A Compressive Study on Security and Privacy Issues in IoT

Abstract

The rapid rise of emerging technologies, our daily lives are increasingly shaped by a variety of smart devices. These technologies bring convenience and efficiency, transforming how we live and work. However, they also introduce new challenges, particularly concerning privacy and cybersecurity. As more devices become interconnected through the Internet of Things (IoT), the risk of cyber threats grows, making it essential to address these vulnerabilities. This paper explores the various applications of IoT and examines the potential security risks and privacy concerns that accompany these innovations.

Country : India

1 Dhanashri S. Patil2 Swati R. Pohokar3 Mustafa A. Mithaiwala4 Shilpa B. Sarvaiya

  1. MCA-II, Department of MCA, Vidya Bharti Mahavidyalaya, Amravati, Maharashtra, India
  2. MCA-II, Department of MCA, Vidya Bharti Mahavidyalaya, Amravati, Maharashtra, India
  3. MCA-II, Department of MCA, Vidya Bharti Mahavidyalaya, Amravati, Maharashtra, India
  4. Head, Department of MCA, Vidya Bharti Mahavidyalaya, Amravati, Maharashtra, India

IRJIET, Volume 8, Issue 10, October 2024 pp. 178-181

doi.org/10.47001/IRJIET/2024.810024

References

  1. Roman, R., Zhou, J., & Lopez, J. (2013). "On the features and challenges of security and privacy in distributed internet of things." Computer Networks.
  2. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). "Security, privacy and trust in the Internet of Things: The road ahead." Computer Networks.
  3. Acar, A., Fereidooni, H., Abera, T., & Sikder, A. K. (2020). "A survey on homomorphic encryption schemes: Theory and implementation." IEEE Communications Surveys & Tutorials.
  4. Kumar, N., & Chilamkurti, N. (2018). "Collaborative trust aware intelligent intrusion detection in IoT networks." IEEE Communications Magazine.
  5. Bahekmat, M., Yaghmaee, M. H., Yazdi, A. S., & Sadeghi, S. (2012). A Novel Algorithm for Detecting Sinkhole Attacks in WSNs. IJCTE, 4(3), 418-421.
  6. Balte, A., Kashid, A., & Patil, B. (2015). Security Issues in Internet of Things (IoT): A Survey. International Journal of Advanced Research in Computer Science and Software Engineering, 5(4), 450-455. ISSN: 2277 128X.
  7. Botta, A., de Donato, W., Persico, V. And Pescape, A., “Integration of Cloud computing and Internet of things: A Survey”, Future Generation Computer Systems, Volume 56, March 2016, pp. 684-700.
  8. Chowdhury, M., Kader, M. F., & Asaduzzaman. (2013). Security Issues in Wireless Sensor Networks: A Survey. International Journal of Future Generation Communication and Networking, 6(5), 97-116. [5] D. Ruiz (Ed) et.al., Modelling the trustworthiness of the IOT, RERUM Deliverable D3.3, April 2016.
  9. Dlodlo, N., Foko, T., Mvelase, P., & Mathaba, S. (2012). The State of Affairs in Internet of Things Research Volume Issue, The Electronic Journal Information Systems Evaluation, 15(3), (244- 258).
  10. Douceur, J. R. (2002). The Sybil Attack. Peer-to-Peer Systems, 251-260. [8] EU-China Joint White Paper on the Internet of Things, China Academy of Information and Communications Technology (CAICT) & European Commission –DG CONNECT, January 2016.
  11. Gianluca Aloi, Giuseppe Caliciuri , Giancarlo Fortino, Raffaele Gravina, Pasquale pace, Wilma Russo and Claudio Savaglio, A Mobile Multi Technology Gateway to enable IOT Interoperability, In proceeding of the IEEE IOTDI Conference, Berlin(Germany) 2016.
  12. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645-1660.
  13. Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. 2015 IEEE World Congress on Services.
  14. Juels, A. (2006). RFID security and privacy: a research survey. IEEE J. Select. Areas Commun,24(2), 381-394.
  15. MacGillivray, Carrie, Worldwide Internet of Things Forecast Update, 2015-2019, International Data Corporation (IDC), February 2016.
  16. Mahalle, P. N., Anggorojati, B., Prasad, N. R., & Prasad, R. (2013). Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things. Journal of Cyber Security and Mobility, 1(4), 309-348.
  17. Maidamwar, P., & Chavhan, N. (2012). A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network. IJANS, 2(4), 37-50.