Skip to main content

Recent Development, Trends and Challenges in IoT Security

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2021)

Abstract

A large amount of data that IoT applications deal, is users’ Private data, and their privacy is a significant issue. However, if users are not sure about the security of their data, they will not desire to use such applications. The goal of this study is to improve the security and privacy of users in the Internet of Things (IoTs) setting. Since, the application of IoT technology is growing day by day. Also, the importance of users’ data security is always top of the list and difficult to achieve. In this study, we studied latest development in the security of Internet of Things (IoTs) so that we can use it to investigate its challenges and advantages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, Y., Wen, J.: An IoT electric business model based on the protocol of bitcoin. In: 2015 18th International Conference on Intelligence in Next Generation Networks (ICIN), pp. 184–191. IEEE (2015)

    Google Scholar 

  2. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): A vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  3. Khoo, B.: RFID - from tracking to the Internet of Things: a review of developments. In: Proceedings of the IEEE/ACM International Conference on Green Computing and Communications & International Conference on Cyber, Physical and Social Computing (2010)

    Google Scholar 

  4. SY, P.: Defending Privacy e Dark Side of IoT. Automating Crypt. (2015)

    Google Scholar 

  5. Jing, Q., Vasilakos, A.V., Wan, J., et al.: Security of the internet of things: perspectives and challenges. Wireless Netw. 20(8), 2481–2501 (2014)

    Article  Google Scholar 

  6. Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-39881-3_18

    Chapter  Google Scholar 

  7. Kavun, E., Yalcin, T.: A lightweight implementation of keccak hash function for radio-frequency identification applications. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 258–269. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16822-2_20

    Chapter  Google Scholar 

  8. Zhang, Y., Shen, Y., Wang, H., et al.: On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2015)

    Article  Google Scholar 

  9. Massis, B.: The internet of things and its impact on the library. New Libr. World 117(3/4), 289–292 (2016)

    Article  Google Scholar 

  10. Liu, Y., Cheng, C., Gu, T., et al.: A lightweight authenticated communications scheme for a smart grid. IEEE Trans. Smart Grid 7(3), 1304–1313 (2016)

    Article  Google Scholar 

  11. Kumar, T., Porambage, P., Ahmad, I.: Securing gadget-free digital services. Computer 51(11), 66–77 (2018)

    Article  Google Scholar 

  12. Alaba, F., Othman, M., Hashem, I., Alotaibi, F.: Internet of things security: a survey. J. Netw. Comput. Appl. 88, 10–28 (2017)

    Article  Google Scholar 

  13. Jurcut, A.D., Liyanage, M., Chen, J., et al.: On the security verification of a short message service protocol. Presented at the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain (2018)

    Google Scholar 

  14. Horrow, S., Anjali, S.: Identity management framework for cloud based internet of things. In: Proceedings of the First International Conference on Security of Internet of Things, SecurIT 2012, pp. 17–19. ACM, Kollam (2012)

    Google Scholar 

  15. Lin, X., Sun, X., Wang, X., et al.: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wireless Commun. 7(12), 4987–4998 (2008)

    Article  Google Scholar 

  16. Lin, X., Li, X.: Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 62(7), 3339–3348 (2013)

    Article  Google Scholar 

  17. Zhou, J., Dong, X., Cao, Z., et al.: 4S: a secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314, 255–276 (2015)

    Article  Google Scholar 

  18. Sen, J.: Privacy preservation technologies in internet of things. In: Proceedings of International Conference on Emerging Trends in Mathematics, Technology, and Management, pp. 18–20 (2011)

    Google Scholar 

  19. Zhou, J., Dong, X., Cao, Z., et al.: Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans. Inf. Forensics Secur. 10(6), 1299–1314 (2015)

    Article  Google Scholar 

  20. Roman, R., Alcaraz, C., Lopez, S.N.: Key management systems for sensor networks in the context of the internet of things. Comput. Electr. Eng. 37 (2), 147–159 (2011)

    Google Scholar 

  21. Zhou, J., Cao, Z., Dong, X., et al.: TR-MABE: white-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-heathcare cloud computing systems. IEEE INFOCOM (2015)

    Google Scholar 

  22. Lu, R., Lin, X., Zhu, H., et al.: Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. Wireless Commun. 9(4), 1483–1492 (2010)

    Article  Google Scholar 

  23. Paillier, P.: Public key cryptosystems based on composite degree residuosity classes. In: Eurocrypt 1999 Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, pp. 2–6. ACM, Prague (1999)

    Google Scholar 

  24. Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78967-3_24

    Chapter  Google Scholar 

  25. Akhunzada, A., Gani, A., Anuar, N.B., et al.: Secure and dependable software defined networks. J. Netw. Comput. Appl. 61, 199–221 (2016)

    Article  Google Scholar 

  26. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, C.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  27. Porambage, P., Okwuibe, J., Liyanage, M., et al.: Survey on multi-access edge computing for internet of things realization. IEEE Commun. Surv. Tutorials 20(4), 2961–2991 (2018)

