crowd: how user’s Privacy is getting affected with the integration of internet of thing’s devices. In: SUSCOM-2019: International conference on sustainable computing in science, technology & management (SUSCOM-2019). Amity University Rajasthan, India, 26–28 February 2019Google Scholar
  6. 6.
  7. 7.
  8. 8.
  9. 9.
    AmirGandomi Murtaza Haider (2015) Beyond the hype: big data concepts, methods, and analytics. Int J Inf Manag 35(2):137–144CrossRefGoogle Scholar
  10. 10.
  11. 11.
    Hunt R (2004) Network Security: the Principles of Threats, Attacks and Intrusions, part1 and part 2, APRICOTGoogle Scholar
  12. 12.
    Veerendra GG, Hacking Internet of Things (IoT), A Case Study on DTH Vulnerabilities, SecPod TechnologiesGoogle Scholar
  13. 13.
  14. 14.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system.
  15. 15.
    Tyagi AK, Aghila G (2011) A wide Scale survey on Botnet. Int J Comput Appl 34(9), 9–22, November (ISSN: 0975-8887)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringLingaya’s VidyapeethFaridabadIndia
  2. 2.Department of Computer Science and EngineeringKoneru Lakshmaiah Education FoundationVaddeswaram, GunturIndia
  3. 3.Department of Computer Science and EngineeringPondicherry Engineering CollegePuducherryIndia

Personalised recommendations