The Internet-of-Things (IoT) Security : A Technological Perspective and Review

Authors

  • Dr. Yusuf Perwej  Assistant Professor, Department of Information Technology, Al Baha University, Al Baha, Kingdom of Saudi Arabia (KSA)
  • Firoj Parwej  Research Scholar, Department of Computer Science & Engineering, Singhania University, Jhunjhunu, Rajasthan, India
  • Mumdouh Mirghani Mohamed Hassan  Assistant Professor, Department of Computer Science, Al Baha University, Al Baha, Kingdom of Saudi Arabia (KSA)
  • Nikhat Akhtar  Research Scholar-Ph.D, Department of Computer Science & Engineering, Babu Banarasi Das University, Lucknow, India

DOI:

https://doi.org//10.32628/CSEIT195193

Keywords:

Internet of Things (IoT), Sybil Attack, IoT Authentication, IoT Trust, IoT Protocols, IoT Security

Abstract

Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things (IoT). The IoT is emerging as the third wave in the evolution of the Internet. The 1990s’ Internet wave connected 1.2 billion subscribers while the 2000s’ mobile wave connected another 2.4 billion. Actually, IoT is expected to consist of more than 84 billion connected devices generating 186 zettabyte of data by 2025, in the opinion of IDC. It includes major types of networks, such as distributed, ubiquitous, grid, and vehicular, these have conquered the world of information technology over a decade. IoT is growing fast across several industry verticals along with increases in the number of interconnected devices and diversify of IoT applications. In spite of the fact that, IoT technologies are not reaching maturity yet and there are many challenges to overcome. The Internet of Things combines actual and virtual anywhere and anytime, fascinate the attention of both constructor and hacker. Necessarily, leaving the devices without human interference for a long period could lead to theft and IoT incorporates many such things. In this paper, we are briefly discussing technological perspective of Internet of Things security. Because, the protection was a major concern when just two devices were coupled. In this context, security is the most significant of them. Today scenario, there are millions of connected devices and billions of sensors and their numbers are growing. All of them are expected secure and reliable connectivity. Consequently, companies and organizations adopting IoT technologies require well-designed security IoT architectures.

References

  1. Yusuf Perwej, Mahmoud A. AbouGhaly, Bedine K. Hani Ali M. Harb, “An Extended Review on Internet of Things (IoT) and Its Promising Applications”, Communications on Applied Electronics (CAE), ISSN: 2394-4714, Foundation of Computer Science FCS, New York, USA, Volume 9, Number 26, Pages 8– 22, Feb 2019, DOI: 10.5120/cae2019652812
  2. Yusuf Perwej, “An Experiential Study of the Big Data,” International Transaction of Electrical and Computer Engineers System (ITECES), USA, ISSN (Print): 2373-1273 ISSN (Online): 2373-1281, Vol. 4, No. 1, page 14-25, March 2017, DOI:10.12691/iteces-4-1-3.
  3. Nikhat Akhtar, Firoj Parwej, Dr. Yusuf Perwej, “A Perusal of Big Data Classification and Hadoop Technology,” International Transaction of Electrical and Computer Engineers System (ITECES), USA, ISSN (Print): 2373-1273 ISSN (Online): 2373-1281, Vol. 4, No. 1, page 26-38, May 2017, DOI: 10.12691/iteces-4-1-4.
  4. Luigi Atzori, Antonio Iera, and Giacomo Morabito. The internet of things: A survey. Computer Networks, 54(15):2787–2805, 2010.
  5. Gartner Inc. Press Release (2014) http://www.gartner.com/newsroom/id/2905717
  6. G. Wu, S. Talwar, K. Johnsson,N. Himayat, and K. D. Johnson, “M2M: from mobile to embedded internet,” IEEE Communications Magazine, vol. 49, no. 4, pp. 36–43, 2011.
  7. L. Atzori, A. Iera, and G. Morabito, “The internet of things: a survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010.
  8. Gartner Inc., “Hype cycle for the internet of things 2017,” Technical report, July 2017.
  9. V. Karagiannis, P. Chatzimisios, F. Vazquez-Gallego, J. Alonso-Zarate, "A survey on application layer protocols for the internet of things", Transaction on IoT and Cloud Computing, vol. 3, no. 1, pp. 11-17, 2015.
  10. Xiaolin Jia, Quanyuan Feng, Taihua Fan, Quanshui L. , ”RFID technology and its applications in Internet of Things (IoT)”, 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), IEEE, Yichang, China, April 2012
  11. Nasser S. A., Andrew J., Olga A.,” Internet of Things Security: A Review of Risks and Threats to Healthcare Sector ”, IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, June 2017
  12. Wei Z., Yan Jia., Anni P., Yuqing Z., Peng L.,”The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved”, IEEE Internet of Things Journal, June 2018
  13. J. Gubbia, R. Buyya, S. Marusic, M. Palaniswami, "Internet of Things (IoT): A vision architectural elements and future directions" in Future Generation Computer Systems, Elsevier, vol. 29, pp. 1645-1660, 2013.
  14. R. H. Weber, "Internet of Things New security and privacy challenges", Computer Law & Security Review, vol. 26, no. 1, pp. 23-30, Jan. 2010.
  15. M. O. Lehtonen, F. Michahelles, E. Fleisch, "Trust and Security in RFID-Based Product Authentication Systems", IEEE Systems Journal, vol. 1, no. 2, pp. 129-144, Dec. 2007.
  16. Yusuf Perwej, Kashiful H., Uruj J., Firoj Perwej, “Block ciphering in KSA, A major breakthrough in cryptography analysis in wireless networks” International Transactions in Mathematical Sciences and Computer, India, ISSN-0974-5068, vol. 2, No. 2, pages 369-385, July-December 2009
  17. G. Gan, Z. Lu, J. Jiang, "Internet of Things Security Analysis", 2011 International Conference on Internet Technology and Applications, pp. 1-4, Aug. 2011.
  18. I. Gudymenko, K. B. Pfitzmann, K. Tietze, "Privacy implications of the internet of things" in Constructing Ambient Intelligence, Springer, pp. 280-286, 2012
  19. Marianne Azer, Sherif El-Kassas, Magdy El-Soudani, “A full of the Wormhole Attack”, International Journal of Computer Science and Information Security, 2009.
  20. Kelly Jackson, “Hacker’s Choice: Top Six Database Attacks.
  21. Ş. Okul ; M. Ali Aydın,” Security Attacks on IoT ”, International Conference on Computer Science and Engineering (UBMK), IEEE, Antalya, Turkey, Oct. 2017
  22. Elisa Bertino, Nayeem Islam,” Botnets and Internet of Things Security ”. Computer, IEEE, Volume 50 , Issue 2, Feb 2017
  23. A. Mohsen Nia and N. K. Jha, “A Comprehensive Study of Security of Internet-of-Things,” IEEE Transactions on Emerging Topics in Computing, vol. PP, no. 99, p. d, 2016.
  24. Kuan Zhang, Xiaohui Liang, Rongxing Lu, Xuemin Shen,” Sybil Attacks and Their Defenses in the Internet of Things”, IEEE Internet of Things Journal , Volume 1 , Issue 5 , Oct. 2014
  25. Ian G. Harris,” Social Engineering Attacks on the Internet of Things ”, September 7, 2016
  26. L. Atzori, A. Iera, G. Morabito, "The Internet of Things: A survey", Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010.
  27. E. Haselsteiner and K. Breitfuß, “Security in Near Near Field Communication (NFC) Strengths,” Semiconductors, vol. 11, no. 71, p. 71, 2006.
  28. Seo JW, Lee SJ,”A study on the detection of DDoS attack using the IP Spoofing”, J Korea Inst Inf Secur Crytol 25(1):147-153, 2015
  29. D. Miessler, “Securing the Internet of Things: Mapping Attack Surface Areas Using the OWASP IoT Top 10.
  30. G. Hernandez, O. Arias, D. Buentello, and Y. Jin, “Smart Nest Thermostat : A Smart Spy in Your Home,” Black Hat USA, pp. 1–8, 2014.
  31. Pin-Yu Chen, Shin-Ming Cheng, and Kwang-Cheng Chen. Optimal control of epidemic information dissemination over networks. IEEE Trans. Cybern., 44(12):2316–2328, December 2014.
  32. Pin-Yu Chen and Shin-Ming Cheng. Sequential defense against random intentional attacks in complex networks. Phys. Rev. E, 91:022805, February 2015.
  33. Shan C, Hui X, Da L, et al. A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective{J}. IEEE Internet of Things Journal, 1(4), 349-359, 2014
  34. Pin-Yu Chen and Alfred O. Hero. Assessing and safeguarding network resilience to nodal attacks. IEEE Commun.Mag., 52(11):138–143,November 2014.
  35. D. Quercia and S. Hailes, “Sybil attacks against mobile users: Friends and foes to the rescue,” in Proc. IEEE IEEE Conf. Comput. Commun. (INFOCOM), 2010, pp. 336–340.
  36. W. Chang, J. Wu, C. Tan, and F. Li, “Sybil defenses in mobile social networks,” in Proc. IEEE Conf. Global Commun. (GLOBECOM), 2013, pp. 1–6.
  37. Pin-Yu Chen and Kwang-Cheng Chen. Intentional attack and fusion-based defense strategy in complex networks. In Proc. IEEE Global Telecommunications Conference (GLOBECOM), pages 1–5, December 2011.
  38. Pin-Yu Chen, Shin-Ming Cheng, and Kwang-Cheng Chen. Information fusion to defend intentional attack in internet of things. IEEE IoT-J., 1(4):337–348, August 2014.
  39. J. Tian, W. Zhao, R. Du, and Z. Zhang, “A New Data Fusion Model of Intrusion Detection-IDSFP,” in Parallel and Distributed Processing and Applications, vol. 3758 of Lecture Notes in Computer Science, pp. 371–382, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005.
  40. Martin Osborne and Ariel Rubinstein. A Course in Game Theory. MIT, Cambridge, MA, 1999.
  41. S. Sicari, A. Rizzardi, L. A. Grieco, A. Coen-Porisini, "Security privacy and trust in Internet of Things: The road ahead", Computer Networks, vol. 76, pp. 146-164, Jan. 2015.
  42. T. Eder, D. Nachtmann, D. Schreckling, "Trust and Reputation in the Internet of Things", Conference Seminar (SS2013) - Real Life Security (5827HS), Dec. 2013.
  43. Z. Yan, P. Zhang, A. V. Vasilakos, "A survey on trust management for Internet of Things", Journal of Network and Computer Applications, vol. 42, pp. 120-134, Jan. 2014.
  44. J. Guo, R. Chen, "A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems", IEEE International Conference on Services Computing (SCC), pp. 324-331, June 2015.
  45. Ie yuan, Xiaoyong li,” A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion”, special section on security and trusted computing for industrial internet of things, volume 6, May 16, 2018
  46. P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, M. Ylianttila, "Two-phase authentication protocol for wireless sensor networks in distributed IoT applications", Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), pp. 2728-2733, Sep. 2014
  47. E Vasilomanolakis, J Daubert, M Luthra, V Gazis, A Wiesmaier, P. Kikiras, "On the Security and Privacy of Internet of Things Architectures and Systems", 2015 International Workshop on Secure Internet of Things (SIoT), pp. 49-57, Sep 2015
  48. Chen, D., Chang, G. R., Sun, D. W., Li, J. J., Jia. J., and Wang. X. W.,”TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things”, Computer Science and Information Systems.,1207-28, October 2010
  49. Michael Schukat, Pablo Cortijo,” Public key infrastructures and digital certificates for the Internet of things”, 26th Irish Signals and Systems Conference (ISSC),IEEE, Carlow, Ireland, June 2015
  50. Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang, "Security and Trust in Digital Rights Management: A Survey", International Journal of Network Security, vol. 9, no. 3, pp. 247-263, 2009.
  51. Younggyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won, "A PKI System for Detecting the Exposure of a User's Secret Key Public Key Infrastructure Springer Berlin, Heidelberg", vol. 4043, pp. 248-250, June 2006.
  52. Yun-kyung Lee, Hong-il Ju, Jee-hye User, authentication mechanism using authentication server in homnetwork Advanced Communication Technology, pp. 504-506, 2006.
  53. Gianmarco Baldini, Trevor Peirce, Maria Chiara Tallachini, "Internet of Things: IoT Governance European Research Cluster on the Internet of Things, Jan. 2014
  54. M. Bauer, P. Chartier, K. Moessner, Catalogue of IoT Naming, Addressing and discovery schemes in IERC projects V1.7, IERC-AC2-D1, 2013.
  55. AS. Wazan, R. Laborde, F. Barrère, A. Benzekri, "Validating X. 509 certificates based on their quality", Young Computer Scientists 2008. ICYCS 2008. The 9th International Conference for IEEE, pp. 2055-2060, November 2008.
  56. J. Shannon, H. Melvin, A. G. Ruzzelli, Dynamic flooding time synchronization protocol for WSNs, IEEE GLOBECOM, 2012.
  57. P. Camion, J. Patarin, "The knapsack hash function proposed at Crypto'89 can be broken", Adv. in Cryptology Proc. Eurocrypt'91, pp. 39-53, 1991.
  58. Yusuf Perwej, Kashiful H., Uruj J., Sharad S., “Some drastic improvements found in the analysis of routing protocol for the Bluetooth technology using scatternet” International Conference on Computing, Communications and Information Technology Applications (CCITA-2010), Ubiquitous Computing and Communication Journal (UBICC) Seoul, South Korea, ISSN Online 1992-8424, ISSN Print 1994-4608, Volume CCITA-2010, Number 5, pages 86-95, 2010
  59. J. Granjal, E. Monteiro, J. Sá Silva, "Security for the Internet of Things: A survey of existing protocols and open research issues", IEEE Commun. Surveys Tuts., vol. 17, no. 3, pp. 1294-1312, 3rd Quart. 2015
  60. Borislav S. Đorđević, Slobodan P. Jovanović, Valentina V. Timčenko, ” Cloud Computing in Amazon and Microsoft Azure platforms: Performance and service comparison ”, 22nd Telecommunications Forum Telfor (TELFOR),IEEE, Belgrade, Serbia, Nov. 2014
  61. R. Tudoran, A. Costan, G. Antoniu, L. Bougé, "A performance evaluation of azure and nimbus clouds for scientific applications", Proceedings of the 2nd International Workshop on Cloud Computing Platforms, pp. 4, 2012.
  62. R. Giuliano, A. Neri, and D. Valletta, “End-to-end secure connection in heterogeneous networks for critical scenarios”, WIFS 2012, Proc. of the 2012 IEEE Intl. Workshop on Information Forensics and Security, pp. 264–269, Tenerife, Spain.
  63. Ka-Ping Yee, "Aligning security and usability." IEEE Security & Privacy 2.5, pp 48-55, 2004
  64. Rebecca E. Grinter, et al., "The work to make a home network work." ECSCW 2005. Springer Netherlands, 2005
  65. A. P. Castellani, M. Gheda, N. Bui, M. Rossi, and M. Zorzi, "Web Services for the Internet of Things through CoAP and EXI," in IEEE RWFI, Kyoto, Japan, Jun. 2011

Downloads

Published

2019-02-28

Issue

Section

Research Articles

How to Cite

[1]
Dr. Yusuf Perwej, Firoj Parwej, Mumdouh Mirghani Mohamed Hassan, Nikhat Akhtar, " The Internet-of-Things (IoT) Security : A Technological Perspective and Review , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.462-482, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT195193