A Study on Privacy Issues in Internet of Things IoT
A Study on Privacy Issues in Internet of Things IoT
97
Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at 06:16:13 UTC from IEEE Xplore. Restrictions apply.
However, according to [30] the smart meter’s ability to [28] also gave an example how a vehicle’s license plate can
monitor a user’s electricity consumption in almost real-time be connected to the vehicle owner’s identity where the trajectory
entails serious implications about consumer privacy. This is of a vehicle can easily be traced even if all communications
supported by [29] where power consumption profiles may reveal between the vehicle and infrastructure are encrypted and each
sensitive information on the state of their businesses to their device is authenticated by others. [28] added that this is against
competitors. Not only to businesses, living pattern of individuals the common notion of privacy, which includes the right of
will also be observed by perpetrators that can pose serious people to lead their lives in a manner that is reasonably secluded
threats when they should or should not be at home at a certain from public scrutiny, whether such scrutiny comes from a
time. Such important privacy concerns in the use of smart meters neighbour’s prying eyes, an investigator’s eavesdropping ears,
has raised significant public attention and they have been highly or a news photographer’s intrusive camera.
debated in the media and by politicians, and, if not properly
addressed, they could represent a major roadblock for this multi- E. Cloud
billion dollar industry [30]. Cloud-based services are often considered as the essential
infrastructure in IoT ecosystem as it offers support for data
C. Smart Medical storage, data processing, and data sharing [33]. As IoT
Health and wellness is one of the most promising application applications allow data to be locally stored on IoT objects or
areas of IoT technology. Recently, there have been an increasing remotely on the cloud depending on their storage capabilities,
number of attacks where the victims have been hospitals or protecting the data at rest is of paramount importance in
health institutions. IoT in healthcare provides an environment preserving its integrity [34].
where a patient’s vital parameters get transmitted by medical
devices onto secure cloud based platforms where it is stored, If the data integrity of a single IoT application at rest has
been compromised, then there is a huge risk of dealing with
aggregated and analyzed [15].
cascading effects on the privacy of the data [35]. For example,
Smart medical devices are attractive targets for [35] stated that a thermostat deployed in a smart home relies
cybercriminals as the devices often employ weak security heavily on a smoke detector’s data to shut a heating system
measures, causes security compromise that lead to privacy down in case of danger. However, access of the smoke
breaches and safety threats in the real world. Types of attacks on detector’s data by unauthorised parties may put the entire smart
medical devices includes eavesdropping in which privacy of the home at risk.
patient is leaked, integrity error in which the medical
information is being altered, and availability issues which As a summary, Table 1 shows the mapping of privacy threats
in various IoT applications based on discussion in the reviewed
include battery draining attacks [8].
papers.
In IoT, Radio Frequency Identification (RFID) plays a lead TABLE I. PRIVACY ISSUES IN IOT APPLICATION
role because it identifies any number of objects simultaneously
[1]. RFID setup consists of several RFID tags and one or more IoT
RFID readers. [31] discussed that privacy threats brought by Privacy Threat Applications Discussion on Privacy Issues
RFID in smart medical devices where criminals can identify Smart Grids Power consumption profiles may
RFID tags in wearable monitoring devices so as to locate and [29] reveal sensitive information about
track patients, or illegally collect and utilize patients' health data the state of their businesses to
their competitors.
for analysis and mining. It is important for entities that have been Smart Homes Private data becomes accessible
using RFID to protect information related to the RFID tags used. [25] without the householders’
The protection should consider not only while using the tags, but awareness.
Smart Home A passive network observer can
also after using them, as discarded RFID may carry a lot of [26] infer sensitive information about
private information of hospitals or patients, which can be easily consumers from the network
collected by others [31]. behaviors of their smart home
devices, even when those devices
D. Smart City use encryption.
Smart • pairing and discovery
A smart city is an interconnected entity of IoT and intelligent Data Leakage
Home[36] protocols that leak
systems to provide quality services to its citizens in various information about devices
in the home;
sectors such as public safety, healthcare, transportation and • insecure communication
energy [5]. Smart city applications benefit people and the city in leaking sensitive
a variety of aspects such as energy, environment, industry, information about the home
and the residents;
living, and services. • vulnerabilities in the
devices that can allow an
Despite the benefits a smart city offer to its population, a attacker to remotely spy on
smart city is vulnerable to privacy leakage and information residents or disrupt their
lives.
inferring by outside attackers, due to on how private information
Smart Discarded RFID may carry a lot of
is collected, transmitted, and processed. [32] highlighted that Medical private information of hospitals or
the disclosed privacy in a smart city may contain a user’s [31] patients, which can be easily
collected by others.
identity and location in transportation, health condition in
Eavesdropping Smart Homes Eavesdrop on the wireless
healthcare, lifestyle inferred from intelligent surveillance, smart [25] transmission of sensors and detect
energy, home and community, and so on.
