IoT’s Biggest Headaches: Privacy, Security, and Data Management Challenges
https://doi.org/10.46610/JISST.2025.v04i01.001
Keywords:
Data management, Deployment challenges, Interoperability, IoT security, scalabilityAbstract
The Internet of Things (IoT) is revolutionizing the way we live and work by connecting devices, collecting data, and automating processes. However, deploying IoT systems is not without its challenges. Connectivity issues can disrupt communication between devices, while interoperability struggles make it difficult for different systems to work together. Security risks like cyberattacks and data breaches raise serious concerns, as do privacy issues stemming from the vast amounts of personal data being collected. Scalability becomes a hurdle as the number of connected devices grows, demanding better data management and infrastructure. At the same time, power consumption and battery life limitations affect long-term functionality. Adding to these challenges are high costs and a shortage of skilled professionals, making IoT deployment even more complex. Overcoming these challenges requires smart planning, strong security measures, and innovative solutions to unlock the full potential of IoT in everyday life and business.
References
R. Van Kranenburg and A. Bassi, "IoT challenges," Communications in Mobile Computing, vol. 1, no. 1, p. 9, Nov. 2012. Available: https://link.springer.com/article/10.1186/2192-1121-1-9.
E. P. Yadav, E. A. Mittal, and H. Yadav, "IoT: Challenges and issues in Indian perspective," in Proceedings of the 2018 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Feb. 2018, pp. 1–5. Available: https://ieeexplore.ieee.org/abstract/document/8519869.
S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of IoT: Applications, challenges, and opportunities with China perspective," IEEE Internet of Things Journal, vol. 1, no. 4, pp. 349–359, Jul. 2014. Available: https://ieeexplore.ieee.org/abstract/document/6851114.
S. Balaji, K. Nathani, and R. Santhakumar, "IoT technology, applications, and challenges: A contemporary survey," Wireless Personal Communications, vol. 108, pp. 363–388, Sep. 2019. Available: https://link.springer.com/article/10.1007/s11277-019-06407-w.
B. B. Gupta and M. Quamara, "An overview of the Internet of Things (IoT): Architectural aspects, challenges, and protocols," Concurrency and Computation: Practice and Experience, vol. 32, no. 21, p. e4946, Nov. 2020. Available: https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.4946
Z. K. Zhang, M. C. Cho, C. W. Wang, C. W. Hsu, C. K. Chen, and S. Shieh, "IoT security: Ongoing challenges and research opportunities," in Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA), Nov. 2014, pp. 230–234. Available: https://ieeexplore.ieee.org/abstract/document/6978614
I. Lee and K. Lee, "The Internet of Things (IoT): Applications, investments, and challenges for enterprises," Business Horizons, vol. 58, no. 4, pp. 431–440, Jul. 2015. Available: https://www.sciencedirect.com/science/article/abs/pii/S0007681315000373
S. G. Soumyalatha, "Study of IoT: Understanding IoT architecture, applications, issues, and challenges," in Proceedings of the 1st International Conference on Innovative Computing and Networking (ICICN16), CSE, RRCE, May 2016. Available: https://www.ijana.in/Special%20Issue/S105.pdf
H. S. Birkel and E. Hartmann, "Impact of IoT challenges and risks for SCM," Supply Chain Management: An International Journal, vol. 24, no. 1, pp. 39–61, Mar. 4, 2019. https://www.emerald.com/insight/content/doi/10.1108/scm-03-2018-0142/full/html
C.-H. Liao, H.-H. Shuai, and L.-C. Wang, "Eavesdropping prevention for heterogeneous Internet of Things systems," in Proc. 15th IEEE Annu. Consumer Commun. Netw. Conf. (CCNC), Jan. 12, 2018, pp. 1–2. https://ieeexplore.ieee.org/abstract/document/8319297
C. Li, Z. Qin, E. Novak, and Q. Li, "Securing SDN infrastructure of IoT–fog networks from MitM attacks," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1156–1164, Mar. 21, 2017. https://ieeexplore.ieee.org/abstract/document/7883928
B. Hale and C. Komlo, "On end-to-end encryption," Cryptology ePrint Archive, 2022. https://eprint.iacr.org/2022/449
C. C. Sobin, "A survey on architecture, protocols, and challenges in IoT," Wireless Personal Communications, vol. 112, no. 3, pp. 1383–1429, Jun. 2020. https://link.springer.com/article/10.1007/s11277-020-07108-5
A. Khanna and S. Kaur, "Internet of Things (IoT), applications and challenges: A comprehensive review," Wireless Personal Communications, vol. 114, pp. 1687–1762, Sep. 2020. https://link.springer.com/article/10.1007/s11277-020-07446-4
S. Nižetić, P. Šolić, D. L. Gonzalez-De, and L. Patrono, "Internet of Things (IoT): Opportunities, issues, and challenges towards a smart and sustainable future," J. Clean. Prod., vol. 274, p. 122877, Nov. 20, 2020. https://www.sciencedirect.com/science/article/pii/S095965262032922X
G. Kambourakis, C. Kolias, and A. Stavrou, "The Mirai botnet and the IoT zombie armies," in MILCOM 2017 - IEEE Military Communications Conference (MILCOM), Oct. 23, 2017, pp. 267-272. IEEE. https://ieeexplore.ieee.org/abstract/document/8170867
T. Xu, J. B. Wendt, and M. Potkonjak, "Security of IoT systems: Design challenges and opportunities," in Proc. IEEE/ACM Int. Conf. Comput.-Aided Design (ICCAD), Nov. 2, 2014, pp. 417-423. https://ieeexplore.ieee.org/abstract/document/7001385
A. Chaudhary, "Internet of Things (IoT): Research challenges and future applications," Int. J. Emerg. Trends Sci. Technol., Jul. 11, 2022. http://igmpublication.com/ijetst.in/index.php/ijetst/article/view/1559
S. Nizetic, P. Soli, D. L. González-de, and L. Patrono, "Internet of Things (IoT): Opportunities, issues, and challenges towards a smart and sustainable future," J. Clean. Prod., vol. 274, pp. 1–32, 2020. https://iris.unisalento.it/handle/11587/444460
A. Haenel, Hybrid Security Solutions for IoT Devices, Ph.D. dissertation, Institut Polytechnique de Paris, 2024. https://theses.hal.science/tel-04884661/
M. N. Aman, M. H. Basheer, and B. Sikdar, "Two-factor authentication for IoT with location information," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3335–3351, Nov. 21, 2018. https://ieeexplore.ieee.org/abstract/document/8542644
D. Minoli, "Positioning of blockchain mechanisms in IoT-powered smart home systems: A gateway-based approach," Internet of Things, vol. 10, p. 100147, Jun. 1, 2020. https://www.sciencedirect.com/science/article/abs/pii/S2542660519302525
A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, "On blockchain and its integration with IoT: Challenges and opportunities," Future Generation Computer Systems, vol. 88, pp. 173–190, Nov. 1, 2018. https://www.sciencedirect.com/science/article/pii/S0167739X17329205
L. A. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, "IoT privacy and security: Challenges and solutions," Appl. Sci., vol. 10, no. 12, p. 4102, Jun. 15, 2020. https://www.mdpi.com/2076-3417/10/12/4102
W. Xie, Y. Jiang, Y. Tang, N. Ding, and Y. Gao, "Vulnerability detection in IoT firmware: A survey," in Proc. 23rd IEEE Int. Conf. Parallel Distrib. Syst. (ICPADS), Dec. 15, 2017, pp. 769–772. https://ieeexplore.ieee.org/abstract/document/8368433
R. Vishwakarma and A. K. Jain, "A survey of DDoS attacking techniques and defence mechanisms in the IoT network," Telecommunication Systems, vol. 73, no. 1, pp. 3–25, Jan. 2020. https://link.springer.com/article/10.1007/s11235-019-00599-z
B. K. Tripathy and J. Anuradha, Eds., Internet of Things (IoT): Technologies, Applications, Challenges and Solutions. CRC Press, Oct. 10, 2017.
