Skip to main content

Enabling Consumer Trust Upon Acceptance of IoT Technologies Through Security and Privacy Model

  • Conference paper
  • First Online:
Advanced Multimedia and Ubiquitous Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 393))

Abstract

Internet of Things (IoT) has become a popular paradigm by digitizing our physical world, bringing appealing level of conveniences to community. Besides that consumers embrace potential IoT benefits to them, they are much more concerned about the security and privacy of their data. Since, the increased connectivity between devices and the internet in IoT presents security and privacy related challenges, and the data breach of sensitive personal information can be exploited to harm the consumers; the trust of these consumers on the IoT can be tampered. The success of IoT ultimately depends upon the consumer perceptions about security and privacy in IoT and the level of digital trust of its consumers. Since trust has been an important element to influence consumer’s behavior, thus, it can be stimulated by increased consumer perceptions of both security and privacy of IoT. In this paper we contribute to identify the evolving features of IoT and identify important security and privacy requirements from consumer perspectives. We propose a conceptual security and privacy model and highlighting important threats and challenges on various stages of this model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abowd GD, Dey AK, Brown PJ, Davies N, Smith M, Steggles P (1999) Towards a better understanding of context and context awareness. In: Proceedings of the 1st international symposium on handheld and ubiquitous computing, ser. HUC’99. London, UK; Springer-Verlag, pp 304–307

    Google Scholar 

  2. Atzori Luigi, Iera Antonio, Morabito Giacomo (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  MATH  Google Scholar 

  3. Mashal Ibrahim, Alsaryrah Osama, Chung Tein-Yaw, Yang Cheng-Zen, Kuo Wen-Hsing, Agrawal Dharma P (2015) Choices for interaction with things on Internet and underlying issues. Ad Hoc Netw 28:68–90

    Article  Google Scholar 

  4. Vermesan O, Friess P (2013) Internet of things: converging technologies for smart environments and integrated ecosystems, River Publishers

    Google Scholar 

  5. Evans D (2011) The internet of things how the next evolution of the internet is changing everything, CISCO White paper, Cisco Internet Business Solutions Group (IBSG), April 2011

    Google Scholar 

  6. Fortino G, Guerrieri A, Russo W, Savaglio C (2014) Internet of things based on smart objects

    Google Scholar 

  7. Atamli AW, Martin A (2014) Threat-based security analysis for the internet of things. In: Secure Internet of Things (SIoT), IEEE, pp 35–43

    Google Scholar 

  8. Gang GAN, Zeyong LU, Jun J (2011) Internet of things security analysis. In: Internet technology and applications (iTAP), IEEE, pp 1–4

    Google Scholar 

  9. Gazis V, Cordero CG, Vasilomanolakis E, Kikiras P, Wiesmaier A (2014) Security perspectives for collaborative data acquisition in the internet of things. In: International conference on safety and security in internet of things. Springer

    Google Scholar 

  10. Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279, July 2013

    Google Scholar 

  11. Sadeghi A-R, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial internet of things. In: Annual design automation conference, ACM, p 54

    Google Scholar 

  12. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164

    Google Scholar 

  13. Zhang Z-K, Cheng M, Cho Y, Shieh S (2015) Emerging security threats and countermeasures in IoT. In: ACM symposium on information, computer and communications security, ACM, pp 1–6

    Google Scholar 

  14. Hornyack P, Han S, Jung J, Schechter S, Wetherall D (2011) These aren’t the droids you’re looking for: retrofitting android to protect data from imperious applications. Proceedings of the 18th ACM conference on computer and communications security, CCS’11, ACM, pp. 639–652, doi:10.1145/2046707.2046780

  15. Khan WZ, Xiang Y, Aalsalem MY, Arshad Q (2013) Mobile phone sensing systems: a survey. Communications Surveys & Tutorials, IEEE 15(1): 402–427

    Google Scholar 

  16. Barcena MB, Wueest C (2015) Insecurity in the Internet of Things, Version 1.0 – 12 Mar 2015. [Online]. Available https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/insecurity-in-the-internet-of-things.pdf

  17. Internet of things, Privacy & Security in a Connected World, FTC staff report Jan 2015

    Google Scholar 

  18. Khan WZ, Khan M, Muhaya F, Aalsalem M, Chao H-C (2015) A comprehensive study of email spam botnet detection. Communications Surveys & Tutorials, IEEE 99

    Google Scholar 

  19. Sivaraman V, Gharakheili HH, Vishwanath A, Boreli R, Mehani O (2015) Network-level security and privacy control for smart-home IoT devices. In: Wireless and mobile computing, networking and communications (WiMob), 2015 IEEE 11th International Conference on, IEEE, pp. 163–167

    Google Scholar 

  20. Goodin D (2015) 9 baby monitors wide open to hacks that expose users’ most private moments [Online] http://arstechnica.com/security/2015/09/9-baby-monitors-wide-open-to-hacks-that-expose-users-most-private-moments/. Last visited 15 Dec 2015

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wazir Zada Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Khan, W.Z., Aalsalem, M.Y., Khan, M.K., Arshad, Q. (2016). Enabling Consumer Trust Upon Acceptance of IoT Technologies Through Security and Privacy Model. In: Park, J., Jin, H., Jeong, YS., Khan, M. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 393. Springer, Singapore. https://doi.org/10.1007/978-981-10-1536-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1536-6_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1535-9

  • Online ISBN: 978-981-10-1536-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics