AnNing, Mazida Ahmad, Huda lbrahim, 2023. "User Privacy and Security Issues in IoT Devices: A Usability-Centric Perspective" ESP International Journal of Advancements in Computational Technology (ESP-IJACT) Volume 1, Issue 3: 34-41.
User privacy and security issues in IoT devices have become a growing concern in recent years. This study aims to investigate these issues from a usability-centric perspective. The research method employed in this study includes a survey and user testing. The results indicate that while IoT systems offer convenience and efficiency, they also pose significant privacy and security risks to users. It is found that many IoT devices lack proper security measures and fail to adequately protect user data. Additionally, usability issues such as complex authentication procedures further exacerbate the vulnerability of user privacy. Based on the findings, it is concluded that addressing user privacy and security concerns in IoT devices requires a holistic approach that emphasizes both technical improvements and user-friendly design.
[1] R Al Ameedee.Exploiting User Privacy from IoT Devices Using Deep Learning and Its Mitigation [D], 2018.
[2] S Beg,SUR Khan,A Anjum.Data usage-based privacy and security issues in mobile app recommendation (MAR): a systematic literature review[D]. Library Hi Tech,2021
[3] SSE Guerbouj,H Gharsellaoui,S Bouamama.A Comprehensive Survey on Privacy and Security Issues in Cloud Computing, Internet of Things and Cloud of Things[D].International Journal of Service Science Management Engineering & Technology,2019
[4] S Abidi Tafreshi.Privacy and Security of Personal Health Information: A Novel User-Centric Approach [D]., 2018.
[5] R Li. Protecting Data Security and Privacy in Internet of Things [D]., 2018.
[6] P Zhang, Y Wang, N Kumar, et al.A Security and Privacy-Preserving Approach Based on Data Disturbance for Collaborative Edge Computing in Social IoT Systems[D].IEEE Transactions on Computational Social Systems,2021
[7] WG Hatcher, C Qian, F Liang, et al. Secure IoT Search Engine: Survey, Challenges Issues, Case Study, and Future Research Direction[D].IEEE Internet of Things Journal,2022
[8] SudhaK. Swapnaswapanak@gmail.comJeyanthiN.njeyanthi@vit.ac.inSchool of Information Technology and Engineering, VIT, Vellore Campus, Vellore, Tamilnadu, India.A Review of Privacy Requirements and Application Layer Security in the Internet of Things (IoT)[D].Cybernetics & Information Technologies,2021
[9] J Fan,W Yang,Z Liu,et al.Understanding Security in Smart City Domains From the ANT-centric Perspective[D].,2022
[10] PM Rao, P Saraswathi.Evolving cloud security technologies for social networks[D].Security in IoT Social Networks,2021
[11] J Chatterjee, MK Das, S Ghosh, et al.A Review on Security and Privacy Concern in IoT Health Care[D].,2021
[12] Asheesh Kumar Dwivedi.Imperceptible Technique to Secure Digital Audio Signals while Attaining Trade-Off among the Parameter of Magic Triangle[D].,2023
[13] D Jiang, G Shi. Research on Data Security and Privacy Protection of Wearable Equipment in Healthcare.[D]. Journal of Healthcare Engineering,2021
[14] MMMAL Qerom, D Ahamad, MM Akhtar, et al.Provably a Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication[D].International Journal of Electronic Security & Digital Forensics,2021
[15] AU Mentsiev,MV Engel,ME Gudaeva.Impact of IoT on the automation of processes in Smart Cities: security issues and world experience[D].Journal of Physics Conference,2020
[16] D. D. Rao, "Multimedia Based Intelligent Content Networking for Future Internet," 2009 Third UKSim European Symposium on Computer Modeling and Simulation, Athens, Greece, 2009, pp. 55-59, doi: 10.1109/EMS.2009.108.
[17] Manish Krishnan, Tong Jiang, Vivekananda Shenoy, Soumil Ramesh Kulkarni, Vinod Nair, Jeba Paulaiyan, 2020 Cloud network having multiple protocols using virtualization overlays across physical and virtualized workloads” United States Patent Application Publication, Application number- 16368381,
[18] Chanthati, Sasibhushan Rao. (2022). A Centralized Approach To Reducing Burnouts In The It Industry Using Work Pattern Monitoring Using Artificial Intelligenc. International Journal on Soft Computing Artificial Intelligence and Applications. Sasibhushan Rao Chanthati. Volume-10, Issue-1, PP 64-69.
[19] Nimeshkumar Patel, 2022.” Quantum Cryptography In Healthcare Information Systems: Enhancing Security In Medical Data Storage And Communication”, Journal of Emerging Technologies and Innovative Research, volume 9, issue 8, pp.g193-g202.
[20] Naga Ramesh Palakurti, 2023. "Evolving Drug Discovery: Artificial Intelligence and Machine Learning's Impact in Pharmaceutical Research" ESP Journal of Engineering & Technology Advancements 3(3): 136-147.
[21] Empowering Rules Engines: AI and ML Enhancements in BRMS for Agile Business Strategies. (2022). International Journal of Sustainable Development through AI, ML and IoT, 1(2), 1-20.
[22] Naga Ramesh Palakurti, 2022. "AI Applications in Food Safety and Quality Control" ESP Journal of Engineering & Technology Advancements 2(3): 48-61.
[23] Ayyalasomayajula, Madan Mohan Tito. "Innovative Water Quality Prediction For Efficient Management Using Ensemble Learning." Educational Administration: Theory and Practice 29.4 (2023): 2374-2381.
[24] Ayyalasomayajula, M. M. T., Chintala, S., & Sailaja, A. (2019). A Cost-Effective Analysis of Machine Learning Workloads in Public Clouds: Is AutoML Always Worth Using? International Journal of Computer Science Trends and Technology (IJCST), 7(5), 107–115.
[25] Chintala, S. ., & Ayyalasomayajula, M. M. T. . (2019). Optimizing Predictive Accuracy With Gradient Boosted Trees In Financial Forecasting. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 10(3), 1710–1721.
[26] Bhat, V. Gojanur, and R. Hegde. 2015. 4G protocol and architecture for BYOD over Cloud Computing. In Communications and Signal Processing (ICCSP), 2015 International Conference on. 0308-0313. Google Scholar.
[27] Aparna Bhat, Rajeshwari Hegde, “Comprehensive Study of Renewable Energy Resources and Present Scenario in India,” 2015 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, TN, India, 2015.
[28] Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2023. "Comparative Study of FPGA and GPU for High-Performance Computing and AI" ESP International Journal of Advancements in Computational Technology (ESP-IJACT) Volume 1, Issue 1: 37-46.
[29] Rao, D. D. (2009, November 25). Multimedia-based intelligent content networking for future internet. In Proceedings of the 2009 Third UKSim European Symposium on Computer Modeling and Simulation (pp. 55-59). IEEE.
[30] Thapliyal, A., Bhagavathi, P. S., Arunan, T., & Rao, D. D. (2009, January 10). Realizing zones using UPnP. In 2009 6th IEEE Consumer Communications and Networking Conference (pp. 1-5). IEEE.
[31] Deshpande, A., Arshey, M. R., Ravuri, D., Rao, D. D., Raja, E., & Rao, D. C. (2023). Optimizing Routing in Nature-Inspired Algorithms to Improve Performance of Mobile Ad-Hoc Network. International Journal of Intelligent Systems And Applications In Engineering, 508–516. IJISAE. ISSN: 2147-6799.
[32] Rao, D. D., & Sharma, S. (2023). Secure and Ethical Innovations: Patenting AI Models for Precision Medicine, Personalized Treatment and Drug Discovery in Healthcare. International Journal of Business, Management and Visuals (IJBMV), 6*(2)*,
[33] Radhika Kanubaddhi, "Real-Time Recommendation Engine: A Hybrid Approach Using Oracle RTD, Polynomial Regression, and Naive Bayes," SSRG International Journal of Computer Science and Engineering , vol. 8, no. 3, pp. 11-16, 2021.
[34] Radhika Kanubaddhi, 2022. "Designing an Enterprise-Grade, Cloud-Native Chatbot Solution for the Hospitality Industry Using Azure QnA Maker and Azure LUIS", ESP Journal of Engineering & Technology Advancements, 2(1): 56-62.
User Privacy, Security Issues, IoT Devices, Usability-Centric Perspective, Technical Improvements.