Security and Privacy Issues in IoT-driven Computer Science Applications

Authors

  • Santhosh Kumar B N  Assistant Professor of Computer Science, Maharani's Science College for Women, Mysore, India
  • Prakasha Raje Urs M  Assistant Professor of Computer Science, Maharani's Science College for Women, Mysore, India

Keywords:

Internet of Things (IoT), Security, Privacy, Computer Science, Applications, Data Protection, Cybersecurity, Vulnerabilities, Threats.

Abstract

The Internet of Things (IoT) has revolutionized various domains in computer science by enabling seamless connectivity and automation across devices. However, the integration of IoT in applications brings forth significant security and privacy concerns. This paper investigates the prevalent security and privacy issues in IoT-driven computer science applications. We review existing literature to identify common vulnerabilities and threats, propose a robust security framework to mitigate these issues, and implement the framework in a simulated environment. The results demonstrate enhanced security and privacy, addressing the critical concerns effectively. This research contributes to the development of more secure and reliable IoT applications, promoting trust and wider adoption of IoT technologies.

References

  1. R. H. Weber, "Internet of Things – New Security and Privacy Challenges," Computer Law & Security Review, vol. 26, no. 1, pp. 23-30, 2010.
  2. S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, Privacy and Trust in Internet of Things: The Road Ahead," Computer Networks, vol. 76, pp. 146-164, Jan. 2015.
  3. A. Mosenia and N. K. Jha, "A Comprehensive Study of Security of Internet-of-Things," IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586-602, Oct.-Dec. 2016.
  4. D. Evans, "The Internet of Things: How the Next Evolution of the Internet is Changing Everything," Cisco Internet Business Solutions Group, 2011.
  5. L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A Survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
  6. A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, "Fog Computing for the Internet of Things: Security and Privacy Issues," IEEE Internet of Things Journal, vol. 4, no. 1, pp. 68-77, Feb. 2016.
  7. H. Ning and H. Liu, "Cyber-Physical-Social Systems: The State of the Art and Perspectives," IEEE Internet of Things Journal, vol. 1, no. 3, pp. 217-232, June 2014.
  8. G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. D. Johnson, "M2M: From Mobile to Embedded Internet," IEEE Communications Magazine, vol. 49, no. 4, pp. 36-43, Apr. 2011.
  9. K. K. R. Choo, "The Cyber Threat Landscape: Challenges and Future Research Directions," Computers & Security, vol. 30, no. 8, pp. 719-731, Nov. 2011.
  10. L. Da Xu, W. He, and S. Li, "Internet of Things in Industries: A Survey," IEEE Transactions on Industrial Informatics, vol. 10, no. 4, pp. 2233-2243, Nov. 2014.
  11. P. Gope and B. Sikdar, "Privacy-Aware Authentication Scheme for IoT," IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 2, pp. 271-279, Mar. 2016.
  12. M. Farooq, M. Waseem, S. Mazhar, A. Khairi, and T. Kamal, "A Review on Internet of Things (IoT)," International Journal of Computer Applications, vol. 113, no. 1, pp. 1-7, Mar. 2015.
  13. J. Suo, Y. Liu, and J. Zhang, "Security and Privacy in IoT Smart Healthcare," IEEE Xplore, 2015.
  14. T. Heer, O. Garcia Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. Wehrle, "Security Challenges in the IP-based Internet of Things," Wireless Personal Communications, vol. 61, no. 3, pp. 527-542, Dec. 2011.
  15. A. Roman, C. Alcaraz, and J. Lopez, "A Review of IoT Security Challenges and Solutions," IEEE Conference Publication, 2016.
  16. P. Ziegeldorf, O. Garcia Morchon, and K. Wehrle, "Privacy Issues in IoT," IEEE Xplore, 2013.
  17. A. Abawajy, M. Hassan, and H. J. Gharakheili, "Security and Privacy for Cloud and IoT," IEEE Access, 2016.
  18. J. J. P. C. Rodrigues, L. F. L. Fernandes, M. Lorenz, and A. Braun, "Enabling Technologies for the Internet of Health Things," IEEE Access, vol. 6, pp. 13129-13141, Jan. 2016.
  19. X. Zhang, W. Sun, and S. Zhu, "A Survey of Security and Privacy Issues in Internet of Things," IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4504-4515, Dec. 2015.
  20. M. S. Hossain, "Cloud-Supported Cyber-Physical Localization Framework for Patients Monitoring," IEEE Systems Journal, vol. 11, no. 1, pp. 118-127, Mar. 2016.
  21. P. Kumar, S. R. Moosavi, and A. Azgin, "Security and Privacy in Smart Health: Efficient Policy Enforcement in IoT-Based Healthcare," Future Generation Computer Systems, vol. 78, pp. 897-906, Jan. 2016.
  22. R. H. Weber, "Internet of Things: Privacy Issues Revisited," Computer Law & Security Review, vol. 31, no. 5, pp. 618-627, Oct. 2015.
  23. M. Suo, J. Wan, C. Zou, and J. Liu, "Security in the Internet of Things: A Review," in Proc. 2012 Int. Conf. Comput. Sci. Electron. Eng., 2012, pp. 648-651.
  24. A. Juels, "RFID Security and Privacy: A Research Survey," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, Feb. 2006.
  25. L. Eschenauer and V. D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," in Proc. 9th ACM Conf. Comput. Commun. Secur., 2002, pp. 41-47.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Santhosh Kumar B N, Prakasha Raje Urs M "Security and Privacy Issues in IoT-driven Computer Science Applications" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 4, Issue 2, pp.2350-2363, January-February-2018.