Abstract
Internet of Things (IoT) has become a popular paradigm by digitizing our physical world, bringing appealing level of conveniences to community. Besides that consumers embrace potential IoT benefits to them, they are much more concerned about the security and privacy of their data. Since, the increased connectivity between devices and the internet in IoT presents security and privacy related challenges, and the data breach of sensitive personal information can be exploited to harm the consumers; the trust of these consumers on the IoT can be tampered. The success of IoT ultimately depends upon the consumer perceptions about security and privacy in IoT and the level of digital trust of its consumers. Since trust has been an important element to influence consumer’s behavior, thus, it can be stimulated by increased consumer perceptions of both security and privacy of IoT. In this paper we contribute to identify the evolving features of IoT and identify important security and privacy requirements from consumer perspectives. We propose a conceptual security and privacy model and highlighting important threats and challenges on various stages of this model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abowd GD, Dey AK, Brown PJ, Davies N, Smith M, Steggles P (1999) Towards a better understanding of context and context awareness. In: Proceedings of the 1st international symposium on handheld and ubiquitous computing, ser. HUC’99. London, UK; Springer-Verlag, pp 304–307
Atzori Luigi, Iera Antonio, Morabito Giacomo (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Mashal Ibrahim, Alsaryrah Osama, Chung Tein-Yaw, Yang Cheng-Zen, Kuo Wen-Hsing, Agrawal Dharma P (2015) Choices for interaction with things on Internet and underlying issues. Ad Hoc Netw 28:68–90
Vermesan O, Friess P (2013) Internet of things: converging technologies for smart environments and integrated ecosystems, River Publishers
Evans D (2011) The internet of things how the next evolution of the internet is changing everything, CISCO White paper, Cisco Internet Business Solutions Group (IBSG), April 2011
Fortino G, Guerrieri A, Russo W, Savaglio C (2014) Internet of things based on smart objects
Atamli AW, Martin A (2014) Threat-based security analysis for the internet of things. In: Secure Internet of Things (SIoT), IEEE, pp 35–43
Gang GAN, Zeyong LU, Jun J (2011) Internet of things security analysis. In: Internet technology and applications (iTAP), IEEE, pp 1–4
Gazis V, Cordero CG, Vasilomanolakis E, Kikiras P, Wiesmaier A (2014) Security perspectives for collaborative data acquisition in the internet of things. In: International conference on safety and security in internet of things. Springer
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279, July 2013
Sadeghi A-R, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial internet of things. In: Annual design automation conference, ACM, p 54
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164
Zhang Z-K, Cheng M, Cho Y, Shieh S (2015) Emerging security threats and countermeasures in IoT. In: ACM symposium on information, computer and communications security, ACM, pp 1–6
Hornyack P, Han S, Jung J, Schechter S, Wetherall D (2011) These aren’t the droids you’re looking for: retrofitting android to protect data from imperious applications. Proceedings of the 18th ACM conference on computer and communications security, CCS’11, ACM, pp. 639–652, doi:10.1145/2046707.2046780
Khan WZ, Xiang Y, Aalsalem MY, Arshad Q (2013) Mobile phone sensing systems: a survey. Communications Surveys & Tutorials, IEEE 15(1): 402–427
Barcena MB, Wueest C (2015) Insecurity in the Internet of Things, Version 1.0 – 12 Mar 2015. [Online]. Available https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/insecurity-in-the-internet-of-things.pdf
Internet of things, Privacy & Security in a Connected World, FTC staff report Jan 2015
Khan WZ, Khan M, Muhaya F, Aalsalem M, Chao H-C (2015) A comprehensive study of email spam botnet detection. Communications Surveys & Tutorials, IEEE 99
Sivaraman V, Gharakheili HH, Vishwanath A, Boreli R, Mehani O (2015) Network-level security and privacy control for smart-home IoT devices. In: Wireless and mobile computing, networking and communications (WiMob), 2015 IEEE 11th International Conference on, IEEE, pp. 163–167
Goodin D (2015) 9 baby monitors wide open to hacks that expose users’ most private moments [Online] http://arstechnica.com/security/2015/09/9-baby-monitors-wide-open-to-hacks-that-expose-users-most-private-moments/. Last visited 15 Dec 2015
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Khan, W.Z., Aalsalem, M.Y., Khan, M.K., Arshad, Q. (2016). Enabling Consumer Trust Upon Acceptance of IoT Technologies Through Security and Privacy Model. In: Park, J., Jin, H., Jeong, YS., Khan, M. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 393. Springer, Singapore. https://doi.org/10.1007/978-981-10-1536-6_15
Download citation
DOI: https://doi.org/10.1007/978-981-10-1536-6_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1535-9
Online ISBN: 978-981-10-1536-6
eBook Packages: Computer ScienceComputer Science (R0)