Preview

Analysis Of The Internet Of Things: Usable Security And Privacy Issues

Powerful Essays
Open Document
Open Document
1164 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis Of The Internet Of Things: Usable Security And Privacy Issues
Internet of Things: Usable Security and Privacy Issues In the modern society, most of the things used in daily life are data-driven, and this has led to increased reliance on technology. Moreover, as advances are made in communication and semiconductor technologies, it has improved the connection of a multitude of devices over a network. Improved network connection promotes communication between humans and machines, and this new trend is referred to as the internet of everything, and within it contains the internet of things (Banerjee, Lee & Choo, 2017). Internet of things is a potent technology that allows for the making of everyday appliances smart. Ordinary appliances have now become part of the digital world. Nonetheless, every good thing …show more content…
Management of identity entails the recognition of an object whereas authentication is the validation of identity and the association between two parties (Maple, 2017). Authentication, within the internet of things, is a crucial aspect since poor authentication protocols would result in lack of integrity and confidentiality and compromised systems. Inferior authentication allows for an adversary to gain access to system’s data by posing as the legitimate user. Consequently, the adversary would be able to restrict the availability of data, delete or modify data, and can view data similar to the way a legitimate user can (Maple, …show more content…
The internet of things has enabled large quantities of data to be collected not only from consumers but from other entities such as organizations, groups, and citizens in general. Tracking the whereabouts of an individual may prove beneficial, in that they improve services, but these benefits need to be weighed against a person’s need for privacy. The internet of things functions in a distributed network with many types of technologies interconnected, and this produces weak links within a system which can be exploited by malicious entities. Weak links may create backdoors for individuals to engage in profiling activities, tracing, tracking, and mass surveillance (Elkhodr, Shahrestani & Cheung, 2016). A study by Hoh, Gruteser, Xiong, and Alrabady (2006) discovered that the presence of GPS systems and mobile devices had rendered anonymity in the present age obsolete. For example, if a person anonymizes their car GPS data, intruders can still infer a person’s location using their mobile

You May Also Find These Documents Helpful

  • Powerful Essays

    Fahrenheit 451 Predictions

    • 1949 Words
    • 8 Pages

    Social media allows the user to post or share information freely through the use of the internet, but information being shared every minute of every day is capable of being tracked even if the user does not personally share their location. In Fahrenheit 451, the hound was an accurate representation of a tracking device since it was able to track Montag’s location based on basic information. “The mechanical hound slept but did not sleep, lived but did not live in its gently humming, gently vibrating, softly illuminated kennel back in a dark corner of the firehouse” (24). The hound was always able to sense where Montag was at any given time even if Montag did not know he was being tracked. This being said, the role of the hound in Fahrenheit 451 could have been to represent another aspect Ray Bradbury had predicted of the future: how privacy and security will change. The present technology that is being used in today’s world has the ability of finding locations instantly or can unveil where people are located based on what they recently posted on the internet or social media. Therefore, some internet users are not fully aware nor are they well-educated about the internet’s capability of breaking through their wall of privacy. The Global Positioning System, also known as GPS, is a common aspect in technology in our current technical society, found in almost every…

    • 1949 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    This article focuses in how devices can transmits a consumer private information to third parties, and how consumers have little knowledge that their information is kept in databases to be sold. In 2020 most home devices will interconnected both wire and wireless to each other across a network, giving unlimited potential to create personal profiles…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unlike Big Brother, surveillance cameras are not there to prevent resistance against the government. Instead America promotes free-thinking and freedom of speech. Another device is our smartphones. Articles debate whether they are cellphones or just tracker devices for the federal government to watch. Yes, the government could actually use your cellphone to find out your location. Just like surveillance cameras, tracking devices are used to promote safety. Usually, the federal government would not prefer to track an individual if they have not been in the wrong. Instead, permitting your phone to allow their location services on will open doors to technology. Look what we can do now. We could ask a program to navigate us around an area, to find out what restaurants are around, and to explore the area. Going this far in technology has opened the world’s eyes to many possibilities, to make it feel that we are really living in the…

    • 523 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1984

    • 514 Words
    • 2 Pages

    Keeping pace with the ever evolving technological world, brings the idea of our personal information can be accessed by a weak firewall and breakable password. All these, however, also have a drawback in common they serve as locating devices for each and every one of us. Privacy has vanished. In George Orwell’s novel, 1984, Big Brother was a character of fiction. Yet he was able to oversee everything and virtually controlled the daily lives of millions of people. Now, as we advance technologically, the thought of Big Brother watching over us isn’t so far-fetched.…

    • 514 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Privacy is perhaps one of the most personal issues in today’s society. Privacy is an intensely personal issue, and perhaps not only to the right of the individual to dress the way he or she desires, worship in any way he chooses, but also to expect that those rights be protected by the government that upholds them. At one point or another, every individual in our society has asked the question, “Is privacy in the 21st Century possible?” The answer lies in the exploration of what privacy really means, and what privacy issues society faces in today’s modern, informational, and digital age of what we call the 21st Century.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    With technological advancements at its peak, the lack of privacy has become a rampant social and economic issue. Some citizens of the United States believe their lives are constantly monitored, compromising their privacy. In fact, “six out of ten Americans believe that it is not possible to go through daily life without having their data collected” (Pew Research Center). As government control progresses, the problem is assumed to continue to grow in power. While technology allows easier access to information and better communication, the backlash could be catastrophic.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    To this day, devices such as, smartphones, smart tvs, tablets and smart-cars are evolving making people's personal lives more susceptible to having personal information that is stored to go wide and easy to gain. This has become easier due to the access we that to the internet and the fact that more and more quantities of devices are beginning to require internet. This brings the issue up for law enforcement agencies to question whether the law enforcements should or should not be required for devices to have warrants. Individuals believe that they should not be required to have a warrant to search people’s privacy and information because people tend to put their information out in the open for others to observe and gives away their direct…

    • 1007 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Devices That Tell on You

    • 1737 Words
    • 6 Pages

    Personal sensing devices are becoming more commonplace in everyday life. Unfortunately, radio transmissions from these devices can create unexpected privacy concerns if not carefully designed. We demonstrate these issues with a widely-available commercial product, the Nike+iPod Sport Kit, which contains a sensor that users put in one of their shoes and a receiver that users attach to their iPod Nanos. Students and researchers from the University of Washington found out that the transmitter in a sneaker can be read up to 60 feet away. Through the use of a prototype surveillance system, the researchers could track someone wearing Nike+iPod sensors, plot their location on a GoogleMaps-based website and emai and text-messaging real-time surveillance data to anyone.…

    • 1737 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    the future of policing

    • 1084 Words
    • 4 Pages

    Of course there is a downfall of the GPS tracking system. Prisoners when released are issued a GPS ankle bracelet similar to a house arrest bracelet can cut the bracelet off when they are not physically being watched. When parolees’ deactivate the bracelet, officers respond and find the bracelet cut and the parolee is nowhere to be found. Of course the only way of capturing the parolee is if he/she commits another crime or is pulled over for a routine traffic stop. Now the U.S. Supreme Court for the first time limited police power to track people using GPS devices, ruling in a case that will shape the privacy rights Americans should expect from a new generation of wireless electronics. Today’s decision addresses the…

    • 1084 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    cell phone privacy

    • 814 Words
    • 4 Pages

    Secondly, GPS tracking is the biggest invasion of privacy on cell phones. This has increased through many court cases in the past years. “’ Awareness that the Government may be watching chills associational and expressive freedoms,’ wrote U.S. Supreme Court Justice Sonia Sotomayor in U.S. v. Jones, a 2012 case dealing with warrantless GPS tracking” (Bailey). This is a big issue because it was warrantless, and that is what many of the American people have a problem with. If there was a device that would be created to track your movements and find information about an individual, it would look very similar to a cell phone (Calabresi, Rogers, and Thornton). That cell phone has…

    • 814 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays