Aya Thesis Book.V7 Cropped
Aya Thesis Book.V7 Cropped
Aya Thesis Book.V7 Cropped
Signature: .................................
………../………./………..
Dedication
This thesis is dedicated to my family, whose unwavering support and encouragement have
been instrumental in my academic journey. Their love, patience, and belief in my abilities
have been a constant source of motivation. I am deeply grateful for their sacrifices and
understanding during the countless hours spent researching, writing, and refining this work.
This achievement is a testament to their belief in me, and I dedicate this thesis to them with
heartfelt appreciation and love.
I
Acknowledgement
I would like to express my deepest gratitude to all those who have contributed to the
completion of this thesis.
First and foremost, I am immensely thankful to my supervisor, Dr. Younis Elbadry, for their
guidance, expertise, and continuous support throughout this research journey. Their insightful
feedback, valuable suggestions, and unwavering encouragement have been invaluable in
shaping this work.
Last but not least, I would like to express my heartfelt gratitude to my family for their
unwavering love, encouragement, and understanding. Their constant support and belief in my
abilities have been the driving force behind my academic pursuits.
Although it is not possible to mention everyone who has played a part in this endeavor, I am
truly grateful for all the support and assistance I have received.
Thank you all for your contributions and for being a part of this important milestone in my
academic journey.
II
Abstract
The internet has become essential to people's lives worldwide in recent years. Many
people use the Internet for various purposes, such as social networking, email
communication, and sharing data. The rise of the Internet has led to the development of
the Internet of Things (IoT) technology, which allows devices and applications to
communicate more efficiently.
The utilisation of IoT offers various advantages, but it also introduces several security
challenges. One of the main challenges is the heterogeneity of IoT networks, which
often comprise multiple types of devices, platforms, and protocols. These networks used
in IoT are complex and can be challenging to secure using traditional network security
tools and controls, which are often inadequate for the complex and dynamic nature of
IoT environments.
Another security concern is that the devices and the data transmitted to and from them
are often exposed to multiple threats. These threats can come in many forms, including
malware, hacking, physical theft, and unauthorised access. As a result, it is critical to
implement robust security measures designed specifically for IoT environments. These
measures should cover all security aspects, including confidentiality, integrity,
availability, authentication, authorisation, accountability, non-repudiation, resilience,
and scalability. By addressing these security concerns, organisations can fully realize
the benefits of IoT while minimizing the risks. We proposed the IoT security framework
based on zero-trust to address these challenges.
Our proposed IoT security framework will help implementers of IoT to overcome
existing security concerns. Zero-trust security provides a more robust and granular
framework for continuously monitoring and managing device security, access control,
and user behavior. By implementing zero-trust, IoT networks can better protect against
potential cyber-attacks and data breaches by only granting access to devices and data
based on their level of trust and continuously verifying their identity and behavior.
Moreover, the proposed framework tackles most of the security challenges in IoT
compared to other traditional security architectures.
Keywords: Internet of Things, Zero-trust, Software Defined Perimeter.
I
Contents
Chapter 1: Introduction
1. Introduction ...........................................................................
2. Problem Statement ...........................................................................
3. Aim and Objectives ...........................................................................
4. Methodology ...........................................................................
5. Scope ...........................................................................
6. Research Significance ...........................................................................
II
3. Zero trust architectures .........................................................................
3.1 NIST Architecture: ........................................................................................
3.2 Gartner Architecture:....................................................................................
3.3 CISA Zero Trust Maturity Model:..............................................................
3.4 Palo Alto Architecture:..................................................................................
4. Zero Trust in IoT .........................................................................
5. Related work .........................................................................
6. Summary .........................................................................
Chapter 4: Framework
1. Introduction .........................................................................
2. SecureIoT-ZT Framework .........................................................................
3. Complying IoT Environment with Zero-trust Architecture.................................
4. Case Study: Enhancing Security with Zero-trust Architecture...........................
5. Summary .........................................................................
III
List of Tables
IV
List of Illustrations
V
List of Abbreviations
Abbreviation Meaning
IoT Internet of Things
M2M Machine to Machine
SDP Software Defined Perimeter
VPN Virtual Private Network
ZTNA Zero Trust Network Access
RBAC Role Based Access Control
ABAC Attribute Based Access Control
CBAC Context Based Access Control
MAC Mandatory Access Control
DAC Discretionary Access Control
BLE Bluetooth Low Energy
WSNs Wireless Sensor Networks
CRM Customer Relationship Management
ERP Enterprise Resource Planning
SSO Single Sign-On
NAC Network Access Control
WAN Wide Area Network
DLP Data Loss Prevention
SASE Secure Access Service Edge
MFA Multi Factor Authentication
BYOD Bring Your Own Device
SIEM Security Information and Event Management
APTs Advanced Persistent Threats
ACI Application Centric Infrastructure
PE Policy Engine
PA Policy Administrator
PEP Policy Enforcement Point
CDM Continuous Diagnostics and Mitigation
PAM Privileged Access Management
IAM Identity and access management
IDS Intrusion Detection Systems
VI
RPL Routing for Low Power and Lossy Network
DoS Denial of Service
DDoS Distributed Denial of Service
6LoWPAN IPv6 over Low Power Wireless Personal Area
GSM Global System for Mobile
KMS Key Management Services
DTLS Datagram Transport Layer Security
TLS Transport Layer Security
RFID Radio Frequency Identification
HSMs Hardware Security Modules
PKI Public Key Infrastructure
CoAP Constrained Application Protocol
MQTT Message Queuing Telemetry Transport
AMQP Advanced Message Queuing Protocol
XMPP Extensible Messaging and Presence Protocol
GPS Global Positioning System
ZT Zero Trust
NB-IoT Narrowband Internet of Things
LTE-M Long Term Evolution Machine
Wi-Fi Wireless Fidelity
VII
Chapter 1
Introduction
8
1. Introduction
The spread of Internet of Things (IoT) devices is occurring at an unprecedented rate, as
highlighted by a recent Gartner report [1]. The IoT can defined as a wired or wireless network
of uniquely identifiable connected devices that can process data and communicate with each
other with or without human involvement.
The surge in IoT adoption is evident across various regions, with Western Europe, North
America, and China leading the way [1]. The exponential growth of machine-to-machine
(M2M) connections further emphasizes the significance of the IoT ecosystem, as the number
of M2M connections is anticipated to surge from 5.6 billion in 2016 to 27 billion in 2024 [1].
The huge potential of the Internet of Things market is evident in the projected revenue from
$892 billion in 2018 to $4 trillion by 2025. M2M connections cover many applications,
including smart cities, smart environments, smart grids, smart retail, smart agriculture, and
more [2].
The growth of the IoT field is driven by the widespread adoption of intelligent devices that
leverage diverse wireless technologies like RFID, Bluetooth, telephonic data services, Wi-Fi,
embedded actuators and sensor nodes. Over time, IoT has evolved from its initial stages and
is now transitioning from the conventional internet to a fully integrated future internet [4].
This IoT revolution has facilitated extensive and rapid interconnection among various entities,
enabling the development of intelligent environments on an unprecedented scale. This
interconnected ecosystem of devices holds immense potential for transforming industries and
enhancing everyday life through innovative applications and seamless connectivity.
This rapid expansion of IoT applications brings forth significant concerns regarding security
and privacy. Without a reliable and interconnected IoT ecosystem, the full potential of
emerging applications cannot be realized, resulting in diminished demand. In addition to the
security challenges encountered by the internet, cellular networks, and wireless sensor
networks, the IoT landscape presents unique security obstacles. These include privacy
concerns, authentication vulnerabilities, management complexities, and information storage
issues. Addressing these challenges is crucial for establishing a trusted and robust IoT
environment capable of safeguarding sensitive data and ensuring user confidence.
As the deployment of IoT devices continues to surge, the management and security of these
devices pose significant challenges. Due to their resource-constrained nature, these devices
primarily allocate their processing power to perform their intended functions, leaving limited
9
capacity for implementing security and privacy measures [2] [3]. The utilization of complex
cryptographic approaches is particularly arduous due to the devices' limited resources.
Additionally, other pertinent concerns include device tracking, device security, maintenance,
and the security and privacy of transmitted data. Developing a resilient and robust ecosystem
for these devices to operate is imperative [2] [3]. These multifaceted issues necessitate
innovative solutions that balance device functionality and robust security measures, enabling
the seamless integration of IoT devices into various domains while preserving data integrity
and user privacy.
Implementing a zero-trust management model for IoT can ensure that every infrastructure
resource's credentials and configurations are verified each time they connect to the network,
thereby preventing deceptive behavior [5]. Additionally, this model can ensure that all
messages exchanged between resources undergo authentication through security measures
such as cryptography, safeguarding them against falsification attempts. Moreover, zero-trust
management can verify the legitimacy of each transaction before its execution, effectively
identifying and discarding any abnormal or suspicious transactions. By adopting a zero-trust
approach, IoT environments can enhance security and protect against threats and unauthorized
activities.
2. Problem Statement
The security of IoT devices presents significant challenges due to their limited processing
capabilities, low power consumption, and diverse software and hardware. These devices often
struggle to comply with traditional security approaches and policies. Moreover, their presence
in critical locations can attract attackers, posing risks to organizations and individuals.
Additionally, with the rise of remote work and interconnected networks, traditional perimeter-
based security models are inadequate as employees connect from various locations and
devices outside the protected perimeter. To address these challenges, there is a need for a
comprehensive security approach that embraces the concept of "zero trust" (ZT), assuming no
implicit trust and providing robust protection for IoT devices and remote work environments;
this ensures that security measures are in place to mitigate the unique risks associated with
IoT devices and the evolving landscape of remote work.
10
To understand and explore zero trust and its architectures.
To propose and design a zero trust framework for IoT.
To evaluate the proposed framework based on IoT security requirements.
4. Methodology
In order to propose the model, the research will be carried out in the following phases:
Phase 1:
First, investigate the security vulnerabilities in IoT, which include:
IoT device-level threats resulting from IoT devices' limited computing resources.
Device mobility and plurality.
Network-level threats resulting from various IoT protocols.
Phase 2:
Explore various ZT principles, which include:
Explore and understand ZT Architectures and find an essential form of deployment
models more suitable for IoT networks.
Get a deeper look at the Software Defined Perimeter (SDP) using traditional
technologies like VPNs, a Gartner-based model.
Phase 3:
Design a zero-trust framework with the following:
Investigate and comprehend the available models.
Find their key differences to construct a solution based on these architectures.
Phase 4:
Evaluate the proposed framework in order to meet the IoT security concerns.
5. Scope
The primary goal of this study is to clarify the security concerns around the IoT network and
build a model based on ZT architectures.
6. Research Significance
In 2020, as the COVID-19 pandemic unfolded, IT teams faced the monumental task of
granting millions of employees remote access to corporate networks. Many companies turned
to VPNs, which, while serving their purpose, expanded the attack surface, hindered
productivity, and disrupted native app experiences. VPNs, though, had their limitations;
11
authorised users often gained access to the entire network, including sensitive resources. Fast
forward to 2023, the landscape has evolved significantly. Around 80% of new digital business
applications, including those in the IoT regality, are now accessed through the secure
framework of zero trust network access (ZTNA). Consequently, over 60% of enterprises have
phased out traditional VPNs in favor of ZTNA, and approximately 40% have extended its
adoption to various other use cases, as detailed in this research. [6]
12
Chapter 2
Internet of Things
(IoT)
13
1. Introduction
The Internet of Things (IoT) has the potential to revolutionize the way we live and work,
enabling everything from smart homes and cities to self-driving cars and advanced healthcare
systems. This chapter will provide a comprehensive overview of IoT, covering its definition
and key features. We will explore the various architecture components of an IoT system, its
advantages and disadvantages, examine the diverse range of IoT applications, data and
network types, and highlight the critical security requirements that must be addressed when
designing and deploying IoT systems, such as confidentiality, integrity, availability,
authentication, and authorization. Finally, we will discuss the various types of attacks that IoT
systems are vulnerable to.
By the end of this chapter, readers will have a thorough understanding of IoT technology and
its potential impact on various industries and sectors. They will also have the knowledge and
tools to effectively design, deploy, and secure IoT systems.
According to [7], IoT technology has brought revolutionary impacts in many areas of our
lives. Besides, it has provided opportunities for the creation of new business models and
revenue streams through the collection and analysis of data for product usage, leading to
improved services and offerings, by reducing the need for human intervention, such as a smart
thermostat adjusting the temperature in a home or a smart factory monitoring and controlling
its machines to minimize downtime and enhance efficiency. However, in a smart
environment, IoT and non-IoT devices and services are often blended to enhance people's
quality of life.
Although IoT is expected to impact many areas of our lives in the future significantly,
ongoing security and privacy concerns must be addressed. Due to the dynamic and diverse
nature of IoT-based smart environments, addressing these security and privacy issues can be
complex.
14
Significant issues for a wider deployment of IoT systems include: limited storage and
processing capacity of the things, concerns regarding reliability in performance, availability in
communication mediums, accessibility any-time and any-where, interoperability in a
heterogeneous environment, data management performance and security and privacy [8] [ 9].
3. IoT Architecture
Numerous proposed IoT architectures have been presented in the literature, but a commonly
accepted reference model for the IoT remains lacking. A typical architecture among these
proposals is a three-layer architecture consisting of the application, network, and perception
layers, as seen in [10] [11]. However, some architectures have suggested a four-layer structure
including the sensing, network, service, and application-interface layers, as exemplified in
[12]. As opposed to the prevalent three and four layer architectures, we agree that multiple
layers are necessary to capture the complexity of the IoT.
This study's illustration of the IoT security requirements features a security architecture with
five functional layers. According to [13], figure 1 shows the five layers: user interface,
application, services composition, network management, and device sensing.
15
As shown above, each layer has an architectural element required for information gathering,
storage, computing, processing, and communication between different layers and architectural
elements. In addition to the planes constituted by these layers, there are other fundamental
security requirements like key management, trust management, identity management,
authorization, and authentication. It should be noted that the list of security requirements
provided is not exhaustive and may need to be updated in the future to reflect new threats and
vulnerabilities [13].
The proposed security architecture is not limited to a specific layer or level of the IoT system,
but rather provides a horizontal framework that can be implemented at any level of the
system. This approach ensures that the security requirements are met at every level of
functionality and across the entire vertical plane of the IoT system. A brief description of each
layer in the vertical plane is now given:
Device Sensing Layer: The first layer of the proposed IoT security architecture
consists of smart IoT sensing devices such as sensors, RFID tags, smart phones, and
actuators capable of sensing and collecting physical parameters such as temperature,
humidity, and location. These devices can store the collected information locally or
transmit it to predefined sensor hubs for further processing. The primary functions of
this layer are data sensing and acquisition. Standardized plug-and-play mechanisms
can be used for the integration of various sensing devices. However, security is a
significant concern in their deployment, with authentication, authorization, access
control, and availability of infrastructure and networks being the key security issues at
this layer. The deployment of sensing devices may be simultaneous or staggered based
on the environmental context and practical requirements.
Network Management Layer: The second layer in IoT architecture is the network
management layer, responsible for data aggregation, Quality of Service, scheduling,
and transmitting data to the next layer. Different wired and wireless networks, cloud
computing services, and big data repositories exist. Various technologies, including
3G, 4G, GSM, WiFi, and Bluetooth, are used for data transmission in this layer. IPv6,
6LoWPAN, and RPL are commonly used technologies. Security issues in this layer
include unauthorized access, modification of routing paths, and DoS attacks.
Service Composition Layer: The third layer is the service composition layer, which
analyzes and processes data collected from the network management layer. It is built
16
on middle-ware technology that allows for information exchange among
heterogeneous objects without specific hardware and software requirements. The
service composition unit is responsible for event processing, creating service
divisions, service monitoring, and decision analytics. Common security issues in this
layer include service authentication, data confidentiality, and integrity.
Application Layer: The fourth layer is the application layer, which offers various
smart IoT services to users. It includes smart homes, smart cities, smart transport,
smart commerce, and smart health, among others. The layer is responsible for data
presentation, application access control, updating software, and security patches.
Standard interfaces using HTTP and HTTPS are widely used, while more dedicated
resource-constrained protocols like CoAP, MQTT, AMQP, and XMPP are also
employed. Common security issues in this layer include unauthorized access to
services, privacy breaches, and resource unavailability.
User Interface Layer: The fifth and final layer, known as the user interface layer,
includes the interface provided to users and the users themselves as the main
components. This layer delivers the functionalities of the system to end-users through
standard web services for both service protocol and composition received from the
application layer. Security concerns in this layer include user authentication and
authorization, unauthorized access to data, data confidentiality, and availability of
services.
17
Improved communication: IoT devices allow for improved communication
between devices and people. For example, smart medical devices can monitor
patients' health remotely and send updates to their doctor.
Data collection and analysis: IoT devices collect vast amounts of data, which
can be analyzed to provide insights and improve decision-making. For
example, smart traffic lights can collect data on traffic patterns and adjust
timing to reduce congestion.
Enhanced safety: IoT devices can enhance safety in various environments. For
example, smart smoke detectors can alert residents of a fire even if they're not
home.
Disadvantages:
Security concerns: IoT devices are vulnerable to cyber-attacks, as they often
have weak security measures. For example, a hacker could access a smart
home's security cameras and spy on the occupants.
Privacy concerns: IoT devices collect large amounts of personal data, raising
privacy concerns. For example, a fitness tracker may collect data on a user's
location and exercise habits.
Cost: IoT devices can be expensive, especially for businesses that require
large-scale implementation. Additionally, maintenance and software updates
can be costly.
Complexity: IoT devices can be complex and require specialized knowledge to
install and maintain.
Interoperability: As IoT devices come from different manufacturers, they may
not always be compatible with each other, which can limit their effectiveness.
5. IoT Applications
The IoT has a wide range of potential application areas across various industries [14]. Here
are some examples of how IoT is being used in different fields:
Smart Home: In a smart home, IoT devices can be used to control and monitor
various home appliances remotely through a mobile device or voice-activated assistant
[15]. For example, a smart thermostat can adjust the temperature in a home based on
the occupant's preferences and patterns of use. Smart lighting systems can be
18
programmed to turn on and off automatically, and security systems can be monitored
and controlled remotely.
Industrial Automation: IoT can optimize production processes and automate tasks in
industrial settings, leading to increased efficiency and reduced costs. IoT devices like
sensors can monitor machinery performance, detect potential failures, and trigger
maintenance activities. IoT can also be used to improve inventory management,
supply chain processes, and worker safety.
Healthcare: IoT can be used in healthcare to monitor patients remotely, collect health
data, and provide better patient care. For example, wearable devices like smartwatches
and fitness trackers can track a patient's heart rate, blood pressure, and vital signs [16].
This data can be used to diagnose health conditions, track medication compliance, and
monitor chronic diseases like diabetes and hypertension.
Agriculture: IoT can be used in agriculture to optimize crop yield and automate
farming processes. IoT devices like sensors can monitor soil moisture levels,
temperature, and other environmental factors affecting crop growth. This data can
inform irrigation, fertilizer application, and pest control decisions.
Transportation: IoT can be used in transportation to track vehicle location, optimize
routes, and improve traffic flow [17]. Connected vehicles can communicate with each
other and with traffic management systems to provide real-time information about
traffic conditions and congestion. This data can be used to optimize routes and reduce
travel times, leading to improved efficiency and reduced emissions.
Retail: IoT can be used in retail to personalize customer experiences, improve
inventory management, and optimize supply chain processes. For example, RFID tags
can track inventory levels in real-time, reducing stock outs and improving product
availability. Smart shelves can track customer preferences and provide personalized
product recommendations.
Energy: IoT can be used in the energy sector to optimize energy consumption,
monitor production, and improve efficiency [18]. Smart grid systems can balance
energy supply and demand in real-time, reducing the need for fossil fuel-powered
peakier plants. Connected sensors can be used to monitor energy usage in buildings
and identify opportunities for energy savings.
Environmental Monitoring: IoT can be used for environmental monitoring to collect
data on air quality, water quality, and weather conditions. Connected sensors can be
19
used to monitor pollution levels in real-time, and this data can inform decisions about
environmental policy and regulation.
Smart Cities: IoT can be used in smart cities to improve infrastructure [19], optimize
energy consumption, and enhance public safety. For example, connected sensors can
monitor traffic flow and optimize traffic signal timing, reducing congestion and
improving safety. Smart street lighting systems can adjust lighting levels based on
occupancy, reducing energy consumption and light pollution.
6. IoT Devices
IoT devices can be broadly categorized into several types based on their functionality and
application. Here are some examples:
Wearables: These devices are typically small, lightweight, and designed to be worn on a
body. They can monitor and track health and fitness data, such as heart rate, steps taken, and
calories burned. Examples of wearables include smartwatches, fitness trackers, and smart
glasses.
Smart Home Devices: These devices are designed to make home automation more accessible
and comfortable. They can be controlled via a mobile app or voice commands and used to
control various aspects of the home, such as lighting, temperature and security. Examples of
smart home devices include smart thermostats, smart lights, and smart locks.
Industrial IoT Devices: These devices are used in industrial settings to monitor and control
various aspects of the production process, such as temperature, humidity, and pressure. They
can improve efficiency, reduce waste, and improve safety. Examples of industrial IoT devices
include sensors used to monitor machinery, equipment, and supply chains.
Medical IoT Devices: These devices are used in healthcare settings to monitor patients
remotely, track vital signs, and provide real-time health data to medical professionals.
Medical IoT devices include remote patient monitoring systems, medical wearables, and
health monitoring apps.
Smart City Devices: These devices are used in urban environments to collect data and
improve city services. They can monitor traffic, air quality, waste management, and other
aspects of city life. Examples of smart city devices include smart traffic management systems,
air quality monitors, and waste management systems.
Agricultural IoT Devices: These devices are used in farming and agriculture to improve crop
yields, reduce waste, and conserve resources. They can monitor soil conditions, weather
patterns, and irrigation systems. Examples of agricultural IoT devices include soil sensors,
weather monitoring systems, and smart irrigation systems.
20
7. IoT Data Types
IoT devices generate and transmit various types of data, each with its unique characteristics
and use cases. Some of the different types of IoT data include:
Sensor Data: This is the most common type of IoT data, and it refers to the data collected by
sensors embedded in IoT devices. Sensors can measure various physical phenomena, such as
temperature, humidity, light, sound, and motion. The data generated by sensors is usually in
the form of numerical values, and it provides real-time insights into the environment. Sensor
data is essential for IoT applications such as smart homes, smart cities, and industrial
automation.
Actuator Data: Actuator data refers to the data generated by devices that perform an action
based on sensor data. For example, actuators can control temperature or turn on lights in
response to sensor data. Actuator data is usually binary, indicating whether the device is on or
off, or in some cases, it can be a range of values, such as the speed of a motor.
Location Data: Location data is generated by GPS or other location tracking technologies. It
provides real-time information about the location of devices or people. Location data is used
in IoT applications such as asset tracking.
Audio and Video Data: Audio and video data are generated by cameras and microphones.
This type of data is usually in the form of multimedia files. Audio and video data are used in
IoT applications such as video surveillance, video conferencing, and voice recognition.
User Data: User data includes information about user behavior, preferences, and usage
patterns. It can be collected through IoT devices such as smartwatches, fitness trackers, and
home automation systems. User data is used in IoT applications such as personalized
recommendations, targeted advertising, and smart health monitoring.
Metadata: Metadata includes information about the context in which the data was generated.
For example, metadata can have the time and date of data collection, the device ID, and the
location. Metadata is essential for data analytics and visualization, as it provides context and
helps interpret data.
Network Data: Network data includes information about the performance and behavior of the
network. It can be used to optimize network performance and troubleshoot issues. Network
data is generated by IoT devices such as routers, gateways, and network switches.
Environmental Data: Environmental data includes information about the environment in
which the IoT devices are deployed. For example, environmental data can consist of air
quality, weather conditions, and water quality information. Ecological data is used in IoT
applications such as environmental monitoring, precision agriculture, and smart cities.
21
In summary, IoT data can be classified into different types based on the type of IoT device
generating, the physical phenomenon being measured, or the context in which the data is
generated. Understanding the different types of IoT data is essential for building practical IoT
applications and extracting insights from IoT data.
22
use low-power wireless protocols such as Zigbee, Z-Wave, LoRaWAN, or Bluetooth Low
Energy (BLE).
Cellular Networks: Cellular networks such as 3G, 4G, and 5G are widely used to connect
IoT devices to the internet. Cellular networks provide comprehensive coverage and high
reliability, making them suitable for IoT applications such as smart cities, asset tracking, and
transportation. In addition to traditional cellular networks, cellular IoT networks such as
Narrowband IoT (NB-IoT) and LTE-M are optimised for low-power IoT devices.
Wi-Fi Networks: Wi-Fi networks are commonly used to connect IoT devices in indoor
settings such as homes and offices. Wi-Fi networks provide high bandwidth and low latency,
making them suitable for smart homes, home automation, and consumer electronics
applications. Wi-Fi networks use the IEEE 802.11 standard for wireless communication.
Ethernet Networks: Ethernet networks are used in industrial settings to connect IoT devices
such as sensors, actuators, and controllers. Ethernet networks provide high reliability, low
latency, and high bandwidth, making them suitable for industrial automation and control
applications. Ethernet networks use the IEEE 802.3 standard for wired communication.
In summary, the choice of an IoT system or network depends on factors such as the specific
requirements of the IoT application, the number and type of devices involved, the
communication range and bandwidth requirements, and the security and privacy
considerations.
Previous studies on the security of the IoT have not focused enough attention on security
requirements as a central issue, with many treating it as a secondary concern. Yang and Fang
[22] proposed a security architecture for IoT that addresses fundamental security issues like
authentication, access control, and identity based on communication, control, and
computation aspects. Other approaches, like [23] [24], prioritise authorisation, authentication,
confidentiality, access control, trust, and identity management as core security requirements
23
for IoT. Some studies, such as [15], cover other general security requirements like network
security, application security, layer security, bootstrapping security, configuration, data
integrity, firewalls, anti-virus, encryption functionality, and secure routing.
In this section, we consider these requirements to be generic and necessary for most IoT
systems:
Confidentiality: This requirement ensures that sensitive data transmitted by IoT
devices and systems is kept private and only accessible to authorised parties. To
achieve confidentiality, encryption can be used to protect data in transit and at rest,
and access controls can be implemented to limit who can view and modify data.
Integrity: This requirement ensures that data transmitted by IoT devices and systems
is not tampered with or modified without authorisation. Techniques such as data
hashing, digital signatures, and integrity checks can be used to ensure that data
remains unmodified during transmission and storage.
Availability: This requirement ensures that IoT devices and systems are available
when needed and not subject to DoS attacks or other disruptions. To achieve
availability measures such as load balancing, redundancy, and failover mechanisms
can be implemented to ensure that IoT systems can continue to operate even if one or
more components fail.
Authentication: This requirement ensures that IoT devices and systems can verify the
identity of authorised users or devices. To achieve authentication, strong passwords,
two-factor authentication, and biometric authentication can be used to verify the
identity of users and devices.
Authorization: This requirement ensures that only authorised users or devices can
access specific resources or data. Access control mechanisms such as Role-Based
Access Control (RBAC) and Attribute-Based Access Control (ABAC) can ensure that
only authorised users or devices can access specific resources or data.
Accountability: This requirement ensures that all actions taken by IoT devices or
users are traceable and auditable. Logging mechanisms can be used to track and record
all actions taken by IoT devices and users, providing a record that can be used to
investigate security breaches and other issues.
Non-Repudiation: This requirement ensures that actions taken by IoT devices or
users cannot be denied later. Techniques such as digital signatures can be used to
ensure that actions taken by IoT devices and users are authentic and cannot be rejected
later.
24
Resilience: This requirement ensures that IoT devices and systems can continue
functioning in the face of attacks or other disruptions. Resilience can be achieved
through backup systems, disaster recovery plans, and other measures to ensure IoT
systems can recover quickly from disruptions and continue functioning.
Scalability: Is a critical requirement for IoT security because IoT systems often
involve many devices and users [25]. To ensure security at scale, it is essential to
design security mechanisms that are efficient, effective, and can handle a large number
of connections and requests without compromising performance or security.
25
12. Summary
In conclusion, the Internet of Things (IoT) has rapidly transformed how we live, work, and
interact with technology. This technology has the potential to bring many benefits, such as
increased efficiency and convenience. However, it also introduces new challenges like
security risks and privacy concerns. In this chapter, we explored the features and architecture
of IoT, its applications, and its advantages and disadvantages. We also discussed the security
requirements that must be considered to protect IoT devices from attacks. Overall, while IoT
presents a promising future, it is essential to be aware of its potential risks and to implement
appropriate security measures.
26
27
References
[1] Gartner, “Zero trust architecture and solutions,” Qi An Xin Group, Beijing, 2020. [Online].
Available: https:// www.gartner.com/teamsiteanalytics/ servePDF?g=/imagesrv/media
-products/pdf/Qi-An-Xin/Qi-An-in -1-1OKONUN2.pdf
[2] T. M. Fernández-Caramés and P. Fraga-Lamas, “A review on the use of blockchain for the Internet
of things,” IEEE Access, vol. 6, pp. 3279– 33 001, 2018.
[3] S. K. Lo et al., ”Analysis of Blockchain Solutions for IoT: A Systematic Literature Review,” in IEEE
Access, vol. 7, pp. 58822-58835, 2019.
[4] Lu Tan and N. Wang, "Future Internet: The Internet of Things," in International Conference on
Advanced Computer Theory and Engineering(ICACTE), Chengdu, China, 2010.
[5] Y. Xiangshuai and W. Huijuan, “Survey on Zero-Trust Network Security,” in Artificial Intelligence
and Security. ICAIS 2020. Communications in Computer and Information Science., Singapore, 2020.
[6] S. Rose et al., “Zero trust architecture,” Nat. Inst. Stand. Technol., Gaithersburg, MD, USA, Draft
(2nd) NIST SP 800 207, 2020.
[7] H. Lin and N. W. Bergmann, ‘‘IoT privacy and security challenges for smart home environments,’’
Information, vol. 7, no. 3, p. 44, 2016.
[8] Zorzi, M.; Gluhak, A.; Lange, S.; Bassi, A. From today’s INTRAnet of things to a future INTERnet of
things: A wireless- and mobility-related view. IEEE Wirel. Commun. 2010, 17, 44–51.
[9] Radanliev, P.; De Roure, D.; Page, K.; Nurse, J.R.; Mantilla Montalvo, R.; Santos, O.; Maddox, L.;
Burnap, P.Cyber risk at the edge: Current and future trends on cyber risk analytics and artificial
intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity 2020, 3,
1–21.
[10] Khan, R.; Khan, S.U.; Zaheer, R.; Khan, S. Future Internet: The Internet of Things Architecture,
Possible Applications and Key Challenges. In Proceedings of the 10th International Conference on
Frontiers of Information Technology, Islamabad, India, 17–19 December 2012; pp. 257–260.
[11] Siegel, J.E.; Erb, D.C.; Sarma, S.E. A Survey of the Connected Vehicle Landscape—Architectures,
Enabling Technologies, Applications, and Development Areas. IEEE Trans. Intell. Transp. Syst. 2018,
19, 2391–2406.
[12] Li, S.; Tryfonas, T.; Li, H. The Internet of Things: A security point of view. Internet Res. 2016, 26,
337–359.
[13] S. Pal, M. Hitchens, T. Rabehaja, and S. Mukhopadhyay, "Security Requirements for the Internet
of Things": A Systematic Approach, Sensors, vol. 20, no. 20, pp. 5897-5897, 2020.
[14] P. Kanuch, D. Macko and L. Hudec, "Survey: Classification of the IoT technologies for better
selection to real use," in 2020 43nd International Conference on Telecommunications and Signal
Processing (TSP), 2020, pp. 500-505.
28
[15] Jerald, A.V.; Rabara, S.A.; Bai, D.P. Secure IoT architecture for integrated smart services
environment. In Proceedings of the 2016 3rd International Conference on Computing for Sustainable
Global Development (INDIACom), Palladam, India, 16-18 March 2016; pp. 800–805.
[16] Catarinucci, L.; de Donno, D.; Mainetti, L.; Palano, L.; Patrono, L.; Stefanizzi, M.L.; Tarricone, L.
An IoT-Aware Architecture for Smart Healthcare Systems. IEEE Internet Things J. 2015, 2, 515–526.
[17] Saarika, P.S.; Sandhya, K.; Sudha, T. Smart transportation system using IoT. In Proceedings of the
2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon), Bengaluru,
India, 17–19 August 2017; pp. 1104–1107.
[18] Fang, X.; Misra, S.; Xue, G.; Yang, D. Smart Grid — The New and Improved Power Grid: A Survey.
IEEE Commun. Surv. Tutor. 2012, 14, 944–980.
[19] Jin, J.; Gubbi, J.; Marusic, S.; Palaniswami, M. An Information Framework for Creating a Smart
City Through Internet of Things. IEEE Internet Things J. 2014, 1, 112–121.
[20] Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., & Henry, J. (2017). IoT Fundamentals:
Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press.
[21] Palo Alto Networks. (n.d.). The Right Approach to Zero Trust for IoT Devices. Retrieved from
https://www.paloaltonetworks.com/resources/whitepapers/the-right-approach-to-zero-trust-for-iot-
devices
[22] Yang, J.; Fang, B. Security model and key technologies for the Internet of things. J. China Univ.
Posts Telecommun. 2011, 18, 109–112.
[23] Tourani, R.; Misra, S.; Mick, T.; Panwar, G. Security, Privacy, and Access Control in Information-
Centric Networking: A Survey. IEEE Commun. Surv. Tutor. 2017, 20, 566–600.
[24] Asiri, S. A Blockchain-Based IoT Trsust Model. Master’s Thesis, Ryerson University, Toronto, ON,
Canada, 2018.
[25] Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). Security and Privacy
Issues in Internet of Things (IoT): A Review. In 2019 International Conference on Intelligent
Computing and Control Systems (ICICCS) (pp. 1289-1294). IEEE.
[26] Ahmad, M.; Younis, T.; Habib, M.A.; Ashraf, R.; Ahmed, S.H. A Review of Current Security Issues
in Internet of Things. In Recent Trends and Advances in Wireless and IoT-enabled Networks; Springer:
Berlin/Heidelberg, Germany, 2019; pp. 11–23.
[27] Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A Survey on Security and Privacy Issues in Internet-of
Things. IEEE Internet Things J. 2017, 4, 1250–1258.
[28] Ko, E.; Kim, T.; Kim, H. Management platform of threats information in IoT environment. J.
Ambient Intell. Human. Comput. 2017, 9, 1167–1176.
[29] Sfar, A.R.; Natalizio, E.; Challal, Y.; Chtourou, Z. A roadmap for security challenges in the Internet
of Things. Digital Commun. Netw. 2017, 4, 118–137.
[30] Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J.
Netw. Comput. Appl. 2017, 88, 10 – 28.
29
[31] Roman, R.; Zhou, J.; Lopez, J. On the features and challenges of security and privacy in
distributed internet of things. Comput. Netw. 2013, 57, 2266–2279 .
[32] https://publications.opengroup.org/c166.
[33] J. Kindervag, “No More Chewy Centers : Introducing The Zero Trust Model Of Information
Security,” pp. 1–15, 2010.
[34] U.S. Presidential Executive Order, “Improving critical infrastructure cybersecurity”, (February 12,
2013).
[36] K. Townsend, “Don’t implement zero-trust security in a virtualized network without reading this
overview - TechRepublic,” 2015.
[37] “Cisco Application Policy Infrastructure Controller Data Center Policy Model - Cisco,” 2014.
[38] “Cisco ACI Security: A New Approach to Secure the Next-Generation Data Center - Cisco,” 2014.
[39] Cybersecurity and Infrastructure Security Agency (CISA). (2020). Zero Trust Maturity Model.
Retrieved from https://www.cisa.gov/publication/zero-trust-maturity-model.
[40] A. Whitmore, A. Agarwal and L. Da Xu, "The Internet of Things-A survey of topics and trends,"
Information Systems Frontiers, vol. 17, no. 2, 2015.
[42] S. Rose, O. Borchert, S. Mitchell and S. Connelly, “nist.gov,” 20 August 2020. [Online]. Available:
https://doi.org/10.6028/NIST.SP.800-207. [Accessed 17 10 2020]
[43] B. Embrey, “The top three factors driving zero trust adoption,” Computer Fraud & Security, vol.
2020, no. 9, pp. 13-15, 22 September 2020.
[44] S. Mehraj and T. M. Banday, “Establishing a Zero Trust Strategy in Cloud Computing
Environment,” in 2020 International Conference on Computer Communication and Informatics
(ICCCI), Coimbatore, India, 2020.
[45] D. Sood, S. Sood, and S. K. Dhurandher, "Augmenting Zero Trust Architecture to Endpoints Using
Blockchain: A State-of-The-Art Review," in 2020 12th International Conference on Communication
Systems & Networks (COMSNETS), Bangalore, India, 2020, pp. 506-513.
[46] R. P. Atwal and S. Chauhan, "Zero Trust Network Architecture: A Survey," in 2021 IEEE 11th
Annual Computing and Communication Workshop and Conference (CCWC), 2021, pp. 110-115.
[47] M. A. Alsheikh, S. M. Abdalla, S. M. Abdalla, A. M. Abdou and A. M. Ali, "Augmenting Zero Trust
Architecture to Endpoints Using Blockchain: A State-of-The-Art Review," in IEEE Access, vol. 9, pp.
16517-16531, 2021, doi: 10.1109/ACCESS.2021.3058351.
30
المستخلص
في السنوات األخيرة ،أصبح اإلنترنت جزًء ا أساسًيا من حياة النQQاس في جميQQع أنحQQاء العQQالم .يسQQتخدم العديQQد من األشQQخاص
اإلنترنت ألغراض مختلفة ،مثل التواصل االجتماعي والبريد اإللكتروني ومشاركة البيانات .تطور تكنولوجيا اإلنQQترنت من
األشياء (اإلنترنت المتصل باألشياء) كمفهوم يهدف إلى تمكين األجهزة والتطبيقات من التواصل مع بعضها البعض بسQQهولة
أكبر ،حيث أن استخدام التكنولوجيا المبنية على اإلنترنت المتصلة باألشياء ( )IoTيQQوفر العديQQد من المزايQQا ،ولكنQQه يواجQQه
أيًض ا تحديات أمنية عديدة.
واحدة من التحديات الرئيسية هي التشابه في شبكات األشياء المتصQQلة ،حيث تتضQQمن غالًب ا مجموعQQة متنوعQQة من األجهQQزة
والمنصQات والQبروتوكوالت .هQذه الشQبكات المسQتخدمة في اإلنQترنت المتصQلة باألشQياء معقQدة وقQد تكQون صQعبة التQأمين
باستخدام أدوات وضوابط األمان التقليدية ،التي في كثير من األحيان ال تكفي للتعامل مQع طبيعQة البيئQات المتغQيرة والمعقQدة
لألجهزة المتصلة باألشياء .مصدر قلق آخر يتعلق باألمان هو أن األجهزة ذاتها ،وكذلك البيانات التي يتم نقلهQQا إليهQQا ومنهQQا،
غالًبا ما تكون عرضة للعديد من التهديدات.
يمكن أن تQأتي هQذه التهديQدات في العديQد من األشQكال ،بمQا في ذلQك الQبرامج الضQارة واخQتراق األجهQزة والسQرقة الماديQة
والوصول غير المصرح بQQه .وبالتQQالي ،فإنQQه من الضQQروري تنفيQQذ تQQدابير أمQQان قويQQة مصQQممة خصيًص ا لبيئQQات اإلنQQترنت
المتصلة باألشياء .يجب أن تشمل هذه التQQدابير جميQQع جQQوانب األمQQان ،بمQQا في ذلQQك السQQرية والنزاهQQة والتQQوافر والمصQQادقة
والترخيص والمساءلة وعدم اإلنكار والصمود والقابلية للتوسع من خالل معالجQQة هQQذه المخQQاوف األمنيQQة ،يمكن للمؤسسQQات
تحقيق الفوائد الكاملة لإلنترنت المتصل باألشياء مع تقليل المخاطر.
يهدف إطار األمان الذي نقترحه لإلنترنت المتصل باألشياء بنQاًء على مبQدأ الثقQة الصQفرية إلى مسQاعدة المنفQذين لإلنQترنت
المتصل باألشياء على التغلب على المخاوف األمنية الحالية .يوفر األمان بنQQاًء على مبQQدأ الثقQQة الصQQفرية إطQQاًرا أمنًي ا أقQQوى
وأكثر تفصياًل يسمح بمراقبة وإدارة مستمرة ألمان األجهزة وضبط الوصول وسلوك المستخدم.
من خالل تنفيQذ مبQدأ الثقQة الصQفرية ،يمكن لشQبكات اإلنQترنت المتصQلة باألشQياء حمايQة أفضQل ضQد الهجمQات السQيبرانية
المحتملة وانتهاكات البيانات من خالل منح الوصول إلى األجهزة والبيانات فقط استناًدا إلى مستوى ثقتهQا والتحقQق المسQتمر
من هويتها وسلوكها.
31
جامعة بنغازي
كلية تقنية المعلومات-
قسم شبكات واتصاالت الحاسوب
32