Privacy and Security Challenges in the Internet of Things (IoT)
Keywords:
The Internet of Things, IoT security, Privacy Challenges, Data Breaches, Cyber Attacks, encryption, authentication, cyber criminals , device tampering, standardization, security protocols, unauthorized access, proactive security, IoT devices.Abstract
The Internet of Things has taken over all industries and daily life since it connects everything, starting with very basic household appliances to the most complicated industrial systems. It is also a space where a significant number of privacy and security-related issues arise. Each device connected becomes a new opening through which cybercriminals could break into a network. Most IoT devices pose even greater risks with insufficient security measures, involving cases of data breach incidents, unauthorized access, or cyber-attacks. The major issues dealt with in this paper are privacy and security in it, which involve big threats of unauthorized access to data, device tampering, denial-of-service attacks, encryption, authentication protocols, software-defined security, etc., to safeguard the systems of IoT. This article has provided an overview of the importance of proactive security strategy and standardization in place for IoT devices and services. The future growth and adoption of IoT technologies in both consumer and industrial sectors require action on these critical factors.
Downloads
References
Y. Yang, L. Wu, G. Yin, L. Li and H. Zhao, "A Survey on Security and Privacy Issues in Internet-of-Things," in IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250-1258, Oct. 2017, doi: 10.1109/JIOT.2017.2694844.
Z. A. Solangi, Y. A. Solangi, S. Chandio, M. bt. S. Abd. Aziz, M. S. bin Hamzah and A. Shah, "The future of data privacy and security concerns in Internet of Things," 2018 IEEE International Conference on Innovative Research and Development (ICIRD), Bangkok, Thailand, 2018, pp. 1-4, doi: 10.1109/ICIRD.2018.8376320
Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020, 10, 4102,doi:10.3390/app10124102
Maple, C. (2017). Security and privacy in the internet of things. Journal of Cyber Policy, 2(2), 155–184. doi:10.1080/23738871.2017.1366536
E. Fernandes, A. Rahmati, K. Eykholt and A. Prakash, "Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?," in IEEE Security & Privacy, vol. 15, no. 4, pp. 79-84, 2017, doi: 10.1109/MSP.2017.3151346.
A. Assiri and H. Almagwashi, "IoT Security and Privacy Issues," 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 2018, pp. 1-5, doi: 10.1109/CAIS.2018.8442002.
S. Singh and D. Kumar, "Perceptions of Security and Privacy in Internet of Things," 2020 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2020, pp. 810-813, doi: 10.1109/ICICT48043.2020.9112462.
B. V. S. Krishna and T. Gnanasekaran, "A systematic study of security issues in Internet-of-Things (IoT)," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2017, pp. 107-111, doi: 10.1109/I-SMAC.2017.8058318.
J. N. Al-Karaki and A. Gawanmeh, "Security and Privacy Challenges of Integrated Disruptive Technologies," 2019 2nd International Conference on Signal Processing and Information Security (ICSPIS), Dubai, United Arab Emirates, 2019, pp. 1-4, doi: 10.1109/ICSPIS48135.2019.9045898.
Mahaboobsubani Shaik. (2017). Edge Computing for Financial Data Processing. International Journal Of Innovative Research And Creative Technology, 3(3), 1–9,doi:10.5281/zenodo.14352602
Mahaboobsubani Shaik. (2019). IoT and Predictive Maintenance in Hospitality Infrastructure. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 7(6), 1–9. doi:10.5281/zenodo.14352270
W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf and Y. A. Bangash, "An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security," in IEEE Internet of Things Journal, vol. 7, no. 10, pp. 10250-10276, Oct. 2020, doi: 10.1109/JIOT.2020.2997651.
E. Tabane and T. Zuva, "Is there a room for security and privacy in IoT?," 2016 International Conference on Advances in Computing and Communication Engineering (ICACCE), Durban, South Africa, 2016, pp. 260-264, doi: 10.1109/ICACCE.2016.8073758.
Z. Ren, X. Liu, R. Ye and T. Zhang, "Security and privacy on internet of things," 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), Macau, China, 2017, pp. 140-144, doi: 10.1109/ICEIEC.2017.8076530.
U. Albalawi and S. Joshi, "Secure and trusted telemedicine in Internet of Things IoT," 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 2018, pp. 30-34, doi: 10.1109/WF-IoT.2018.8355206.
H. Garg and M. Dave, "Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware," 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 2019, pp. 1-6, doi: 10.1109/IoT-SIU.2019.8777334
C. Feltus, T. Grandjean, J. Aubert and D. Khadraoui, "Towards a Standard-Based Security and Privacy of IoT System's Services," 2018 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 2018, pp. 1036-1039, doi: 10.1109/CSCI46756.2018.00201.
K. Tabassum, A. Ibrahim and S. A. El Rahman, "Security Issues and Challenges in IoT," 2019 International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 2019, pp. 1-5, doi: 10.1109/ICCISci.2019.8716460.
Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020, 10, 4102,:10.3390/app10124102
Torğul, Belkız & S.Sua, Lutfu & Balo, Figen. (2016). Internet of Things: A Survey. International Journal of Applied Mathematics, Electronics and Computers. 104-110. 10.18100/ijamec.267197.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.