Background
There has always seemed to be a widespread agreement between stakeholders in the industry on the security requirements of the IoT. Overall, IoT seems to need extra security above the existing systems where each and every aspect of smart objects is covered, however, what constitute good security is still a question that needs to be answered (Lu, 2014). Security depends on a number of factors such the data handled i.e. amount and even sensitivity. Moreover, factors such as the collection method and the cost of fixing the existing vulnerabilities also have to be considered which in the end outlines the challenges of IoT. Nevertheless, international standards and commissions encourage manufacturers and producers to adopt the best practices when developing the smart systems and things used for IoT (Ziegeldorf, Morchon & Wehrle, 2014).
Furthermore, the companies involved in the technology should incorporate security measures on the onset of production and not as an afterthought of production. This practice will increase the security of the products as well as integrate the privacy issues highlighted today, a step in the right direction. For instance, these companies can start by conducting security and privacy evaluations before producing the IoT products. Moreover, they can minimise the data which is collected and retained by the devices. Finally, they should conduct thorough tests before deploying the devices and objects in the industry. In addition to this, organisations should continuously sensitise its employees on the issues of security to increase the overall awareness. In the end, these procedures would substantially lower the security and privacy threats (FTC Staff Report, 2015).
IoT together with the concepts it embodies has been in operations since the 1990s when ICT experts started to envision an interconnected world. This vision as highlighted before has led to the connections seen today such IP networks and the predominant connection the internet. Nevertheless, IoT is a key concept that encapsulates components such as networks, sensors and actuators. In essence, the idea is very simple, connecting all devices and objects together so that they can share information thus facilitate a better quality of life (Internet society, 2015). For this to happen the technology takes advantage on the advancement of computer power, miniaturisation of electronics and the sophisticated network connections seen today. Furthermore, mobile technology and devices play a key role as they facilitate the best deployment of the technology by providing a platform where all components of IoT can be used while maintaining the overall benefits of convenience and efficiency (GSMA, 2014).
Overview of the Issues
Security and privacy issues in technology are not a new thing however, they are of high concern in IoT because it’s a new technology which presents many new challenges. For instance, data collection and retention in the devices used remains to a big challenge that must be addressed. In fact addressing these issues should be a priority unlike seen today where the rate of innovation supersedes the security and privacy requirements. Furthermore, IoT challenges are extremely complex owing to its extended connections that can potentially lead to security violation in case some devices are poorly secured (Internet society, 2015). Moreover, the mass production of homogenous devices, ability to connect devices automatically and the fielding of these devices in insecure environments predisposes them to many problems. Therefore, the security and privacy issues facing IoT are mostly as a result of the nature of the technology more so, its complexity.
Today’s trends seem to have laid the foundation for the IoT where among many other concepts, IPv6 is rapidly taking over the industry which means more devices will be able to be connected to the internet. However, one question still remains, does the internet have the capability to support billions of devices as currently estimated? In answering this question, one has to consider the complexity and dynamic nature of technology. When incorporated some of the devices used will have micro-protocols for networking and other functions which will increase the challenges (Fink, Zarzhitsky, Carroll & Farquhar, 2015).
Security issues: Most of the security issues associated with IoT are related to the manufacturers who as a result of their development procedures exposes the devices and the technology as a whole, to many security violations. Furthermore, the current world still faces the same challenges, however, the limited connections, as opposed to those of a full implemented IoT, helps mute the problems. Regardless, the issues still remain, when integrated faults in simple devices such as sensors in a home appliance will cause huge security threats. For instance, smart devices like the Amazon echo may have access to user’s private and confidential materials such as identification numbers among others. This device may lack vulnerabilities however the connected devices may have insufficient security protocols owing to its application but when connected through IoT will expose the entire network (Borgohain, Kumar & Sanyal, 2015).
Furthermore, consider the current application of encryption methods where people rarely use strong authentication and authorization procedures especially for their day to day applications so as it enhances convenience. IoT is overexposed by this leniency because of the extended connections. The same security problem is further aggravated in home networks where unlike in workplace environments the networks are never isolated which give intruders extended access in case they breach a single device. At home, a user may feel safe having established the best security protocols for their phones, laptops and even smart television only to be failed by the measures adopted on the refrigeration device (Seitz, 2017). In the end, the intruder can compromise this single and unexpected device causing many problems such as denial of service attack which are more dramatic in extended connections.
Scope of Engagement
In addition to this, the prevailing condition exposes the technology to many security violations. For one, the existing security systems are not able to secure extended networks, for instance, it’s still challenging to protect applications that are offered via the internet. These application or Softwares are continuously faced with challenges such as bugs among others. Moreover, there are other extended challenges that make it difficult to protect devices connected in an extended network, these includes; the limited experience of industrial stakeholders and disposable nature of most technological devices today. In essence, it’s easier to tamper with smart devices than to protect which further increases the security challenges involved (Kumar & Patel, 2014).
Privacy issues: Several experts in the industry have called for data minimization, a concept that advocates for less data collection and retention. In their proposal, these experts highlight the need for companies to reduce their data collection/retention endeavours to safeguard the privacy of the users. However, even then the existing systems continue to infringe on the rights of the users where data is overly exposed (Bannan, 2016). Consider the facilities that already exist in smart devices today, a smartphone has in its facilities such as geo-location and activation sensors. Geolocation can be used by some organisations such as insurance companies to collect data of their customers. Moreover, this collection is done without the consent of the users who rarely read their service agreement before agreeing to the terms.
