Abstract
Internet of Everything (IoE) is a newly emerging trend, especially for future networks. Such a rapid adoption of these networks offered new services where devices are equipped with specialized sensors based on intelligent transactions and control of services systems to improve the quality of life. The rapid adoption of these networks opens new security and protection threats for maintaining end nodes’ or users’ privacy and trust against disruptive attacks designed to incur financial losses. These networks are connected with edge and cloud networks where the trustworthiness of these devices is another challenge for IoE networks. Despite IoE connecting trillion users, devices, systems, objects, and interfaces for autonomous Internet-based services, it suffers from implementation issues and vulnerabilities of security, trust, and privacy along with architectural and infrastructural considerations. IoE is designed to benefit valuable users by creating compound impacts through close and handy interconnectivity and interoperability among processes, things, data, systems, institutes, and individuals over heterogeneous platforms. This chapter presents the future user privacy and trust research challenges that still need to be addressed for IoE networks. This chapter also discusses the new trend and usage of blockchain and artificial intelligence in IoE networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Flores FFS, de Lemos Meira SR Ethical Software Engineering: A critical review about Software Engineering in face of Security Requirements in the IoT/IoE Society. In: 2021 IEEE International Systems Conference (SysCon), 2021. IEEE, pp 1–8
Ilgi GS, Ever YK (2020) Critical analysis of security and privacy challenges for the Internet of drones: a survey. In: Drones in smart-cities. Elsevier, pp 207–214
ALiero MS, Qureshi KN, Pasha MF, Jeon G (2021) Smart Home Energy Management Systems in Internet of Things networks for green cities demands and services. Environmental Technology & Innovation:101443. doi:https://doi.org/10.1016/j.eti.2021.101443
Qureshi KN, Alhudhaif A, Hussain A, Iqbal S, Jeon G (2021) Trust aware energy management system for smart homes appliances. Computers & Electrical Engineering:107641. doi:https://doi.org/10.1016/j.compeleceng.2021.107641
Qureshi KN, Alhudhaif A, Haider SW, Majeed S, Jeon G (2022) Secure Data Communication for Wireless Mobile Nodes in Intelligent Transportation Systems. Microprocessors and Microsystems:104501. doi:https://doi.org/10.1016/j.micpro.2022.104501
Mazzoccoli A, Naldi M (2022) An Overview of Security Breach Probability Models. Risks 10 (11):220
Cisco U (2021) Cisco annual internet report (2018–2023) white paper. 2020. Acessado em 10 (01)
Gabilondo García Á, Fernández Z, Viola R, Martín Á, Zorrilla M, Angueira Buceta P, Montalbán Sánchez J (2022) Traffic Classification for Network Slicing in Mobile Networks.
Luiijf E, Klaver M (2021) Analysis and lessons identified on critical infrastructures and dependencies from an empirical data set. International Journal of Critical Infrastructure Protection 35:100471
Karie NM, Sahri NM, Yang W, Valli C, Kebande VR (2021) A review of security standards and frameworks for IoT-based smart environments. IEEE Access
Kong X, Wu Y, Wang H, Xia F (2022) Edge Computing for Internet of Everything: A Survey. IEEE Internet of Things Journal 9 (23):23472–23485
Shahzad K, Aseeri AO, Shah MA (2022) A Blockchain-Based Authentication Solution for 6G Communication Security in Tactile Networks. Electronics 11 (9):1374
Un Nisa K, Alhudhaif A, Qureshi KN, Hadi HJ, Jeon G (2022) Security Provision for Protecting Intelligent Sensors and Zero Touch Devices by using Blockchain Method for the Smart Cities. Microprocessors and Microsystems:104503. doi:https://doi.org/10.1016/j.micpro.2022.104503
Conti M, Kumar G, Nerurkar P, Saha R, Vigneri L (2022) A survey on security challenges and solutions in the IOTA. Journal of Network Computer Applications:103383
Paleri P (2022) Threat, Risk and Uncertainty: Triad of Chaotic Balance in a Chancy, Chancy World. In: Revisiting National Security. Springer, pp 155–193
Qureshi KN, Ahmad A, Piccialli F, Casolla G, Jeon G (2020) Nature-inspired algorithm-based secure data dissemination framework for smart city networks. Neural Computing and Applications. doi:https://doi.org/10.1007/s00521-020-04900-z
Sachdev R Towards security and privacy for edge AI in IoT/IoE based digital marketing environments. In: 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), 2020. IEEE, pp 341–346
El-Masri M, Hussain EMA (2021) Blockchain as a mean to secure Internet of Things ecosystems–a systematic literature review. Journal of Enterprise Information Management 34 (5):1371–1405
Hatfield JM (2019) Virtuous human hacking: The ethics of social engineering in penetration-testing. Computers Security 83:354–366
Formosa P, Wilson M, Richards DJC, Security (2021) A principlist framework for cybersecurity ethics. 109:102382
Abe N, Soltys M (2019) Deploying health campaign strategies to defend against social engineering threats. Procedia Computer Science 159:824–831
Shuvo MMH (2022) Edge AI: Leveraging the full potential of deep learning. In: Recent Innovations in Artificial Intelligence and Smart Applications. Springer, pp 27–46
Kokkonen H, Lovén L, Motlagh NH, Partala J, González-Gil A, Sola E, Angulo I, Liyanage M, Leppänen T, Nguyen T (2022) Autonomy and Intelligence in the Computing Continuum: Challenges, Enablers, and Future Directions for Orchestration. arXiv preprint arXiv:01423
Chinchawade AJ, Lamba OS (2021) Security and privacy challenges in internet of everything (ioe) with security requirements. Journal of Engineering Technology-Suresh Gyan Vihar University 7 (2)
Desai S, Alhadad R, Chilamkurti N, Mahmood A (2019) A survey of privacy preserving schemes in IoE enabled smart grid advanced metering infrastructure. Cluster Computing 22:43–69
Stellios I, Kotzanikolaou P, Psarakis M, Alcaraz C, Lopez J (2018) A survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services. IEEE Communications Surveys Tutorials 20 (4):3453–3495
Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Communications Surveys Tutorials 22 (3):1646–1685
Shankhpal SV, Brahmananda S (2022) Systematic analysis and review of trust management schemes for IoT security. International Journal of Wireless Mobile Computing 23 (1):33–45
Farias da Costa VC, Oliveira L, de Souza J (2021) Internet of everything (IoE) taxonomies: A survey and a novel knowledge-based taxonomy. Sensors 21 (2):568
Saba T, Rehman A, Haseeb K, Alam T, Jeon G (2023) Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence. Cluster Computing:1–11
Jimo S, Abdullah T, Jamal A IoE Security Risk Analysis in a Modern Hospital Ecosystem. In: Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022, 2023. Springer, pp 451–467
Juszczyk O, Shahzad K (2022) Blockchain technology for renewable energy: principles, applications and prospects. Energies 15 (13):4603
Alqasemi F, Al-Hagree S, Shaddad RQ, Zahary AT An IEEE Xplore Database Literature Review Concerning Internet of Everything During 2020–2021. In: 2021 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE), 2021. IEEE, pp 1–8
Puthal D, Damiani E, Mohanty SP Secure and Scalable Collaborative Edge Computing using Decision Tree. In: 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2022. IEEE, pp 247–252
Aldawsari H, Artoli AM (2021) A Reliable Lightweight Trust Evaluation Scheme for IoT Security. International Journal of Advanced Computer Science Applications 12 (11)
Tanwar S, Popat A, Bhattacharya P, Gupta R, Kumar N (2022) A taxonomy of energy optimization techniques for smart cities: Architecture and future directions. Expert Systems with Applications 39 (5):e12703
Uribe S, Moreno F, Hernández G, Álvarez F (2022) Personalised Interaction or How We Can Improve Migrants’ Experience When Using a Digital Companion Through a Mobile App. In: Information and Communications Technology in Support of Migration. Springer, pp 229–247
Mohanty SP, Yanambaka VP, Kougianos E, Puthal D (2020) PUFchain: A hardware-assisted blockchain for sustainable simultaneous device and data security in the internet of everything (IoE). IEEE Consumer Electronics Magazine 9 (2):8–16. doi:https://doi.org/10.1109/MCE.2019.2953758
Swathi GC, Kumar GK, Kumar AS (2022) Estimating Botnet Impact on IoT/IoE networks using Traffic flow Features. Computers Electrical Engineering 102:108209
Rustagi A, Manchanda C, Sharma N IoE: A boon & threat to the mankind. In: 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), 2020. IEEE, pp 114–119
Kouicem DE, Bouabdallah A, Lakhlef H An efficient architecture for trust management in IoE based systems of systems. In: 2018 13th Annual Conference on System of Systems Engineering (SoSE), 2018. IEEE, pp 138–143
Fortino G, Fotia L, Messina F, Rosaci D, Sarné GM (2020) Trust and reputation in the internet of things: State-of-the-art and research challenges. IEEE Access 8:60117–60125
Elsayed MA, Zulkernine M (2020) PredictDeep: security analytics as a service for anomaly detection and prediction. IEEE Access 8:45184–45197
Khan WZ, Rafique W, Haider N, Hakak S, Imran M (2022) Internet of Everything: Enabling Technologies, Applications, Security and Challenges. TechRxiv Preprint. doi:https://doi.org/10.36227/techrxiv.21341796.v1
Ryoo J, Kim S, Cho J, Kim H, Tjoa S, DeRobertis C IoE security threats and you. In: 2017 International Conference on Software Security and Assurance (ICSSA), 2017. IEEE, pp 13–19. doi:https://doi.org/10.1109/ICSSA.2017.28
Janbi N, Katib I, Albeshri A, Mehmood R (2020) Distributed artificial intelligence-as-a-service (DAIaaS) for smarter IoE and 6G environments. Sensors 20 (20):5796
Mohanty SP (2020) Security and Privacy by Design is Key in the Internet of Everything (IoE) Era. IEEE Consumer Electron Mag 9 (2):4–5
Bera B, Das AK, Obaidat MS, Vijayakumar P, Hsiao K-F, Park Y (2020) AI-enabled blockchain-based access control for malicious attacks detection and mitigation in IoE. IEEE Consumer Electronics Magazine 10 (5):82–92
Jameii SM, Zamirnaddafi RS, Rezabakhsh R (2022) Internet of Flying Things security: A systematic review. Concurrency Computation: Practice Experience 34 (24):e7213
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Iftikhar, A., Qureshi, K.N. (2024). Future Privacy and Trust Challenges for IoE Networks. In: Naseer Qureshi, K., Newe, T., Jeon, G., Chehri, A. (eds) Cybersecurity Vigilance and Security Engineering of Internet of Everything. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-031-45162-1_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-45162-1_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45161-4
Online ISBN: 978-3-031-45162-1
eBook Packages: EngineeringEngineering (R0)