‘Internet of things’ term has gained importance in the recent past. Though the concept is not that new as it is thought of this term has been coined by the researchers of industries. It is believed that internet of things will change the way of how computers are working today (Mitchell, 2016).
If seen the technical definition of the internet of things we can say that, it is a system that interlinks all the computing devices, all the mechanical as well as digital machines, any object or human beings or even the animals. Anything and everything that is present in the world with unique identifiers and also has the capability to transfer the data to a network without the need of having any human to human interaction or even without any interaction between human to a computer (Postscapes, 2017).
In the term Internet of Things, the thing can be anything, it can be a person that has a heart monitor implanted in him, or it can be an animal of any farm that has a biochip transponder attached to it, or it can be a vehicle that has built-in sensors attached to it that send alert messages to the driver related to any information regarding the vehicle, or the thing can be anything that is a natural object or is a man-made object that can be given an IP address and also has the capability of transferring any data over a network (Rouse, 2017).
It is simply connecting with so many devices on the internet, allowing other devices to connect with ourselves and letting them talk to us and with the other applications (The Guardian, 2015).
So, if said in simple words, it can be said that internet of things is a concept that mainly connects any device with simply on and off switch of the internet. It is a concept that has the ability and potential to impact the human life as well as has an impact on how the people work (Morgan, 2014).
Internet of thing has a great impact on everybody’s life. As the new concept of life is that “anything that can be connected will be connected.” Internet of things will make life easier and simpler to live in this world. It has the ability to develop the whole new smart cities that can take efforts towards reducing waste in the society as well as it can increase the efficiency of general things like energy use and many more things. And will help us to understand and make continuous improvement in our way of living as well as how we work. It has vast opportunities attached to it which are difficult for a human being to understand its impact today. But as we know anything that provides us with a great opportunity, attached to it comes greater challenges as well. The major challenge being the Security issue that is attached with internet of things. This is the main concern that arises in mind of people when one thinks or talks about the internet of things. It is a challenging task to secure the information when billions of devices are connected with each other. Even the organizations become more vulnerable to the threats attached to the internet of things. Privacy, as well as the issue of data sharing, is also one of the major concerns that are associated with the internet of things (Morgan, 2014).
The main impact of the internet of things in future will be on businesses though the changes will also be seen by the consumers but a major change is expected in the industries. It can also give a start to new business like the supporting companies that can manufacture new connecting devices, new security solutions, decision control system and many more. A lot of scope is there that internet of things is going to provide in future (Iyenger, 2016).
The internet of things in near future can do many new inventions like car driving itself, the computers talking like a human being and conducting every work by just mere conversation with it and will have skills that a normal person has and many more new things that a man have never imagined or even if they had imagined, they never have thought that this will come true one day (Wilson, 2016).
It is expected from the internet of things that it will cause miracles in the field of human efficiency, transportation as well as in the field of health care (Kavis, 2014). So, it can be said that the internet of things has significant ability to change the future of business, consumers, and each and everything to sum up the entire mankind will be impacted due to this. It is even going to have a financial impact as it is expected that it will be approximately about $30 billion by the year 2020 (Hope, 2016). The internet of things is seen to have a great potential that can have significant impact on the health sector, can help to develop new smart cities, have the ability to control pollution and even carry the activity of waste management efficiently in an effective manner, can give new heights to the businesses and change the way people are living today (Muhammed, 2016).
Today there are many objects that are connected to the internet and can communicate with the help of it. Internet has made people’s life very comfortable and easy to live but there are many challenges to maintain the security of today’s internet of things devices (Infosecinstitute, 2015). The main challenges that are related to security of internet of things are as follows:
Every device of internet of things has potential risk attached to it. It is very difficult for any organization to have control on these devices as well as to maintain the confidentiality of the data that has been collected and sent as well as to maintain the integrity of such data. Vulnerabilities are the weak points of any device or in any system which leaves a scope for the hackers to attack the system and misuse the data or any information that becomes open to him (Koien, 2015). Hackers always try to make use of these loopholes and enter into someone’s system by an unethical manner (Brandon, 2016).
The main loopholes in the internet of things devices are that some of them have poor encryption and have many backdoors that leave the possibility for unauthorized access by unethical hackers. And as the internet of things connects many devices to each other, one open device can give the opportunity to access hundreds and thousands of devices on the network which may have many serious consequences (Samani, 2014). The other vulnerabilities are also there like a poor design of the system at the initial stage and making use of plain simple text (Constantin, 2016).
Trust is the foundation stone of everything. The consumers also feel that way for their service providers and expect from them to continue their work in an ethical manner and keep rebuilding their trust in the organization (Jungo, 2015). Integrity is the most important component for any organization to maintain. It is the important one from confidentiality, integrity as well as availability (Ruubel, 2016). It is very difficult for any organization to find out the authenticity of the data that they have received from a number of sources of the internet of things. There are chances that the data that they have received are compromised or changed to a certain extent that can lead to a further mishap in the organization. There have been a number of cases in which the messages or information sent from the sender has been received by the receiver with some alterations. So, security designs need to be suitable for the devices of internet of things as well as the systems that can create trust in the hardware as well as in the data and also maintain the integrity of such information (Samani, 2014). Any kind of breach of the data integrity will leave an impression that the internet of things device is not able to perform its task correctly as expected, and even have the potential to bring out about the device and make it vulnerable to further attack (Baker, 2017).
The main aim of internet of things is to improve the lives of people, increase efficiency, make life easier and also to increase the productivity of the organization as well as increase the efficiency of the employees (Samani, 2014). There are too much data available on the internet, there are many unwanted public profiles, and a lot more privacy issues are there that are related to internet of things, and this can have a negative impact on the consumer’s confidence (Meola, 2016). The data that internet of things provide helps the people to make smarter decisions. But the main issue here is the privacy of information. The people expect the organizations as well as the government organizations to maintain the privacy of their personal information safeguard it. Today the cases of cyber-attacks are at its peak, the hackers are able to access person’s information and even misuse that information (Samani, 2014). Financial account details, details related to personal health, and much more sensitive information become vulnerable to risks if any loophole is found (FTC, 2015). A recent research work conducted by French Technology Institute Eurecom was able to discover nearly 38 vulnerabilities from a bunch of 123 products of internet of things so the ratio is quite large and worrisome (Elvia, 2017). To quote Bill Gates, even he said that earlier it was difficult to find any information but as the world is becoming more digitized, there is a need to have more stringent rules to protect this information (Pollack, 2016).
As more and more devices are being connected, the need to have a future strategy for proper handling of so many devices and data’s attached to it is required (Williams, 2017). It is very difficult to gauge the scope of risk attached to this and to know that how quick can an attack spread in the whole system (Dix, 2015).
The system of internet of things is very complex and this is the main reason that there can be many chances of loopholes in the system at any stage and this can spread further if not checked at the initial stage. The main thing to consider is that a number of ecosystems are working all around at the same time and each ecosystem has its own security implications.
By looking at the above image, the first question that will come in anyone’s mind is that what is the security of the nest device? Or what is the security of the nest service itself? As it can be seen from the image, the nest service other than interacting with itself also interacts with the other services like that of Apple and Google. So, it can be said that usually, the user without going through so many pages of license agreements tend to believe that the internet of things system is secure and expects that the security is ensured.
Expectation of security: The users believe that only the service provider has access to the device connected to their home or to the organizations and they feel secure with the generated user id and password. Even if people come to know about the fact that there is a device on their home network that has the potential to get hacked easily, they do not take any action and remain under the impression that this will not affect the other devices connected to the home network. The people even expect that the service providers will always keep a check on the updates available related to any applications that are used by their service. These services include any kind of web based services and majorly those applications that make use of other internet of things devices for maintaining control, for example any android based phone or any iPhone. The security status of the control devices is the main issue in front of the internet of things service provider as well as in front of the user. It is very essential that all the applications are kept updated to keep a check on the security aspect of the internet of things. Let’s say if there is a security issue in an android phone. This may allow the hackers to attack the phone through that loophole and this may further weaken the secure protocol, this may enable the hacker to have access to the information collected by that specific device of the internet of things. The users of such application usually expect from the manufactures of such applications as well as from the service providers of the internet of things that they will secure their network and keep the applications updated. The other major issue that concerns the most is the chances of these devices that are designed to collect the login information and other credentials of the user’s right at the initial stage. There are a lot of hacking devices that can be connected to the device of the internet of things and through wireless activity the information can easily be transported to their main leader and this information can be used in any manner by the hackers. These hacking devices can be connected into the supply chain and further distribution can take place to hundreds of computers or any device of any house or of an organization. This can lead to identity theft as well as hacking of the users of internet of things information. What the hacker can do is that after hacking a specific device he will create many similar functioning devices.
The other main issue that is linked with the security issue is the;
Confidentiality, integrity and availability issue: Users expect confidentiality from the service providers when they use their system. The users think that the information that has been provided to the service provider will be kept to the service provider only. But, this is not the case if one will read the whole license agreement with patience. The person will come to know that there is a clause mentioned in the license agreement that reads that the internet of things service provider can use the user’s information in any manner he wants or he can even sell the information to any data aggregator that can relate to another level of monetization. This is very common for the internet of things service providers and this even earns most of the revenues of the internet company. To site one example related to this, it can be said that if a person has browsed a website for bean bags. In the coming few days that person will see advertisements related to bean bags on every website that he opens. Though there is no such confidentiality that is expected in case of bean bags but this can give a start that many further significant issues that will be of major concern. It is even important to know the integrity of the data that has been sent or received by any one. Another major thing related to security is the systems availability. The ability that the systems have in order to defend against the denial of service attacks is also a major concern as this can affect the whole chain of systems that is inter-dependent. This is a major concern as recently people have seen many cases like this, the famous ones being the attacks on the Sony’s PlayStation network system and the other major attack on the Microsoft’s Xbox Live show which was attacked by a small group of unethical hackers. This does not only limit its attack to game play section but also it had an impact on the gaming consoles ability which was able to buy and also watch movies. This was a very important issue and has put a question mark on the security of internet of things as these companies are very old in the market and these companies suffered due to vulnerability in its system.
Consumer awareness: consumers are usually so much involved in using this internet of things that they tend to ignore the fact that is all this safe and secure? Is our privacy not at stake? (Lazarte, 2016). The users have no awareness among them about the impact that is associated with the internet of things devices can have within their homes. The major factors related to this are the assumptions that internet of things services that are provided and the concern of its security is someone else’s responsibility. The compromise that takes place regarding the several user ids and passwords as well as the credit cards information against very few cases of hacking that have taken place ruins reputations. The other issue is the government’s messages that name this cyber-attacks under the term cyber vandalism as it creates a sense of confusion among the people. Because of these confusing remarks from the government, the consumers are not able to detect the potential impacts that are related to the increasing use of internet of things devices and services.
Liability: from the development of the user license agreement these internet providers have always tried to manage themselves anyhow harmless from the issue of any damage that has been caused due to the use of their equipments. Today we are using this internet of things devices at our own risk. Though these agreements were specific and were related to majorly devices that were having logical impact on people’s lives, for example, any lost email or any kind of corrupted files etc. But this is not going to sustain longer as there are now cases related to committing illegal surveillance that is today giving a new dimension to the concept of stalking. And within no time this issue of surveillance by internet of things will even reach the devices of internet of things that are there in the houses. Though there are only very few cases we have come across and this kind of stalking at home by people will not take much time to spread like fire in the forest.
So, it is on the part of the manufacturers of the internet of things to develop the security of the devices as well as services properly as one cannot expect from the consumers to be a technical experts and deal with the security issues on its own. It should not be expected by the users to take any action for making up the security flaws (Folk, et al., 2015).
According to the Gartner’s forecast which was published in May 2014 regarding the internet of things there are some of the security challenges related to internet of things and these are
To build security, one need to adopt multi- layer approach as only one single control system cannot help to build security in the entire system or device of internet of things. Security is an issue that can be checked and should be addressed throughout the entire lifecycle of the services or the devices of internet of things. Starting from the initial design of the device to the stage of its placement in the operational environment.
Conclusion
Internet of things has spread it wings more than anyone would have ever thought of, all the necessary technological advances have already been made in its field (Google, 2017). But, as we know that there is an increasing tendency of cyber-attacks in the future, the main efforts that the companies are taking today is to mitigate these issues though complete eradication is near to impossible as there are experts that make new inventions and the experts only find some loophole to enter into the new inventions so total eradication is difficult but the organizations are trying best to reduce these cases and if any such attack occurs then they try to reduce the impact of those attacks by keeping it limited and solving the issue as soon as they find out (Infosecinstitute, 2015). Security is very essential for the internet of things and the security should be maintained at every stage and should not be only limited to financial transactions matter (Jha & Sunil, 2014).
References
Baker, A., 2017. Maintaining data integrity in Internet of Things applications. [Online] Available at: https://files.iccmedia.com/pdf/windriver160823.pdf [Accessed 25 may 2017].
Brandon, J., 2016. Security concerns rising for Internet of Things devices. [Online] Available at: https://www.csoonline.com/article/3077537/internet-of-things/security-concerns-rising-for-internet-of-things-devices.html[Accessed 25 may 2017].
Constantin, L., 2016. Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON. [Online] Available at: https://www.csoonline.com/article/3119765/security/hackers-found-47-new-vulnerabilities-in-23-iot-devices-at-def-con.html
[Accessed 25 may 2017].
Dix, J., 2015. The security implications of IoT: A roundtable discussion with four experts. [Online] Available at: https://www.networkworld.com/article/2881754/internet-of-things/the-security-implications-of-iot-a-roundtable-discussion-with-four-experts.html [Accessed 25 May 2017].
Elvia, 2017. Internet of Things Security and Privacy Challenges. [Online] Available at: https://reolink.com/internet-of-things-security-privacy-challenges/[Accessed 25 may 2017].
Folk, C., Hurley, D. C., Kaplow, W. K. & Payne, J. F. X., 2015. The Security Implications. [Online] Available at: https://www.afcea.org/committees/cyber/documents/InternetofThingsFINAL.pdf[Accessed 24 May 2017].
FTC, 2015. Internet of Things. [Online] Available at: https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf[Accessed 25 may 2017].
Google, 2017. Internet of Things. [Online] Available at: https://sites.google.com/site/netothings/home/honor-code-statement/introductio-1/potential-benefits/legal-and-ethical-issues/security-concerns/social-problems/further-research/conclusion
[Accessed 25 May 2017].
Hajdarbegovic, N., 2017. Are We Creating An Insecure Internet of Things (IoT)? Security Challenges and Concerns2017. [Online]
Available at: https://www.toptal.com/it/are-we-creating-an-insecure-internet-of-things[Accessed 24 May 2017].
Hope, J., 2016. Understanding the Internet of Things and Its Impact. [Online] Available at: https://www.digitaldoughnut.com/articles/2016/april/understanding-the-internet-of-things-and-its-impac[Accessed 25 may 2017].
Infosecinstitute, 2015. Security Challenges in the Internet of Things (IoT). [Online] Available at: https://resources.infosecinstitute.com/security-challenges-in-the-internet-of-things-iot/#gref[Accessed 25 May 2017].
Infosecinstitute, 2015. The Emergence of IoT: Is Security a Concern?. [Online] Available at: https://resources.infosecinstitute.com/the-emergence-of-iot-is-security-a-concern/#gref[Accessed 25 may 2017].
Iyenger, S., 2016. The impact of the internet of things in 2026. [Online] Available at: https://data-informed.com/the-impact-of-the-internet-of-things-in-2026/[Accessed 25 May 2017].
Jha, A. & Sunil, M. C., 2014. Security considerations for internet of things. [Online] Available at: https://www.lnttechservices.com/media/30090/whitepaper_security-considerations-for-internet-of-things.pdf[Accessed 25 May 2017].
Jungo, C., 2015. Integrity and trust in the Internet of Things. [Online] Available at: https://www.swisscom.ch/content/dam/swisscom/en/about/responsibility/digital-switzerland/security/documents/integrity-and-trust-in-the-internet-of-things.pdf.res/integrity-and-trust-in-the-internet-of-things.pdf.[Accessed 25 may 2017].
Kavis, M., 2014. Don’t Underestimate The Impact Of The Internet Of Things. [Online] Available at: https://www.forbes.com/sites/mikekavis/2014/07/21/dont-underestimate-the-impact-of-the-internet-of-things/#65ec4bdb1baa[Accessed 25 may 2017].
Koien, M. A. a. G. M., 2015. Cyber Security and the Internet of Things:Vulnerabilities, Threats, Intruders and Attacks. Journal of Cyber Security, 4(River Publishers), pp. 65-88.
Lazarte, M., 2016. Are we safe in the Internet of Things?. [Online] Available at: https://www.iso.org/news/2016/09/Ref2113.html
[Accessed 25 May 2017].
Meola, A., 2016. How the Internet of Things will affect security & privacy. [Online] Available at: https://www.businessinsider.com/internet-of-things-security-privacy-2016-8?IR=T[Accessed 25 may 2017].
Mitchell, B., 2016. Introduction to the Internet of Things (IoT). [Online] Available at: https://www.lifewire.com/introduction-to-the-internet-of-things-817766[Accessed 24 may 2017].
Morgan, J., 2014. A Simple Explanation Of ‘The Internet Of Things’. [Online] Available at: https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#103c31201d09[Accessed 24 May 2017].
Muhammed, A., 2016. 5 Ways the Internet of Things Impacts Your Daily Life. [Online] Available at: https://www.business2community.com/big-data/5-ways-internet-things-impacts-daily-life-01447717#TAyzEdEHYIVLe451.97
[Accessed 25 may 2017].
Pollack, D., 2016. Internet of Things Makes Big Data Even Bigger (And Riskier). [Online] Available at: https://www2.idexpertscorp.com/blog/single/internet-of-things-makes-big-data-even-bigger-and-riskier[Accessed 25 may 2017].
Postscapes, 2017. Best Internet of Things Definition. [Online] Available at: https://www.postscapes.com/internet-of-things-definition/
[Accessed 25 may 2017].
Rossi, B., 2016. 4 unexpected implications arising from the Internet of Things – Gartner. [Online] Available at: https://www.information-age.com/4-unexpected-implications-arising-internet-things-gartner-123460779/[Accessed 25 May 2017].
Rouse, M., 2017. Internet of Things. [Online] Available at: https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT[Accessed 24 may 2017].
Ruubel, M., 2016. Privacy and Integrity on the Internet of Things. If all you have is a PKI hammer…. [Online] Available at: https://guardtime.com/blog/privacy-and-integrity-on-the-internet-of-things-if-all-you-have-is-a-pki-hammer-dot-dot-dot
[Accessed 25 may 2017].
Samani, R., 2014. 3 key security challenges for the Internet of Things. [Online] Available at: https://securingtomorrow.mcafee.com/business/3-key-security-challenges-internet-things/[Accessed 24 may 2017].
The Guardian, 2015. What is the internet of things?. [Online] Available at: https://www.theguardian.com/technology/2015/may/06/what-is-the-internet-of-things-google[Accessed 25 may 2017].
Williams, L., 2017. Implications of the Internet of Things. [Online] Available at: https://blog.externetworks.com/implications-of-the-internet-of-things/?MTS[Accessed 25 May 2017].
Wilson, N., 2016. How Will the Internet of Things Impact Everything?. [Online] Available at: https://www.govtech.com/fs/internet/How-Will-the-Internet-of-Everything-Impact-Everything.html[Accessed 25 may 2017].
Windriver, 2017. Security in the Internet of Things. [Online] Available at: https://www.windriver.com/whitepapers/security-in-the-internet-of-things/wr_security-in-the-internet-of-things.pdf
[Accessed 24 May 2017].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download