S. Selvaraj and S. Sundaravaradhan, "Challenges and opportunities in IoT healthcare systems: A systematic review," SN Applied Sciences, vol. 2, no. 1, p. 139, Jan. 2020. https://link.springer.com/article/10.1007/s42452-019-1925-y
Q. D. Ngo, H. T. Nguyen, V. H. Le, and D. H. Nguyen, "A survey of IoT malware and detection methods based on static features," ICT Express, vol. 6, no. 4, pp. 280–286, Dec. 2020. https://www.sciencedirect.com/science/article/pii/S2405959520300503
K. K. Patel, S. M. Patel, and P. Scholar, "Internet of Things (IoT): Definition, characteristics, architecture, enabling technologies, applications, and future challenges," Int. J. Eng. Sci. Comput., vol. 6, no. 5, May 2016. https://www.scirp.org/reference/referencespapers?referenceid=2966486
M. Bansal, I. Chana, and S. Clarke, "A survey on IoT big data: Current status, 13 V's challenges, and future directions," ACM Comput. Surv. (CSUR), vol. 53, no. 6, pp. 1–59, Dec. 6, 2020. https://dl.acm.org/doi/abs/10.1145/3419634
A. Taivalsaari and T. Mikkonen, "A roadmap to the programmable world: Software challenges in the IoT era," IEEE Software, vol. 34, no. 1, pp. 72–80, Jan. 16, 2017. https://ieeexplore.ieee.org/abstract/document/7819416
A. Karale, "The challenges of IoT addressing security, ethics, privacy, and laws," Internet of Things, vol. 15, p. 100420, Sep. 1, 2021. https://www.sciencedirect.com/science/article/abs/pii/S2542660521000640
P. V. Krishna, S. Gurumoorthy, M. S. Obaidat, K. Dasgupta, and M. Rajasekhara Babu, "A review on cryptocurrency transactions using IOTA (Technology)," in Social Network Forensics, Cyber Security, and Machine Learning, 2019, pp. 67–81. https://link.springer.com/chapter/10.1007/978-981-13-1456-8_6
C. Bekara, "Security issues and challenges for the IoT-based smart grid," Procedia Computer Science, vol. 34, pp. 532-537, Jan. 1, 2014. https://www.sciencedirect.com/science/article/pii/S1877050914009193
E. Tekiner, A. Acar, A. S. Uluagac, E. Kirda, and A. A. Selcuk, "SoK: Cryptojacking malware," in Proc. IEEE Eur. Symp. Security Privacy (EuroS&P), Sep. 6, 2021, pp. 120-139. https://ieeexplore.ieee.org/abstract/document/9581251
J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, "Security and privacy for cloud-based IoT: Challenges," IEEE Communications Magazine, vol. 55, no. 1, pp. 26–33, Jan. 19, 2017. https://ieeexplore.ieee.org/abstract/document/7823334
K. Y. Lam and C. H. Chi, "Identity in the Internet-of-Things (IoT): New challenges and opportunities," in Proc. Int. Conf. Inf. Commun. Secur., Cham, Switzerland: Springer Int. Publishing, Nov. 25, 2016, pp. 18–26. https://link.springer.com/chapter/10.1007/978-3-319-50011-9_2
E. J. Marinissen, Y. Zorian, M. Konijnenburg, C.-T. Huang, P.-H. Hsieh, P. Cockburn, J. Delvaux, V. Rožić, B. Yang, D. Singelée, and I. Verbauwhede, "IoT: Source of test challenges," in Proc. 21st IEEE Eur. Test Symp. (ETS), May 23, 2016, pp. 1–10. https://ieeexplore.ieee.org/abstract/document/7519331
M. Litoussi, N. Kannouf, K. El Makkaoui, A. Ezzati, and M. Fartitchou, "IoT security: Challenges and countermeasures," Procedia Computer Science, vol. 177, pp. 503-508, Jan. 1, 2020. https://www.sciencedirect.com/science/article/pii/S1877050920323395
M. Marjani, F. Nasaruddin, A. Gani, A. Karim, I. A. Hashem, A. Siddiqa, and I. Yaqoob, "Big IoT data analytics: Architecture, opportunities, and open research challenges," IEEE Access, vol. 5, pp. 5247–5261, Mar. 29, 2017. https://ieeexplore.ieee.org/abstract/document/7888916
F. Meneghello, M. Calore, D. Zucchetto, M. Polese, and A. Zanella, "IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices," IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8182–8201, Aug. 13, 2019. https://ieeexplore.ieee.org/abstract/document/8796409
A. Banafa, "IoT standardization and implementation challenges," IEEE Internet of Things Newsletter, vol. 2016, pp. 1–10, Jul. 2016. https://iot.ieee.org/articles-publications/newsletter/july-2016/iot-standardization-and-implementation-challenges
C.-H. Liao, H.-H. Shuai, and L.-C. Wang, "Eavesdropping prevention for heterogeneous Internet of Things systems," in Proc. 15th IEEE Annu. Consumer Commun. Netw. Conf. (CCNC), Jan. 12, 2018, pp. 1–2. https://ieeexplore.ieee.org/abstract/document/8319297
Y. H. Hwang, "IoT security and privacy: Threats and challenges," in Proc. 1st ACM Workshop on IoT Privacy, Trust, and Security, Apr. 14, 2015, pp. 1–1. https://dl.acm.org/doi/abs/10.1145/2732209.2732216
A. Triantafyllou, P. Sarigiannidis, and T. D. Lagkas, "Network protocols, schemes, and mechanisms for the Internet of Things (IoT): Features, open challenges, and trends," Wireless Communications and Mobile Computing, vol. 2018, no. 1, p. 5349894, 2018. https://onlinelibrary.wiley.com/doi/full/10.1155/2018/5349894
M. Bharathi and T. A. S. Srinivas, "Exploring ant colony optimization for enhanced routing in IoT networks: A survey," Advancement in Image Processing and Pattern Recognition, vol. 7, no. 1, pp. 68–83, 2024. http://hbrppublication.com/OJS/index.php/AIPPR/article/view/4267
S. Luthra, D. Garg, S. K. Mangla, and Y. P. Berwal, "Analyzing challenges to Internet of Things (IoT) adoption and diffusion: An Indian context," Procedia Computer Science, vol. 125, pp. 733-739, Jan. 1, 2018. https://www.sciencedirect.com/science/article/pii/S1877050917328624
B. Kaur, S. Dadkhah, F. Shoeleh, E. C. Neto, P. Xiong, S. Iqbal, P. Lamontagne, S. Ray, and A. A. Ghorbani, "Internet of Things (IoT) security dataset evolution: Challenges and future directions," Internet of Things, vol. 22, p. 100780, Jul. 1, 2023. https://www.sciencedirect.com/science/article/abs/pii/S2542660523001038
B. H. Çorak, F. Y. Okay, M. Güzel, Ş. Murt, and S. Ozdemir, "Comparative analysis of IoT communication protocols," in Proc. 2018 Int. Symp. Netw., Comput. Commun. (ISNCC), Jun. 19, 2018, pp. 1–6. https://ieeexplore.ieee.org/abstract/document/8530963
N. M. Karie, N. M. Sahri, W. Yang, C. Valli, and V. R. Kebande, "A review of security standards and frameworks for IoT-based smart environments," IEEE Access, vol. 9, pp. 121975–121995, Sep. 3, 2021. https://ieeexplore.ieee.org/abstract/document/9528421
D. Belli, P. Barsocchi, and F. Palumbo, "Connectivity Standards Alliance Matter: State of the art and opportunities," Internet of Things, vol. 25, p. 101005, Apr. 1, 2024. https://www.sciencedirect.com/science/article/pii/S2542660523003281
D. Blaauw, D. Sylvester, P. Dutta, Y. Lee, I. Lee, S. Bang, Y. Kim, G. Kim, P. Pannuto, Y. S. Kuo, and D. Yoon, "IoT design space challenges: Circuits and systems," in Proc. 2014 Symp. VLSI Technol. (VLSI-Technology): Dig. Tech. Papers, Jun. 9, 2014, pp. 1–2. IEEE. https://ieeexplore.ieee.org/abstract/document/6894411
W. Shang, Y. Yu, R. Droms, and L. Zhang, "Challenges in IoT networking via TCP/IP architecture," NDN Project, vol. 2, Feb. 10, 2016. https://named-data.net/publications/techreports/ndn-0038-1-challenges-iot/
S. S. Samuel, "A review of connectivity challenges in IoT-smart home," in 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), Mar. 15, 2016, pp. 1–4, IEEE. https://ieeexplore.ieee.org/abstract/document/7460395
S. Singh and N. Singh, "Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce," in Proc. 2015 Int. Conf. Green Comput. Internet Things (ICGCIoT), Oct. 8, 2015, pp. 1577-1581. IEEE. https://ieeexplore.ieee.org/abstract/document/7380718.
R. C. Motta, K. M. De Oliveira, and G. H. Travassos, "On challenges in engineering IoT software systems," in Proc. XXXII Brazilian Symp. Softw. Eng., Sept. 17, 2018, pp. 42–51. https://dl.acm.org/doi/abs/10.1145/3266237.3266263.
A. Bhattacharjya, X. Zhong, J. Wang, and X. Li, "Security challenges and concerns of Internet of Things (IoT)," in Cyber-Physical Systems: Architecture, Security, and Application, 2019, pp. 153–185. https://link.springer.com/chapter/10.1007/978-3-319-92564-6_7
A. Ometov, V. Petrov, S. Bezzateev, S. Andreev, Y. Koucheryavy, and M. Gerla, "Challenges of multi-factor authentication for securing advanced IoT applications," IEEE Network, vol. 33, no. 2, pp. 82–88, Mar. 27, 2019. https://ieeexplore.ieee.org/abstract/document/8675176