Skip to main content

Security Challenges in the IoT Paradigm for Enterprise Information Systems

  • Chapter
  • First Online:
Connected Environments for the Internet of Things

Abstract

A complex system has a large number of design variables, and decision-making requires real-time data collected from machines, processes, and diverse business environments. In this context, enterprise information systems (EISs) are used to support data acquisition, data analytics, communication, and related decision-making activities. Therefore, information technology infrastructure for data acquisition and sharing affects the performance of an EIS greatly. Our objective in the present work is to investigate the impact of security in the Internet of Things (IoT ) paradigm for enterprise information systems. The breakthrough potential of the IoT conjures up immense possibilities for delivering value through new business models across industries, products, and service offerings. However, making IoT technologies reliable and secure is the key to realizing the potential of this breakthrough concept. Ensuring security and privacy of the IoT offerings is therefore a major concern for users and businesses. This chapter explores the potential of IoT-enabled smart services in EISs. It identifies security and privacy concerns for a variety of scenarios and discusses ways to address these concerns effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164

    Article  Google Scholar 

  2. Emmerson B, Win-Win Mag J (2010) M2M: the internet of 50 billion devices. Huawei (4):19–22

    Google Scholar 

  3. Boswarthick D, Elloumi O, Hersent O (2012) M2M communications: a systems approach, 1st edn. Wiley Publishing, Hoboken

    Book  Google Scholar 

  4. Hersent O, Boswarthick D, Elloumi O (2012) The internet of things: key applications and protocols, 2nd edn. Wiley Publishing, Chichester

    Google Scholar 

  5. Fleisch E (2010) What is the internet of things: an economics perspective, Auto-ID labs white paper, WP-BIZAPP-053

    Google Scholar 

  6. Bandyopadhyay D, Sen J (2011) Internet of things: Applications and challenges in technology and standardization. Wirel Pers Commun 58:49–59

    Article  Google Scholar 

  7. Weber RH (2010) Internet of things–new security and privacy challenges. Comput Law Secur Rev 26(1):23–30

    Article  Google Scholar 

  8. Feng H, Fu W (2010) Study of recent development about privacy and security of the internet of things. In: 2010 international conference on Web Information Systems and Mining (WISM), Sanya, pp 91–95

    Google Scholar 

  9. Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279

    Article  Google Scholar 

  10. Anderson J, Rainie L (2014) The internet of things will thrive by 2025. PewResearch Internet Project. www.pewinternet.org/2014/05/14/internet-of-things/

  11. Bandyopadhyay S, Sengupta M, Maiti S, Dutta S (2011) A survey of middleware for internet of things. In: Third international conferences, WiMo 2011 and CoNeCo 2011, Ankara, pp 288–296

    Google Scholar 

  12. Manyika J, Chui M, Bisson P, Woetzel J, Dobbs R, Bughin J, Aharon D. Unlocking the potential of the internet of things. McKinsey Global Institute. Accessed June 2015

    Google Scholar 

  13. Giusto D, Iera A, Morabito G, Atzori L (eds) (2010) The internet of things. Springer. ISBN: 978-1-4419-1673-0

    Google Scholar 

  14. Li Q, Wang ZY, Li WH, Li J, Wang C, Du RY (2013) Applications integration in a hybrid cloud computing environment: Modelling and platform. Enterp Inf Syst 7(3):237–271

    Article  Google Scholar 

  15. Bi Z, Da Xu L, Wang C (2014) Internet of things for enterprise systems of modern manufacturing. IEEE Trans Ind Inform 10(2):1537–1546

    Article  Google Scholar 

  16. RFID is a technology used to identify, track and locate assets; the universal, unique identification of individual items through the EPC is encoded in an inexpensive RFID tag

    Google Scholar 

  17. The term “IoT” has been “invented” by Kevin Ashton in a presentation in 1998 (see Gerald Santucci, Paper for the International Conference on Future Trends of the Internet, From Internet of Data to Internet of Things, at p. 2 Available at: ftp://ftp.cordis.europa.eu/pub/fp7/ict/docs/enet/20090128-speech-iot-conference-lux_en.pdf

  18. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  MATH  Google Scholar 

  19. Gartner (2015) Hype cycle for emerging technologies, 2015. http://www.gartner.com/document/3100227?ref=lib. Accessed 30 July 2015

  20. Gartner (2014) Gartner says 4.9 billion connected “Things” will be in use in 2015. http://www.gartner.com/newsroom/id/2905717. Accessed 8 July 2015

  21. Chaudhuri A (2015) Address security and privacy concerns to fully tap into IoT’s potential. http://www.tcs.com/offerings/it_infrastructure/Pages/default.aspx

  22. Government of India (2015) Smart Cities Mission: Ministry of Urban Development: Government of India, June 2015. http://smartcities.gov.in/writereaddata/SmartCityGuidelines.pdf https://www.gov.uk/government/uploads/system/uploads/attachment_data. Accessed 21 July 2015

  23. Cloud Security Alliance (2015) Security guidance for early adopters of the Internet of Things (IoT). https://downloads.cloudsecurityalliance.org/whitepapers/Security_Guidance_for_Early_Adopters_of_the_Internet_of_Things.pdf. Accessed 18 June 2015

  24. Apple Inc. (2015) iOS: understanding iBeacon. https://support.apple.com/en-ap/HT202880. Accessed 3 July 2015

  25. Facebook (2015) Engage people who visit your business. https://www.facebook.com/business/a/facebook-bluetooth-beacons. Accessed 18 June 2015

  26. Weber RH (2015) Internet of things: privacy issues revisited. Comput Law Secur Rev 31(5):618–627

    Article  Google Scholar 

  27. Hodgson K (2015) The internet of [security] things. SDM magazine. Available: http://www.sdmmag.com/articles/91564-the-internet-of-security-things

  28. Accenture (2015) Security call to action. Available: https://www.accenture.com/t20160122T014933__w__/usen/_acnmedia/Accenture/Conversion-Assets/Microsites/Documents22/Accenture-Security-Call-to-Action-pdf#zoom=50

  29. OWASP (2015) Internet of things top 10 projects’. www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project. Accessed Aug 2015

  30. IBM (2015) IBM point of view: internet of things security. Available: http://public.dhe.ibm.com/common/ssi/ecm/ra/en/raw14382usen/RAW14382USEN.PDF

  31. FTC (2015) Careful connections. Available: https://www.ftc.gov/system/files/documents/plain-language/pdf0199-carefulconnections-buildingsecurityinternetofthings.pdf

  32. Ettlinger M, Gordon K (2011) The importance and promise of American manufacturing, center for American process [online]. Available: http://cdn.theatlantic.com/static/mt/assets/businessAmerican_Manufacturing%20.pdf. Accessed 29 Jan 2014

  33. Lehtihet A, Wilson D, Susman G (2010) Future of manufacturing in the U.S. [online]. Available: http://www.smeal.psu.edu/cmtoc/research/nist1fut.pdf. Accessed 29 Jan 2014

  34. Dumitrache I, Caramihai SI (2010) The intelligent manufacturing paradigm in knowledge society. In: Knowledge management, InTech, pp 36–56, ISBN 978-953-7619-94-7

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chandrakumar Thangavel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Thangavel, C., Sudhaman, P. (2017). Security Challenges in the IoT Paradigm for Enterprise Information Systems. In: Mahmood, Z. (eds) Connected Environments for the Internet of Things. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-70102-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70102-8_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70101-1

  • Online ISBN: 978-3-319-70102-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics