← Back to All Articles

Overview of Security and Privacy concerns of the Internet of Things

By Adithya D A, D A Akshay adithya.davangeri@gmail.com Posted on 16 May 2025
Area of Article:
AI and Machine Learning, Internet of Things

Overview of Security and Privacy concerns of the Internet of Things


Abstract:


The Internet of Things (IoT) is growing increasingly popular due to its numerous uses. Low-cost sensors are fueling the rapid spread of the IoT. Construction, healthcare, transportation, and, most notably, agriculture are all making greater use of IoT technology. On the other hand, Privacy and security are the pressing issues for the future of IoT. The majority of these software and/or hardware "things" that are connected to the Internet are extremely basic devices with limited resource capabilities. This study emphasizes the significance of safeguarding IoT networks while also outlining the problems of the IoT.


Key words: Intrusion Detection Systems (IDS), Internet of Things (IoT), Machine Learning (ML), big data, smart objects


Introduction


A big technological transition is happening in our society, and it is based upon the Internet of Things (IoT) which is related to "connecting the unconnected"[1] -is a network of devices, automobiles, appliance as well as other items which equipped with software, actuators ,sensors along with connectivity of computer networks to gather with exchange of data.




Figure-1. IoT environment


 



These IoT devices are "smart objects" that vary from "smart home" gadgets such as smart thermostats to smart watches and clothes with RFID-enabled features to large business transportation and mechanical equipments. These IoT devises allows gadgets to interact with one another and also internet-connected devices. Similar to smart phones and a gateway, constructing these wide networked devices that can share data and execute numerous functions independently [2][5], like tracking shipments and inventory in warehouses, monitoring environmental conditions, managing traffic patterns (smart cars as well as smart automotive things),machines and processes controlling, etc., as shown in figure1.


Internet of Things Advantages andDisadvantage


IoT devices have various advantages like:


Data and insights- Real-time: IoT devices can help businesses make better decisions by gathering and analyzing real-time data.


Increased efficiency and productivity:Employees can focus on more vital tasks thanks to automated data collection and processing.


Lower costs and revenue:Enable decision makers to make faster decisions, save time, and increase productivity, all of which can assist to cut spending and enhance returns.


Furthermore, it is practically impossible to protect IoT devices using standard resource-intensive defenses.


IoT also suffers with some pros like:


Security and privacy risks: Some IoT have limited security and it is hard to protect, despite processing and storing a large quantity of data.


Security and privacy technology: As IoT usage expand; handling IoT security and privacy become difficult task.  Encryption methods, access restrictions and IDS technologies are widely used to safeguard IoT and the data they create against cyber attacks.   Examples include IoT-based Drones, also known as the Internet of Drones (IoD), which are used in a variety of fields to gather data, monitor in real time, and perform remote operations.  These drones are outfitted with sensors and can wirelessly transmit data, allowing for a wide range of industrial applications.  So, in such instances, privacy and security are top priorities for IoT that demand rapid attention and extensive study.Weber [4] shed light on these issues, arguing that a private corporation utilizing IoT must comprise authentication of data, access control, fighting to threats and privacy of client into their daily business actions as an additional value.  Further it is recommended that in order to identify global security as well as privacy challenges, IoT designers must consider each country's geographical limits.  Single frameworks have to be developed to meet global privacy and security standards.  Previous to establishing a IoT framework, it is recommended that difficulties with obstacles in privacy plus security be investigated as well as identified.


Later, Heer et al. [5] focused on the security concern, stating that especially in the IP-based IoT that is., by using the Internet Protocol (IP) for addressing, communication and routing data across the computer network and also stressed on the importance of the Internet which stands as the main strength for the device interaction.  As a result, security vulnerabilities in IP-based IoT systems will become major issues.  Furthermore, security planning must be developed with the life cycle and capability of all the objects in the IoT environment.   Furthermore, study incorporates the engagement of a trusted third party as well as security standards.  Scalability capabilities to support small to large-scale items in the IoT environment is tremendously beneficial. They emphasized that because IoT introduced a new mode of communication across a variety of devices throughout the net, conventional end-to-end IP are not capable to give the essential aid.  As to provide end-to-end security, unique protocols should be devised while taking into account translations at the gateway.  In addition, each layer is liable for interaction has its security issues and requirements.  So, carrying out the criterion for one specific layer would leave the system in a susceptible condition and the security must be ensured for all the layers in a design.


The Security Risks


·       IoT devices connect to any system.  A lack of safety and security measures raises the possibility of personal information leak when data is gathered and delivered to the IoT mechanism.


·       IoT devices are connected to a customer system with a network.  Further, this network may interconnect to other systems as well.  Consequently, if the gadget with IoT by chance has security flaws, it might affect the client’s set-up.  This weakness allows for easy assault and harm to other systems. Unauthorized remote access may exploit security flaws, posing a danger to physical safety.


Privacy Risks


·       Unauthorized manipulation of networked devices can lead to sensitive information leakage.


·       IoT devices send personal information without encryption.


Conclusion


Despite security and privacy issues, IoT devices provide value to one’s lives by allowing them to handle everyday usual activities remotely and without human intervention, more importantly; they signify a game changer for many enterprises.  By investigating several approaches to IoT security and privacy issues, such as blockchain, fog computing, machine learning, and edge computing.  These techniques seek to secure IoT networks and devices from cyber attacks while simultaneously protecting user privacy [6].


References


1.     David Hanes et al.  IoT Fundamentals:  Networking Technologies, Protocols, and Use Cases for the Internet of Things, CISCO press, 2019


2.     Dr. PritamGajkumar Shah AI-Enabled Security Protocols for Safeguarding Wireless Communications and IOT Devices Ausjournal 2025


3.     J. Showail, A. (2021). Internet of Things Security and Privacy. IntechOpen. doi: 10.5772/intechopen.96669


4.     Weber RH. Internet of things-new security and privacy challenges. Comput Law Secur Rev. 2010;26(1):23–30.


5.      Heer T, Garcia-Morchon O, Hummen R, Keoh SL, Kumar SS, Wehrle K. Security challenges in the IP based internet of things. Wirel Pers Commun. 2011;61(3):527–42.


6.     Kumar, S., Tiwari, P. &Zymbler, M. Internet of Things is a revolutionary approach for future technology enhancement: a review. J Big Data 6, 111 (2019). https://doi.org/10.1186/s40537-019-0268-2