Mohon tunggu...
Nezi Tzuu
Nezi Tzuu Mohon Tunggu... Lainnya - Belum

-

Selanjutnya

Tutup

Pendidikan

Internet of Things (IoT): Challenges in Privacy and Security

26 Desember 2024   11:23 Diperbarui: 26 Desember 2024   11:20 43
+
Laporkan Konten
Laporkan Akun
Kompasiana adalah platform blog. Konten ini menjadi tanggung jawab bloger dan tidak mewakili pandangan redaksi Kompas.
Lihat foto
Pendidikan. Sumber ilustrasi: PEXELS/McElspeth

The Internet of Things (IoT) which is the connection of devices around us and sharing of information over the internet is a revolutionary concept. IoT devices are very helpful and innovative and can be found in all walks of life such as fitness trackers, health monitors, industrial machinery and even automobiles. However, there are important privacy and security issues arising from this connection which cannot be overlooked.

Privacy Challenges

Comprehensive Data Gathering. In the recent past, there has been a huge creation of data in regards to environmental, behavioral and personal data through the use of IoT devices. Google Nest and Amazon Echo are some of the smart home devices that capture user's preferences, activities, and even voice recordings. Other personal information including information on the individual's health is also collected through wearable fitness devices. Such practices raise a number of concerns on the extent of surveillance as well as the potential for misuse given this constant collection of data.

Insufficient User Control. Due to the fact that the interfaces of most of the IoT devices are limited, consumers may not be able to control or even see what kind of data is being collected and shared. For instance, a smart refrigerator may be tracking consumption patterns without allowing consumers to opt out of the data collection This lack of transparency therefore poses a huge imbalance between the people and the companies creating the technologies.

Data Exploitation. Such data generated by the third parties IoT without informing also getting users' data. Such data is valuable and may these result into intrusive either targeted advertising, sold by differential treatment companies or any other form of unethical use. For example, insurance organizations may leverage the information gathered individuals' on health or driving habits to set premiums arbitrarily.

Geolocation. It is also one of the activities that can be performed by many IoT devices like the GPS watch, smart cameras, and trackers for cars that provide real time location information. This data can be obtained by unauthorized persons and used in a way that violates the privacy of individuals, for example, for stalking or monitoring of people's movements.

Security Challenges

Weak Security Protocols. Due to cost constraints and the rush to market, many IoT devices are manufactured with minimal security features. Some of the common vulnerabilities include using default passwords, not updating firmware and using unencrypted protocols. These are some of the areas that cyber-criminals use to gain easy access into systems.

Botnet Attacks. IoT devices are very often used in botnet attacks. In 2016, the Mirai botnet targeted those IoT devices that were easily hackable and used them to launch distributed denial of service (DDoS) attacks that affected many big websites and services. Such incidents reveal how vulnerable devices can be in the hands of cyber criminals to multiply the threats on the global level.

Physical Security Risks. Sometimes the security of IoT can be tampered with and this goes beyond the digital aspect to the physical aspect. For instance, it is possible to hack smart locks and gain entry into houses, while hacking of medical IoT devices like insulin pumps or pacemakers is dangerous.

Cross-Device Vulnerabilities. This means that the IoT devices are usually connected and these devices can be interconnected. This means that a vulnerability in one device can be used to gain entry into the entire network thus increasing the chances of an attack. This means that the IoT devices are usually connected and these devices can be interconnected. This means that a vulnerability in one device can be used to gain entry into the entire network thus increasing the chances of an attack.

Industrial IoT risks. When IoT devices are hacked in the industrial environment, then it creates an issue with the important infrastructure like energy grid, transportation system, and manufacturing plant. Such disruptions can have severe consequences on economies as well as the safety of the general public.

Ethical Consideration

There are several concerns that arise from the adoption of IoT technologies. One of the biggest concerns is that of algorithmic bias particularly in systems that incorporate AI into their operations. This paper focuses on the dangers of biases in IoT systems that are built with AI capabilities. For instance, smart security cameras with facial recognition may misidentify individuals since the technology is based on data that also holds biases.

Another issue is the absence of informed consent in data collection. The majority of the IoT devices that are available in the market are found to collect data without even informing the user thus raising some ethical questions on informed consent and user's autonomy. For example, smart TVs may be tuning in to people's viewing habits without them knowing it.

The digital divide also becomes an issue in the ethical consideration of IoT. This means that the ethical issues regarding the use of IoT. IoT technologies' development and integration are uneven; this intensifies the gap between those with access to technology and those without. While the societies with high income can enjoy the advanced IoT applications, the societies with low income cannot afford such technologies and may lead to increase in the social inequalities.

Addressing the Challenges

1.Regulatory Frameworks

To ensure protection of data and security of the governments and other international organizations need to come up with certain set of rules. The European Union's General Data Protection Regulation (GDPR) provides a model on how to protect the privacy and security of IoT users. Other laws like the California Consumer Privacy Act (CCPA) should be implemented across the globe to reduce risks.

2.Security-by-Design Principles

To ensure protection of data and security of the governments and other international organizations need to come up with certain set of rules. The European Union's General Data Protection Regulation (GDPR) provides a model on how to protect the privacy and security of IoT users. Other laws like the California Consumer Privacy Act (CCPA) should be implemented across the globe to reduce risks.

3.User Education and Empowerment

It is therefore important to raise awareness of the users on the risks of IoT. A few steps, including the change of passwords, unavailability of certain features, and frequent updating of devices, can be helpful in enhancing security. Also, standard and easily understood privacy policies can also help to build trust in the users.

4.Collaborative Efforts

In order to address the challenges of IoT, its stakeholders who include the manufacturers, governments, cybersecurity firms and consumers need to come together. These could be backed up by industry norms, for instance, the IoT Cybersecurity Improvement Act that was approved in the United States recently.

5.Advanced Security Technologies

Other technologies like artificial intelligence in detecting the anomalies and blockchain in improving the security of transactions can also improve the security of IoT. This is because AI can be used in identifying and addressing threats in real time while blockchain ensures that data transfer is safe and trustworthy.

6.Ethical Frameworks

Such considerations should be made while developing and implementing the IoT technologies in the society. This involves identifying and minimizing biases in AI, ensuring that data is handled appropriately, and making sure that the benefits of IoT are equally available to all.

Future Directions

1.Standardization Efforts: It is possible to establish certain guidelines to follow with regards to the security of the IoT and its interoperability in order to assist in the problem-solving process. The International Organization for Standardization (ISO) is currently developing guidelines on the use of IoT.

2.Integration of Quantum Technologies: With the advancement of quantum computing, it has the possibility of enhancing the security of IoTs through quantum encryption which offers uncrackable form of encryption.

3.Sustainable IoT Development: The social effects of the IoT devices such as energy usage and e-waste cannot be ignored either. Creating energy-efficient devices and encouraging their recycling are among the most important aspects of the sustainable use of the IoT.

Conclusions

Thus, the Internet of Things has the power to change the industries and improve people's lives, however, it has demonstrated that there are many privacy and security issues regarding its implementation. To solve such challenges, there is a need to take a holistic approach whereby there are proper legislations, ethical manufacturing, aware consumers, and technological advancement. This paper has identified some of the challenges that have been faced in the implementation of IoT and how these challenges can be addressed through collaboration of all the stakeholders in order to achieve progress while at the same time protecting the rights of an individual and the society.

References

Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2014). Context aware computing for the internet of things: A survey. IEEE Communications Surveys and Tutorials, 16(1), 414--454. https://doi.org/10.1109/SURV.2013.042313.00197

Roman, R., Najera, P., & Lopez, J. (2011). Securing the Internet of things. Computer, 44(9), 51--58. https://doi.org/10.1109/MC.2011.291

Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80--84. https://doi.org/10.1109/MC.2017.201

Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146--164. https://doi.org/10.1016/J.COMNET.2014.11.008

Weber, R. H. (2010). Internet of Things -- New security and privacy challenges. Computer Law & Security Review, 26(1), 23--30. https://doi.org/10.1016/J.CLSR.2009.11.008

Baca konten-konten menarik Kompasiana langsung dari smartphone kamu. Follow channel WhatsApp Kompasiana sekarang di sini: https://whatsapp.com/channel/0029VaYjYaL4Spk7WflFYJ2H

HALAMAN :
  1. 1
  2. 2
  3. 3
  4. 4
Mohon tunggu...

Lihat Konten Pendidikan Selengkapnya
Lihat Pendidikan Selengkapnya
Beri Komentar
Berkomentarlah secara bijaksana dan bertanggung jawab. Komentar sepenuhnya menjadi tanggung jawab komentator seperti diatur dalam UU ITE

Belum ada komentar. Jadilah yang pertama untuk memberikan komentar!
LAPORKAN KONTEN
Alasan
Laporkan Konten
Laporkan Akun