Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

On the features and challenges of security and privacy in distributed internet of things

Published: 01 July 2013 Publication History

Abstract

In the Internet of Things, services can be provisioned using centralized architectures, where central entities acquire, process, and provide information. Alternatively, distributed architectures, where entities at the edge of the network exchange information and collaborate with each other in a dynamic way, can also be used. In order to understand the applicability and viability of this distributed approach, it is necessary to know its advantages and disadvantages - not only in terms of features but also in terms of security and privacy challenges. The purpose of this paper is to show that the distributed approach has various challenges that need to be solved, but also various interesting properties and strengths.

References

[1]
INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro & Nanosystems, in co-operation with the Working group RFID of the ETP EPOSS, Internet of things in 2020: Roadmap for the future, 27 May 2008.
[2]
CERP-IoT Cluster, Visions and Challenges for Realising the Internet of Things, European Commission, 2010.
[3]
O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I.S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer, P. Doody, Internet of Things Strategic Research Roadmap, Cluster of European Research Projects on the Internet of Things, CERP-IoT, 2011.
[4]
ThingWorx. <http://www.thingworx.com/> (accessed 11.12).
[5]
Cosm. <https://cosm.com/> (accessed 11.12).
[6]
A. Gómez-Goiri, D. López-de-Ipiña, On the complementarity of Triple Spaces and the Web of Things, in: 2nd International Workshop on Web of Things (WoT'11), San Francisco, USA, 2011.
[7]
Ning, H. and Liu, H., Cyber-physical-social based security architecture for future internet of things. Advances in Internet of Things. v2 i1. 1-7.
[8]
IoT-A project - internet of things architecture. <http://www.iot-a.eu> (accessed 11.12).
[9]
Joachim W. Walewski (Ed.), D1.2 - Initial Architectural Reference Model for IoT, IoT-A Project, 2011. <http://www.iot-a.eu/public/public-documents>.
[10]
Hydra project - Heterogeneous Physical Devices in a Distributed Architecture. <http://www.hydramiddleware.eu> (accessed 11.12).
[11]
Sensei Project - Integrating the Physical with the Digital World of the Network of the Future. <http://www.sensei-project.eu> (accessed 11.12).
[12]
M. Ohashi, Introduction of Ubiquitous Service Platform Project CUBIQ, in: 10th International Symposium on Autonomous Decentralized Systems (ISADS'11), Kobe, Japan, 2011, pp. 456-460.
[13]
Smartproducts Project - Proactive Knowledge for Smart Products. <http://www.smartproducts-project.eu> (accessed 11.12).
[14]
Sensinode NanoService. <http://www.sensinode.com> (accessed 11.12).
[15]
Jones, G., Organizational Theory, Design, and Change. 2012. seventh ed. Prentice Hall.
[16]
Tanenbaum, A. and van Steen, M., Distributed Systems: Principles and Paradigms. 2002. Prentice Hall.
[17]
A. Williams. How the Internet of Things Helps us Understand Radiation Levels. <https://cosm.com/press> (accessed 11.12).
[18]
Viehland, D. and Zhao, F., The future of personal area networks in a ubiquitous computing world. International Journal of Advanced Pervasive and Ubiquitous Computing. v2 i2. 30-44.
[19]
Schaffers, H., Komninos, N., Pallot, M., Trousse, B., Nilsson, M. and Oliveira, A., Smart cities and the future internet: towards cooperation frameworks for open innovation. In: Lecture Notes in Computer Science, vol. 6656. Springer, Berlin/ Heidelberg. pp. 431-446.
[20]
Status of Cloud Services. Cloud Harmony. <http://cloudharmony.com/status> (accessed 11.12).
[21]
S. Babar, P. Mahalle, A. Stango, N. Prasad, R. Prasad, Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT), in: 3rd International Conference on Recent Trends in Network Security and Applications (CNSA'10), Chennai, India, 2010, pp. 420-429.
[22]
S. Turner, T. Polk, Security Challenges For the Internet of Things, in: IAB Interconnecting Smart Objects with the Internet Workshop, Prague, Czech Republic, 2011.
[23]
Roman, R., Najera, P. and Lopez, J., Securing the internet of things. IEEE Computer. v44 i9. 51-58.
[24]
A. Cavoukian, Privacy by Design¿ Take the Challenge, Information and Privacy Commissioner of Ontario, Canada, 2009.
[25]
Mahalle, P., Babar, S., Prasad, N.R. and Prasad, R., Identity management framework towards Internet of Things (IoT): roadmap and key challenges. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (Eds.), Communications in Computer and Information Science, vol. 89. Springer, Berlin Heidelberg. pp. 430-439.
[26]
Hartenstein, H. and Laberteaux, K., A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine. v46 i6. 164-171.
[27]
Ilie-Zudor, E., Kemeny, Z., van Blommestein, F., Monostori, L. and van der Meulen, A., A survey of applications and requirements of unique identification systems and RFID techniques. Computers in Industry. v62 i3. 227-252.
[28]
J. Takalo-Mattila, J. Kiljander, M. Etelapera, J.-P. Soininen, Ubiquitous computing by utilizing semantic interoperability with item-level object identification, in: Second International ICST Conference on Mobile Networks and Management (MONAMI'10), Santander, Spain, 2010, pp. 198-209.
[29]
T. Bauge (Ed.), D3.5 - Global and Pluggable Sensor and Actuator Networking Framework, SENSEI Project, 2011. <http://www.sensei-project.eu/>.
[30]
H. Akram, M. Hoffmann, Supports for identity management in ambient environments - the hydra approach, in: 3rd International Conference on Systems and Networks Communications (ICSNC'08), Sliema, Malta, 2008, pp. 371-377.
[31]
D. Guinard, M. Fischer, V. Trifa, Sharing using social networks in a composable web of things, in: 1st International Workshop on the Web of Things (WoT'10), Mannheim, Germany, 2010, pp. 702-707.
[32]
S.G. Weber, L.A. Martucci, S. Ries, M. Mühlhäuser, Towards trustworthy identity and access management for the future internet, in: 4th International Workshop on Trustworthy Internet of People, Things & Services (Trustworthy IoPTS'10), 2010.
[33]
Sarma, A. and Girão, J.a., Identities in the future internet of things. Wireless Personal Communications. v49 i3. 353-363.
[34]
Z. Wei, C. Meinel, Implement role based access control with attribute certificates, in: 6th International Conference on Advanced Communication Technology (ICACT'04), Phoenix Park, Korea, 2004, pp. 536-540.
[35]
G. Bai, L. Yan, L. Gu, Y. Guo, X. Chen, Context-aware usage control for web of things, Security and Communication Networks (in press). http://dx.doi.org/10.1002/sec.424/abstract.
[36]
M. Brachmann, S.L. Keoh, O.G. Morchon, S.S. Kumar, End-to-end transport security in the IP-based internet of things, in: 21st International Conference on Computer Communications and Networks (ICCCN'12), Munich, Germany, 2012, pp. 1-5.
[37]
Mocana - NanoDTLS. <https://mocana.com/products.html> (accessed 11.12).
[38]
S. Raza, S. Duquennoy, J. Hglund, U. Roedig, T. Voigt, Secure communication for the internet of things - a comparison of link-layer security and IPsec for 6LoWPAN, Security and Communication Networks (in press). http://dx.doi.org/10.1002/sec.406/abstract.
[39]
Roman, R., Alcaraz, C., Lopez, J. and Sklavos, N., Key management systems for sensor networks in the context of the internet of things. Computers & Electrical Engineering. v37. 147-159.
[40]
European Network of Excellence in Cryptology II. <http://www.ecrypt.eu.org/> (accessed 11.12).
[41]
I. Verbauwhede, J. Fan, Light-weight public key implementations for constrained devices, in: Workshop on Cryptography for the Internet of Things, Antwerp, Belgium, 2012.
[42]
K. Beznosov, P. Inglesant, J. Lobo, R. Reeder, M. Zurko, Panel: usability meets access control: challenges and research opportunities, in: 14th ACM Symposium on Access Control Models and Technologies (SACMAT'09), Stresa, Italy, 2009.
[43]
Aggarwal, C.C. and Yu, P.S., A general survey of privacy-preserving data mining models and algorithms. In: Advances in Database Systems, vol. 34. Springer, US. pp. 11-52.
[44]
Y. Shen, S. Pearson, Privacy Enhancing Technologies: A Review, Tech. rep., HP Laboratories, 2011.
[45]
V. Oleshchuk, Internet of things and privacy preserving technologies, in: 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (WirelessVITAE'09), Aalborg, Denmark, 2009, pp. 336-340.
[46]
P. Angin, B. Bhargava, R. Ranchal, N. Singh, M. Linderman, L.B. Othmane, L. Lilien, An entity-centric approach for privacy and identity management in cloud computing, in: 29th IEEE Symposium on Reliable Distributed Systems (SRDS'10), New Delhi, India, 2010, pp. 177-183.
[47]
Weber, R.H., Internet of things new security and privacy challenges. Computer Law & Security Review. v26 i1. 23-30.
[48]
S. Radomirovic, Towards a model for security and privacy in the internet of things, in: 1st International Workshop on the Security of the Internet of Things (SecIoT'10), Tokyo, Japan, 2010.
[49]
G. Broenink, J.-H. Hoepman, C. van't Hof, R. van Kranenburg, D. Smits, T. Wisman, The privacy coach: supporting customer privacy in the Internet of things, in: Pervasive 2010 Conference Workshop on What can the Internet of Things do for the citizen? (CIoT'10), Helsinki, Finland, 2010, pp. 72-81.
[50]
Button, M., Setting the watch privacy and ethics of CCTV surveillance. International Journal of Law, Crime and Justice. v39 i4. 215-217.
[51]
J.-H. Hoepman, In Things We Trust? Towards trustability in the Internet of Things, CoRR abs/1109.2637.
[52]
Køien, G., Reflections on trust in devices: an informal survey of human trust in an internet-of-things context. Wireless Personal Communications. v61 i3. 495-510.
[53]
A. Jøsang, R. Hayward, S. Pope, Trust Network Analysis with Subjective Logic, in: 29th Australasian Computer Science Conference (ACSC'06), Hobart, Australia, 2006.
[54]
Cho, J.-H., Swami, A. and Chen, I.-R., A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials. v13 i4. 562-583.
[55]
Trcek, D., Trust management in the pervasive computing era. IEEE Security & Privacy. v9 i4. 52-55.
[56]
J. Robinson, I. Wakeman, D. Chalmers, B. Horsfall, Trust and the internet of things, in: Joint International Workshop on Trust in Location and Communications in Decentralised Computing (TruLoco'10), Morioka, Japan, 2010.
[57]
uTRUSTit Project - Usable Trust in the Internet of Things. <http://www.utrustit.eu> (accessed 11.12).
[58]
T. Teixeira, S. Hachem, V. Issarny, N. Georgantas, Service oriented middleware for the internet of things: a perspective, in: Proceedings of the 4th European Conference on Towards a Service-based Internet (ServiceWave'11), Poznan, Poland, 2011, pp. 220-229.
[59]
Giannetsos, T., Krontiris, I., Dimitriou, T. and Freiling, F., Intrusion Detection in Wireless Sensor Networks. In: Security in RFID and Sensor Networks, Auerbach Publications, CRC Press.
[60]
D. Petro, G. Vesztergombi, L. Fritsch, D3.2 - Threat Analysis, uTRUSTit Project, 2011. <http://www.utrustit.eu/>.
[61]
S. Amin, Y. jig Young, M. Siddiqui, C.S. Hong, A novel intrusion detection framework for IP-based sensor networks, in: International Conference on Information Networking (ICOIN'09), 2009, pp. 1-3.
[62]
Chen, R., Liu, C.M. and Xiao, L.X., A security situation sense model based on artificial immune system in the internet of things. Advanced Materials Research. v403-408. 2457-2460.
[63]
G. Singh, F. Masseglia, C. Fiot, A. Marascu, P. Poncelet, Data mining for intrusion detection: from outliers to true intrusions, in: 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD-09), Bangkok, Thailand, 2009.
[64]
Zhang, Y., Wang, L., Sun, W., Green II, R.C. and Alam, M., Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Transactions on Smart Grid. v2 i4. 796-808.

