Abstract
The Internet of Intelligence (IoI) is a next-generation networking paradigm that integrates artificial intelligence (AI) and the Internet of Things (IoT) to create a more intelligent and interconnected world. The IoI will enable a wide range of new applications and services, such as smart cities, intelligent transportation, and personalized healthcare. However, the IoI also poses significant security challenges. This chapter provides an overview of the key technologies for information security for the IoI. It discusses the unique security challenges of the IoI and presents a number of promising security solutions. The abstract also highlights some of the key research directions in IoI security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Information Security’s Future. Effect of Field. What is the future of cyber security? https://fieldeffect.com/blog
NIST Framework for Cybersecurity. Technology and Standards National Institute. NIST’s Cyber framework website
Essential Security Measures for CIS. The Internet Security Center. Controls at https://www.cisecurity.org
ICSA. Available at https://www.isaca.org/
Cloud Security Alliance. The Cloud Security Alliance website
Network of wireless sensors. Wireless sensor network on Wikipedia, https://en.wikipedia.org
Ad Hoc wireless network. WiFi ad hoc network on Wikipedia, https://en.wikipedia.org
Imperva. Information Security. https://www.imperva.com/learn/data-security/infosec/
H.J. Mattord, M.E. Whitman, Information Security Principles, 6th edn. (Convene, 2019)
In 2023, Tallings, W. Overview of information security. Pearson Training
L. Atzori, G. Morabito, A. Iera, A survey on the internet of things. Netwk. Comput. 54(15), 2787–2805 (2010)
D.’.A. Pappelli, Become a Ghost in the Digital Realm and Master the Art of Invisibility (Don’t Press Starch, 2022)
I.U. Awan, A thorough review and critique of the cybersecurity framework (CSF) developed by the National Institute of Standards and Technology (NIST) (Singaporean Springer Nature, 2022)
International Data Corporation, D. Evans, The 2022 Data Breach report’s Expense (Institute Ponemon, 2022)
For Gartner, 2022. Top risk management and security trends predicted by Gartner for 2022. Association for Information Systems Audit and Control. In 2022. CISA perceptions. Price & Associates, Inc. In 2022. insights on global digital trust
S. Alam, An overview of biometric authentication in detail (Singaporean Springer Nature, 2022) Update on Biometrics (2022). Market research on biometric updates until 2022. Global Biometric Association. (2022). White paper on biometrics
K. Crawford, In 2022. The Atlas of Artificial Intelligence: Emerging Technologies, Politics, and Power. Press of Yale University. Commission on Trade Regulation. In 2022. Computational intelligence and algorithmic judgment (Agency for Cybersecurity of the European Union, 2022) Cybersecurity in the context of AI
Agency for Infrastructure and Cybersecurity, Framework for artificial intelligence risk management. The National Cybersecurity Education Initiative. In 2022. Framework for workforce cybersecurity (World Trade Organization, 2022) In 2022. The report on global hazards for 2023
(2022) Allianz. 2023 Global Risk Report. Marsh, 2022... Report on Global Risks, 2023. Re. Munich (2022). Report on Global Risks, 2023
Ventures in Cybersecurity. (2022). An Almanac of Cybersecurity. 2022 saw Forrester Research. Forrester projects 2023 as the year when risk and security will change. Networks Palo Alto. (2022). Unit 42: Report on Cloud Security for 2023
Systems Engineering International Council, Cybersecurity through systems engineering. Technology and Standards National Institute. In 2022. Framework for enhancing cybersecurity for critical infrastructure (version 1.1). "The Open Group" In 2022 (TOGAF 9.2, the Open Group Cybersecurity Architecture Framework, 2022)
Agency for Fundamental Rights of the European Union, The Modern Digital Age’s Right to Privacy. International Association of Professionals in Privacy. In 2022. The Privacy Situation in 2023 (World Trade Organization, 2022) In 2022. The report on global hazards for 2023
J.A. Verizon, Ponemon Institute. In 2022. Report on 2022 Data Breach Investigations
P. Cole, SANS Institute, and the Open Web Application Security Project (OWASP), The Greatest Threats to Web Application Security, According to the OWASP Top 10–2021 (2022)
A. Cavoukian (2011) Implementing Privacy Through Design: A Handbook. Association of Privacy Professionals International (IAPP). (2023). The State of Privacy Technology Vendors in 2023. The Clearinghouse for Privacy Rights. (2023). Rights to privacy: Be aware of your rights and safeguard them
Technology and Standards National Institute. (2018). The risk management strategy for government information systems and organizations is outlined in NIST special publication 800–37, revision 2. White House, 2017 (2017). Boosting the security of vital infrastructure and federal networks is the goal of Executive Order 13800
The Society for Healthcare Information and Management Systems (HIMSS). (2023). The cybersecurity framework of HIMSS. Authority for Financial Industry Regulation (FINRA). (2023). The 4513 Cybersecurity Rule
The USPTO, or United States Patent and Trademark Office, (2023). resources for cybersecurity. Organization for International Property Rights (WIPO). (2023). resources for cybersecurity
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kalenda, M.W.W., Mukubwa, E.W. (2024). Information Security Technologies for the Internet of Intelligence. In: Odhiambo, M.O., Mwashita, W. (eds) From Internet of Things to Internet of Intelligence. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-031-55718-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-55718-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-55717-0
Online ISBN: 978-3-031-55718-7
eBook Packages: EngineeringEngineering (R0)