Internet of Things Privacy, Security and Governance
Internet of Things (IoT) is broad term, which indicates the concept that increasingly pervasive communication and connected devices (“Things”) will support various applications to enhance the awareness and the capabilities of users.
The adoption of IoT essentially depends upon trust. Moreover this trust must be established and maintained with respect to a broad group of stakeholders otherwise IoT will face, to some degree or other, challenges which may restrict adoption scope or delay its timing.
Without sufficient IoT security it is highly likely that some applications will more resemble the Intranet of Things rather than the Internet of Things as users seek to place their own proprietary protection barriers and thus frustrating broad interoperability. Many of the device connections to the Internet today more closely resemble the Intranet of Things which differs dramatically from the vision for the Internet of Things, the latter being a much more open and interoperable environment allowing in theory the connection with many more objects and with their multiple IoT compatible devices.
One specific challenge in IoT is the control on the information collected and distributed by mobile devices, which are increasingly small and pervasive like RFID or future micro-nano sensors, which can be worn or distributed in the environment. In most cases, such devices have the capability of being wireless connected and accessible. In this context, the challenge is to ensure that the information collected and stored by the devices should be visible and distributed only to authorized users.
Finally, one aspect which often gets overlooked particularly frequently by those of us who entered adulthood before the year 2000 is the importance of the virtual-world. IoT is capable of establishing an important bridge between the two. This bridge is likely to grow and become more relevant in the life of the citizens in the future.
The book chapter describes how the FP7 projects iCore, BUTLER, GAMBAS and IoT@Work have addressed the issues identified above and identified related mitigation approaches.
BALDINI Gianmarco;
PEIRCE Trevor;
HANDTE Marcus;
ROTONDI Domenico;
GUSMEROLI Sergio;
PICCIONE Salvatore;
COPIGNEAUX Bertrand;
LE GALL Franck;
MELAKESSOU Foued;
SMADJA Philippe;
SERBANATI Alexandru;
STEFA Julinda;
2013-08-13
River Publishers
JRC82483
978-8-79298-273-5,
Additional supporting files
File name | Description | File type | |