Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3361570.3361622acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicistConference Proceedingsconference-collections
short-paper

Security for Internet of Things: A State of the Art on existing Protocols and Open Research issues

Published: 24 March 2019 Publication History

Abstract

Internet of Things (IoT) consists of devices, smart objects, and people that are given a unique identifier connected to the internet via wireless network. These devices are usually resources limited such as battery powered, memory and processing capability etc. The migration of these objects to the internet make them susceptible to various attacks related to external or internal unauthorized devices, which affect physical links, radio hops and routing discovery, give rise to malfunction and resources exhausting. The security mechanisms widely used on the Internet are too heavy to be integrated on small constrained objects. Therefore, we need secure protocols or add a security features to the existing ones with a minimum overhead. Routing also is one of the factors that may impact the security. In this paper, we will focus our work on the State of the art of existing protocols and study their vulnerabilities. Potential solutions based on the blockchain technology are also discussed in this paper.

References

[1]
Christine Hennebert, Jessye Dos Santos, "Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis," IEEE Internet of Things Journal, vol. 1, no. 5, pp. 384--398, Oct. 2014.
[2]
Ahmed Mohammed Ibrahim Alkuhlani1, S.B. Thorat, "Internet of Things (IOT) Standards, Protocols and Security Issues." International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue. 11, pp. 491--495, November 2015.
[3]
Konstantinos Rantos, Alexandros Papanikolaou, Charalampos Manifavas, "IPsec over IEEE 802.15.4 for Low Power and Lossy Networks." MobiWac'13, November 3-8, 2013, Barcelona, Spain.
[4]
Thebiga M. Noorul, R. Suji Pramilan Noorul Islam, "An analysis of routing protocols in manets and Internet of things." International Conference on IoT and Application (ICIOT); 2017.
[5]
Anhtuan Le, Jonathan Loo, Yuan Luo, Aboubaker Lasebae, "The Impacts of Internal Threats towards Routing Protocol for Low power and lossy Network Performance," In IEEE Symposuim on Computers and Communications (ISCC), pp. 789--794, 2013.
[6]
M. Chernyshev, Z. Baig, O. Bello, S. Zeadally, "Internet of Things (IoT): Research, Simulators, and Testbeds," IEEE Internet of Things Journal, vol. 5, issue. 3, pp. 1--11, 2017.
[7]
A. Nayyar and R. Singh, "A comprehensive review of simulation tools for wireless sensor networks (WSNs)," Journal of Wireless Networking and Communications, vol. 5, no. 1, pp. 19--47, 2015.
[8]
Ghada Glissa, Aref Meddeb, "6LoWPAN multi-layered security protocol based on IEEE 802.15.4 security features," IEEE, pp. 264--268, 2017.
[9]
G. Peretti, V. Lakkundi, and M. Zorzi, "Blinktoscoap: An end-to-end security framework for the internet of things," in 2015 7th International Conference on Communication Systems and Networks (COMSNETS), IEEE, pp. 1--6, 2015.
[10]
Giulio Peretti, Vishwas Lakkundi, Michele Zorzi, "BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things," Future Information Security Workshop, COMSNETS 2015.
[11]
Smitesh Mangelkar, Sudhir N. Dhage, Anant V. Nimkar, "A Comparative Study on RPL Attacks and Security Solutions," International Conference on Intelligent Computing and Control (I2C2), 2017.
[12]
Ghada Glissa, Aref Meddeb, "IEEE 802.15.4 Security Sublayer for OMNET++," Proceeding of the 13th International Conference on Wireless Communciations and Mobile Computing (IWCMW), pp. 1891--1896, 2017.
[13]
Shahid Raza, Simon Duquennoy, Tony Chung, Dogan Yazar, Thiemo Voigt, Utz Roedig, "Securing Communication in 6LoWPAN with Compressed IPsec," Proceedings of the 7th IEEE International Conference on Distributing Computing in Sensor Systems, IEEE DCOSS, June 2011, Barcelona, Spain.
[14]
Shahid Raza, Simon Duquennoy; Goeran Selander, "Compression of IPsec AH and ESP Headers for Constrained Environments," draft-raza-6lowpan-ipsec-01, 6LoWPAN Working Group S. Raza Internet-Draft, September 3, 2013.
[15]
Ghada Glissa, Aref Meddeb, "6LowPSec: An End-to-End Security Protocol for 6LoWPAN," Ad Hoc Networks (2018).
[16]
Kuan Zhang, Xiaohui Liang, Rongxing Lu, Xuemin Shen, "Sybil Attacks And THeir Defenses In The Internet Of Things," IEEE Internet of Things Journal, vol. 1, no. 5, October 2014.
[17]
Pavan Pongle, Gurunath Chavan, "A survey: Attacks on RPL 6LoWPAN in IoT," International Conference on Pervasive Computing (ICPC), 2015.
[18]
Karishma Chugh, Aboubaker Lasebae, Jonathan Loo, "Case Study of a Black Hole Attack on 6LoWPAN-RPL," SECURWARE 2012: The Sixth International Conference on Emerging Security Information, Systems and Technologies, 2012.
[19]
Xiong Li, et al. "A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things," IEEE Internet of Things Journal, pp. 1--11, 2017.
[20]
Anjana Rajan, Jithish J, Sriram Sankaran, "Sybil Attack in IoT: Modelling and Defenses," 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2323--2327, 2017.
[21]
Patrick Olivier Kamgueu, Emmanuel Nataf, Thomas Djotio Ndie, "Survey on RPL enhancements: a focus on topology, security and mobility," Computer Communications (2018).
[22]
Faiza Medjek, Djamel Tandjaoui, Imed Romdhani, Nabil Djedjig, "A Trust-based Intrusion Detection System for Mobile RPL Based Network," IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 735--742, 2017.
[23]
Chris Piro Clay Shields Brian Neil Levine, "Detecting the Sybil Attack in Mobile Ad hoc Networks," IEEE Conference, In Securecomm and Workshops, pp. 1--11, 2006.
[24]
Anass RGHIOUI, Anass KHANNOUS, Mohammed BOUHORMA, "Denial-of-Service attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition.," Journal of Advanced Computer Science and Technology, vol. 3, no. 2, pp. 143--153, 2014.
[25]
T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, et aI., "RPL IPv6 Routing Protocol for Low-Power and Lossy Network," RFC 6550, IETF, 2012.
[26]
John R. Douceur, "They Sybil Attack," In International Workshop on Peer-to-Peer Systems, vol 2429, pp. 251--260, Springer, 2002.
[27]
Linus Wallgren, Shahid Raza, Thiemo Voigt, "Routing Attacks and Countermeasures in the RPL-Based Internet of Things," In International Journal of Destributed Sensor Networks, vol. 2013, pp. 1--11, 2013.
[28]
Minhaj Ahmad Khan, Khaled Salah, "IoT security: Review, blockchain solutions, and open challenges," Future Generation Computer Systems. pp. 395--411, 2018.
[29]
Göran Pulkkis, Jonny Karlsson, and Magnus Westerlund, "Blockchain-Based Security Solutions for IoT Systems, Internet of Things A to Z: Technologies and Applications," First Edition. pp. 253--273, 2018
[30]
Rahul Agrawal, et al "Continuous Security In IoT Using Blockchain," Internet of Things Business Models, Users, and Networks, pp. 6423--6427, 2018.
[31]
Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gauravaram, "Blockchain for IoT Security and Privacy: The Case Study of a Smart Home," 2ND IEEE PERCOM Workshop On Security Privacy And Trust In The Internet of Things, 2017.
[32]
Yash Gupta, Rajeev Shorey, Devadatta Kulkarni, Jeffrey Tew, "The Applicability of Blockchain in the Internet of Things," Proceedings of the 10th International Conference on Communication Systems & Networks (COMSNETS) pp. 561--564, 2018.
[33]
Thamer A. Alghamdi, Aboubaker Lasebae, Mahdi Aiash, "Security Analysis of the Constrained Application Protocol in the Internet of Things," In Proceeding of the 2nd International Conference on Future Generation Communication Technologies (FGCT), pp. 163--168, 2013.
[34]
Jiye Park, Namhi Kang, "Lightweight Secure Communication for CoAP-enabled Internet of Things using Delegated DTLS Handshake," In Proceeding of the 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 28--33.
[35]
Mohamed T. HAMMI, Patrick BELLOT, Ahmed SERHROUCHNI, "BCTrust: A decentralized authentication blockchain-based mechanism", IEEE Wireless Communications and Networking Conference (WCNC), pp. 1--6, 2018.
[36]
Moon Y. Jung, Ju W. Jang, "Data Management and Searching System and Method to Provide Increased Security for IoT Platform", International Conference on Information and Communication Technology Convergence, pp. 273--278.

Cited By

View all
  • (2024)Securing Wireless Networks Against Emerging Threats: An Overview of Protocols and SolutionsJournal of Science & Technology10.55662/JST.2024.54065:4(132-158)Online publication date: 4-Oct-2024
  • (2024)Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary fieldThe Journal of Supercomputing10.1007/s11227-024-06270-y80:15(21592-21614)Online publication date: 13-Jun-2024
  • (2023)Internet of things: present state of the art, applications, protocols and enabling technologies2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG)10.1109/ICTBIG59752.2023.10456335(1-6)Online publication date: 8-Dec-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIST '19: Proceedings of the 9th International Conference on Information Systems and Technologies
March 2019
249 pages
ISBN:9781450362924
DOI:10.1145/3361570
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 March 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Internet of Things
  2. Protocols
  3. Security
  4. Simulators

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

icist 2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)105
  • Downloads (Last 6 weeks)12
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Securing Wireless Networks Against Emerging Threats: An Overview of Protocols and SolutionsJournal of Science & Technology10.55662/JST.2024.54065:4(132-158)Online publication date: 4-Oct-2024
  • (2024)Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary fieldThe Journal of Supercomputing10.1007/s11227-024-06270-y80:15(21592-21614)Online publication date: 13-Jun-2024
  • (2023)Internet of things: present state of the art, applications, protocols and enabling technologies2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG)10.1109/ICTBIG59752.2023.10456335(1-6)Online publication date: 8-Dec-2023
  • (2023)DoS Attack Simulation for Intrusion Detection2023 IEEE Afro-Mediterranean Conference on Artificial Intelligence (AMCAI)10.1109/AMCAI59331.2023.10431522(1-6)Online publication date: 13-Dec-2023
  • (2023)Application of Green IoT in Agriculture 4.0 and Beyond: Requirements, Challenges and Research Trends in the Era of 5G, LPWANs and Internet of UAV ThingsWireless Personal Communications10.1007/s11277-023-10521-1131:3(1767-1816)Online publication date: 8-Jun-2023
  • (2023)A Deployment Model for IoT Devices Based on Fog Computing for Data Management and AnalysisWireless Personal Communications10.1007/s11277-023-10168-yOnline publication date: 20-Feb-2023
  • (2022)Ensure the dynamic identity and PUF based authenticated key settlement approach for the IoT infrastructureProceedings of the Indian National Science Academy10.1007/s43538-022-00110-488:4(670-687)Online publication date: 19-Sep-2022
  • (2022)IoT Eco-system, Layered Architectures, Security and Advancing Technologies: A Comprehensive SurveyWireless Personal Communications: An International Journal10.1007/s11277-021-08958-3122:2(1481-1517)Online publication date: 1-Jan-2022
  • (2022)Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL NetworksAdvances in Cyber Security10.1007/978-981-16-8059-5_21(340-360)Online publication date: 1-Jan-2022
  • (2022)Use of Blockchain in IoT Devices Security: A Systematic Mapping StudyEmerging Research in Intelligent Systems10.1007/978-3-030-96043-8_7(83-98)Online publication date: 3-Feb-2022

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media