On the other hand, activation sensors have been highlighted as a source of information where they are used to highlight the moods and behaviours of the users. Therefore, in the end, these devices will produce a lot of data that is collected and used for functions that are unknown to the user. Consider the prevailing trend of using fingerprints as authentication procedures for smart devices. These procedures are inherently connected to the service providers systems which raises the questions of where the data is stored and its functionality (Banafa, 2017).
Internet connectivity has offered an insight into the IoT where, as subscribers, we are heavily dependent on it to the extent its no longer an optional facility but a pre-requisite requirement. This outcome is evidenced by the processes or activities that today depend on it, for instance, e-commerce, a business venture that has taken over the world today(Seitz, 2017). In addition to this, business operations including data collection and analysis are facilitated by the internet. IoT, therefore, will have an even bigger foothold in the future since all devices and objects will be connected. Nevertheless, the issues faced by IoT seem to have had a direct effect on the users where public perception seems to have shifted more so, due to the cases of cyber terrorism and privacy concerns. Users now are more vigilant in investing in the technology which has slowed its implementation. Icontrol a research institution outlines that 44 percent of consumers today fear that their data might be stolen which causes them to take extra precaution (Meola, 2016).
Security Issues
On the other hand, while these risks and threats have deterred people from investing in smart systems they also have increased the awareness among users who now are more vigilant when handling new technologies. Unlike before, consumers are not only interested in the functionalities of a system but also on the security protocols in place. Moreover, they are keener to understand the measures put in place to safeguard their privacy. In response, the industry has improved its production procedures as observed with the countless studies and research in the fields of cybercrime and security in general (Hargrave, 2015). Therefore, the security and privacy threats facing IoT have awoken the industry a much-needed outcome for the future success of the technology.
Conclusion
As a result of the existing production systems, IoT led by smart technologies faces a lot of challenges related to the security and privacy of the users. Most of these challenges seem to evolve around the extended connectivity where unlike today are aggravated by the size of the concept. Malicious activities such cybercrime are controlled today because of the isolation seen in networks. However, in an event where advanced connections are implemented i.e. IoT, the result of these attacks will be catastrophic which in the end may cause the technology’s objectives to fail. The solutions? Well, the industry’s stakeholders (users and manufacturers) need to develop new measures to protect their systems. Similar to the advancement in technology, the affiliated security measures should also advance as well. Moreover, user’s contribution is critical as it will outline the needs of the customers whose privacy and security needs are in question.
References
Banafa. A. (2017). Internet of Things (IoT): Security, Privacy and Safety. Datafloq. Retrieved 16 May, 2017, from: https://datafloq.com/read/internet-of-things-iot-security-privacy-safety/948
Bannan. C. (2016). The IoT threat to privacy. Crunch network. Retrieved 16 May, 2017, from: https://techcrunch.com/2016/08/14/the-iot-threat-to-privacy/
Borgohain.T, Kumar. U & Sanyal. S. (2015). Survey of Security and Privacy Issues of Internet of Things. Research gate. Retrieved 17 May, 2017, from: https://www.researchgate.net/publication/270763270_Survey_of_Security_and_Privacy_Issues_of_Internet_of_Things
Fink. G, Zarzhitsky. D, Carroll. T & Farquhar. E. (2015). Security and privacy grand challenges for the internet of things. National security directorate, Pacific Northwest national laboratory Retrieved 17 May, 2017, from: https://cybersecurity.pnnl.gov/documents/security_and_privacy.pdf
FTC annual report. (2015). Internet of things privacy and security in a connected world. Retrieved 17 May, 2017, from: https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf
GSMA. (2014). Understanding the Internet of Things (IoT). GSM Association. Retrieved 17 May, 2017, from: https://www.gsma.com/iot/wp-content/uploads/2014/08/cl_iot_wp_07_14.pdf
Hargrave. S. (2015). How will the internet of things impact data security? Guardian Small Business Network. Retrieved 16 May, 2017, from: https://www.theguardian.com/small-business-network/2015/jul/30/internet-of-things-data-security
Internet society. (2015). The internet of things: An overview. Understanding the issues and challenges of a more connected world. Retrieved 17 May, 2017, from: https://www.internetsociety.org/sites/default/files/ISOC-IoT-Overview-20151014_0.pdf
Kumar. J & Patel. D. (2014). A survey on internet of things: Security and privacy issues. International journal of computer applications, 90(11). Retrieved 17 May, 2017, from: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.678.4896&rep=rep1&type=pdf
Lu. C. (2014). Overview of Security and Privacy Issues in the Internet of Things. Security and privacy issues in the Internet of Things. Retrieved 17 May, 2017, from: https://www.cse.wustl.edu/~jain/cse574-14/ftp/security.pdf
Meola. A. (2016). How the internet of things will affect security and privacy. Retrieved 16 May, 2017, from: https://www.businessinsider.com/internet-of-things-security-privacy-2016-8?IR=T
Seitz. L. (2017). Security and Privacy in the Internet of Things. ERCIM News. Retrieved 16 May, 2017, from: https://www.businessinsider.com/internet-of-things-security-privacy-2016-8?IR=T
Ziegeldorf. J, Morchon. O & Wehrle. K. (2014). Privacy in the Internet of Things:
Threats and Challenges. Security and Communication Networks. Retrieved 17 May, 2017, from: https://assets.documentcloud.org/documents/2822904/Ziegeldorf-Jan-Henrik-Privacy-in-the-Internet-of.pdf