First Draft of Research Iot
First Draft of Research Iot
CHH. SAMBHAJINAGAR
SEMESTER -II
................................................................................................PAGE NO.
ABSTRACT ........................................................................................................... 3
1.INTRODUCTION............................................................................................... 3
1.1)BACKDROP........................................................................................4
1.2)OBJECTIVES................................................. ....................................4
1.3) METHODOLOGY.............................................................................4
1.4) LIMITATIONS..................................................................................4
8. CONCLUSION .................................................................................................
9. REFERENCES .................................................................................................
2|Page
RIGHTS TO PRIVACY IN THE ERA OF INTERNET OF
THINGS
ABSTRACT
IOT (Internet of things) is connecting inter-related computing devices and the main
idea for this concept is to connect each device via internet so that it will be easy for
the devices to communicate and share info among them. these days IoT has grown
up to a massive extent and new and emerging topic in research. IoT is the new and
vast technology for the upcoming future as almost all devices will be connected to
each other and share data among them. This research paper indentifies various
privacy challenges in Iot, and their respective solutions .
1.INTRODUCTION
The present status of the world is loaded up with immense innovation types of
technologies. Innovative manisfestations show up each day. The Internet of Things
concerns to the ability of everyday objects to connect to the Internet and to send as
well as recieve data.
It has some magical features, such as, internet-connected cameras that permit you
to post pictures online with a single click, home automatically operated systems
that depend on you front porch light when you leave work, and bracelets that share
with you some different things like your friends how far you have run or walk
during the day.
The IoT has the aim of rendering an IT- infrastructure facilitating the exchange of
things in a secure and reliable manner. some of the prominent privacy issues are
plagued the entire developing IoT system spring up the security issues present in
the technologies used in Iot for information pass along from one device to another.
This research paper has tried to address different areas related to the role of IoT
and the right of privacy while passing information from one device to another. and
also the safeguards to protect privacy in the era of internet of things.
3|Page
1.1)BACKDROP
1.2)OBJECTIVES
1.3) METHODOLOGY
1.4) LIMITATIONS
1
Ministry of information and technology, Government of India (NEILIT)
4|Page
2. MEANING OF INTERNET OF THINGS
The internet of things engages a broad set of ideas that are complex and interwined
from different perspective. key concepts that serve as a foundation for exploring
the opportunites and challenges of IoT.
In 1998, the real IoT was touched by Mark Weiser, who developed a water
fountain that was amazing and delightful to everyone who saw it. It rose and fell
respectively according to the pricing trends and the volume of stock on the NYSE.
But the actual term “Internet of Things” was coined by Kevin Ashton in 1999
during his work at Procter&Gamble. At that point, he viewed radio-frequency
identification (RFID) as essential to the Internet of things. Because the internet was
the new trend in 1999 and because it somehow made sense, he called his
presentation “Internet of Things”.
Althogh the concept wasn't named until 1999, the internet of things has been in
development for decades. The first internet appliances, for example, was a coke
machine at carnegie melon university in the early 1980s.
5|Page
The possibilities for applications of IoT are infinite. Whether it is a car, a
microwave, a pacemaker, a watch or even a light bulb, the effect will be the same
and information which is collected and exchanged between the devices allows us
broad control, monitoring and useful visibility between our physical and virtual
worlds. these are just a fraction of the ways IoT could be integrated in our lives.
3.3 Healthcare
there are already devices in use which let you measure your heart rate, respiratory
rate, skin temperature, or even get ECG and send them immediately to the doctor
taking care of you and alert them about potential health problems before they occur
or even give insight.
3.4 transportation
there are already a number that have autonomous driving integrated in them. they
are full of sensors which scan the road and make real time calculations to identify
potential safety issues.
3.5 Industrial
manufacturing and production process can be made more efficient by integrating
IoT technology. Remote monitoring and access to equipment used in
manufacturing could significantly increase.
6|Page
2
figure 1
The latest report from industry analyst firm Transforma Insights presents its
annual snapshot of the status of the IoT market worldwide.
Transforma Insights has today published its report ‘ Global IoT Forecast Report, 2021-
2030 ’ which provides its annual snapshot of the status of the global Internet of Things
market. The report draws on Transforma Insights’ extensive application-by-application
analysis of the market contained within the IoT Forecast Database and associated
reports.
The key highlights are:
At the end of 2021 there were 11.3 billion active IoT devices, a figure which will
grow to 29.4 billion in 2030, a compound annual growth rate (CAGR) of 12%.
Short range technologies will dominate connections, accounting for 73% in 2030, a
slight reduction compared to the 77% it accounts for today. Public networks, which
2
figure 1 - application of IoT, image is from ebary.net
7|Page
are dominated by cellular networks, will grow from 1.35 billion connections in 2021
to 5.7 billion in 2030, growing market share from 12% to 19%. Private networks
account for the balance of connections.
In revenue terms, the total IoT market (defined as including connectivity modules,
value added connectivity, and core associated applications) in 2021 was worth
USD213 billion, a figure which will rise to USD621 billion in 2030. Value Added
Connectivity will account for 12% of spend in 2030, with the connectivity modules
accounting for a further 4%.
In 2030 the consumer sector will account for 58% of all connections. Of the
enterprise segment in 2030, 30% of devices will be accounted for by ‘cross-vertical’
use cases such as generic track-and-trace, office equipment and fleet vehicles, 29%
by utilities, most prominently smart meters, 20% by retail/wholesale (predominantly
payment processing devices), 7% by government, 4% by transport and logistics, and
2% for finance and insurance.
The single biggest use case is Consumer Internet & Media devices, accounting for
29% of all devices in 2030. The next largest is Smart Grid, including smart meters,
representing 12% of connections.
In financial terms, the biggest vertical sector is Consumer, generating USD183
billion in revenue in 2030, or 29% of the total market value. Cross-vertical
applications account for 20%. The remaining 51% is sector-specific applications
across sectors such as energy, transport, retail and healthcare.
Geographically, China, North America, and Europe dominate, accounting for 30%,
22% and 20% respectively of the total value of the IoT market in 2030 3
3
fig 2 Iot connections forecast 2020-2030
4
8|Page
5. RIGHT TO PRIVACY
internet of things integrated in the life of the consumer provides countless benefits
and comforts but while enjoying this comfort enormous quantities of data are being
saved about the end user. this data is being is used by the companies for marketing
strategies and other purposes due to the privacy agreement accepted by the
consumer. but it becomes a bit frightning when somebody has agreed to five ten or
even more privacy agreements which very often are not thoroughly read the
increase quantity and variety of data which is collected and filtered through
technical and business analytics systems can produce astonishingly detailed and
also very precise profile of end users. This information could directly or indirectly
be accessed by Governments criminal or others and we used for the sophisticated
analytical queries which can output patterns about consumers combine with other
public data sources data mining is powerful and dangerous tool, privacy laws have
not kept up with data science that opposes them.
It is of utmost importance to discover ways of preserving privacy within the
domain of IoT some privacy challenges are unique to the IoT but not all one of the
main differences between Iot and traditional IT privacy is the extensive capturing
and sharing of sensor based data whether home energy , transportation related,
medical, etc. This data could be authorize but it could not systems must be design
to make determination as to whether that authorisation exist for the storage and
sharing of data i.e collected.
A very simple example is CCTV cameras through the smart city they set up
to support local law enforcement efforts to reduce crime however they capture
images and video of everyone passing by this people caught on the video have not
given their consent to be recorded.
9|Page
Iot increasingly evolve with new technologies and services. In this chapter
we will discuss the various privacy threats and challenges associated with IoT
environment.
5.1.3 Profiling
In this research we delve into the reasons behind the hindrance of IoT adoption in
india.
6.1 limited infrastructure and connectivity
one of the primary barriers of IoT adoption in india is the inadequate infrastructure
and connectivity in any regions rural areas still face challenges accessing stable
network however the digital india initiative and on going efforts to expand internet
infrastructure have shown the gap between urban and rural connectivity
10 | P a g e
with the proliferation of IoT devices data privacy and security have become major
concerns for individual and enterprises alike India lacks comprehensive data
protection laws making IoT development companies need to prioritize robust
security majors
In the wake of enormous security loopholes, IoT experts are restless, Therefore,
there is comprehensive review of these devices, attempting to solve their security
and privacy issues. while it is clear it is impossible to secure a one hundread
percent success rate on security issues, the stakeholders are just working to
eliminate the prevalence of these attacks.
7.1 Security Analytics
7.5 Authentication
11 | P a g e
The use of authentication is beneficial in acknowledging that only
authorized people should access the information. vulnerabilities are common in
IoT devices without appropriate authentication techniques.
There are a few PbD privacy by design principles which if followed could greatly
secure the privacy of data stored, transmitted and even deleted by devices.
The positive-sum principle of privacy engineering and design states that privacy
improves the functionality and security of the systems, not the other way around.
8. CONCLUSION
Generally, This paper takes a precise look at the security and privacy based models
glimpsing into any current IoT bases systems using known cryptographic tools and
technologies and introducing efficient approaches to overcome some difficulties of
security and privacy in IoT. This paper proposes a method for privacy protection
with data minimization based on background knowledge and an in depth literature
evaluation.
The internet of things has the potential to change the world, just as the internet di
two decades ago, Nevertheless, any new technology faces several technical and
non-technical challenges. The highly diverse IoT application domains, resource-
contrained IoT devices, and hetergoneity of both devices and platforms inhibits the
development of a standard IoT framework.
9. REFERENCES
13 | P a g e