Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3231053.3231103acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

IoT standardisation: challenges, perspectives and solution

Published: 26 June 2018 Publication History
  • Get Citation Alerts
  • Abstract

    The success and widespread adoption of the Internet of Things (IoT) has increased many folds over the last few years. Industries, technologists and home users recognise the importance of IoT in their lives. Essentially, IoT has brought vast industrial revolution and has helped automate many processes within organisations and homes. However, the rapid growth of IoT is also a cause for significant concern. IoT is not only plagued with security, authentication and access control issues, it also doesn't work as well as it should with fourth industrial revolution, commonly known as Industry 4.0. The absence of effective regulation, standards and weak governance has led to a continual downward trend in the security of IoT networks and devices, as well as given rise to a broad range of privacy issues. This paper examines the IoT industry and discusses the urgent need for standardisation, the benefits of governance as well as the issues affecting the IoT sector due to the absence of regulation. Additionally, through this paper, we are introducing an IoT security framework (IoTSFW) for organisations to bridge the current lack of guidelines in the IoT industry. Implementation of the guidelines, defined in the proposed framework, will assist organisations in achieving security, privacy, sustainability and scalability within their IoT networks.

    References

    [1]
    2018. Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links. Journal of Network and Computer Applications 112 (2018), 41 -- 52.
    [2]
    R. Aitken. 2017. The road to a trillion: Making the IoT work. (April 2017).
    [3]
    S. A. Al-Qaseemi, H. A. Almulhim, M. F. Almulhim, and S. R. Chaudhry. 2016. IoT architecture challenges and issues: Lack of standardization. (Dec 2016).
    [4]
    D. Bol, G. de Streel, and D. Flandre. 2015. Can we connect trillions of IoT sensors in a sustainable way? A technology/circuit perspective (Invited). (Oct 2015).
    [5]
    D. Clark. 1988. The Design Philosophy of the DARPA Internet Protocols. SIGCOMM Comput. Commun. Rev. 18, 4 (Aug. 1988), 106--114.
    [6]
    Industrial Internet Consortium. (????).
    [7]
    DDCMS. 2018. Secure by Design: Improving the cyber security of consumer Internet of Things Report. (Mar 2018).
    [8]
    N. N. Dlamini and K. Johnston. 2016. The use, benefits and challenges of using the Internet of Things (IoT) in retail businesses: A literature review. (Nov 2016).
    [9]
    Ibrahim Ghafir, Jibran Saleem, Mohammad Hammoudeh, Hanan Faour, Vaclav Prenosil, Sardar Jaf, Sohail Jabbar, and Thar Baker. 2018. Security threats to critical infrastructure : the human factor. Journal of supercomputing. (March 2018). http://dro.dur.ac.uk/24406/
    [10]
    Mohammad Hammoudeh and Mounir Arioua. 2018. Sensors and Actuators in Smart Cities. Journal of Sensor and Actuator Networks 7, 1 (2018).
    [11]
    Caroline Hayes. 2018. The Urban Sprawl of the IoT. (2018). http://eecatalog.com/arm/2018/04/04/the-urban-sprawl-of-the-iot/
    [12]
    Oliver Hogan. 2015. The Economic Contribution of Standards to the UK Economy. (2015). https://www.bsigroup.com/LocalFiles/en-GB/standards/BSI-The-Economic-Contribution-of-Standards-to-the-UK-Economy-UK-EN.pdf
    [13]
    IETF. 2018. (2018). https://www.ietf.org/
    [14]
    IOFSF. 2018. (2018). https://www.iotsecurityfoundation.org/
    [15]
    S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. S. Kwak. 2015. The Internet of Things for Health Care: A Comprehensive Survey. (2015).
    [16]
    ISO.org. 2017. International Organization for Standardization: Economic Benefits of Standards. (2017). https://www.iso.org/files/live/sites/isoorg/files/archive/pdf/en/ebs_case_studies_factsheets.pdf
    [17]
    J. A. Jerkins. 2017. Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. (Jan 2017).
    [18]
    Qi Jing, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. 2014. Security of the Internet of Things: Perspectives and Challenges. Wirel. Netw. 20, 8 (Nov. 2014), 2481--2501.
    [19]
    Olamide Jogunola, Augustine Ikpehai, Kelvin Anoh, Bamidele Adebisi, Mohammad Hammoudeh, Haris Gacanin, and Georgina Harris. 2018. Comparative Analysis of P2P Architectures for Energy Trading and Sharing. Energies 11, 1 (2018).
    [20]
    Olamide Jogunola, Augustine Ikpehai, Kelvin Anoh, Bamidele Adebisi, Mohammad Hammoudeh, Sung-Yong Son, and Georgina Harris. 2017. State-Of-The-Art and Prospects for Peer-To-Peer Transaction-Based Energy System. Energies 10, 12 (2017).
    [21]
    Ganetzky B. Littleton JT. 2000. Ion channels and synaptic organization: analysis of the Drosophila genome. (2000). https://www.ncbi.nlm.nih.gov/ /10798390
    [22]
    A. Meddeb. 2016. Internet of things standards: who stands out from the crowd? (July 2016).
    [23]
    Jason Parham. 2018. FACEBOOK AND THE PRICE OF TECH UTOPIA. (Mar 2018).
    [24]
    Postscapes. 2017. IoT Standards and Protocols. (2017).
    [25]
    Ammar Rayes Samer Salam. 2017. Internet of Things From Hype to Reality. (2017).
    [26]
    J Saleem, B Adebisi, R Ande, and M Hammoudeh. 2017. A State of the Art Survey - Impact of Cyber Attacks on SME's., Article 52 (2017).
    [27]
    Jibran Saleem and Mohammad Hammoudeh. 2017. Computer and Network Security Essentials. Springer. https://www.amazon.com/Computer-Network-Security-Essentials-Kevin-ebook/dp/B074S17K83?SubscriptionId=0JYN1NVW651KCA56C102&tag=techkie-20&linkCode=xm2&camp=2025&creative=165953&creativeASIN=B074S17K83
    [28]
    IEEE Shuang Yu. 2013. IEEE 802.3ffl fiStandard for Ethernetfi Marks 30 Years of Innovation and Global Market Growth. (2013). http://standards.ieee.org/news/2013/802.3_30anniv.html
    [29]
    William A. Smeaton. 2000. The Foundation of the Metric System in France in the 1790s., Article 44 (2000). https://www.technology.matthey.com/article/44/3/125-134/
    [30]
    European Union. 2018. European Committee for Standardization. European Standards. (2018). https://www.cen.eu/Pages/default.aspx
    [31]
    European Union. 2018. European Testing Inspection Certification System. Full list of European Standards. (2018). https://www.etics.org/
    [32]
    S. Walker-Roberts, M. Hammoudeh, and A. Dehghantanha. 2018. A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure. IEEE Access (2018), 1--1.

    Cited By

    View all
    • (2024)Analysis of Internet of things implementation barriers in the cold supply chain: An integrated ISM-MICMAC and DEMATEL approachPLOS ONE10.1371/journal.pone.030411819:7(e0304118)Online publication date: 12-Jul-2024
    • (2024)Developing a causal framework of internet of things adoption barriers for agile manufacturing in post COVID-19International Journal of Engineering Business Management10.1177/1847979023122362316Online publication date: 18-Jan-2024
    • (2024)Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directionsFuture Generation Computer Systems10.1016/j.future.2024.06.023160(577-597)Online publication date: Nov-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICFNDS '18: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems
    June 2018
    469 pages
    ISBN:9781450364287
    DOI:10.1145/3231053
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 June 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IoT
    2. computer security
    3. cyber threats
    4. legislation
    5. privacy
    6. security audit
    7. standards

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ICFNDS'18

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)166
    • Downloads (Last 6 weeks)13
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Analysis of Internet of things implementation barriers in the cold supply chain: An integrated ISM-MICMAC and DEMATEL approachPLOS ONE10.1371/journal.pone.030411819:7(e0304118)Online publication date: 12-Jul-2024
    • (2024)Developing a causal framework of internet of things adoption barriers for agile manufacturing in post COVID-19International Journal of Engineering Business Management10.1177/1847979023122362316Online publication date: 18-Jan-2024
    • (2024)Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directionsFuture Generation Computer Systems10.1016/j.future.2024.06.023160(577-597)Online publication date: Nov-2024
    • (2023)Monitoring and Control Framework for IoT, Implemented for Smart AgricultureSensors10.3390/s2305271423:5(2714)Online publication date: 1-Mar-2023
    • (2023)Intelligent Process Automation and Business Continuity: Areas for Future ResearchInformation10.3390/info1402012214:2(122)Online publication date: 14-Feb-2023
    • (2023)Review of Internet of Things security protocols – A Bibliometric Analysis2023 25th International Conference on Advanced Communication Technology (ICACT)10.23919/ICACT56868.2023.10079641(394-400)Online publication date: 19-Feb-2023
    • (2023)Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00311(2216-2221)Online publication date: 1-Nov-2023
    • (2023)Security-Aware Provenance for Transparency in IoT Data PropagationIEEE Access10.1109/ACCESS.2023.328092811(55677-55691)Online publication date: 2023
    • (2023)RME–SEP: An IoT Favorable Approach of Minimum Energy-Efficient Hybrid SEP for Heterogeneous WSN Data RoutingArabian Journal for Science and Engineering10.1007/s13369-023-08234-549:3(4005-4012)Online publication date: 14-Sep-2023
    • (2023)A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated dataCluster Computing10.1007/s10586-023-04063-127:2(2117-2132)Online publication date: 22-Jun-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media