0% found this document useful (0 votes)
29 views7 pages

PRIVACY - IN - INTERNET - OF - THINGS Edited.

The document discusses significant privacy concerns with the internet of things like eavesdropping, data accumulation and interference, identification, and location tracking. It also outlines privacy practices and laws regarding IoT as well as solutions to the privacy concerns and their shortcomings.

Uploaded by

IAN MIGOT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views7 pages

PRIVACY - IN - INTERNET - OF - THINGS Edited.

The document discusses significant privacy concerns with the internet of things like eavesdropping, data accumulation and interference, identification, and location tracking. It also outlines privacy practices and laws regarding IoT as well as solutions to the privacy concerns and their shortcomings.

Uploaded by

IAN MIGOT
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

TITLE PAGE

STUDENT NAME

MODULE

MODERATOR

DATE
PRIVACY IN THE INTERNET OF THINGS

INTRODUCTION

The internet of things is a collection of network of devices and the technology that governs

communication between the devices. . Alotaibi, F. (2017). There are various issues revolving

around this topic, including privacy concerns in the internet of things and their examples, privacy

practices, solutions to privacy concerns, and shortcomings.

What are the significant privacy concerns in the internet of things?

Iot has been progressive over time. The fact that there is the interconnectivity of devices means

that it is prone to many privacy concerns. Eavesdropping is a risk of concern. It is alarming that

hackers can use one's home appliances to snoop into their information.This is a very common

activity.No one is comfortable with strangers monitoring their personal life. It is a breach of

one's privacy. An excellent example of eavesdropping is researchers who intercepted data from a

smart meter device. They used unencrypted data to tell a television show someone was watching

at that particular time. security (Kumar, 2017)

Another privacy concern is the accumulation and interference of data. Very discrete data from

internet of things devices is left staggering for various reasons. Research done by the federal
trade commission shows that it takes very few households below 10,000 to create over 150

million data points daily.This attracts a high possibility of a breach of internet of things security.

Leaving very personal data lying around is an easy catch for hackers.

Identification is another privacy concern noted. The internet of things allows devices to identify

and communicate with each other. There are different uses of iot, including intelligent healthcare

and smart homes. In such circumstances, security is critical, and identification is an issue of

concern here due to possible attacks from malicious iot devices. Attackers use different

strategies, fake identification being one of them. They can access networks and carry on with

their malicious activities easily. An example is using identification to enable tagged objects to be

available on the internet.

Location and tracking have been widespread security concerns. In the modern days, third parties

can track personal mobile devices without the owner's control,which is definitely a violation of

one's privacy. Third parties can monitor them whenever owners grant access to their location.

The hackers could easily misuse the information accessed. An example is applications based on

Geo-spatial. (solangi, 2017)

PRIVACY PRACTICES IN INTERNET OF THINGS

There are privacy practices in the internet of things. These laws vary depending on different

countries. An example is that of Europe. In Europe, there are rules set for the internet of things

that fall under the European Union General Data Protection Regulations since the internet of

things devices process a large amount of personal data. The law states that all the devices subject

to the internet of things ought to be provided with very high rights and the data processed

according to data protection principles.


In America, a law known as the internet of things cybersecurity improvement act of 2019 was

passed to govern its security. This law sets basic cybersecurity standards prescribed by the

federal government concerning internet of things devices.This was a move made after they

realized how much of a weak link internet of things is to consumers' privacy.

Solutions to privacy concerns facing the internet of things

Having discussed the significant privacy concerns in internet things, there ought to be solutions

to each one of them.. To begin with, is how to solve the issue of eavesdropping. Identifying

eavesdropping is difficult, so it is good to use preventive measures. One of the solutions is

encryption. It is advisable to encrypt emails, networks, and communications. This helps prevent

hackers from accessing information since they decrypt data without the encryption key. Another

solution is network segmentation. Segmenting a network means data is out of reach from

hackers. In case one segment is compromised, the others are safe from hackers. Awareness of

eavesdropping risks is another solution, for instance, by educating employees to avoid clicking

on strange links or downloading unfamiliar files. They could also employ the culture of creating

passwords that are not easy to guess.

