Reference Hub2
Critical Issues in the Invasion of the Internet of Things (IoT): Security, Privacy, and Other Vulnerabilities

Critical Issues in the Invasion of the Internet of Things (IoT): Security, Privacy, and Other Vulnerabilities

Shravani Devarakonda, Malka N. Halgamuge, Azeem Mohammad
Copyright: © 2019 |Pages: 23
ISBN13: 9781522574323|ISBN10: 1522574328|EISBN13: 9781522574330
DOI: 10.4018/978-1-5225-7432-3.ch010
Cite Chapter Cite Chapter

MLA

Devarakonda, Shravani, et al. "Critical Issues in the Invasion of the Internet of Things (IoT): Security, Privacy, and Other Vulnerabilities." Handbook of Research on Big Data and the IoT, edited by Gurjit Kaur and Pradeep Tomar, IGI Global, 2019, pp. 174-196. https://doi.org/10.4018/978-1-5225-7432-3.ch010

APA

Devarakonda, S., Halgamuge, M. N., & Mohammad, A. (2019). Critical Issues in the Invasion of the Internet of Things (IoT): Security, Privacy, and Other Vulnerabilities. In G. Kaur & P. Tomar (Eds.), Handbook of Research on Big Data and the IoT (pp. 174-196). IGI Global. https://doi.org/10.4018/978-1-5225-7432-3.ch010

Chicago

Devarakonda, Shravani, Malka N. Halgamuge, and Azeem Mohammad. "Critical Issues in the Invasion of the Internet of Things (IoT): Security, Privacy, and Other Vulnerabilities." In Handbook of Research on Big Data and the IoT, edited by Gurjit Kaur and Pradeep Tomar, 174-196. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7432-3.ch010

Export Reference

Mendeley
Favorite

Abstract

In this chapter, the authors collected data from issues related to threats in the applications of IoT-based technologies that describe the security and privacy issues from 30 peer reviewed publications from 2014 to 2017. Further, they analyzed each threat type and its percentages in each application of the internet of things. The results indicated that the applications of smart transportation (20%) face the highest amount of security and privacy issues followed by smart home (19%) and smart cities (18%) compared to the rest of the applications. Further, they determined that the biggest threats were denial of service attack (9%) followed by eavesdropping (5%), man in the middle (4%), and replay (4%). Denial of service attacks and man in the middle attack are active attacks that can severely damage human life whereas eavesdropping is a passive attack that steals information. This study has found that privacy issues have the biggest impacts on people. Therefore, researchers need to find possible solutions to these threats to improve the quality of IoT applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.