0% found this document useful (0 votes)
57 views13 pages

First Draft of Research Iot

The document discusses the right to privacy in the era of the Internet of Things (IoT). It provides background on IoT, defines IoT, discusses its history and applications. It also discusses data analysis of IoT security and privacy challenges and India's hurdles in IoT adoption. The document aims to understand factors affecting privacy with IoT use and examine privacy methods and effects on society.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views13 pages

First Draft of Research Iot

The document discusses the right to privacy in the era of the Internet of Things (IoT). It provides background on IoT, defines IoT, discusses its history and applications. It also discusses data analysis of IoT security and privacy challenges and India's hurdles in IoT adoption. The document aims to understand factors affecting privacy with IoT use and examine privacy methods and effects on society.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

MANIKCHAND PAHADE LAW COLLEGE

CHH. SAMBHAJINAGAR

SEMESTER -II

FIRST DRAFT FOR DOCTRINAL RESEARCH

TOPIC - RIGHT TO PRIVACY IN THE ERA OF INTERNET OF


THINGS (IOT)

SUBMITTED TO - PROF. SHIVKUMAR KOMARAGIRI

SUBMITTED BY - AMRUTA JAYBHAY

CLASS - LLM-1st GROUP - CONSTITUTION

ROLL NO.- CON2308


TABLE OF CONTENTS

................................................................................................PAGE NO.

ABSTRACT ........................................................................................................... 3

1.INTRODUCTION............................................................................................... 3

1.1)BACKDROP........................................................................................4

1.2)OBJECTIVES................................................. ....................................4

1.3) METHODOLOGY.............................................................................4

1.4) LIMITATIONS..................................................................................4

2. MEANING OF INTERNET OF THINGS .....................................................5

3. APPLICATION OF INTERNET OF THINGS .............................................6

4. DATA ANALYSIS OF IOT SECURITY AND PRIVACY ...........................7

5. RIGHT TO PRIVACY ......................................................................................9

6. HURDLES OF IOT ADOPTION IN INDIA .................................................10

7. CURRENT MEASURES IN IOT SECURITY AND PRIVACY................11

8. CONCLUSION .................................................................................................

9. REFERENCES .................................................................................................

2|Page
RIGHTS TO PRIVACY IN THE ERA OF INTERNET OF
THINGS

ABSTRACT

IOT (Internet of things) is connecting inter-related computing devices and the main
idea for this concept is to connect each device via internet so that it will be easy for
the devices to communicate and share info among them. these days IoT has grown
up to a massive extent and new and emerging topic in research. IoT is the new and
vast technology for the upcoming future as almost all devices will be connected to
each other and share data among them. This research paper indentifies various
privacy challenges in Iot, and their respective solutions .

1.INTRODUCTION

The present status of the world is loaded up with immense innovation types of
technologies. Innovative manisfestations show up each day. The Internet of Things
concerns to the ability of everyday objects to connect to the Internet and to send as
well as recieve data.

It has some magical features, such as, internet-connected cameras that permit you
to post pictures online with a single click, home automatically operated systems
that depend on you front porch light when you leave work, and bracelets that share
with you some different things like your friends how far you have run or walk
during the day.

The IoT has the aim of rendering an IT- infrastructure facilitating the exchange of
things in a secure and reliable manner. some of the prominent privacy issues are
plagued the entire developing IoT system spring up the security issues present in
the technologies used in Iot for information pass along from one device to another.

This research paper has tried to address different areas related to the role of IoT
and the right of privacy while passing information from one device to another. and
also the safeguards to protect privacy in the era of internet of things.

3|Page
1.1)BACKDROP

The internet of things is an important topic in technology industry, policy and


engineering circles and has become headline news in both the speciality press and
the popular media.
In today's era there is a huge significance of development in technology, more we
use the technology more we get vulnerable to privacy, data protection and cyber
security.

