PRIVACY - IN - INTERNET - OF - THINGS Edited.
PRIVACY - IN - INTERNET - OF - THINGS Edited.
STUDENT NAME
MODULE
MODERATOR
DATE
PRIVACY IN THE INTERNET OF THINGS
INTRODUCTION
The internet of things is a collection of network of devices and the technology that governs
communication between the devices. . Alotaibi, F. (2017). There are various issues revolving
around this topic, including privacy concerns in the internet of things and their examples, privacy
Iot has been progressive over time. The fact that there is the interconnectivity of devices means
that it is prone to many privacy concerns. Eavesdropping is a risk of concern. It is alarming that
hackers can use one's home appliances to snoop into their information.This is a very common
activity.No one is comfortable with strangers monitoring their personal life. It is a breach of
one's privacy. An excellent example of eavesdropping is researchers who intercepted data from a
smart meter device. They used unencrypted data to tell a television show someone was watching
Another privacy concern is the accumulation and interference of data. Very discrete data from
internet of things devices is left staggering for various reasons. Research done by the federal
trade commission shows that it takes very few households below 10,000 to create over 150
million data points daily.This attracts a high possibility of a breach of internet of things security.
Leaving very personal data lying around is an easy catch for hackers.
Identification is another privacy concern noted. The internet of things allows devices to identify
and communicate with each other. There are different uses of iot, including intelligent healthcare
and smart homes. In such circumstances, security is critical, and identification is an issue of
concern here due to possible attacks from malicious iot devices. Attackers use different
strategies, fake identification being one of them. They can access networks and carry on with
their malicious activities easily. An example is using identification to enable tagged objects to be
Location and tracking have been widespread security concerns. In the modern days, third parties
can track personal mobile devices without the owner's control,which is definitely a violation of
one's privacy. Third parties can monitor them whenever owners grant access to their location.
The hackers could easily misuse the information accessed. An example is applications based on
There are privacy practices in the internet of things. These laws vary depending on different
countries. An example is that of Europe. In Europe, there are rules set for the internet of things
that fall under the European Union General Data Protection Regulations since the internet of
things devices process a large amount of personal data. The law states that all the devices subject
to the internet of things ought to be provided with very high rights and the data processed
passed to govern its security. This law sets basic cybersecurity standards prescribed by the
federal government concerning internet of things devices.This was a move made after they
Having discussed the significant privacy concerns in internet things, there ought to be solutions
to each one of them.. To begin with, is how to solve the issue of eavesdropping. Identifying
encryption. It is advisable to encrypt emails, networks, and communications. This helps prevent
hackers from accessing information since they decrypt data without the encryption key. Another
solution is network segmentation. Segmenting a network means data is out of reach from
hackers. In case one segment is compromised, the others are safe from hackers. Awareness of
eavesdropping risks is another solution, for instance, by educating employees to avoid clicking
on strange links or downloading unfamiliar files. They could also employ the culture of creating
The issue of identification also has solutions. One of the practical solutions is authentication.
This is verifying the identity of users and devices before allowing them to access the information
connect to the internet of things devices for cell devices. It is advisable to use robust passwords
Localization and tracking is a primary privacy concern that needs to be solved. One of the
possible solutions is changing default passwords. Devices come with passwords provided by the
network providers. It is advisable to disable connectivity features that do not meet one's purpose.
Some features are only helpful in certain instances and possible risks in others. Devices come in
with very basic and straightforward passwords prone to attacks. It is, therefore, needful for one to
address the issue early enough. It is also common for devices to connect to other iot devices
setting an east target for attacks from hackers. Secondly, people need to keep their software
updated. This is because, with the growing technology, there is also progress in security threats.
When software updates, it is easy to receive new security threats and deal with them earlier.
The last privacy concern is the accumulation and interference of data. One of the many ways to
counter this is solid wifi protection. Routers always come in with the providers' passwords. It is
advisable to change the password instantly. People should avoid using their birthdays, years, or
other easy-to-guess passwords. It is also advisable to use updated routers that support encryption.
Another solution is monitoring network activities. Some tools help in network monitoring to
identify malicious network activities. This is an easy way to prevent threats. Lastly, embracing
solution. This method works by verifying login attempts. For instance, they send a one-time code
to a verified email address or phone number. The code also has an expiry date. This makes it
very hard for the hackers since they must dig deeper to access one's accounts. They'll need to
steal their phone, which is not easy physically.This is a very efficient method.
SHORTCOMINGS FACING SOLUTIONS TO PRIVACY CONCERNS IN IOT
The solutions to the security concerns are a plus. However, there are shortcomings in the
solutions. The solution given is challenged by traffic metadata, such as IP addresses and
endpoints that help sniffers quickly gather information. This makes it difficult for encryption to
cybersecurity. People click on unnatural links and download things from unsafe websites, putting
CONCLUSION
In conclusion internet of things aims to improve the connection of devices to the internet. It has
changed how people perceive devices. However, we realize that it comes with several security
issues that violate different people's privacy. We have realized that there are solutions to those
privacy concerns, which also have shortcomings. If all the issues are adequately addressed, the
internet of things will have very positive impacts. It is only suitable for people to keep safe from
all threats.
REFERENCES
Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A survey on IoT
security: application areas, security threats, and solution architectures. IEEE Access, 7, 82721-
82743.
Kumar, N., Madhuri, J., & ChanneGowda, M. (2017, May). Review on and privacy concerns in
Internet of Things. In 2017 International Conference on IoT and Application (ICIOT) (pp. 1-5).
IEEE.
Madakam, S., Lake, V., Lake, V., & Lake, V. (2015). Internet of Things (IoT): A literature
Solangi, Z. A., Solangi, Y. A., Chandio, S., bin Hamzah, M. S., & Shah, A. (2018, May). The
future of data privacy and security concerns in Internet of Things. In 2018 IEEE International
(solangi, 2017)