Privacy Vulnerabilities and Data Security Challenges in the IoT
eBook - ePub

Privacy Vulnerabilities and Data Security Challenges in the IoT

  1. 222 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Privacy Vulnerabilities and Data Security Challenges in the IoT

About this book

This book discusses the evolution of security and privacy issues in the Internet of Things (IoT). The book focuses on assembling all security- and privacy-related technologies into a single source so that students, researchers, academics, and those in the industry can easily understand the IoT security and privacy issues.

This edited book discusses the use of security engineering and privacy-by-design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding security issues in IoT-enabled technologies and how these can be applied in various sectors. It walks readers through engaging with security challenges and building a safe infrastructure for IoT devices. The book helps researchers and practitioners understand the security architecture of IoT and the state-of-the-art in IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID and WSNs in IoT.

This book aims to highlight the concepts of related technologies and novel findings by researchers through its chapter organization. The primary audience comprises specialists, researchers, graduate students, designers, experts, and engineers undertaking research on security-related issues.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Privacy Vulnerabilities and Data Security Challenges in the IoT by Shivani Agarwal,Sandhya Makkar,Duc-Tan Tran in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

1 Applications of Industrial Internet of Things (IIoT)

Sandhya Makkar, Megha Duseja, and Shivani Agarwal
Contents
1.1 Introduction
1.1.1 Internet of Things
1.1.2 Machine-To-Machine (M2M)
1.1.3 Emergence and Growth of IoT
1.1.4 Setting up an IoT Infrastructure
1.2 Cloud System Selection
1.3 Platform Selection
1.4 IoT Applications in the Industry
1.4.1 Vehicle Telematics
1.4.2 Fleet
1.4.3 Connected Car
1.4.4 Leasing/Ride Sharing/Asset Management
1.4.5 Healthcare
1.4.6 IoT for Patients
1.4.7 Medical Adherence
1.4.8 IoT for Physicians
1.4.9 Blood Banks
1.4.10 Device Monitoring: Defibrillators/Heart Monitors/Pacemakers
1.4.11 IoT for Hospitals
1.4.12 IoT for Health Insurance Companies
1.4.13 Smart Metering
1.4.14 Smart House
1.4.15 Smart City
1.4.16 Renewable Solar Energy
1.4.17 Insurance
1.4.18 Enterprise Use Cases
1.4.19 Using Iot for a Better World
1.5 Security, Privacy, and the Internet of Things
1.5.1 Multiple Network
1.5.2 Multiple Types of Services
1.5.3 Scaling Growth
1.5.4 Automated Functionality
1.5.5 Long Lifecycles
1.5.6 Remote Updates
1.6 The Future of the Internet of Things
1.6.1 IoT Will Be Primary
1.6.2 Homes Will Get Smarter
1.6.3 Enterprises Will Start Using More IoT
Bibliography

1.1 Introduction

1.1.1 Internet of Things

The Internet of Things, or as it is informally referred to, IoT, is a system of devices, people, and machines all well connected wirelessly through the internet and to each other.
The perception and uses of the term IoT will continue to evolve with the changing times as new connected technologies are developed and pave the way for more such applications. The possibilities just keep growing.
The need for more advanced solutions will drive the next IoT innovations in a world where consumer satisfaction is imperative for organizational growth. Every business can leverage the digitally connected ecosystem of IoT devices to have that technological edge in this furiously competitive world we live in. Not only will IoT enhance efficiency but it can also provide valuable insights into issues related to streamline workflows, predict necessary maintenance, analyze usage patterns, automate manufacturing, and much more.

1.1.2 Machine-To-Machine (M2M)

M2M technologies represent closed, point-to-point communications between machines or between machine and management systems, without the need for human intervention. M2M devices, enabling bidirectional remote monitoring and transfer of data, consist of a sensor or a radio frequency identification (RFID) tag and a communication module.
M2M devices, as the industrial precursors to the IoT, can include items ranging from in-house/in-office machinery, such as printers or scanners, to manufacturing equipment, including heavy machinery.
But do not assume that the IoT will replace M2M. Predictions show that cumulative M2M connections will grow from 995 million in 2014 to a projected 2.7 billion connections by 2018.
M2M uses include telemetry, traffic control, security, tracking and tracing, machinery maintenance and control, metering, and manufacturing and facility management, as well as a multitude of other applications.
M2M/IoT will represent the next phase of the internet revolution, connecting about ten times more devices on the internet in a couple of years. So, it is best to be aware and start embracing it from its infancy and gain the first mover advantage.

