Abstract
A complex system has a large number of design variables, and decision-making requires real-time data collected from machines, processes, and diverse business environments. In this context, enterprise information systems (EISs) are used to support data acquisition, data analytics, communication, and related decision-making activities. Therefore, information technology infrastructure for data acquisition and sharing affects the performance of an EIS greatly. Our objective in the present work is to investigate the impact of security in the Internet of Things (IoT ) paradigm for enterprise information systems. The breakthrough potential of the IoT conjures up immense possibilities for delivering value through new business models across industries, products, and service offerings. However, making IoT technologies reliable and secure is the key to realizing the potential of this breakthrough concept. Ensuring security and privacy of the IoT offerings is therefore a major concern for users and businesses. This chapter explores the potential of IoT-enabled smart services in EISs. It identifies security and privacy concerns for a variety of scenarios and discusses ways to address these concerns effectively.
References
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164
Emmerson B, Win-Win Mag J (2010) M2M: the internet of 50 billion devices. Huawei (4):19–22
Boswarthick D, Elloumi O, Hersent O (2012) M2M communications: a systems approach, 1st edn. Wiley Publishing, Hoboken
Hersent O, Boswarthick D, Elloumi O (2012) The internet of things: key applications and protocols, 2nd edn. Wiley Publishing, Chichester
Fleisch E (2010) What is the internet of things: an economics perspective, Auto-ID labs white paper, WP-BIZAPP-053
Bandyopadhyay D, Sen J (2011) Internet of things: Applications and challenges in technology and standardization. Wirel Pers Commun 58:49–59
Weber RH (2010) Internet of things–new security and privacy challenges. Comput Law Secur Rev 26(1):23–30
Feng H, Fu W (2010) Study of recent development about privacy and security of the internet of things. In: 2010 international conference on Web Information Systems and Mining (WISM), Sanya, pp 91–95
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279
Anderson J, Rainie L (2014) The internet of things will thrive by 2025. PewResearch Internet Project. www.pewinternet.org/2014/05/14/internet-of-things/
Bandyopadhyay S, Sengupta M, Maiti S, Dutta S (2011) A survey of middleware for internet of things. In: Third international conferences, WiMo 2011 and CoNeCo 2011, Ankara, pp 288–296
Manyika J, Chui M, Bisson P, Woetzel J, Dobbs R, Bughin J, Aharon D. Unlocking the potential of the internet of things. McKinsey Global Institute. Accessed June 2015
Giusto D, Iera A, Morabito G, Atzori L (eds) (2010) The internet of things. Springer. ISBN: 978-1-4419-1673-0
Li Q, Wang ZY, Li WH, Li J, Wang C, Du RY (2013) Applications integration in a hybrid cloud computing environment: Modelling and platform. Enterp Inf Syst 7(3):237–271
Bi Z, Da Xu L, Wang C (2014) Internet of things for enterprise systems of modern manufacturing. IEEE Trans Ind Inform 10(2):1537–1546
RFID is a technology used to identify, track and locate assets; the universal, unique identification of individual items through the EPC is encoded in an inexpensive RFID tag
The term “IoT” has been “invented” by Kevin Ashton in a presentation in 1998 (see Gerald Santucci, Paper for the International Conference on Future Trends of the Internet, From Internet of Data to Internet of Things, at p. 2 Available at: ftp://ftp.cordis.europa.eu/pub/fp7/ict/docs/enet/20090128-speech-iot-conference-lux_en.pdf
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Gartner (2015) Hype cycle for emerging technologies, 2015. http://www.gartner.com/document/3100227?ref=lib. Accessed 30 July 2015
Gartner (2014) Gartner says 4.9 billion connected “Things” will be in use in 2015. http://www.gartner.com/newsroom/id/2905717. Accessed 8 July 2015
Chaudhuri A (2015) Address security and privacy concerns to fully tap into IoT’s potential. http://www.tcs.com/offerings/it_infrastructure/Pages/default.aspx
Government of India (2015) Smart Cities Mission: Ministry of Urban Development: Government of India, June 2015. http://smartcities.gov.in/writereaddata/SmartCityGuidelines.pdf https://www.gov.uk/government/uploads/system/uploads/attachment_data. Accessed 21 July 2015
Cloud Security Alliance (2015) Security guidance for early adopters of the Internet of Things (IoT). https://downloads.cloudsecurityalliance.org/whitepapers/Security_Guidance_for_Early_Adopters_of_the_Internet_of_Things.pdf. Accessed 18 June 2015
Apple Inc. (2015) iOS: understanding iBeacon. https://support.apple.com/en-ap/HT202880. Accessed 3 July 2015
Facebook (2015) Engage people who visit your business. https://www.facebook.com/business/a/facebook-bluetooth-beacons. Accessed 18 June 2015
Weber RH (2015) Internet of things: privacy issues revisited. Comput Law Secur Rev 31(5):618–627
Hodgson K (2015) The internet of [security] things. SDM magazine. Available: http://www.sdmmag.com/articles/91564-the-internet-of-security-things
Accenture (2015) Security call to action. Available: https://www.accenture.com/t20160122T014933__w__/usen/_acnmedia/Accenture/Conversion-Assets/Microsites/Documents22/Accenture-Security-Call-to-Action-pdf#zoom=50
OWASP (2015) Internet of things top 10 projects’. www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project. Accessed Aug 2015
IBM (2015) IBM point of view: internet of things security. Available: http://public.dhe.ibm.com/common/ssi/ecm/ra/en/raw14382usen/RAW14382USEN.PDF
FTC (2015) Careful connections. Available: https://www.ftc.gov/system/files/documents/plain-language/pdf0199-carefulconnections-buildingsecurityinternetofthings.pdf
Ettlinger M, Gordon K (2011) The importance and promise of American manufacturing, center for American process [online]. Available: http://cdn.theatlantic.com/static/mt/assets/businessAmerican_Manufacturing%20.pdf. Accessed 29 Jan 2014
Lehtihet A, Wilson D, Susman G (2010) Future of manufacturing in the U.S. [online]. Available: http://www.smeal.psu.edu/cmtoc/research/nist1fut.pdf. Accessed 29 Jan 2014
Dumitrache I, Caramihai SI (2010) The intelligent manufacturing paradigm in knowledge society. In: Knowledge management, InTech, pp 36–56, ISBN 978-953-7619-94-7
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Thangavel, C., Sudhaman, P. (2017). Security Challenges in the IoT Paradigm for Enterprise Information Systems. In: Mahmood, Z. (eds) Connected Environments for the Internet of Things. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-70102-8_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-70102-8_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70101-1
Online ISBN: 978-3-319-70102-8
eBook Packages: Computer ScienceComputer Science (R0)