1.2)OBJECTIVES

 To understand the main reasons for choosing IoT as a powerful solutions


 To identify the factors / challenges faced by individual while using IoT ?
 To understand the Role of Internet of things in 21st century.
 what security/privacy methods have been used in Iot applications ?
 To study How the Right to privacy infringed and their adverse effect on
Indian society.

1.3) METHODOLOGY

The Researcher has used doctrinal methods of research to arrive at


reasonable conclusions. She has accessed various source like jornals, newspapers,
articles, Government websites, and other research works for collection relevant
data.

1.4) LIMITATIONS

The topic of research reads- "Right to Privacy in the era of Internet of


Things" However, the researcher would like to streamline the topic to focus
majorly on infringement of Right to privacy as given under Article 21 of the Indian
constitution while using internet of things. also due to lack of infrastructure ,
unavailability of requisite resources, awarness in society and skill gap.
1

1
Ministry of information and technology, Government of India (NEILIT)

4|Page
2. MEANING OF INTERNET OF THINGS

The internet of things engages a broad set of ideas that are complex and interwined
from different perspective. key concepts that serve as a foundation for exploring
the opportunites and challenges of IoT.

2.1 DEFINITION OF IOT :


The term internet of things generally refers to scenarios where network
connectivity and computing capability extends to objects, sensors and everyday
items not normally considered computers, allowing these device to generate,
exchange and consume data with minimal human intervention. there is , however,
no single universal definition.

The ITU ( international Telecommunication union ) defines the Global


infrastructure for the information society, enabling advanced services by
interconnecting (physical and virtual ) things based on existing and evolving,
interoperable information and communication technologies.

2.2 History of IoT

In 1998, the real IoT was touched by Mark Weiser, who developed a water
fountain that was amazing and delightful to everyone who saw it. It rose and fell
respectively according to the pricing trends and the volume of stock on the NYSE.
But the actual term “Internet of Things” was coined by Kevin Ashton in 1999
during his work at Procter&Gamble. At that point, he viewed radio-frequency
identification (RFID) as essential to the Internet of things. Because the internet was
the new trend in 1999 and because it somehow made sense, he called his
presentation “Internet of Things”.

Althogh the concept wasn't named until 1999, the internet of things has been in
development for decades. The first internet appliances, for example, was a coke
machine at carnegie melon university in the early 1980s.

3. APPLICATION OF INTERNET OF THINGS

definition from ibm.com

5|Page
The possibilities for applications of IoT are infinite. Whether it is a car, a
microwave, a pacemaker, a watch or even a light bulb, the effect will be the same
and information which is collected and exchanged between the devices allows us
broad control, monitoring and useful visibility between our physical and virtual
worlds. these are just a fraction of the ways IoT could be integrated in our lives.

3.1 Consumer and Home


A thermostat which is connected to the internet. Learns the routines of people and
adjusts the temperature based on when they are home or not, asleep or awake, hot
or cold. It could be controlled over the internet by an app or it might even send
alerts if any wrong happens.

3.2 Smart infrastructure


Instead of having employees from your electricity provider to come and read your
electricity readings. The devices could automatically take record of the reading and
send them.

3.3 Healthcare
there are already devices in use which let you measure your heart rate, respiratory
rate, skin temperature, or even get ECG and send them immediately to the doctor
taking care of you and alert them about potential health problems before they occur
or even give insight.

3.4 transportation
there are already a number that have autonomous driving integrated in them. they
are full of sensors which scan the road and make real time calculations to identify
potential safety issues.

3.5 Industrial
manufacturing and production process can be made more efficient by integrating
IoT technology. Remote monitoring and access to equipment used in
manufacturing could significantly increase.

6|Page
2

figure 1

4. DATA ANALYSIS OF IOT SECURITY AND PRIVACY

The latest report from industry analyst firm Transforma Insights presents its
annual snapshot of the status of the IoT market worldwide.

