disadvantages of iot.pptx
TRANSCRIPT
DANGERS OF
Engr. Syeda IffatEngr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
WHAT IS IOV? IOT is driving conventional VANETS into IOV paradigm IOV: a large-scale distributed system for wireless communication and
information exchange between vehicle2X (X: vehicle, road, human and internet)
FEATURES: Communications Storage Intelligence and learning capabilities to anticipate the customers’ intentions.
SMART CAR: PRIVACY ISSUE
Engr. Syeda IffatEngr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
In VANETS and so in Smart cars locating and tracking a vehicle is possible
This tracking leads to threats on the location privacy of the vehicle’s user[1][2].
TRACKING IS EASY NOW…
3
Engr. Syeda IffatEngr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
“Even as we are more connected than ever in our cars and trucks, our technology systems and data
security remain largely unprotected” said Senator Markey, a member of the Commerce, Science and
Transportation Committee[3].
TRACKING AND HACKING…
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
DANGERS OF
IoT Scenario: Ubiquitous Computing Vision
Spontaneous interaction between the digital
devices That surround and serve us—could bring a great deal of convenience but
also a great deal of risk. If it takes off as anticipated, ubiquitous computing will have an impact on
society similar to that of the Web.
IoT vulnerabilities will have major repercussions It is prudent for scientists and engineers to study the protection issues
before a critical mass of applications gets built and deployed.
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
UBIQUITOUS COMPUTING SECURITY
IoT Security Issues for Ubiquitous Computing Authentication
A failure of authentication can easily lead to violations of Confidentiality Integrity availability
For example, protecting your secrets with encryption does little good if the true identity of your recipient is not what you anticipated.
So it is natural, given the task of protecting a new computing environment, to look at authentication first.
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
UBIQUITOUS COMPUTING SECURITY
IoT Security Issues for Ubiquitous Computing Confidentialityo is violated when unauthorized principals learn protected information, such as your
medical records.
Integrityo is violated when unauthorized principals modify information, as when someone
changes the amount or the beneficiary on a check.
Availabilityo is violated when the system is prevented from performing its intended function,
as when someone brings down the Web site of an online store.Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
UBIQUITOUS COMPUTING SECURITY
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
HEALTH MONITORING ISSUES IN IOT
The IOT plays a significant role in a broad range of healthcare applications
Clinical care: Hospitalized patients whose physiological status requires close attention
can be constantly monitored using IoT monitoring. This type of solution employs sensors to collect information and uses gateways and the cloud to analyze and store the information.
Remote monitoring: Small powerful wireless solutions connected through the IoT are now
making it possible for monitoring to come out by remote monitoring.
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
HEALTH MONITORING ISSUES IN IOT
Remote Patient Monitoring These solutions capture patient health data from a variety of sensors, apply
complex algorithms to analyze the data and then share it through wireless connectivity with medical professionals who can make appropriate health recommendations.
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
THE HEALTHCARE INTERNET OF THINGS
The health devices generally fall into four main groups:
Consumer products for health
monitoring
Wearable external medical devices;
internally
Embedded medical devices; and
stationary
Networked, medical devices
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
THE HEALTHCARE INTERNET OF THINGSAREA OF CONCERNS:Accidental failuresPrivacy violationsIntentional DisruptionWidespread disruption
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
UNAVAILABILITY OF INTERNET
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
DANGERS OF
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
WHERE TO STORE DATA ? [4] [5] [6] [7]
Data storage is a danger of IoT in terms of:
Memory/Hard Drive Capacity [4]o Big challenge for the companies to be able to
purchase enough space to keep up with the demand for storage space
Power/Batteryo Need of minimal battery drain and low power
consumption.
Relevant Data Storage [5]o Often companies make the mistake of saving everything without determining
the attributes that would define a piece of data as important.
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
WHERE TO STORE DATA ? [4] [5] [6] [7]
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
DANGERS OF
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
DANGERS OF
Lacks Emotional Connection
Decreases Face-to-Face Communication Skills
Facilitates Laziness
Causes Distractions
Reduces Family Closeness
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
IMPACT ON SOCIAL BEHAVIOUR [8]
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
SPECIALIZED PERSONNEL
In IOT things are connected with other things either giving or getting information.Example: Grocery store connected with home
BIG QUESTION?What kinds of jobs will be available a few years from now, and what
skills do I need to be employable?
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Jamal
Engr. Wasiat
SPECIALIZED PERSONNELWhat kinds of jobs will be available a few years from now, and what skills do I need to be employable?
Computational thinking and interpreting evidence should be an essential part of the education curriculum, building skills and helping people to make informed decisions about everyday use of the Internet of Things
The Civil Service itself needs skilled people if it is to be an expert customer and enabler of this technology[9].
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Wasiat
Engr. Sikandar
DANGERS OF
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Sikandar
Engr. Waqas
INFORMATION INTERRUPTION
Direct collection of sensitive personal information, such as precise geolocation, financial account numbers, or health information.
“Generate 150 million discrete data points a day”OR
Approximately one data point every six seconds for each household
Engr. Syeda Iffat
Engr. Zeeshan
Engr. Sobia
Engr. Ayesha
Engr. Gulam Shabbir
Engr. Amnah
Engr. Yasir
Engr. Saima
Engr. Farzana
Engr. Sikandar
Engr. Waqas
INFORMATION INTERRUPTION
Existing smartphone sensors can be used to infer:
User’s mood Stress levels Personality type Smoking habits; Overall well-being Sleep patterns
Such inferences could be used to provide beneficial services to consumers, but also could be misused
25
REFERENCES
[1] “Vehicular ad hoc networks (VANETS): status, results, and challenges” Sherali Zeadally ,Ray Hunt , Yuh-Shyan Chen, Angela Irwin, Aamir Hassan Published online: 9 December 2010 © Springer Science+Business Media, LLC 2010
[2] “Securing Vehicular Communications” Maxim Raya, Panos Papadimitratos, Jean Pierre Hubaux, EPFL ,IEEE Wireless Communications October 2006.
[3] “Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk ” By Telematics News, Published: 10 February 2015 Posted in: Cybersecurity, Security, Telematics, USA, Video
[4] http://www.storageacceleration.com/author.asp?section_id=3497 [5] http://www.networkcomputing.com/storage/internet-of-things-what-about-data-storage/a/d-id/1114116 [6] http://www.itbusinessedge.com/slideshows/how-the-internet-of-things-will-transform-the-data-center-06.html [7] http://radar.oreilly.com/2015/01/the-internet-of-things-has-four-big-data-problems.html [8] http://www.rootsofaction.com/disadvantages-of-social-networking/ [9] “The Internet of Things: making the most of the Second Digital Revolution” A report by Sir Mark Walport UK
Government Chief Scientific Adviser.