Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/5960
Title: Security breaches on individual's privacy via internet of things
Authors: Ahamad Sabani, M. J.
Shafana, M. S.
Zisath Shama, L. F.
Keywords: Data Security
IoT
IoT collaborative technologies
IoT devices
Privacy issues
Issue Date: Dec-2021
Publisher: Faculty of Arts and Culture, South Eastern University of Sri Lanka, University Park, Oluvil.
Citation: KALAM – International Journal Faculty of Arts and Culture, South Eastern University of Sri Lanka. 14(4), 2021: pp.33-39.
Abstract: The Internet of Things is an organized structure of objects which are able to interact between themselves. IoT mainly resides in data collection and collaborates with several technologies and entered deeply in daily human life Moreover, it requires cloud computing services, robust internetwork connectivity, secure data storage, processing, and analytics for enhanced advantages. IoT connects the devices using mostly Wi-Fi networks and sensors. An analytic survey says that in IoT, the number of connected devices is growing each year significantly. In the sense of data collection, there are some risks and threats to an individual’s privacy. Security and privacy are primary elements to be considered in IoT. Through this study, some significant themes of privacy were identified related to gathering personal information through IoT technology such as unauthorized surveillance, inadequate authentication, information security risks, and uncontrolled data generation and usage. Reduction of privacy is unavoidable with IoT technology because of the increased collection of data, which causes some issues for each individual such as spying, information diffusion, disclosure of the collected sensitive data, problems of security, and hacking of the gathered data. These kinds of security problems can be sorted out by providing secure logins to increase the individual’s trust of IoT technology, by developing and establishing the individual’s anonymity for effective use, by using encryption techniques, by implementing adequate security protocols for sensor use.
URI: http://ir.lib.seu.ac.lk/handle/123456789/5960
ISSN: 1391-6815
2738-2214
Appears in Collections:Volume 14 Issue 4

Files in This Item:
File Description SizeFormat 
K2021_ISSUE-4 (33-39).pdf680.81 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.