Internet of Things: Risk Management

  • Vinita MalikEmail author
  • Sukhdip Singh
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 141)


IoT (Internet of Things) devices envisions a future where interoperable, reliable, secure and efficient digital devices communicate and linked by appropriate communication technologies. These digital devices help in generating big volumes of sensitive data with high processing speed. Such information is helpful in empowering users but imposes a great cost of data loss or data misuse. As data complexity, technology and pervasiveness grow, it becomes a strong argument to perform risk management. Our research contributes towards proposing a deep insight into IoT architectural components, factors shaping risks, attack vectors and their management strategies/counter measures. Furthermore, we have explored IoT capabilities, applications, challenges and opportunities in various fields. This state of art will make a case for developing new risk assessment methodologies and develop new ideas for exercising IoT opportunities by considering the heavy, big, dynamic, interoperable data processing.


Internet of things Risks Attack vectors Risk management 


  1. 1.
  2. 2.
  3. 3.
    Leloglu. E: A review of Security concerns in internet of things. J. Comput. Commun. 5, 121–136 (2017)Google Scholar
  4. 4.
    Nurse, R.C.J., Creese, S., Roure, D.D.: Security Risk assessment in Internet of Things Systems, IT professional, pp. 1–9 (2017)Google Scholar
  5. 5.
    An, J., Gui, X.L., He, X.: Study on architecture and key technologies for Internet of things. Advanc. Biomed. Eng. 11, 329–335 (2012)Google Scholar
  6. 6.
    Lewis, J.A.: Managing Risk for the Internet of Things, A Report of the CSIS Strategic Technologies Program, CSIS., pp. 1–32 (2016)
  7. 7.
    Sorebo, G.: Managing the unmanageable: A risk model for the Internet of Things. RSA Conference., pp. 1–20 (2015)
  8. 8.
    Miorandi, D., Sicari, S., Pellegrini, F.D.: Internet of things: vision, applications and research challenges. Adhoc Netw. 10, 1497–1516 (2012)Google Scholar
  9. 9.
    Tianshui, W., Gang, Z.: A Novel Risk Assessment Model for Privacy Security in Internet of Things, vol. 19, no. 5, pp. 398–404 (2014)Google Scholar
  10. 10.
    Chawngsangpuii, R., Das, P.: Security Management perspective for Internet of Things. Int. J. Eng. Sci. Invent. 6(9), 59–65 (2017)Google Scholar
  11. 11.
  12. 12.
    Sun, D.Z., Zhong, J.D.: A hash based RFID security protocol for strong privacy protection. IEEE Trans. Consum. Electron. 58(4), 1246–1252 (2012)Google Scholar
  13. 13.
    Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 557–570 (2002)Google Scholar
  14. 14.
    Xiao, P., Xing, H., Xiaofeng, M.: Privacy preserving towards continuous query in location-based services. J. Comput. Res. Develop. 10–18 (2010)Google Scholar
  15. 15.
    Rath, A.T., Colin, J.: Adaptive risk aware control model for internet of things 2017. In: International Workshop on Secure Internet of Things, pp. 40–49 (2018)Google Scholar
  16. 16.
    Zahra, B.F., Abdelhamid, B.: Risk analysis in Internet of things using EBIOS. In: IEEE, 2017 IEEE 7th Annual Computing and Communication, 1–7 (2017)Google Scholar
  17. 17.
    Ouaddah, A., et al.: Access control in the internet of things; big challenges and new opportunities. Comput. Netw. 112, Elsevier, 237–262 (2016)Google Scholar
  18. 18.
    Darwish, S., Nouretdinov, I., Wolthusen, S.D.: Towards composable threat assessment for medical IOT. In: The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17), Proc. Comput. Sci. 113, 627–632 (2017)Google Scholar
  19. 19.
    Kouzinopoulos, C.S. et al.: Using blockchains to strengthen the security of internet of things, Euro Cybersec, CCIS, 90–100 (2018)Google Scholar
  20. 20.
    Mayzaud, A., Badonnel, R., Chrisment, I.: Monitoring and Security for Internet of Things, LNCS 7943, pp. 37–40 (2013)Google Scholar
  21. 21.
    Liu, C., Zhang, Y: Research on dynamical security risk assessment for the internet of things inspired by immunology. In: 8th International Conference on Natural Computation, pp. 874–878 (2012)Google Scholar
  22. 22.
    Lin, Z., Zhou, C: Research on Extracting Risk Control Rules for Internet of Things Business, pp. 598–601. IEEE (2018)Google Scholar
  23. 23.
    Mircea, M., Stoica, M., Ghilic-Micu, B.: Using cloud computing to address challenges raised by internet of things. Comput. Commun. Netw. Connected Environments for Internet of Things, pp. 63–82. Springer (2017)Google Scholar
  24. 24.
    Kempf, J., Arkko, J., Beheshti, N., Yedavalli, K.: Thoughts on Reliability in the Internet of Things, March 2011, 1–4. Accessed 3 Feb 2017
  25. 25.
    Bagula, B.A.: Internet-of-Things and Big Data: Promises and Challenges for the Developing World, pp. 1–20. Accessed 3 Feb 2017
  26. 26.
    Liwei, R.: IoT Security: Problems, Challenges and Solution, pp. 1–32. Accessed 20 Jan 2017
  27. 27.
    Internet of Things (IoT) and Cyber Risk Insurance Mindtree. Accessed 12 June 2018

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.D.C.R.U.S.TMurthalIndia
  2. 2.Information Scientist at Central University of HaryanaMahendergarhIndia
  3. 3.D.C.R.U.S.TMurthalIndia

Personalised recommendations