Security and Privacy in Internet of Things (IoT) Environments

Although the proliferation of IoT devices has led to unparalleled ease of use and accessibility, it has also raised serious privacy and safety issues. Using a systematic approach that incorporates security and privacy modelling, data analysis, and empirical trials, this study provides a deep dive in...

Full description

Saved in:
Bibliographic Details
Published in2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) pp. 1 - 6
Main Authors Bhoomadevi, A., Soundarraj, Prem latha, Gupta, Vishnu, Kumaravel, Sathish Kumar, Deivasigamani, Sudhakar, Kumar, Ankit
Format Conference Proceeding
LanguageEnglish
Published IEEE 04.04.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Although the proliferation of IoT devices has led to unparalleled ease of use and accessibility, it has also raised serious privacy and safety issues. Using a systematic approach that incorporates security and privacy modelling, data analysis, and empirical trials, this study provides a deep dive into the topic of IoT security and privacy. Our results show how crucial it is to take precautions against "Information Disclosure" by using strong encryption and authorization protocols. The need to protect against "Unencrypted Data" vulnerabilities is further emphasized by vulnerability analysis. Encryption (AES-256) and other access control rules fare very well in the assessment of security systems. Furthermore, "Homomorphic Encryption" is identified as a potential strategy to protecting user privacy while retaining data usefulness based on our review of privacy preservation strategies. A more secure and privacyaware IoT environment may be fostered thanks to the findings of this study, which have ramifications for the industry, government, consumers, and academics. Addressing the ever-evolving security and privacy issues in the IoT will need a future focus on cutting-edge security mechanisms, privacy-preserving technology, regulatory compliance, user-centric design, multidisciplinary cooperation, and threat intelligence sharing.
DOI:10.1109/ICONSTEM60960.2024.10568633