    Article  Google Scholar 

  28. ur Rehman, S., et al.: Deep learning techniques for future intelligent cross-media retrieval. arXiv preprint arXiv:2008.01191. 2020 July 21

  29. Zhong, N., et al.: Research challenges and perspectives on Wisdom Web of Things (W2T). J. Supercomput. 64(3), 862–882 (2013)

    Article  Google Scholar 

  30. Lai, C., Lu, R., Zheng, D., Li, H., Shen, X.: Toward secure large-scale machine-to-machine communications in 3GPP networks. IEEE Comm. Mag. Suppl. (2015)

    Google Scholar 

  31. Tiburski, R.T., Amaral, L.A., de Matos, E., Hessel, F.: The importance of a standard security architecture for SOA - based IoT middleware. IEEE Commun. Mag. (2015)

    Google Scholar 

  32. Valerie Aurora, “Lifetimes of cryptographic hash functions” (2012). http://valerieaurora.org/hash.html

  33. ETSI TR103 167 v0.3.1: Machine to Machine Communications (M2M); Threat Analysis and Counter Measures to M2M Service Layer (2011)

    Google Scholar 

  34. International Workshop on Big Data and Data Mining Challenges on IoT and Pervasive Systems (BigD2M 2015), New Security Architecture for IoT Network (2015)

    Google Scholar 

  35. Geneiatakis, D., Kounelis, I., Neisse, R., Nai-Fovino, I.: Security and privacy issues for an IoT based smart home. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1292–1297. IEEE Conference Publications (2017)

    Google Scholar 

  36. J. Comput. Commun. 3, 164–173 (2015). Published Online May 2015 in SciRes. http://www.scirp.org/journal/jcc https://doi.org/10.4236/jcc.2015.35021

  37. Source: Cisco IBSG projections, UN Economic & Social Affairs. http://www.un.org/esa/population/publications/longrange2/WorldPop2300final.pdf

  38. NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition, 2 October 2012. http://www.nist.gov/itl/csd/sha-100212.cfm

  39. Ur Rehman, S., Bilal, M., Ahmad, B., Yahya, K.M., Ullah, A., Ur Rehman, O.: Comparison based analysis of different cryptographic and encryption techniques using message authentication code (MAC) in wireless sensor networks (WSN). arXiv preprint arXiv:1203.3103 (2012)

  40. Ur Rehman, S., Tu, S., Huang, Y., Yang, Z.: Face recognition: a novel un-supervised convolutional neural network method. In 2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS), pp. 139–144. IEEE (2016)

    Google Scholar 

  41. ur Rehman, O., Yang, S., Khan, S., Ur Rehman, S.: A quantum particle swarm optimizer with enhanced strategy for global optimization of electromagnetic devices. IEEE Trans. Mag. 55(8), 1–4 (2019)

    Google Scholar 

  42. Tu, S., Huang, Y., Liu, G.: CSFL: a novel unsupervised convolution neural network approach for visual pattern classification. AI Commun. 30(5), 311–324 (2017)

    Google Scholar 

  43. ur Rehman, S., Tu, S., Huang, Y., Ur Rehman, O.: A benchmark dataset and learning high-level semantic embeddings of multimedia for cross-media retrieval. IEEE Access 6, 67176–67188 (2018)

    Google Scholar 

  44. Ur Rehman, S., Tu, S., Ur Rehman, O., Huang, Y., Sarathchandra Magurawalage, C.M., Chang, C.-C.: Optimization of CNN through novel training strategy for visual classification problems. Entropy 20(4), 290 (2018)

    Google Scholar 

  45. Ur Rehman, S., et al.: Unsupervised pre-trained filter learning approach for efficient convolution neural network. Neurocomputing 365, 171–190 (2019)

    Google Scholar 

  46. ur Rehman, S., Huang, Y., Tu, S., ur Rehman, O.: Facebook5k: a novel evaluation resource dataset for cross-media search. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11063, pp. 512–524. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00006-6_47

    Chapter  Google Scholar 

  47. ur Rehman, S., Huang, Y., Tu, S., Ahmad, B.: Learning a semantic space for modeling images, tags and feelings in cross-media search. In: U., L.H., Lauw, H.W. (eds.) PAKDD 2019. LNCS (LNAI), vol. 11607, pp. 65–76. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26142-9_7

    Chapter  Google Scholar 

  48. Tu, S., et al.: ModPSO-CNN: an evolutionary convolution neural network with application to visual recognition. Soft Comput., 1–12 (2020)

    Google Scholar 

  49. ur Rehman, S., et lal.: Deep learning techniques for future intelligent cross-media retrieval

    Google Scholar 

  50. Tu, S., et al.: Optimisation-based training of evolutionary convolution neural network for visual classification applications. IET Comput. 14(5), 259–267 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shanshan Tu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Talezari, M. et al. (2021). Recent Development, Trends and Challenges in IoT Security. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78612-0_51

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78611-3

  • Online ISBN: 978-3-030-78612-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics