Preview

Analysis Of The Internet Of Things: Usable Security And Privacy Issues

Powerful Essays
Open Document
Open Document
1164 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis Of The Internet Of Things: Usable Security And Privacy Issues
Internet of Things: Usable Security and Privacy Issues In the modern society, most of the things used in daily life are data-driven, and this has led to increased reliance on technology. Moreover, as advances are made in communication and semiconductor technologies, it has improved the connection of a multitude of devices over a network. Improved network connection promotes communication between humans and machines, and this new trend is referred to as the internet of everything, and within it contains the internet of things (Banerjee, Lee & Choo, 2017). Internet of things is a potent technology that allows for the making of everyday appliances smart. Ordinary appliances have now become part of the digital world. Nonetheless, every good thing …show more content…
Management of identity entails the recognition of an object whereas authentication is the validation of identity and the association between two parties (Maple, 2017). Authentication, within the internet of things, is a crucial aspect since poor authentication protocols would result in lack of integrity and confidentiality and compromised systems. Inferior authentication allows for an adversary to gain access to system’s data by posing as the legitimate user. Consequently, the adversary would be able to restrict the availability of data, delete or modify data, and can view data similar to the way a legitimate user can (Maple, …show more content…
The internet of things has enabled large quantities of data to be collected not only from consumers but from other entities such as organizations, groups, and citizens in general. Tracking the whereabouts of an individual may prove beneficial, in that they improve services, but these benefits need to be weighed against a person’s need for privacy. The internet of things functions in a distributed network with many types of technologies interconnected, and this produces weak links within a system which can be exploited by malicious entities. Weak links may create backdoors for individuals to engage in profiling activities, tracing, tracking, and mass surveillance (Elkhodr, Shahrestani & Cheung, 2016). A study by Hoh, Gruteser, Xiong, and Alrabady (2006) discovered that the presence of GPS systems and mobile devices had rendered anonymity in the present age obsolete. For example, if a person anonymizes their car GPS data, intruders can still infer a person’s location using their mobile

You May Also Find These Documents Helpful

  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Fahrenheit 451 Predictions

    • 1949 Words
    • 8 Pages

    Social media allows the user to post or share information freely through the use of the internet, but information being shared every minute of every day is capable of being tracked even if the user does not personally share their location. In Fahrenheit 451, the hound was an accurate representation of a tracking device since it was able to track Montag’s location based on basic information. “The mechanical hound slept but did not sleep, lived but did not live in its gently humming, gently vibrating, softly illuminated kennel back in a dark corner of the firehouse” (24). The hound was always able to sense where Montag was at any given time even if Montag did not know he was being tracked. This being said, the role of the hound in Fahrenheit 451 could have been to represent another aspect Ray Bradbury had predicted of the future: how privacy and security will change. The present technology that is being used in today’s world has the ability of finding locations instantly or can unveil where people are located based on what they recently posted on the internet or social media. Therefore, some internet users are not fully aware nor are they well-educated about the internet’s capability of breaking through their wall of privacy. The Global Positioning System, also known as GPS, is a common aspect in technology in our current technical society, found in almost every…

    • 1949 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Privacy is perhaps one of the most personal issues in today’s society. Privacy is an intensely personal issue, and perhaps not only to the right of the individual to dress the way he or she desires, worship in any way he chooses, but also to expect that those rights be protected by the government that upholds them. At one point or another, every individual in our society has asked the question, “Is privacy in the 21st Century possible?” The answer lies in the exploration of what privacy really means, and what privacy issues society faces in today’s modern, informational, and digital age of what we call the 21st Century.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Unlike Big Brother, surveillance cameras are not there to prevent resistance against the government. Instead America promotes free-thinking and freedom of speech. Another device is our smartphones. Articles debate whether they are cellphones or just tracker devices for the federal government to watch. Yes, the government could actually use your cellphone to find out your location. Just like surveillance cameras, tracking devices are used to promote safety. Usually, the federal government would not prefer to track an individual if they have not been in the wrong. Instead, permitting your phone to allow their location services on will open doors to technology. Look what we can do now. We could ask a program to navigate us around an area, to find out what restaurants are around, and to explore the area. Going this far in technology has opened the world’s eyes to many possibilities, to make it feel that we are really living in the…

