Smart Service Systems: Security and Privacy Challenges in Internet of Things

被引:0
作者
Suciu, George, Jr. [1 ,2 ]
Hussain, Ijaz [2 ]
机构
[1] Univ Politehn Bucuresti, Bucharest, Romania
[2] Beia Consult Int, Bucharest, Romania
来源
PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2019) | 2019年
关键词
Smart environment; IoT devices; WiFi communications; Big Data; Analytics; Digitization; Smart Service Systems; Digital Service Innovation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Monitoring and detecting changes in the environment and can be used for several purposes. To develop new advanced services for smart environments, data gathered during the monitoring need to be stored, processed and correlated to different parts of the information that characterizes or influences the environment itself. With the quick advancement in enabling technologies for ubiquitous computing, more and more active or passive devices/sensors are augmented in the smart indoor environment. Service innovations, enabled by the confluence of big data, mobile solutions, cloud, social, and cognitive computing, and the Internet of Things (IoT), have gained a lot of attention among many enterprises in the past few years because they represent promising ways for companies to effectively and rapidly deliver new services. But one of today's most pervasive and bedeviling challenges is how to start this journey and stay on course. In this paper we present our state-of-the-art technology and IoT devices, how they are playing a vital role in making the world advanced. The biggest conclusion is that all the information and communications technology (ICT)-enabled service innovations need to be human-centered and focused on co-creating value. We took into consideration smart home/office IoT systems, the related security and privacy challenges and an outlook on the possible solutions towards a holistic security framework for these IoT systems.
引用
收藏
页数:6
相关论文
共 8 条
  • [1] Ahmad M, 2019, EAI SPRINGER INNOVAT, P11, DOI 10.1007/978-3-319-99966-1_2
  • [2] Bigthink Edge, 2016, HACK HUM HEART
  • [3] SOFTWARE-DEFINED NETWORKING SECURITY: PROS AND CONS
    Dabbagh, Mehiar
    Hamdaoui, Bechir
    Guizani, Mohsen
    Rayes, Ammar
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 : 73 - 79
  • [4] Envista Forensics, 2015, MOST HACK CARS ROAD
  • [5] IDC, 2016, INT THINGS MARK STAT
  • [6] Jerald V., 2015, DEPT OF COMPUTER SCI, V128
  • [7] Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application
    Rodriguez-Molina, Jesus
    Martinez, Jose-Fernan
    Castillejo, Pedro
    Lopez, Lourdes
    [J]. SENSORS, 2013, 13 (02): : 1787 - 1835
  • [8] The Statistics Portal, 2017, INT THING IOT CONN D