Transforma Insights has today published its report ‘ Global IoT Forecast Report, 2021-
2030 ’ which provides its annual snapshot of the status of the global Internet of Things
market. The report draws on Transforma Insights’ extensive application-by-application
analysis of the market contained within the IoT Forecast Database and associated
reports.
The key highlights are:
 At the end of 2021 there were 11.3 billion active IoT devices, a figure which will
grow to 29.4 billion in 2030, a compound annual growth rate (CAGR) of 12%.
 Short range technologies will dominate connections, accounting for 73% in 2030, a
slight reduction compared to the 77% it accounts for today. Public networks, which

2
figure 1 - application of IoT, image is from ebary.net

7|Page
are dominated by cellular networks, will grow from 1.35 billion connections in 2021
to 5.7 billion in 2030, growing market share from 12% to 19%. Private networks
account for the balance of connections.
 In revenue terms, the total IoT market (defined as including connectivity modules,
value added connectivity, and core associated applications) in 2021 was worth
USD213 billion, a figure which will rise to USD621 billion in 2030. Value Added
Connectivity will account for 12% of spend in 2030, with the connectivity modules
accounting for a further 4%.
 In 2030 the consumer sector will account for 58% of all connections. Of the
enterprise segment in 2030, 30% of devices will be accounted for by ‘cross-vertical’
use cases such as generic track-and-trace, office equipment and fleet vehicles, 29%
by utilities, most prominently smart meters, 20% by retail/wholesale (predominantly
payment processing devices), 7% by government, 4% by transport and logistics, and
2% for finance and insurance.
 The single biggest use case is Consumer Internet & Media devices, accounting for
29% of all devices in 2030. The next largest is Smart Grid, including smart meters,
representing 12% of connections.
 In financial terms, the biggest vertical sector is Consumer, generating USD183
billion in revenue in 2030, or 29% of the total market value. Cross-vertical
applications account for 20%. The remaining 51% is sector-specific applications
across sectors such as energy, transport, retail and healthcare.
 Geographically, China, North America, and Europe dominate, accounting for 30%,
22% and 20% respectively of the total value of the IoT market in 2030 3

3
fig 2 Iot connections forecast 2020-2030
4

8|Page
5. RIGHT TO PRIVACY

Indian constitution gives the fundamental rights to every individual in india .


Article 21 provides Right to life and personal liberty. There are many judgment
which include the right to privacy under article 21.
judgments

1. M P Sharma Ors. vs Satish chandra and Ors. case


2. kharakhsingh vs The state of U.P
3. K S puttaswamy vs Union of India
4. Adhar case

internet of things integrated in the life of the consumer provides countless benefits
and comforts but while enjoying this comfort enormous quantities of data are being
saved about the end user. this data is being is used by the companies for marketing
strategies and other purposes due to the privacy agreement accepted by the
consumer. but it becomes a bit frightning when somebody has agreed to five ten or
even more privacy agreements which very often are not thoroughly read the
increase quantity and variety of data which is collected and filtered through
technical and business analytics systems can produce astonishingly detailed and
also very precise profile of end users. This information could directly or indirectly
be accessed by Governments criminal or others and we used for the sophisticated
analytical queries which can output patterns about consumers combine with other
public data sources data mining is powerful and dangerous tool, privacy laws have
not kept up with data science that opposes them.
It is of utmost importance to discover ways of preserving privacy within the
domain of IoT some privacy challenges are unique to the IoT but not all one of the
main differences between Iot and traditional IT privacy is the extensive capturing
and sharing of sensor based data whether home energy , transportation related,
medical, etc. This data could be authorize but it could not systems must be design
to make determination as to whether that authorisation exist for the storage and
sharing of data i.e collected.
A very simple example is CCTV cameras through the smart city they set up
to support local law enforcement efforts to reduce crime however they capture
images and video of everyone passing by this people caught on the video have not
given their consent to be recorded.

5.1 Evaluation of privacy Threats in IoT

9|Page
Iot increasingly evolve with new technologies and services. In this chapter
we will discuss the various privacy threats and challenges associated with IoT
environment.

