Skip to main content

Internet of Things: Risk Management

  • Conference paper
  • First Online:
Smart Systems and IoT: Innovations in Computing

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 141))

Abstract

IoT (Internet of Things) devices envisions a future where interoperable, reliable, secure and efficient digital devices communicate and linked by appropriate communication technologies. These digital devices help in generating big volumes of sensitive data with high processing speed. Such information is helpful in empowering users but imposes a great cost of data loss or data misuse. As data complexity, technology and pervasiveness grow, it becomes a strong argument to perform risk management. Our research contributes towards proposing a deep insight into IoT architectural components, factors shaping risks, attack vectors and their management strategies/counter measures. Furthermore, we have explored IoT capabilities, applications, challenges and opportunities in various fields. This state of art will make a case for developing new risk assessment methodologies and develop new ideas for exercising IoT opportunities by considering the heavy, big, dynamic, interoperable data processing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.airmic.com/news/guest-stories/how-internet-things-transforming-risk-management. Accessed 19 Aug 2018

  2. https://csrc.nist.gov/CSRC/media/Presentations/NIST-Cybersecurity-for-IoT-Program/imagesmedia/NIST%20Cybersecurity%20for%20IoT%20Program.pdf, pp. 1–8. Accessed 19 Aug 2018

  3. Leloglu. E: A review of Security concerns in internet of things. J. Comput. Commun. 5, 121–136 (2017)

    Google Scholar 

  4. Nurse, R.C.J., Creese, S., Roure, D.D.: Security Risk assessment in Internet of Things Systems, IT professional, pp. 1–9 (2017)

    Google Scholar 

  5. An, J., Gui, X.L., He, X.: Study on architecture and key technologies for Internet of things. Advanc. Biomed. Eng. 11, 329–335 (2012)

    Google Scholar 

  6. Lewis, J.A.: Managing Risk for the Internet of Things, A Report of the CSIS Strategic Technologies Program, CSIS. https://csisprod.s3.amazonaws.com/s3fspublic/legacy_files/files/publication/160217_Lewis_ManagingRiskIoT_Web_Redated.pdf, pp. 1–32 (2016)

  7. Sorebo, G.: Managing the unmanageable: A risk model for the Internet of Things. RSA Conference. https://www.rsaconference.com/writable/presentations/file_upload/grc-r01-managing-the-unmanageable-a-risk-model-for-the-internet-of-things.pdf, pp. 1–20 (2015)

  8. Miorandi, D., Sicari, S., Pellegrini, F.D.: Internet of things: vision, applications and research challenges. Adhoc Netw. 10, 1497–1516 (2012)

    Google Scholar 

  9. Tianshui, W., Gang, Z.: A Novel Risk Assessment Model for Privacy Security in Internet of Things, vol. 19, no. 5, pp. 398–404 (2014)

    Google Scholar 

  10. Chawngsangpuii, R., Das, P.: Security Management perspective for Internet of Things. Int. J. Eng. Sci. Invent. 6(9), 59–65 (2017)

    Google Scholar 

  11. https://www.gartner.com/smarterwithgartner/make-privacy-a-top-priority-for-your-iot-project/. Accessed 25 Aug 2018

  12. Sun, D.Z., Zhong, J.D.: A hash based RFID security protocol for strong privacy protection. IEEE Trans. Consum. Electron. 58(4), 1246–1252 (2012)

    Google Scholar 

  13. Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 557–570 (2002)

    Google Scholar 

  14. Xiao, P., Xing, H., Xiaofeng, M.: Privacy preserving towards continuous query in location-based services. J. Comput. Res. Develop. 10–18 (2010)

    Google Scholar 

  15. Rath, A.T., Colin, J.: Adaptive risk aware control model for internet of things 2017. In: International Workshop on Secure Internet of Things, pp. 40–49 (2018)

    Google Scholar 

  16. Zahra, B.F., Abdelhamid, B.: Risk analysis in Internet of things using EBIOS. In: IEEE, 2017 IEEE 7th Annual Computing and Communication, 1–7 (2017)

    Google Scholar 

  17. Ouaddah, A., et al.: Access control in the internet of things; big challenges and new opportunities. Comput. Netw. 112, Elsevier, 237–262 (2016)

    Google Scholar 

  18. Darwish, S., Nouretdinov, I., Wolthusen, S.D.: Towards composable threat assessment for medical IOT. In: The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17), Proc. Comput. Sci. 113, 627–632 (2017)

    Google Scholar 

  19. Kouzinopoulos, C.S. et al.: Using blockchains to strengthen the security of internet of things, Euro Cybersec, CCIS, 90–100 (2018)

    Google Scholar 

  20. Mayzaud, A., Badonnel, R., Chrisment, I.: Monitoring and Security for Internet of Things, LNCS 7943, pp. 37–40 (2013)

    Google Scholar 

  21. Liu, C., Zhang, Y: Research on dynamical security risk assessment for the internet of things inspired by immunology. In: 8th International Conference on Natural Computation, pp. 874–878 (2012)

    Google Scholar 

  22. Lin, Z., Zhou, C: Research on Extracting Risk Control Rules for Internet of Things Business, pp. 598–601. IEEE (2018)

    Google Scholar 

  23. Mircea, M., Stoica, M., Ghilic-Micu, B.: Using cloud computing to address challenges raised by internet of things. Comput. Commun. Netw. Connected Environments for Internet of Things, pp. 63–82. Springer (2017)

    Google Scholar 

  24. Kempf, J., Arkko, J., Beheshti, N., Yedavalli, K.: Thoughts on Reliability in the Internet of Things, March 2011, 1–4. https://www.iab.org/wp-content/IABuploads/2011/03/Kempf.pdf. Accessed 3 Feb 2017

  25. Bagula, B.A.: Internet-of-Things and Big Data: Promises and Challenges for the Developing World, pp. 1–20. http://unctad.org/meetings/en/Presentation/ecn162016p16_BagulaUWC_en.pdf. Accessed 3 Feb 2017

  26. Liwei, R.: IoT Security: Problems, Challenges and Solution, pp. 1–32. http://www.snia.org/sites/default/files/DSS-Summit-2015/presentations/LiweiRen_Iot_Security_Problems_Challenges_revision.pdf. Accessed 20 Jan 2017

  27. Internet of Things (IoT) and Cyber Risk Insurance Mindtree. https://www.mindtree.com/blog/internet-things-iot-and-cyber-risk-insurance. Accessed 12 June 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vinita Malik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Malik, V., Singh, S. (2020). Internet of Things: Risk Management. In: Somani, A.K., Shekhawat, R.S., Mundra, A., Srivastava, S., Verma, V.K. (eds) Smart Systems and IoT: Innovations in Computing. Smart Innovation, Systems and Technologies, vol 141. Springer, Singapore. https://doi.org/10.1007/978-981-13-8406-6_40

Download citation

Publish with us

Policies and ethics