The issue of identification also has solutions. One of the practical solutions is authentication.

This is verifying the identity of users and devices before allowing them to access the information

systems, made possible by using radio frequency identification.RFID uses electromagnetic

induction to distinguish various objects. Authentication could be classified into password-based,


biometrics, multi-factor, and token-based. Another way is using VPNs like personal wireless to

connect to the internet of things devices for cell devices. It is advisable to use robust passwords

and avoid sharing personal records.

Localization and tracking is a primary privacy concern that needs to be solved. One of the

possible solutions is changing default passwords. Devices come with passwords provided by the

network providers. It is advisable to disable connectivity features that do not meet one's purpose.

Some features are only helpful in certain instances and possible risks in others. Devices come in

with very basic and straightforward passwords prone to attacks. It is, therefore, needful for one to

address the issue early enough. It is also common for devices to connect to other iot devices

setting an east target for attacks from hackers. Secondly, people need to keep their software

updated. This is because, with the growing technology, there is also progress in security threats.

When software updates, it is easy to receive new security threats and deal with them earlier.

The last privacy concern is the accumulation and interference of data. One of the many ways to

counter this is solid wifi protection. Routers always come in with the providers' passwords. It is

advisable to change the password instantly. People should avoid using their birthdays, years, or

other easy-to-guess passwords. It is also advisable to use updated routers that support encryption.

Another solution is monitoring network activities. Some tools help in network monitoring to

identify malicious network activities. This is an easy way to prevent threats. Lastly, embracing

multi-factor authentication is a good move as it is effortless and secure, making it an efficient

solution. This method works by verifying login attempts. For instance, they send a one-time code

to a verified email address or phone number. The code also has an expiry date. This makes it

very hard for the hackers since they must dig deeper to access one's accounts. They'll need to

steal their phone, which is not easy physically.This is a very efficient method.
SHORTCOMINGS FACING SOLUTIONS TO PRIVACY CONCERNS IN IOT

The solutions to the security concerns are a plus. However, there are shortcomings in the

solutions. The solution given is challenged by traffic metadata, such as IP addresses and

endpoints that help sniffers quickly gather information. This makes it difficult for encryption to

solve the issue of security entirely.

Ignorance is another shortcoming. A considerable number of people lack knowledge of

cybersecurity. People click on unnatural links and download things from unsafe websites, putting

everyone around them at risk.

CONCLUSION

In conclusion internet of things aims to improve the connection of devices to the internet. It has

changed how people perceive devices. However, we realize that it comes with several security

issues that violate different people's privacy. We have realized that there are solutions to those

privacy concerns, which also have shortcomings. If all the issues are adequately addressed, the

internet of things will have very positive impacts. It is only suitable for people to keep safe from

all threats.
REFERENCES

Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A

survey. Journal of Network and Computer Applications, 88, 10-28.

Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A survey on IoT

security: application areas, security threats, and solution architectures. IEEE Access, 7, 82721-

82743.

Kumar, N., Madhuri, J., & ChanneGowda, M. (2017, May). Review on and privacy concerns in

Internet of Things. In 2017 International Conference on IoT and Application (ICIOT) (pp. 1-5).

IEEE.

Madakam, S., Lake, V., Lake, V., & Lake, V. (2015). Internet of Things (IoT): A literature

review. Journal of Computer and Communications, 3(05), 164.

Solangi, Z. A., Solangi, Y. A., Chandio, S., bin Hamzah, M. S., & Shah, A. (2018, May). The

future of data privacy and security concerns in Internet of Things. In 2018 IEEE International

Conference on Innovative Research and Development (ICIRD) (pp. 1-4). IEEE.

(solangi, 2017)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy