Yıl 2018, Cilt 10 , Sayı , Sayfalar 68 - 76 2018-09-12

A Critical Analysis on Internet of Things: Features and Vulnerabilities

Naciye Guliz UGUR [1] , Merve TURKMEN BARUTCU [2]


Smart devices have completely changed how society functions both outside and inside the home. A major concern is the Internet of Things (IoT), and the lack of awareness by the public of the limited data security built around IoT devices (Raggett, 2016). The purpose of this research is to investigate how a reliance on IoT devices within the home can come at the expense of personal privacy. There has been limited research conducted on how much, and what data is transmitted by IoT devices. This research focused upon data privacy and security concerns, privacy laws, law enforcement capabilities and legal precedents pertaining to personal privacy and IoT devices. The storage, transmission, sharing and retention of personal information through connected devices were found to pose substantial privacy concerns. There is a deficiency in public knowledge on the subject of IoT because people are putting a greater emphasis on functionality and design with these IoT tools that provide ease of life, but less regard for their own individual privacy. People may have reached a point where they have allowed too many other entities such as government, corporations, and data aggregators access to their personal information but limited knowledge as to what is being transmitted. Based on the research it seems that humans put a lesser value on their own privacy and personal information because the world around them is consumed by a pursuit of things like vanity, pleasure, and enjoyment. Companies should be required to provide a baseline explanation in detail exactly what, where, how, who, and anything else relating to the data transmission that contains any personal information about the consumer using the device. For anybody who doesn’t have a working knowledge of what that traffic should look like, it should be explained in reasonable terms so those who are not technical can understand the data capture.

Cybersecurity, Internet of things, IoT, Privacy, Security
  • Banafa, A. (2014). IoT Standardization and Implementation Challenges. IEEE. org Newsletter. Berners-Lee, T. (2017). I invented the web. Here are three things we need to change to save it. Retrieved March 11, 2017. from https://www.theguardian.com/technology/2017/mar/11/tim- berners-lee-web-inventor-save-internet Berreby, D. (2017). Click To Agree With What? No One Reads Terms Of Service, Studies Confirm. Retrieved March 03, 2017. from https://www.theguardian.com/technology/2017/mar/03/terms-of- service-online-contracts-fine-print Borgia, E. (2014). The Internet of Things Vision: Key Features. Applications And Open Issues Computer Communications, 54, 1–31. Brill, H. (2017). What Rules Apply to Information Privacy and the Internet of Things?. The Santa Clara High Technology Law Journal. Retrieved 29 October, 2017. from https://techlawquestions.com/home/2017/7/17/what-rules-apply-to-information-privacy- and-the-internet-of-things. Daitch, H. (2017). 2017 Data Breaches - The Worst Breaches, So Far. IdentityForce. Retrieved September 29, 2017. from https://www.identityforce.com/blog/2017-data-breaches DeNisco, A. (2017). The Five Industries Leading The Iot Revolution. Retrieved June 23, 2017. from http://www.zdnet.com/article/the-five-industries-leading-the-iot-revolution/ Equifax Inc. (2017). Equifax Announces Cybersecurity Incident Involving Consumer Information. Retrieved December 29, 2017. from https://investor.equifax.com/news-and-events/news/2017/09- 07-2017-213000628 Fernandes, E., Jung, J., & Prakash, A. (2016, May). Security Analysis Of Emerging Smart Home Applications. In Security and Privacy (SP), 2016 IEEE Symposium on (pp. 636-654). IEEE. FTC (2015). The Internet of Things: Privacy and Security in a Connected World. Retrşeved 01 March 2018. from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf Gartner (2016). Gartner Says By 2020, More Than Half Of Major New Business Processes And Systems Will Incorporate Some Element Of The Internet Of Things [Press release]. Retrieved 23 June, 2017. from https://www.gartner.com/newsroom/id/3185623 Glancy, R. (2014). Will You Read This Article About Terms And Conditions? You Really Should. Retrieved April 24, 2018. from https://www.theguardian.com/commentisfree/2014/apr/24/terms- and-conditions-online-small-print-information Koblin, J. (2016). How Much Do We Love TV? Let Us Count the Ways. Retrieved 22 October, 2017. from https://www.nytimes.com/2016/07/01/business/media/nielsen-survey-media-viewing.html Li, S., & Xu, L. (2017). Securing The Internet Of Things. Cambridge, MA: Syngress. Lord, N. (2017). The History Of Data Breaches. Retrieved July 27, 2017. from https://digitalguardian.com/blog/history-data-breaches Mehta, R. (2017). How The Iot Will Explode At 2020. Retrieved August 19, 2017. from http://customerthink.com/how-the-iot-will-explode-at-2020/ Maddox, T. (2015). The dark side of wearables: How they're secretly jeopardizing your security and privacy. Retrieved January 19, 2018. from http://www.techrepublic.com/article/the-dark-side-of- wearables-how-theyre-secretly-jeopardizing-your-security-and-privacy/ Martin, J., Meade, C., & Nusraty, W. (2017). A Summary Of The Recently Introduced Internet Of Things (Iot) Cybersecurity Improvement Act Of 2017. Retrieved October 04, 2017, from https://www.insideprivacy.com/data-security/cybersecurity/a-summary-of- the-recently-introduced-internet-of-things-iot-cybersecurity-improvement-act-of-2017/ Massive Media. (2016). Mirai Malware: How To Protect Yourself From The Internet Of Things (Iot Exploit). Retrieved October 31, 2017. from https://www.massivealliance.com/2016/10/31/mirai-malware-protect-internet-things-iot- exploit/ Montalbano, E. (2017). 300 Billion Passwords? Internet Of Things Growth Poses Unprecedented Threat By 2020. Retrieved February 01, 2018. from https://securityledger.com/2017/02/300- billion-passwords-internet-of-things-growth-poses-unprecedented-threat-by-2020/ Newman, S. (2017). Service Providers: The Gatekeepers Of Internet Security. Network Security, 5, 5-7. doi:10.1016/s1353-4858(17)30048-x Palmer, D. (2017). Is 'Admin' Password Leaving Your Iot Device Vulnerable To Cyberattacks? Retrieved April 26, 2018. from http://www.zdnet.com/article/is-admin-password-leaving- your-iot-device-vulnerable-to-cyberattacks/ Perez, S. (2017). U.S. Consumers Now Spend 5 Hours Per Day On Mobile Devices. Retrieved March 3, 2018. from https://techcrunch.com/2017/03/03/u-s-consumers-now-spend-5-hours- per-day-on-mobile-devices Ponemon Institute (2017). 2017 Cost of Data Breach Study: United States. 12, 4-5, Retrieved October 09, 2017. from https://www- 01.ibm.com/marketing/iwm/dre/signup?source=urx-15764&S_PKG=ov58458 Rouse, M. (2016). What is Internet of Things (IoT)? Retrieved March 12, 2018. from http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT Symantec (2017). Securing the Internet of Thing. Retrieved January 6, 2018. from https://sg.norton.com/internetsecurity-iot-securing-the-internet-of-things.html Talamantes, J. (2016). Google Dorking And Shodan. Retrieved from November 9, 2017. http://www.elp.com/articles/powergrid_international/print/volume-21/issue- 11/features/google-dorking-and-shodan.html Thielman, S., Hunt, E. (2016). Cyber Attack: Hackers 'Weaponised' Everyday Devices With Malware. Retrieved October 22, 2017. from https://www.theguardian.com/technology/2016/oct/22/cyber-attack-hackers-weaponised- everyday-devices-with-malware-to-mount-assault Turgut, D., Bölöni, L. (2017). Value Of Information And Cost Of Privacy In The Internet Of Things. IEEE Communications Magazine, 55(9), 62-66. Vaughan-Nichols, S. J. (2017). How To Keep Your Smart TV From Spying On You. Retrieved March 8, 2017. from http://www.zdnet.com/article/how-to-keep-your-smart-tv-from-spying- on-you/ Wadhwa, V. (2015). When Your Scale And Fridge Conspire To Make You Lose Weight, The Internet Of Things Will Have Gone Too Far. Retrieved June 29, 2017. from https://www.washingtonpost.com/news/innovations/wp/2015/06/29/when-your-scale- and-fridge-conspire-to-make-you-lose-weight-the-internet-of-things-will-have-gone-too- far/?utm_term=.6ffbbfc4131c Weber, R. H. (2016). Governance Of The Internet Of Things—From Infancy To First Attempts Of Implementation?. Laws, 5(3), 28. Zatz, C. J., Aradi, L. O., Meadows, J. L., & Mathis, P. (2017). Recent Iot Device Cases. Lexology. Retrieved July 29, 2017. from https://www.lexology.com/library/detail.aspx?g=97b70db8- b67d-4e8b-b9bf-d4beaf12eddd
Birincil Dil en
Konular Sosyal
Bölüm Articles
Yazarlar

Yazar: Naciye Guliz UGUR

Yazar: Merve TURKMEN BARUTCU

Tarihler

Yayımlanma Tarihi : 12 Eylül 2018

Bibtex @araştırma makalesi { epess459217, journal = {The Eurasia Proceedings of Educational and Social Sciences}, issn = {}, eissn = {2587-1730}, address = {}, publisher = {ISRES Organizasyon Turizm Eğitim Danışmanlık Ltd. Şti.}, year = {2018}, volume = {10}, pages = {68 - 76}, doi = {}, title = {A Critical Analysis on Internet of Things: Features and Vulnerabilities}, key = {cite}, author = {UGUR, Naciye Guliz and TURKMEN BARUTCU, Merve} }
APA UGUR, N , TURKMEN BARUTCU, M . (2018). A Critical Analysis on Internet of Things: Features and Vulnerabilities. The Eurasia Proceedings of Educational and Social Sciences , 10 () , 68-76 . Retrieved from https://dergipark.org.tr/tr/pub/epess/issue/39111/459217
MLA UGUR, N , TURKMEN BARUTCU, M . "A Critical Analysis on Internet of Things: Features and Vulnerabilities". The Eurasia Proceedings of Educational and Social Sciences 10 (2018 ): 68-76 <https://dergipark.org.tr/tr/pub/epess/issue/39111/459217>
Chicago UGUR, N , TURKMEN BARUTCU, M . "A Critical Analysis on Internet of Things: Features and Vulnerabilities". The Eurasia Proceedings of Educational and Social Sciences 10 (2018 ): 68-76
RIS TY - JOUR T1 - A Critical Analysis on Internet of Things: Features and Vulnerabilities AU - Naciye Guliz UGUR , Merve TURKMEN BARUTCU Y1 - 2018 PY - 2018 N1 - DO - T2 - The Eurasia Proceedings of Educational and Social Sciences JF - Journal JO - JOR SP - 68 EP - 76 VL - 10 IS - SN - -2587-1730 M3 - UR - Y2 - 2020 ER -
EndNote %0 The Eurasia Proceedings of Educational and Social Sciences A Critical Analysis on Internet of Things: Features and Vulnerabilities %A Naciye Guliz UGUR , Merve TURKMEN BARUTCU %T A Critical Analysis on Internet of Things: Features and Vulnerabilities %D 2018 %J The Eurasia Proceedings of Educational and Social Sciences %P -2587-1730 %V 10 %N %R %U
ISNAD UGUR, Naciye Guliz , TURKMEN BARUTCU, Merve . "A Critical Analysis on Internet of Things: Features and Vulnerabilities". The Eurasia Proceedings of Educational and Social Sciences 10 / (Eylül 2018): 68-76 .
AMA UGUR N , TURKMEN BARUTCU M . A Critical Analysis on Internet of Things: Features and Vulnerabilities. EPESS. 2018; 10: 68-76.
Vancouver UGUR N , TURKMEN BARUTCU M . A Critical Analysis on Internet of Things: Features and Vulnerabilities. The Eurasia Proceedings of Educational and Social Sciences. 2018; 10: 76-68.