98
Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at 06:16:13 UTC from IEEE Xplore. Restrictions apply.
IoT IoT
Privacy Threat Applications Discussion on Privacy Issues Privacy Threat Applications Discussion on Privacy Issues
99
Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at 06:16:13 UTC from IEEE Xplore. Restrictions apply.
[14] H. A. Abdul-ghani, “A Comprehensive Study of Security and Privacy [26] N. Apthorpe, D. Reisman, and N. Feamster, “Closing the Blinds : Four
Guidelines , Threats , and Countermeasures : An IoT Perspective,” 2019. Strategies for Protecting Smart Home Privacy from Network Observers.”
[15] S. E. E. Profile, “Internet of Things ( IoT ): Security and Privacy Threats,” [27] P. Biocco and P. Hines, “A Study of Privacy Policies across Smart Home
no. June, 2016. Companies.”
[16] D. K. Alferidah and N. Z. Jhanjhi, “A Review on Security and Privacy [28] R. Khatoun and S. Zeadally, “Cybersecurity and Privacy Solutions in
Issues and Challenges in Internet of Things,” vol. 20, no. 4, pp. 263–285, Smart Cities,” no. March, pp. 51–59, 2017.
2020. [29] G. Giaconi and G. Deniz, “Smart Meter Data Privacy,” pp. 1–36.
[17] Y. Lu, S. Member, and X. Huang, “Blockchain and Federated Learning [30] G. Giaconi, G. Deniz, and H. V. Poor, “Privacy-Aware Smart Metering :
for Privacy-Preserved Data Sharing in Industrial IoT,” vol. 16, no. 6, pp. Progress and Challenges,” no. January 2019, 2018.
4177–4186, 2020.
[31] D. He, R. Ye, S. Chan, M. Guizani, and Y. Xu, “Privacy in the Internet of
[18] D. Geneiatakis, I. Kounelis, R. Neisse, I. Nai-fovino, G. Steri, and G. Things for Smart Healthcare,” no. April, pp. 38–44, 2018.
Baldini, “Security and Privacy Issues for an IoT based Smart Home,” pp.
[32] K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. S. Shen, “Security and
1292–1297, 2017.
Privacy in Smart City Applications : Challenges and Solutions,” no.
[19] B. K. Mohanta, U. Satapathy, S. S. Panda, and D. Jena, “A Novel January, pp. 122–129, 2017.
Approach to Solve Security and Privacy Issues for IoT Applications using
[33] J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, “Twenty security
Blockchain,” pp. 394–399, 2019.
considerations for cloud-supported Internet of Things,” no. 1, pp. 1–16.
[20] D. Kanngiesser, “These are the seven deadly sins of data tampering.”
[34] H. A. Abdulghani, N. A. Nijdam, and A. Collen, “SS symmetry A Study
[Online]. Available: https://www.techradar.com/news/these-are-the-
on Security and Privacy Guidelines , Countermeasures , Threats : IoT
seven-deadly-sins-of-data-tampering. [Accessed: 19-Nov-2020].
Data at Rest Perspective,” pp. 1–36, 2019.
[21] C. H. Lee and K. Kim, “Implementation of IoT System using BlockChain
[35] A. Mosenia, S. Member, and N. K. Jha, “A Comprehensive Study of
with Authentication and Data Protection,” pp. 936–940, 2018.
Security of Internet-of-Things,” vol. 5, no. 4, 2017.
[22] D. Patrick, “Abstra ct:,” pp. 1–16, 2012.
[36] E. Zeng et al., “End User Security and Privacy Concerns with Smart
[23] S. Pearson, “Privacy , Security and Trust in Cloud Computing Privacy , Homes This paper is included in the Proceedings of the End User Security
Security and Trust in Cloud Computing,” 2012. & Privacy Concerns with Smart Homes,” no. Soups, 2017.
[24] D. Kolevski and K. Michael, “Cloud Computing Data Breaches A socio- [37] P. C. K. Hung, M. Fantinato, and L. Rafferty, “A STUDY OF PRIVACY
technical review of literature,” pp. 1486–1495, 2015. REQUIREMENTS FOR SMART TOYS,” 2016.
[25] J. Bugeja, A. Jacobsson, and P. Davidsson, “On Privacy and Security
Challenges in Smart Connected Homes,” 2016.
100
Authorized licensed use limited to: Somaiya University. Downloaded on April 04,2025 at 06:16:13 UTC from IEEE Xplore. Restrictions apply.