In today’s era Governance, Security and Privacy are current challenges for the Internet of Things and thereby are the most extensively studied issues in the IT industry and research. Various definitions of the concepts of IoT Governance, Security, and Privacy have been proposed by different government industries and research organizations.
‘Administration‘ alludes to the standards, cycles, and conduct that influence the manner by which powers are worked out, especially as respects receptiveness, interest, responsibility, viability, and cognizance. These five “standards of good administration” build up those of subsidiarity and proportionality.
Also Read :
How can we use IoT in governance?
Who governs the IoT?
There are organizations like IEEE, IGF, etc. which deal with the concept of governance through specific aspects. There is a need to take a logical step to extend the internet governance to governance in the Internet of Things. Due to the high number and heterogeneity of technologies and the devices used in a lot more specific Governance solutions and complex approaches are the main hurdles. The two main components that affect the governance of loT are Organisation Size and heterogeneity:
IoT Governance Challenges
Governance is considered as a double-edged sword, as it can offer stability and support for decisions but at the same time its excessive use can result an over-controlled environment.
The main complexity of the IoT governance is to find a common definition of IoT governance together with the different positions of many stakeholders. It is too early to start a policy development since there is no agreement on finding special rules for IoT governance issues that are separated from other general rules. Nevertheless, since there are no legal frameworks for IoT governance, even if the differences between the IoT and the Internet have been overestimated. It is necessary and worthwhile to conduct an analysis of the major IoT governance issues like legitimacy, transparency, accountability, and anti-competitive behavior.
Heterogeneity in IoT Administration
expects security to beat the inconceivability of carrying out productive conventions and calculations on every one of the gadgets required across the numerous IoT application regions. Unless guaranteed security, the stakeholders are unlikely to adopt IoT solutions on a large scale. The key factors to allow data protection are to develop enforcement techniques to support scalability and heterogeneity, to anonymize users’ data and to allow context aware data protection are key factors. As far as loT is concerned, it is difficult to separate the concepts of Governance, Security and Privacy. To address privacy and security aspects and to achieve trust in IoT it is necessary to have strong governance mechanisms. At the higher level of the interaction of IoT, with users, ethical aspects cannot be disjointed from the governance, security and privacy aspects as well.
Thus, we adopt the definitions of security and privacy where privacy, data protection and information security are complementary requirements for IoT services. In particular information security has the objective to preserve the confidentiality, integrity and availability of information.