Abstract
The economic value of the industrial, smart city, home, and many more transformations by Internet of Things (IoT) across all industries is estimated to be trillions of dollars, and the societal impact on energy efficiency, health, and productivity is enormous. When sensing and intelligence are built into every smart gadget, there is a heightened risk of misuse in addition to any potential benefits. The increased complexity needed to manage IoT devices safely and securely is one of the main issues with their growing quantity. This increased complexity creates new safety, security, privacy, and usability challenges far beyond the difficult challenges individuals face just securing a single device. Herewith, researchers are trying to point out some of the bad trends that smart devices and collections of devices bring about and make the case that problems with security, physical safety, privacy, and usability are intricately intertwined and require simultaneous answers. Tight safety and security standards for individual devices based on existing technology are needed. Likewise, research that identifies the most effective method for people to reliably manage collections of devices must direct the development of such systems in the future.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Fu, K., Kohno, T., Lopresti, D., Mynatt, E., Nahrstedt, K., Patel, S., Richardson, D., & Zorn, B. (2017). Safety, security, and privacy threats posed by accelerating trends in the internet of things. http://cra.org/ccc/resources/ccc-led-whitepapers/.
Mohammed, H., & Qayyum, M. (2017). Internet of things: A study on security and privacy threats. https://doi.org/10.1109/Anti-Cybercrime.2017.7905270
Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11).
Abdur Razzaq, M., Sheikh, R. A., Baig, A., & Ahmad, A. (2017). Digital image security: Fusion of encryption, steganography and watermarking. International Journal of Advanced Computer Science and Applications (IJACSA), 8(5).
GeekPwn. (2017). IoT devices have a large number of low-level loopholes. [Online]. Available: http://www.sohu.com/a/129188339_198147
Lin, J., et al. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 99, 1.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed Internet of Things. Computer Networks, 57(10), 2266–2279.
Yang, Y., et al. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.
Jia, Y. J., et al. (2017). ContexIoT: Towards providing contextual integrity to Appified IoT platforms. In Network and distributed system security symposium (pp. 1–15).
Mavrogiorgou, A., Kiourtis, A., Perakis, K., Pitsios, S., & Kyriazis, D. (2019). IoT in healthcare: Achieving interoperability of high-quality data acquired by IoT medical devices. Sensors, 19(9), 1978.
Lemayian, J. P., & Al-Turjman, F. (2019). Intelligent IoT communication in smart environments: An overview. In Artificial intelligence in IoT (pp. 207–221). Springer.
Mukhandi, M., David, P., Pereira, S., & Couceiro, M. S. (2019). A novel solution for securing robot communications based on the MQTT protocol and ROS. In IEEE/SICE international symposium on system integration (SII) (pp. 608–613).
Coman, F. L., Malarski, K. M., Petersen, M. N., & Ruepp, S. (2019). Security issues in internet of things: Vulnerability analysis of LoRaWAN, sigfox and NB-IoT. In 2019 global IoT summit (GIoTS) (pp. 1–6). IEEE.
Alam, S., Siddiqui, S. T., Ahmad, A., Ahmad, R., & Shuaib, M. (2020). Internet of Things (IoT) enabling technologies, requirements, and security challenges. In Advances in data and information sciences (pp. 119–126). Springer.
Li, W., & Wu, D. (2019). Bridging the gap between security tools and SDN controllers. ICST Transaction on Security and Safety, 5(17), 156242.
Almiani, M., Abu Ghazleh, A., Al-Rahayfeh, A., Atiewi, S., & Razaque, A. (2020). Deep recurrent neural network for IoT intrusion detection system. Simulation Modelling Practice and Theory, 101, –102031.
Sarwar, M. I., Iqbal, M. W., Alyas, T., et al. (2021). Data vaults for blockchain-empowered accounting information systems. IEEE Access, 9(2021), 117306–117324.
Naqvi, M. R., Iqbal, M. W., Ashraf, M. U., et al. (2022). Ontology driven testing strategies for IoT applications. Computers, Materials & Continua, 70(3), 5855–5869.
Gondal, F. K., Shahzad, S. K., Iqbal, M. W., Aqeel, M., & Naqvi, M. R. (2021). Business process model for IoT based systems operations. LGU, Research Journal for Computer Science and IT, 5(4), 1–10.
Kabir, S. (2021). Internet of Things and safety assurance of cooperative cyber-physical systems: Opportunities and challenges. IEEE Internet of Things Magazine, 4(2), 74–78.
Gope, P., & Sikdar, B. (2021). A comparative study of design paradigms for PUF-based security protocols for IoT devices: Current progress challenges and future expectation. Computer, 54(11), 36–46.
Zhang, Y., He, D., Obaidat, M. S., Vijayakumar, P., & Hsiao, K.-F. (2021). Efficient identity-based distributed decryption scheme for electronic personal health record sharing system. IEEE Journal on Selected Areas in Communications, 39(2), 384–395.
Alazab, M., Reddy Maddikunta, S. P. R. M. P. M. P. K., Gadekallu, T. R., & Pham, Q.-V. (2022). Federated learning for cybersecurity: Concepts, challenges and future directions. IEEE Transactions on Industrial Informatics, 18(5), 3501–3509.
Eisele, M., Maugeri, M., Shriwas, R., Huth, C., & Bella, G. (2022). Embedded fuzzing: A review of challenges tools and solutions. Cybersecurity, 5(1), 18.
Aldahmani, A., Ouni, B., Lestable, T., & Debbah, M. Cyber-security of embedded IoTs in smart homes: Challenges, requirements, countermeasures, and trends. IEEE Open Journal of Vehicular Technology. https://doi.org/10.1109/OJVT.2023.3234069
Anagnostopoulos, T. (2023). Smart campus safety systems survey. In IoT-enabled unobtrusive surveillance systems for smart campus safety (pp. 39–95). IEEE. https://doi.org/10.1002/9781119903932.ch5
Padmanaban, S., Nasab, M. A., Shiri, M. E., Javadi, H. H. S., Nasab, M. A., Zand, M., & Samavat, T. (2023). The role of internet of things in smart homes. In Artificial intelligence-based smart power systems (pp. 259–271). IEEE. https://doi.org/10.1002/9781119893998.ch13
Jeribi, F., Amin, R., Alhameed, M., & Tahir, A. (2023). An efficient trust management technique using ID3 algorithm with blockchain in smart buildings IoT. IEEE Access, 11, 8136–8149. https://doi.org/10.1109/ACCESS.2022.3230944
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jadhav, A.D. (2024). Standardization in the Transformation of Civic Systems Using Safe and Secure Internet of Things Systems. In: Gupta, N., Mishra, S. (eds) Internet of Everything for Smart City and Smart Healthcare Applications. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-34601-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-34601-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34600-2
Online ISBN: 978-3-031-34601-9
eBook Packages: EngineeringEngineering (R0)