    • 523 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Devices That Tell on You

    • 1737 Words
    • 6 Pages

    Personal sensing devices are becoming more commonplace in everyday life. Unfortunately, radio transmissions from these devices can create unexpected privacy concerns if not carefully designed. We demonstrate these issues with a widely-available commercial product, the Nike+iPod Sport Kit, which contains a sensor that users put in one of their shoes and a receiver that users attach to their iPod Nanos. Students and researchers from the University of Washington found out that the transmitter in a sneaker can be read up to 60 feet away. Through the use of a prototype surveillance system, the researchers could track someone wearing Nike+iPod sensors, plot their location on a GoogleMaps-based website and emai and text-messaging real-time surveillance data to anyone.…

    • 1737 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    1984

    • 514 Words
    • 2 Pages

    Keeping pace with the ever evolving technological world, brings the idea of our personal information can be accessed by a weak firewall and breakable password. All these, however, also have a drawback in common they serve as locating devices for each and every one of us. Privacy has vanished. In George Orwell’s novel, 1984, Big Brother was a character of fiction. Yet he was able to oversee everything and virtually controlled the daily lives of millions of people. Now, as we advance technologically, the thought of Big Brother watching over us isn’t so far-fetched.…

    • 514 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    government tracking

    • 1009 Words
    • 5 Pages

    Do you know who is tracking your movements when your turn on your cell phone, or what is being done with that information? These are questions that I recently had to ask myself after reading two insightful articles. The first was by Ronald Bailey called “Your Cellphone is Spying on You” and the other was by Terry J. Allen entitled “Reach Out and Track Someone”. In Ronald Bailey’s article, he explores the use of cellular phone tracking technology by law enforcement and their recent attempts to expand the surveillance laws to include more use of cell phones to track users’ movements without their knowledge. In addition he gives us some perspective on the idea of a big brother watching over us by examining what a future built on limited privacy expectations might look like. Allen gives us his personal perspective on tracking technology and explores abuses that might arise if we continue down the current path. Both of these articles have given me insight into the use of tracking technology and make me question both the moral and legal ramifications of sharing information related to personal movement. There is in fact a moral and legal balance that satisfies the need to protect the privacy of law abiding citizens, prosecute criminals, and protect family and friends through the use of cell phone tracking all at the same time, and the name we give to that solution is the constitution.…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To this day, devices such as, smartphones, smart tvs, tablets and smart-cars are evolving making people's personal lives more susceptible to having personal information that is stored to go wide and easy to gain. This has become easier due to the access we that to the internet and the fact that more and more quantities of devices are beginning to require internet. This brings the issue up for law enforcement agencies to question whether the law enforcements should or should not be required for devices to have warrants. Individuals believe that they should not be required to have a warrant to search people’s privacy and information because people tend to put their information out in the open for others to observe and gives away their direct…

    • 1007 Words
    • 5 Pages
    Good Essays
  • Good Essays

    cell phone privacy

    • 814 Words
    • 4 Pages

    Secondly, GPS tracking is the biggest invasion of privacy on cell phones. This has increased through many court cases in the past years. “’ Awareness that the Government may be watching chills associational and expressive freedoms,’ wrote U.S. Supreme Court Justice Sonia Sotomayor in U.S. v. Jones, a 2012 case dealing with warrantless GPS tracking” (Bailey). This is a big issue because it was warrantless, and that is what many of the American people have a problem with. If there was a device that would be created to track your movements and find information about an individual, it would look very similar to a cell phone (Calabresi, Rogers, and Thornton). That cell phone has…

    • 814 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    the future of policing

    • 1084 Words
    • 4 Pages

    Of course there is a downfall of the GPS tracking system. Prisoners when released are issued a GPS ankle bracelet similar to a house arrest bracelet can cut the bracelet off when they are not physically being watched. When parolees’ deactivate the bracelet, officers respond and find the bracelet cut and the parolee is nowhere to be found. Of course the only way of capturing the parolee is if he/she commits another crime or is pulled over for a routine traffic stop. Now the U.S. Supreme Court for the first time limited police power to track people using GPS devices, ruling in a case that will shape the privacy rights Americans should expect from a new generation of wireless electronics. Today’s decision addresses the…

    • 1084 Words
    • 4 Pages
    Powerful Essays