You are on page 1of 26

DANGERS

OF

SMART CAR:
PRIVACY ISSUE
WHAT IS IOV?
IOT is driving conventional VANETS into IOV paradigm
IOV: a large-scale distributed system for wireless communication and
information exchange between vehicle2X (X: vehicle, road, human and
internet)

FEATURES:
Communications
Storage
Intelligence
and learning capabilities to anticipate the customers intentions.

2
Engr. Syeda IffatEngr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

TRACKING IS EASY
NOW
In VANETS and so in Smart cars locating and tracking a vehicle is
possible
This tracking leads to threats on the location privacy of the
vehicles user[1][2].

Engr. Syeda IffatEngr.


Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

3
Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

TRACKING AND
HACKING

Even as we aremoreconnected than ever in our


cars and trucks, our technology systems and data
security remain largely unprotected
said Senator Markey, a member of the Commerce, Science and
Transportation Committee[3].

4
Engr. Syeda IffatEngr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

DANGERS
OF

5
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

UBIQUITOUS
COMPUTING SECURITY
IoT Scenario: Ubiquitous Computing Vision
Spontaneous interaction between the digital
devices
That surround and serve uscould bring a great deal of convenience but
also a great deal of risk.
If it takes off as anticipated, ubiquitous computing will have an impact on
society similar to that of the Web.

IoT vulnerabilities will have major repercussions


It is prudent for scientists and engineers to study the protection issues
before a critical mass of applications gets built and deployed.
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

6
Engr.
Wasiat

UBIQUITOUS
COMPUTING SECURITY
IoT Security Issues for Ubiquitous
Computing
Authentication
A failure of authentication can easily lead to violations of
Confidentiality
Integrity
availability
For example, protecting your secrets with encryption does little good if the
true identity of your recipient is not what you anticipated.
So it is natural, given the task of protecting a new computing environment,
to look at authentication first.
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

UBIQUITOUS
COMPUTING SECURITY
IoT Security Issues for Ubiquitous
Computing
Confidentiality
o is violated when unauthorized principals learn protected information, such as your
medical records.

Integrity
o is violated when unauthorized principals modify information, as when someone
changes the amount or the beneficiary on a check.

Availability
o is violated when the system is prevented from performing its intended function,
as when someone brings down the Web site of an online store.
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

8
Engr.
Wasiat

HEALTH MONITORING
ISSUES IN IOT
The IOT plays a significant role in a broad
range of healthcare applications
Clinical care:
Hospitalized patients whose physiological status requires close attention
can be constantly monitored using IoT monitoring. This type of solution
employs sensors to collect information and uses gateways and the cloud
to analyze and store the information.

Remote monitoring:
Small powerful wireless solutions connected through the IoT are now
making it possible for monitoring to come out by remote monitoring.

9
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

HEALTH MONITORING
ISSUES IN IOT

Remote Patient Monitoring


These solutions capture patient health data from a variety of sensors, apply
complex algorithms to analyze the data and then share it through wireless
connectivity with medical professionals who can make appropriate health
recommendations.

10
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

THE HEALTHCARE
INTERNET OF THINGS
The health devices generally fall
into four main groups:
Consumer products for health
monitoring
Wearable external medical devices;
internally
Embedded medical devices; and
stationary
Networked, medical devices

11
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

THE HEALTHCARE
INTERNET OF THINGS
AREA OF CONCERNS:
Accidental failures
Privacy violations
Intentional Disruption
Widespread disruption

12
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

UNAVAILABILITY OF
INTERNET

13
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

DANGERS
OF

14
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

WHERE TO STORE
DATA ? [4] [5] [6] [7]
Data storage is a danger of IoT in terms of:

Memory/Hard Drive
Capacity [4]
o Big challenge for the companies to be able to
purchase enough space to keep up with the
demand for storage space

Power/Battery
o Need of minimal battery drain and low power
consumption.

15
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

WHERE TO STORE
DATA ? [4] [5] [6] [7]

Relevant Data Storage [5]


o Often companies make the mistake of saving everything without determining
the attributes that would define a piece of data as important.

16
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

DANGERS
OF

17
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

DANGERS
OF

18
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

IMPACT ON SOCIAL
BEHAVIOUR [8]
Lacks Emotional Connection
Decreases Face-to-Face Communication Skills
Facilitates Laziness
Causes Distractions
Reduces Family Closeness

19
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

SPECIALIZED
PERSONNEL

In IOT things are connected with other things either giving or getting
information.
Example: Grocery store connected with home

BIG

QUESTION?

What kinds ofjobswill be available a few years from now, and what
skills do I need to be employable?

20
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

SPECIALIZED
PERSONNEL
What kinds ofjobswill be available a few
years from now, and what skills do I need
to be employable?
Computational thinking and interpreting evidence should be an
essential part of the education curriculum, building skills and
helping people to make informed decisions about everyday use of
the Internet of Things
The Civil Service itself needs skilled people if it is to be an expert
customer and enabler of this technology[9].

21
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Jamal

Engr.
Wasiat

DANGERS
OF

22
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Wasiat

Engr.
Sikandar

INFORMATION
INTERRUPTION
Direct collection of sensitive personal information, such as precise
geolocation, financial account numbers, or health information.

Generate 150 million discrete data points a day


OR
Approximately one data point every six seconds for each household

23
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Sikandar

Engr.
Waqas

INFORMATION
INTERRUPTION
Existing smartphone sensors can be used to infer:
Users mood
Stress levels
Personality type
Smoking habits;
Overall well-being
Sleep patterns

Such inferences could be used to provide beneficial services to


consumers, but also could be misused

24
Engr. Syeda
Iffat

Engr.
Zeeshan

Engr. Gulam
Shabbir

Engr.
Ayesha

Engr.
Yasir

Engr.
Sobia

Engr.
Amnah

Engr.
Saima

Engr.
Farzana

Engr.
Sikandar

Engr.
Waqas

REFERENCES
[1] Vehicular ad hoc networks (VANETS): status, results, and challenges Sherali Zeadally ,Ray
Hunt , Yuh-Shyan Chen, Angela Irwin, Aamir Hassan Published online: 9 December 2010 Springer
Science+Business Media, LLC 2010
[2] Securing Vehicular Communications Maxim Raya, Panos Papadimitratos, Jean Pierre Hubaux,
EPFL ,IEEE Wireless Communications October 2006.
[3] Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk ByTelematics News,
Published:10 February 2015 Posted in:Cybersecurity, Security, Telematics, USA, Video
[4] http://www.storageacceleration.com/author.asp?section_id=3497
[5] http://www.networkcomputing.com/storage/internet-of-things-what-about-data-storage/a/did/1114116
[6] http://www.itbusinessedge.com/slideshows/how-the-internet-of-things-will-transform-the-datacenter-06.html
[7] http://radar.oreilly.com/2015/01/the-internet-of-things-has-four-big-data-problems.html
[8] http://www.rootsofaction.com/disadvantages-of-social-networking/
[9] The Internet of Things: making the most of the Second Digital Revolution A report by Sir Mark
Walport UK Government Chief Scientific Adviser.

25

You might also like