Abstract
PurposeIn the existing era, the Internet of Things (IoT) can be considered entirely as a system of embedding intelligence. The transverse character of IoT systems and various components associated with the arrangement of IoT systems have confronted impediments in the form of security and trust. There is a requirement to efficiently secure the IoT environment. The present study recommends a framework for impediments to secure and trustworthy IoT environments.Design/methodology/approachThe present study identifies thirteen potential impediments to secure and trustworthy IoT environment. Further, a framework is developed employing Total Interpretive Structural Model (TISM) and Cross-Impact Matrix Multiplication Applied to Classification (MICMAC) approach. The integrated approach is employed as TISM organizes inter-relations among the identified impediments, while MICMAC analysis organizes interpretations related to the driving and dependence power of the impediments.FindingsThe results from the study represents that security of IoT from arbitrary attacks is the impediment that has attained the highest driving power. The impediments such as “security of IoT from arbitrary attacks”, “profiling” and “trust and prominence structure” are identified at the top level in the analysis.Research limitations/implicationsThe previous studies highlight the facilitating contribution of IoT on various devices but neglect the impediments that can contribute towards a safe and trustworthy IoT environment. Also, the present study has its limitations as it depends upon the experts’ recommendations and suggestions.Originality/valueThe existing framework could be beneficial in constructing policies and suggestions to efficiently cater the impediments to a secure and trustworthy IoT environment.
Subject
Management, Monitoring, Policy and Law,Public Health, Environmental and Occupational Health
Reference78 articles.
1. Image classification on IoT edge devices: profiling and modeling;Cluster Computing,2020
2. Blockchain-based identity and authentication scheme for MQTT protocol,2021
3. Low-cost, open source IoT-based SCADA system design using thinger. IO and ESP32 thing;Electronics,2019
4. Atlam, H.F. and Wills, G.B. (2020), “IoT security, privacy, safety and ethics”, in Digital Twin Technologies and Smart Cities, Springer, Cham, pp. 123-149.