The future of data privacy and security concerns in Internet of Things

Z. Solangi, Yasir Ali Solangi, Shahmurad Chandio, Madihah bt. S. Abd. Aziz, Mohd Syarqawy bin Hamzah, Asadullah Shah
{"title":"The future of data privacy and security concerns in Internet of Things","authors":"Z. Solangi, Yasir Ali Solangi, Shahmurad Chandio, Madihah bt. S. Abd. Aziz, Mohd Syarqawy bin Hamzah, Asadullah Shah","doi":"10.1109/ICIRD.2018.8376320","DOIUrl":null,"url":null,"abstract":"A global, immersive, invisible, ambient network-computing environment built through the continued proliferation of smart sensors, cameras, software, databases, and massive data centers in a world-spanning information fabric known as the Internet of Things. The idea is to live in connected world. Altogether varieties of connected objects from smart home appliances like televisions, laundry machines, thermostats, refrigerators to Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) are going to conserve the potential of IoT connectivity in all paces of future smart world. However, it has high importance to preserve adherence of enormous benefits of IoT connectivity, which might lead to unseen security and privacy issues and vulnerabilities that will cause various malicious attacks including waterhole, ransomware, eavesdropping, and others to exploit the potential of smart objects. This paper will present and forecast advanced concepts for end-to end security and privacy issues in a highly distributed, heterogeneous and dynamic network of IoT devices, which may reveal a holistic approach of device identification, authentication, and management, security, and privacy concerns.","PeriodicalId":397098,"journal":{"name":"2018 IEEE International Conference on Innovative Research and Development (ICIRD)","volume":"299 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Innovative Research and Development (ICIRD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIRD.2018.8376320","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 28

Abstract

A global, immersive, invisible, ambient network-computing environment built through the continued proliferation of smart sensors, cameras, software, databases, and massive data centers in a world-spanning information fabric known as the Internet of Things. The idea is to live in connected world. Altogether varieties of connected objects from smart home appliances like televisions, laundry machines, thermostats, refrigerators to Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) are going to conserve the potential of IoT connectivity in all paces of future smart world. However, it has high importance to preserve adherence of enormous benefits of IoT connectivity, which might lead to unseen security and privacy issues and vulnerabilities that will cause various malicious attacks including waterhole, ransomware, eavesdropping, and others to exploit the potential of smart objects. This paper will present and forecast advanced concepts for end-to end security and privacy issues in a highly distributed, heterogeneous and dynamic network of IoT devices, which may reveal a holistic approach of device identification, authentication, and management, security, and privacy concerns.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
未来物联网中的数据隐私与安全问题
一个全球性的、身临其境的、不可见的环境网络计算环境,通过智能传感器、摄像头、软件、数据库和大规模数据中心在一个被称为物联网的跨越世界的信息结构中不断扩散而构建。我们的想法是生活在一个相互联系的世界里。从智能家电(如电视、洗衣机、恒温器、冰箱)到工业物联网(IIoT)和医疗物联网(IoMT),各种连接对象将在未来智能世界的所有空间中保持物联网连接的潜力。然而,保持物联网连接的巨大优势非常重要,这可能会导致看不见的安全和隐私问题和漏洞,从而导致各种恶意攻击,包括水坑,勒索软件,窃听等,以利用智能对象的潜力。本文将介绍并预测高度分布式、异构和动态的物联网设备网络中端到端安全和隐私问题的先进概念,这可能会揭示设备识别、认证和管理、安全和隐私问题的整体方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Streamlining mobile app deployment with Jenkins and Fastlane in the case of Catrobat's pocket code Pocket code build variants Lithium recovery from Bledug Kuwu Mud volcano using water leaching method Copyright Information An approach towards developing tower of Hanoi sequence based distributed multi-channel parallel rendezvous for ad hoc networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1