OF
SMART CAR:
PRIVACY ISSUE
WHAT IS IOV?
IOT is driving conventional VANETS into IOV paradigm
IOV: a large-scale distributed system for wireless communication and
information exchange between vehicle2X (X: vehicle, road, human and
internet)
FEATURES:
Communications
Storage
Intelligence
and learning capabilities to anticipate the customers intentions.
2
Engr. Syeda IffatEngr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
TRACKING IS EASY
NOW
In VANETS and so in Smart cars locating and tracking a vehicle is
possible
This tracking leads to threats on the location privacy of the
vehicles user[1][2].
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
3
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
TRACKING AND
HACKING
4
Engr. Syeda IffatEngr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
DANGERS
OF
5
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
UBIQUITOUS
COMPUTING SECURITY
IoT Scenario: Ubiquitous Computing Vision
Spontaneous interaction between the digital
devices
That surround and serve uscould bring a great deal of convenience but
also a great deal of risk.
If it takes off as anticipated, ubiquitous computing will have an impact on
society similar to that of the Web.
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
6
Engr.
Wasiat
UBIQUITOUS
COMPUTING SECURITY
IoT Security Issues for Ubiquitous
Computing
Authentication
A failure of authentication can easily lead to violations of
Confidentiality
Integrity
availability
For example, protecting your secrets with encryption does little good if the
true identity of your recipient is not what you anticipated.
So it is natural, given the task of protecting a new computing environment,
to look at authentication first.
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
UBIQUITOUS
COMPUTING SECURITY
IoT Security Issues for Ubiquitous
Computing
Confidentiality
o is violated when unauthorized principals learn protected information, such as your
medical records.
Integrity
o is violated when unauthorized principals modify information, as when someone
changes the amount or the beneficiary on a check.
Availability
o is violated when the system is prevented from performing its intended function,
as when someone brings down the Web site of an online store.
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
8
Engr.
Wasiat
HEALTH MONITORING
ISSUES IN IOT
The IOT plays a significant role in a broad
range of healthcare applications
Clinical care:
Hospitalized patients whose physiological status requires close attention
can be constantly monitored using IoT monitoring. This type of solution
employs sensors to collect information and uses gateways and the cloud
to analyze and store the information.
Remote monitoring:
Small powerful wireless solutions connected through the IoT are now
making it possible for monitoring to come out by remote monitoring.
9
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
HEALTH MONITORING
ISSUES IN IOT
10
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
THE HEALTHCARE
INTERNET OF THINGS
The health devices generally fall
into four main groups:
Consumer products for health
monitoring
Wearable external medical devices;
internally
Embedded medical devices; and
stationary
Networked, medical devices
11
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
THE HEALTHCARE
INTERNET OF THINGS
AREA OF CONCERNS:
Accidental failures
Privacy violations
Intentional Disruption
Widespread disruption
12
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
UNAVAILABILITY OF
INTERNET
13
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
DANGERS
OF
14
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
WHERE TO STORE
DATA ? [4] [5] [6] [7]
Data storage is a danger of IoT in terms of:
Memory/Hard Drive
Capacity [4]
o Big challenge for the companies to be able to
purchase enough space to keep up with the
demand for storage space
Power/Battery
o Need of minimal battery drain and low power
consumption.
15
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
WHERE TO STORE
DATA ? [4] [5] [6] [7]
16
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
DANGERS
OF
17
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
DANGERS
OF
18
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
IMPACT ON SOCIAL
BEHAVIOUR [8]
Lacks Emotional Connection
Decreases Face-to-Face Communication Skills
Facilitates Laziness
Causes Distractions
Reduces Family Closeness
19
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
SPECIALIZED
PERSONNEL
In IOT things are connected with other things either giving or getting
information.
Example: Grocery store connected with home
BIG
QUESTION?
What kinds ofjobswill be available a few years from now, and what
skills do I need to be employable?
20
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
SPECIALIZED
PERSONNEL
What kinds ofjobswill be available a few
years from now, and what skills do I need
to be employable?
Computational thinking and interpreting evidence should be an
essential part of the education curriculum, building skills and
helping people to make informed decisions about everyday use of
the Internet of Things
The Civil Service itself needs skilled people if it is to be an expert
customer and enabler of this technology[9].
21
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Jamal
Engr.
Wasiat
DANGERS
OF
22
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Wasiat
Engr.
Sikandar
INFORMATION
INTERRUPTION
Direct collection of sensitive personal information, such as precise
geolocation, financial account numbers, or health information.
23
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Sikandar
Engr.
Waqas
INFORMATION
INTERRUPTION
Existing smartphone sensors can be used to infer:
Users mood
Stress levels
Personality type
Smoking habits;
Overall well-being
Sleep patterns
24
Engr. Syeda
Iffat
Engr.
Zeeshan
Engr. Gulam
Shabbir
Engr.
Ayesha
Engr.
Yasir
Engr.
Sobia
Engr.
Amnah
Engr.
Saima
Engr.
Farzana
Engr.
Sikandar
Engr.
Waqas
REFERENCES
[1] Vehicular ad hoc networks (VANETS): status, results, and challenges Sherali Zeadally ,Ray
Hunt , Yuh-Shyan Chen, Angela Irwin, Aamir Hassan Published online: 9 December 2010 Springer
Science+Business Media, LLC 2010
[2] Securing Vehicular Communications Maxim Raya, Panos Papadimitratos, Jean Pierre Hubaux,
EPFL ,IEEE Wireless Communications October 2006.
[3] Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk ByTelematics News,
Published:10 February 2015 Posted in:Cybersecurity, Security, Telematics, USA, Video
[4] http://www.storageacceleration.com/author.asp?section_id=3497
[5] http://www.networkcomputing.com/storage/internet-of-things-what-about-data-storage/a/did/1114116
[6] http://www.itbusinessedge.com/slideshows/how-the-internet-of-things-will-transform-the-datacenter-06.html
[7] http://radar.oreilly.com/2015/01/the-internet-of-things-has-four-big-data-problems.html
[8] http://www.rootsofaction.com/disadvantages-of-social-networking/
[9] The Internet of Things: making the most of the Second Digital Revolution A report by Sir Mark
Walport UK Government Chief Scientific Adviser.
25