ABSTRACT

The IoT has attracted a lot of attention; and yet, despite all the attention, many security and privacy challenges have remained. Since most devices in the IoT are often deployed in unattended areas, they are vulnerable to physical attacks that are not detected immediately; and the nature of broadcasting using

Table 15.1 Typical applications and benefits of the IoT Typical Applications Benefits eHealthcare system Remote patient monitoring for better healthcare Smart home Real-time remote security and surveillance Environmental monitoring Effective monitoring with lower costs Industrial automation Remote equipment management for cost savings Smart grid Smart meters, sensors for real-time monitoring

power grid

wireless communication also makes it easy for an attacker to launch an eavesdropping attack. As many research efforts have been made about IoT security challenges, in this chapter, we mainly focus on addressing privacy challenges in the IoT.