5.1.1 User Indentification


from privacy perspectives, user identification is the ability to distinguish a person
or revealing their identity based on a piece of acquired data (name,address, or
personal information). The risk of such a threat is that privacy-violating actions
could be carried out after the customer is identified. It also allows for linking
information from different sources for the same indentified. This threat enables and
aggravates other threats, e.g profiling and tracking of individuals behaviours.
user indentification is currently implemented in almost all mobile platforms, using
a variety of mechanisms including face recognition, fingerprints and voice
recognition.

5.1.2 User Tracking

5.1.3 Profiling

5.1.4 privacy in device

5.1.5 privacy during communication

5.1.6 privacy in storage

5.1.7 privacy at processing

6. HURDLES OF IOT ADOPTION IN INDIA

In this research we delve into the reasons behind the hindrance of IoT adoption in
india.
6.1 limited infrastructure and connectivity
one of the primary barriers of IoT adoption in india is the inadequate infrastructure
and connectivity in any regions rural areas still face challenges accessing stable
network however the digital india initiative and on going efforts to expand internet
infrastructure have shown the gap between urban and rural connectivity

6.2 data privacy and security concern

10 | P a g e
with the proliferation of IoT devices data privacy and security have become major
concerns for individual and enterprises alike India lacks comprehensive data
protection laws making IoT development companies need to prioritize robust
security majors

6.3 skill gap in IoT development


IoT development require specialized skills in hardware and software engineering,
data analytics and cyber security.

6.4 high implementation cost


to make IoT adoption more accessible IoT development companies should focus
on cost effective solutions

6.5 lack of standardization


the lack of uniform standards and protocols in the IoT ecosystem has hindered
seamless integration and interoperability IoT devices from different manufacturers
may not be compatible leading to fragmentation and complexity

7. CURRENT MEASURES IN IOT SECURITY AND PRIVACY

In the wake of enormous security loopholes, IoT experts are restless, Therefore,
there is comprehensive review of these devices, attempting to solve their security
and privacy issues. while it is clear it is impossible to secure a one hundread
percent success rate on security issues, the stakeholders are just working to
eliminate the prevalence of these attacks.
7.1 Security Analytics

7.2 protection of communications

7.3 Securing Network

7.4 data minimization

7.5 Authentication

11 | P a g e
The use of authentication is beneficial in acknowledging that only
authorized people should access the information. vulnerabilities are common in
IoT devices without appropriate authentication techniques.

There are a few PbD privacy by design principles which if followed could greatly
secure the privacy of data stored, transmitted and even deleted by devices.

The positive-sum principle of privacy engineering and design states that privacy
improves the functionality and security of the systems, not the other way around.

A zero-sum privacy approach would result in either losses in functinality, no


improvement to security and functionality or losses of non-functional business or
security needs.

8. CONCLUSION

Generally, This paper takes a precise look at the security and privacy based models
glimpsing into any current IoT bases systems using known cryptographic tools and
technologies and introducing efficient approaches to overcome some difficulties of
security and privacy in IoT. This paper proposes a method for privacy protection
with data minimization based on background knowledge and an in depth literature
evaluation.

The internet of things has the potential to change the world, just as the internet di
two decades ago, Nevertheless, any new technology faces several technical and
non-technical challenges. The highly diverse IoT application domains, resource-
contrained IoT devices, and hetergoneity of both devices and platforms inhibits the
development of a standard IoT framework.

9. REFERENCES

1. Ministry of electronics and Information technology, government of India.


2. www.hashstudioz.com The Hurdles of IoT adoption in India
3.article in Livelaw.in
4. A detail study of security and privacy issues of internet of things Article on
Academia.com
5. IJET journal by International Research Group
12 | P a g e
6. Research paper on privacy preservation in internet of things by mehdi gheisari
on Academia.com
7. transforma insight TAM forecasts 2022

13 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy