Strategies for Internet of Things Data Privacy and Security Using Systematic Review

Sithembiso Khumalo, Amanda Sibiya, Teballo, A. Kekana

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

The Internet of Things (IoT) now referend to as the Internet of Everything (IoE) has been in existence long before it was identified as a concept. It was introduced with the emergence of the Fourth Industrial Revolution and was aimed at improving people’s lives and economies across the globe by connecting physical items to the internet so they can be able to deliver specific services implicitly. The nature of IoT requires that all the systems ensure data privacy and security because much of data that is uploaded into and used by the system is personal and private. Thus, the aim of this research was to identify the tools and strategies that can be used for IoT data privacy and security while also providing a brief but intensive understanding of the concept of IoT and data privacy and security challenges faced by IoT systems. This qualitative research study utilised a pragmatic paradigm and data was collected and analysed using text-based secondary data sources and a PRISMA protocol through systematic review. A PRISMA flow diagram was utilised to assess the eligibility of the sources used for this research. The findings showed that hacking is a major challenge that affects IoT systems and that there are strategies that can be used to protect data such as authentication, encryption technology, and anonymisation amongst many. Additional findings found that the strategies have not yet been found effective, but standards have been set upon the results expected from them. The conclusion is that for the identified strategies to be proven effective, they must be implemented and tested in IoT systems, so further investigation can be conducted if they prove to be ineffective.

Original languageEnglish
Title of host publicationProceedings of the 21st European Conference on Cyber Warfare and Security, ECCWS 2022
EditorsThaddeus Eze, Nabeel Khan, Cryil Onwubiko, Cryil Onwubiko
PublisherCurran Associates Inc.
Pages115-122
Number of pages8
ISBN (Electronic)9781914587405
Publication statusPublished - 2022
Event21st European Conference on Cyber Warfare and Security, ECCWS 2022 - Chester, United Kingdom
Duration: 16 Jun 202217 Jun 2022

Publication series

NameEuropean Conference on Information Warfare and Security, ECCWS
Volume2022-June
ISSN (Print)2048-8602
ISSN (Electronic)2048-8610

Conference

Conference21st European Conference on Cyber Warfare and Security, ECCWS 2022
Country/TerritoryUnited Kingdom
CityChester
Period16/06/2217/06/22

Keywords

  • data privacy
  • data security
  • internet of things (IoT)
  • strategies
  • tools

ASJC Scopus subject areas

  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Strategies for Internet of Things Data Privacy and Security Using Systematic Review'. Together they form a unique fingerprint.

Cite this