1.1.3 Emergence and Growth of IoT

The IoT establishes an end-to-end ecosystem, including technologies, processes, and concepts employed across all connectivity use cases.
In principle, modern information and communication technologies play a vital role in IoT. As IoT is nothing but an exhaustive web of recognizable physical things, this will involve connecting not only humans but objects as well. These objects come with small processors and sensors like temperature controllers and audio or video output devices that are used to supervise the surrounding objects. This helps to make the connected objects more responsive to the changes in the surroundings and thus to analyze the appropriate information or service to be provided, which makes our objects “smart”.
The foundation of IoT is automatic identification through RFID. Sensors and actuators help by enhancing the applicability by encapsulating the real-time effects of actions. This leads to a huge opportunity for new services and applications in many areas. For instance, consumer goods may have a large repository of data which will help in providing a faster and more specific personalized service later on. Not only will this result in new business models and product innovations but it will also create a new line of products and services for more narrowed-down and specific customer needs, thus having a huge influence on individuals, markets, society, and enterprises.
The term Internet of Things was coined by Kevin Ashton while presenting RFID technology connected to the internet to easily identify products at Proctor and Gamble. The notion evolved and came to be more widely used in real life during the 2000s, especially after 2008, when the IPSO Alliance was formed to encourage the use of networked objects/things. Table 1.1 gives a summary of the progress of IoT according to Forbes.
TABLE 1.1
Historical Journey of IoT
Year
Event
1949
Norman Joseph Woodland invents the barcode, which is patented in 1952 and is first used by supermarkets 20 years later.
1955
Edward O. Thorp creates the world’s first wearable computer, whose only function is to predict roulette wheels.
1967
Hubert Upton develops an analog wearable computer.
1969
The first message is sent over ARPANET.
1973
Invented by Mario Cardullo, the RFID tag receives its first patent.
1977
C.C. Colins creates a product for the visually disabled, a wearable that transforms an image into a tactile grid on a vest.
Early 1980s
Carnegie-Mellon Computer Science Department researchers install micro-switches in the Coke vending machine and connect them to a computer to make supervision easier.
1990
John Romkey comes up with a toaster connected to the internet.
1990
Olivetti invents a badge system to locate people.
1993
Thad Starner from MIT uses a heads-up display as a wearable.
1993
Steven Feiner, Blair MacIntyre, and DorĂ©e Seligmann invent KARMA—Knowledge-based Augmented Reality for Maintenance Assistance.
1995
GPS Satellite Network (version 1) is completed.
1999
An Automatic Identification Center is set up at MIT where objects are linked to the internet through the RFID tag.
1999
The term Internet of Things is first used by Kevin Ashton of MIT.
2000
LG designs the first “smart fridge”.
2003
Publications like The Guardian, Scientific American, and Boston Globe mention the Internet of Things in their articles.
2004
US Defence uses IoT in their Savi Program, and Walmart starts using IoT in commercial retail.
2005
The Interaction Design Institute Ivrea (IDII) invents a small microcontroller to help their students in making their projects.
2007
The United Nations’ International Telecommunications Union publishes a report on Internet of Things, saying “from anytime, anyplace connectivity for anyone, we will now have connectivity for anything. Connections will multiply and create an entirely new dynamic network of networks—an Internet of Things”.

1.1.4 Setting up an IoT Infrastructure

Before setting up an IoT infrastruct...

Table of contents

  1. Cover
  2. Half-Title
  3. Series
  4. Title
  5. Copyright
  6. Dedication
  7. Contents
  8. Preface
  9. Editors
  10. Contributors
  11. Chapter 1 Applications of Industrial Internet of Things (IIoT)
  12. Chapter 2 Biomedical Applications Using IoT
  13. Chapter 3 Emerging Technological Advances in Healthcare
  14. Chapter 4 The Internet of Things (IoT) and Contactless Payments: An Empirical Analysis of the Healthcare Industry
  15. Chapter 5 AI in Healthcare
  16. Chapter 6 Security Vulnerabilities in the IoT
  17. Chapter 7 Research on IoT Governance, Security, and Privacy Issues of Internet of Things
  18. Chapter 8 Recent Trends of IoT and Big Data in Research Problem-Solving
  19. Chapter 9 A Theoretical Context for CSF in Medical Software Next Release
  20. Chapter 10 Robotics and Machine Learning
  21. Chapter 11 Detecting Medical Reviews Using Sentiment Analysis
  22. Index