User Privacy in IoT

User Privacy in IoT

Copyright: © 2023 |Pages: 17
ISBN13: 9781668469149|ISBN10: 1668469146|ISBN13 Softcover: 9781668469156|EISBN13: 9781668469163
DOI: 10.4018/978-1-6684-6914-9.ch012
Cite Chapter Cite Chapter

MLA

Tareen, Majida Khan, et al. "User Privacy in IoT." Protecting User Privacy in Web Search Utilization, edited by Rafi Ullah Khan, IGI Global, 2023, pp. 234-250. https://doi.org/10.4018/978-1-6684-6914-9.ch012

APA

Tareen, M. K., Hussain, A., & Hamad, M. (2023). User Privacy in IoT. In R. Khan (Ed.), Protecting User Privacy in Web Search Utilization (pp. 234-250). IGI Global. https://doi.org/10.4018/978-1-6684-6914-9.ch012

Chicago

Tareen, Majida Khan, Altaf Hussain, and Muhammad Hamad. "User Privacy in IoT." In Protecting User Privacy in Web Search Utilization, edited by Rafi Ullah Khan, 234-250. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6914-9.ch012

Export Reference

Mendeley
Favorite

Abstract

The number of IoT devices connected to the global network is expected to be three times more, from 9.7 billion in 2020 to more than 29 billion in 2030. Globally connected IoT devices transmit enormous amounts of facts and figures daily via the internet for various purposes which is about users including important, intimate, or private information. As this data can be utilized for malevolent reasons, these devices constitute a privacy risk. IoT systems involved sensors gathering data from the environment, so known as cyber-physical systems which are highly vulnerable. Hence, user privacy issues such as password stealing, information and identity stealing, intruding, corrupting information, etc. are increasing day by day. Therefore, privacy experts and researchers are very much concerned about preventing user privacy issues and developed many PETs (blind signature, group signature, attribute-based credentials (ABCs), anonymous and pseudonymous data authentication, onion routing, encrypted communications, etc.) to prevent user privacy risks in IoT.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.