Skip to main content

Abstract

In the current era, Internet of Things (IoT) is facilitating ubiquitous and smart services to the users. IoT applications are widely increasing day by day in many fields such as healthcare, military, industries, agricultural and smart city. While, IoT application are facilitating smart services to provide comfortable living, many new issues also have emerged. Among the issues, data and user privacy is a serious issue to be considered on priority. To better understand privacy related parameters; we have presented a methodology of Privacy Threat Modeling along with Identification of the sensitive information in the Internet of Things. Then, An Adversary Model is described to clarify and comprehend the target attacks by the adversary in the architectural layers of the IoT ecosystem. A privacy risk map has been presented that will help to understand and fix priorities of the involved risk in IoT ecosystem. An IoT application called as Patient Data Provider “PDP" has been presented along with the discussion of the data privacy issues and challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bandyopadhyay, D., Sen, J.: Internet of Things: applications and challenges in technology and standardization. Wireless Pers. Commun. 58(1), 49–69 (2011)

    Article  Google Scholar 

  2. Batth, R.S., Nayyar, A., Nagpal, A.: Internet of robotic things: driving intelligent robotics of future-concept, architecture, applications and technologies. In: 2018 4th International Conference on Computing Sciences (ICCS), pp. 151–160. IEEE (2018)

    Google Scholar 

  3. Nayyar, A., Puri, V., Nguyen, N.G.: BioSenHealth 1.0: a novel internet of medical things (IoMT)-based patient health monitoring system. In: International Conference on Innovative Computing and Communications, pp. 155–164. Springer (2019)

    Google Scholar 

  4. Perera, C., Ranjan, R., Wang, L., Khan, S.U., Zomaya, A.Y.: Big data privacy in the Internet of Things era. IT Professional 17(3), 32–39 (2015)

    Article  Google Scholar 

  5. European Commission: Iot privacy, data protection, information security. http://ec.europa.eu/information_society/newsroom/cf/dae/document.cfm?doc_id=1753

  6. Weber, R.H.: Internet of Things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)

    Article  MathSciNet  Google Scholar 

  7. Porambage, P., Ylianttila, M., Schmitt, C., Kumar, P., Gurtov, A., Vasilakos, A.V.: The quest for privacy in the Internet of Things. IEEE Cloud Comput. 3(2), 36–45 (2016)

    Article  Google Scholar 

  8. Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed Internet of Things. Comput. Netw. 57(10), 2266–2279 (2013)

    Article  Google Scholar 

  9. Baker, F., et al.: Internet of Things (IoT) security and privacy recommendations, November 2016. https://www.bitag.org/documents/BITAG_Report_-_Internet_of_Things_(IoT)_Security_and_Privacy_Recommendations.pdf. Accessed 10 Oct 2018. 11:22 AM

  10. Radomirovic, S.: Towards a model for security and privacy in the Internet of Things. In: Proceedings of First International Workshop on Security of the Internet of Things (2010)

    Google Scholar 

  11. Ziegeldorf, J.H., Morchon, O.G., Wehrle, K.: Privacy in the Internet of Things: threats and challenges. Secur. Commun. Netw. 7(12), 2728–2742 (2014)

    Article  Google Scholar 

  12. Swiderski, F., Snyder, W.: Threat Modeling. Microsoft Press, Redmond (2003)

    Google Scholar 

  13. Gholami, A., Laure, E.: Advanced cloud privacy threat modeling. arXiv preprint arXiv:1601.01500 (2016)

  14. Li, Z., Xin, T.: Threat modeling and countermeasures study for the Internet of Things. J. Convergence Inf. Technol. 8(5), 1163–1171 (2013)

    Article  Google Scholar 

  15. Liang, H., Wu, D., Xu, J., Ma, H.: Survey on privacy protection of android devices. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 241–246. IEEE (2015)

    Google Scholar 

  16. CNIL: Methodology for privacy risk management (2012). https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=2ahUKEwjYv9_ho_ndAhUJurwKHdgOAn8QFjAAegQICBAC&url=https%3A%2F%2Fwww.cnil.fr%2Fsites%2Fdefault%2Ffiles%2Ftypo%2Fdocument%2FCNIL-ManagingPrivacyRisks-Methodology.pdf&usg=AOvVaw1ZpBEi2P0NGSe0mIJpvduH. Accessed 09 Oct 2018. 5:22 PM

  17. Miakotko, L.: The impact of smartphones and mobile devices on human health and life. New York University (2017). (Online Journal), Tersedia dari. https://www.nyu.edu/classes/keefer/waoe/miakotkol.pdf. Accessed 2 Oct 2018

  18. Canino, G., Scarpino, M., Cristiano, F., Mirarchi, D., Tradigo, G., Guzzi, P.H., Cuda, G., Veltri, P.: Geoblood: a web based tool for geo-analysis of biological data. Procedia Comput. Sci. 98, 473–478 (2016)

    Article  Google Scholar 

  19. Bhelkar, V., Shedge, D.: Different types of wearable sensors and health monitoring systems: a survey. In: 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 43–48. IEEE (2016)

    Google Scholar 

  20. Sharma, S., Tripathi, M., Mishra, V.: Survey paper on sensors for body area network in health care. In: 2017 International Conference on Emerging Trends in Computing and Communication Technologies (ICETCCT), pp. 1–6. IEEE (2017)

    Google Scholar 

  21. Kiourti, A., Shubair, R.M.: Implantable and ingestible sensors for wireless physiological monitoring: a review. In: 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, pp. 1677–1678. IEEE (2017)

    Google Scholar 

  22. Yuce, M.R., Dissanayake, T.: Easy-to-swallow antenna and propagation. IEEE Microw. Mag. 14(4), 74–82 (2013)

    Article  Google Scholar 

  23. Luis, J., Roa Romero, L., Gómez-Galán, J., Hernández, D., Estudillo-Valderrama, M., Barbarov-Rostán, G., Rubia-Marcos, C.: Design and implementation of a smart sensor for respiratory rate monitoring. Sensors 14(2), 3019–3032 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

This research work is supported by Maulana Azad National Fellowship formulated and funded by the Ministry of Minority Affairs. We wish to thank reviewers for their precious time.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shelendra Kumar Jain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jain, S.K., Kesswani, N. (2020). Privacy Threat Model for IoT. In: Nain, N., Vipparthi, S. (eds) 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019. ICIoTCT 2019. Advances in Intelligent Systems and Computing, vol 1122. Springer, Cham. https://doi.org/10.1007/978-3-030-39875-0_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-39875-0_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-39874-3

  • Online ISBN: 978-3-030-39875-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics