Skip to main content

Information Security Technologies for the Internet of Intelligence

  • Chapter
  • First Online:
From Internet of Things to Internet of Intelligence

Abstract

The Internet of Intelligence (IoI) is a next-generation networking paradigm that integrates artificial intelligence (AI) and the Internet of Things (IoT) to create a more intelligent and interconnected world. The IoI will enable a wide range of new applications and services, such as smart cities, intelligent transportation, and personalized healthcare. However, the IoI also poses significant security challenges. This chapter provides an overview of the key technologies for information security for the IoI. It discusses the unique security challenges of the IoI and presents a number of promising security solutions. The abstract also highlights some of the key research directions in IoI security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Information Security’s Future. Effect of Field. What is the future of cyber security? https://fieldeffect.com/blog

  2. NIST Framework for Cybersecurity. Technology and Standards National Institute. NIST’s Cyber framework website

    Google Scholar 

  3. Essential Security Measures for CIS. The Internet Security Center. Controls at https://www.cisecurity.org

  4. ICSA. Available at https://www.isaca.org/

  5. Cloud Security Alliance. The Cloud Security Alliance website

    Google Scholar 

  6. Network of wireless sensors. Wireless sensor network on Wikipedia, https://en.wikipedia.org

  7. Ad Hoc wireless network. WiFi ad hoc network on Wikipedia, https://en.wikipedia.org

  8. Imperva. Information Security. https://www.imperva.com/learn/data-security/infosec/

  9. H.J. Mattord, M.E. Whitman, Information Security Principles, 6th edn. (Convene, 2019)

    Google Scholar 

  10. In 2023, Tallings, W. Overview of information security. Pearson Training

    Google Scholar 

  11. L. Atzori, G. Morabito, A. Iera, A survey on the internet of things. Netwk. Comput. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  12. D.’.A. Pappelli, Become a Ghost in the Digital Realm and Master the Art of Invisibility (Don’t Press Starch, 2022)

    Google Scholar 

  13. I.U. Awan, A thorough review and critique of the cybersecurity framework (CSF) developed by the National Institute of Standards and Technology (NIST) (Singaporean Springer Nature, 2022)

    Google Scholar 

  14. International Data Corporation, D. Evans, The 2022 Data Breach report’s Expense (Institute Ponemon, 2022)

    Google Scholar 

  15. For Gartner, 2022. Top risk management and security trends predicted by Gartner for 2022. Association for Information Systems Audit and Control. In 2022. CISA perceptions. Price & Associates, Inc. In 2022. insights on global digital trust

    Google Scholar 

  16. S. Alam, An overview of biometric authentication in detail (Singaporean Springer Nature, 2022) Update on Biometrics (2022). Market research on biometric updates until 2022. Global Biometric Association. (2022). White paper on biometrics

    Google Scholar 

  17. K. Crawford, In 2022. The Atlas of Artificial Intelligence: Emerging Technologies, Politics, and Power. Press of Yale University. Commission on Trade Regulation. In 2022. Computational intelligence and algorithmic judgment (Agency for Cybersecurity of the European Union, 2022) Cybersecurity in the context of AI

    Google Scholar 

  18. Agency for Infrastructure and Cybersecurity, Framework for artificial intelligence risk management. The National Cybersecurity Education Initiative. In 2022. Framework for workforce cybersecurity (World Trade Organization, 2022) In 2022. The report on global hazards for 2023

    Google Scholar 

  19. (2022) Allianz. 2023 Global Risk Report. Marsh, 2022... Report on Global Risks, 2023. Re. Munich (2022). Report on Global Risks, 2023

    Google Scholar 

  20. Ventures in Cybersecurity. (2022). An Almanac of Cybersecurity. 2022 saw Forrester Research. Forrester projects 2023 as the year when risk and security will change. Networks Palo Alto. (2022). Unit 42: Report on Cloud Security for 2023

    Google Scholar 

  21. Systems Engineering International Council, Cybersecurity through systems engineering. Technology and Standards National Institute. In 2022. Framework for enhancing cybersecurity for critical infrastructure (version 1.1). "The Open Group" In 2022 (TOGAF 9.2, the Open Group Cybersecurity Architecture Framework, 2022)

    Google Scholar 

  22. Agency for Fundamental Rights of the European Union, The Modern Digital Age’s Right to Privacy. International Association of Professionals in Privacy. In 2022. The Privacy Situation in 2023 (World Trade Organization, 2022) In 2022. The report on global hazards for 2023

    Google Scholar 

  23. J.A. Verizon, Ponemon Institute. In 2022. Report on 2022 Data Breach Investigations

    Google Scholar 

  24. P. Cole, SANS Institute, and the Open Web Application Security Project (OWASP), The Greatest Threats to Web Application Security, According to the OWASP Top 10–2021 (2022)

    Google Scholar 

  25. A. Cavoukian (2011) Implementing Privacy Through Design: A Handbook. Association of Privacy Professionals International (IAPP). (2023). The State of Privacy Technology Vendors in 2023. The Clearinghouse for Privacy Rights. (2023). Rights to privacy: Be aware of your rights and safeguard them

    Google Scholar 

  26. Technology and Standards National Institute. (2018). The risk management strategy for government information systems and organizations is outlined in NIST special publication 800–37, revision 2. White House, 2017 (2017). Boosting the security of vital infrastructure and federal networks is the goal of Executive Order 13800

    Google Scholar 

  27. The Society for Healthcare Information and Management Systems (HIMSS). (2023). The cybersecurity framework of HIMSS. Authority for Financial Industry Regulation (FINRA). (2023). The 4513 Cybersecurity Rule

    Google Scholar 

  28. The USPTO, or United States Patent and Trademark Office, (2023). resources for cybersecurity. Organization for International Property Rights (WIPO). (2023). resources for cybersecurity

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kalenda, M.W.W., Mukubwa, E.W. (2024). Information Security Technologies for the Internet of Intelligence. In: Odhiambo, M.O., Mwashita, W. (eds) From Internet of Things to Internet of Intelligence. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-031-55718-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-55718-7_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-55717-0

  • Online ISBN: 978-3-031-55718-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics