Abstract
The Internet of Things incorporates billions of sensors, cameras, RFID and other machines that observe and/or affect the physical world, as well as IoT applications that harvest and analyse IoT data in the cloud, edge computers, and/or the IoT devices themselves. To realise its full potential IoT must ensure the security of the IoT data and related applications that support the IoT-based services and products that are provided to their consumers. Although IoT devices, networks, and computing resources support robust security standards and include related mechanisms that can secure IoT data within the scope of these IoT components, compositions of such point security solutions often fail to ensure the security of IoT data across the IoT ecosystem. In this article we will discuss the main challenges in securing IoT data acquisition, communication, analysis, actuation and illustrate the need for IoT security solutions that are both holistic and lightweight. In addition, we propose a holistic and lightweight IoT security mechanism that via a novel combination of contextualisation with homomorphic encryption prevents harmful outcomes from lack of IoT data security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aggarwal, C.C., Philip, S.Y.: A general survey of privacy-preserving data mining models and algorithms. In: Privacy-Preserving Data Mining, pp. 11–52. Springer, Boston (2008). https://doi.org/10.1007/978-0-387-70992-5_2
Andrukiewicz, E., Cadzow, S., Górniak, S.: IoT security standards gap analysis. European Union Agency For Network and Information Security (2018)
Bakken, D.E., Rarameswaran, R., Blough, D.M., Franz, A.A., Palmer, T.J.: Data obfuscation: anonymity and desensitization of usable data sets. IEEE Secur. Priv. 2(6), 34–41 (2004)
Belsis, P., Pantziou, G.: A k-anonymity privacy-preserving approach in wireless medical monitoring environments. Pers. Ubiquit. Comput. 18(1), 61–74 (2014)
Bera, A., Kundu, A., De Sarkar, N.R., Mou, D.: Experimental analysis on big data in IoT-based architecture. In: Satapathy, S., Bhateja, V., Joshi, A. (eds.) International Conference on Data Engineering and Communication Technology, pp. 1–9. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-1678-3_1
Bertino, E., Ooi, B.C., Yang, Y., Deng, R.H.: Privacy and ownership preserving of outsourced medical data. In: 21st International Conference on Data Engineering, pp. 521–532. IEEE (2005)
Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Secure Comput. 2(1), 2–19 (2005)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Computer Security-ESORICS 2004, pp. 293–308 (2004)
Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: Proceedings of the 6-th ACM Symposium on Access Control Models and Technologies, pp. 10–20. ACM (2001)
Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM, pp. 42–51 (2003)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM (2002)
Gentry, C.: Toward basing fully homomorphic encryption on worst-case hardness. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 116–137. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14623-7_7
Georgakopoulos, D., Jayaraman, P.P.: Internet of Things: from internet scale sensing to smart services. Computing 98(10), 1041–1058 (2016)
Hahn, J.: Security and privacy for location services and the internet of things. Libr. Technol. Rep. 53(1), 23–28 (2017)
Hu, C., Zhang, J., Wen, Q.: An identity-based personal location system with protected privacy in IoT. In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), pp. 192–195. IEEE (2011)
Hu, J., Weaver, A.C.: A dynamic, context-aware security infrastructure for distributed health-care applications. In: Proceedings of the First Workshop on Pervasive Privacy Security, Privacy, and Trust, pp. 1–8. Citeseer (2004)
Jayaraman, P.P., Yang, X., Yavari, A., Georgakopoulos, D., Yi, X.: Privacy preserving internet of things: from privacy techniques to a blueprint architecture and efficient implementation. Future Gener. Comput. Syst. (2017)
Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)
Ko, J., et al.: MEDiSN: medical emergency detection in sensor networks. ACM Trans. Embed. Comput. Syst. (TECS) 10(1), 1–29 (2010)
Liu , D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, New York, NY, USA, pp. 52–61. ACM (2003)
Liu, J., Xiao, Y., Philip Chen, C.L.: Internet of Things’ authentication and access control. Int. J. Secur. Netw. 7(4), 228–241 (2012)
Malan, D.J., Fulford-Jones, T., Welsh, M., Moulton, S.: CodeBlue: an ad hoc sensor network infrastructure for emergency medical care. In: International Workshop on Wearable and Implantable Body Sensor Networks (2004)
Martucci, L.A., Fischer-Hübner, S., Hartswood, M., Jirotka, M.: Privacy and social values in smart cities. In: Angelakis, V., Tragos, E., Pöhls, H.C., Kapovits, A., Bassi, A. (eds.) Designing, Developing, and Facilitating Smart Cities, pp. 89–107. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-44924-1_6
Mivule, K.: Utilizing noise addition for data privacy, an overview. arXiv preprint arXiv:1309.3958 (2013)
Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. Commun. Mag. 32(9), 33–38 (1994)
Ouaddah, A., Abou Elkalam, A., Ouahman, A.A.: Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA Cooperation Advances in Information and Communication Technologies, pp. 523–533. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46568-5_53
Ould-Yahia, Y., Banerjee, S., Bouzefrane, S., Boucheneb, H.: Exploring formal strategy framework for the security in IoT towards e-health context using computational intelligence. In: Bhatt, C., Dey, N., Ashour, A.S. (eds.) Internet of Things and Big Data Technologies for Next Generation Healthcare. SBD, vol. 23, pp. 63–90. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-49736-5_4
Panah, A.S., Yavari, A., van Schyndel, R., Georgakopoulos, D., Yi, X.: Context-driven granular disclosure control for internet of things applications. IEEE Trans. Big Data 5, 408–422 (2017)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Picazo-Sanchez, P., Tapiador, J.E., Peris-Lopez, P., Suarez-Tangil, G.: Secure publish-subscribe protocols for heterogeneous medical wireless body area networks. Sensors 14(12), 22619–22642 (2014)
Rayes, A., Salam, S.: Internet of Things—From Hype to Reality. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-44860-2
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Roman, R., Alcaraz, C., Lopez, J., Sklavos, N.: Key management systems for sensor networks in the context of the internet of things. Comput. Electr. Eng. 37(2), 147–159 (2011)
Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Shah, T., et al.: Remote health care cyber-physical system: quality of service (QoS) challenges and opportunities. IET Cyber Phys. Syst. Theory Appl. 1(1), 40–48 (2016)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)
Tragos, E., Fragkiadakis, A., Angelakis, V., Pöhls, H.C.: Designing secure IoT architectures for smart city applications. In: Angelakis, V., Tragos, E., Pöhls, H.C., Kapovits, A., Bassi, A. (eds.) Designing, Developing, and Facilitating Smart Cities, pp. 63–87. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-44924-1_5
Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S., et al.: EKG-based key agreement in body sensor networks. In: INFOCOM Workshops 2008, IEEE, pp. 1–6. IEEE (2008)
Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)
Wood, A., et al.: ALARM-NET: wireless sensor networks for assisted-living and residential monitoring. University of Virginia Computer Science Department Technical Report, 2:17 (2006)
Yavari, A., Georgakopoulos, D., Agrawal, H., Korala, H., Jayaraman, P.P., Milovac, J.K.: Internet of Things milk spectrum profiling for industry 4.0 dairy and milk manufacturing. In: 2020 International Conference on Information Networking (ICOIN), pp. 342–347 (2020)
Yavari, A., Georgakopoulos, D., Stoddart, P.R., Shafiei, M.: Internet of Things-based hydrocarbon sensing for real-time environmental monitoring. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 729–732 (2019)
Yavari, A.: Internet of Things data contextualisation for scalable information processing, security, and privacy. Ph.D. thesis, RMIT University (2019)
Yavari, A., Jayaraman, P.P., Georgakopoulos, D., Nepal, S.: Contaas: an approach to internet-scale contextualization for developing efficient internet of things applications. In: Proceedings of the 50th Annual Hawaii International Conference on System Sciences. IEEE (2017)
Yavari, A., Jayaraman, P.P., Georgakopoulos, D.: Contextualised service delivery in the Internet of Things: parking recommender for smart cities. In: IEEE 3rd World Forum on Internet of Things, pp. 454–459. IEEE (2016)
Yavari, A., Panah, A.S., Georgakopoulos, D., Jayaraman, P.P., van Schyndel, R.: Scalable role-based data disclosure control for the Internet of Things. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2226–2233. IEEE (2017)
Yi, X., Paulet, R., Bertino, E.: Homomorphic encryption. Homomorphic Encryption and Applications. SCS, pp. 27–46. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12229-8_2
Shucheng, Yu., Ren, K., Lou, W.: FDAC: toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(4), 673–686 (2011)
Zhang, T., Siebers, P.-O., Aickelin, U.: Modelling electricity consumption in office buildings: an agent based approach. Energy Build. 43(10), 2882–2892 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Yavari, A., Georgakopolous, D. (2021). IoTSec: A Lightweight and Holistic IoT Security Based on IoT Data Contextualisation and Homomorphic Encryption. In: Aiello, M., Bouguettaya, A., Tamburri, D.A., van den Heuvel, WJ. (eds) Next-Gen Digital Services. A Retrospective and Roadmap for Service Computing of the Future. Lecture Notes in Computer Science(), vol 12521. Springer, Cham. https://doi.org/10.1007/978-3-030-73203-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-73203-5_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73202-8
Online ISBN: 978-3-030-73203-5
eBook Packages: Computer ScienceComputer Science (R0)