Cited By

View all
  • (2024)Empowering IoT Developers with Privacy-Preserving End-User Development ToolsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785888:3(1-47)Online publication date: 9-Sep-2024
  • (2024)Performance- and Energy-Aware Gait-Based User Authentication With Intermittent Computation for IoT DevicesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.331309743:2(600-612)Online publication date: 1-Feb-2024
  • (2024)An interval-valued spherical fuzzy CIMAS-WISP group decision-analytic model for blockchain platform selection in digital projectsApplied Soft Computing10.1016/j.asoc.2024.111810162:COnline publication date: 1-Sep-2024
  • Show More Cited By

Index Terms

  1. On the features and challenges of security and privacy in distributed internet of things
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      Publisher

      Elsevier North-Holland, Inc.

      United States

      Publication History

      Published: 01 July 2013

      Author Tags

      1. Distributed Architectures
      2. Internet of Things
      3. Security

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 22 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Empowering IoT Developers with Privacy-Preserving End-User Development ToolsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785888:3(1-47)Online publication date: 9-Sep-2024
      • (2024)Performance- and Energy-Aware Gait-Based User Authentication With Intermittent Computation for IoT DevicesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.331309743:2(600-612)Online publication date: 1-Feb-2024
      • (2024)An interval-valued spherical fuzzy CIMAS-WISP group decision-analytic model for blockchain platform selection in digital projectsApplied Soft Computing10.1016/j.asoc.2024.111810162:COnline publication date: 1-Sep-2024
      • (2024)A survey on IoT trust model frameworksThe Journal of Supercomputing10.1007/s11227-023-05765-480:6(8259-8296)Online publication date: 1-Apr-2024
      • (2023)Enhanced Sensor Communication through Trusted ComputingProceedings of the 2023 International Conference on embedded Wireless Systems and Networks10.5555/3639940.3639999(369-379)Online publication date: 15-Dec-2023
      • (2023)IoT trust and reputation: a survey and taxonomyJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-023-00416-812:1Online publication date: 22-Mar-2023
      • (2023)A Survey on Edge Intelligence and Lightweight Machine Learning Support for Future Applications and ServicesJournal of Data and Information Quality10.1145/358175915:2(1-30)Online publication date: 25-Jan-2023
      • (2023)Fault tolerance in fog-based Social Internet of ThingsKnowledge-Based Systems10.1016/j.knosys.2023.110376265:COnline publication date: 8-Apr-2023
      • (2023)HieraledgerInformation Sciences: an International Journal10.1016/j.ins.2023.02.077632:C(87-104)Online publication date: 1-Jun-2023
      • (2023)F-NIDS — A Network Intrusion Detection System based on federated learningComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.110010236:COnline publication date: 1-Nov-2023
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media