Abstract
In the past few years, the Internet of Things (IoT) has emerged, grown and gradually affected the daily lives of human beings in many new application domains, ranging from wearable devices, smart manufacturing, to smart homes and ambient intelligence just to mention a few. However, realizing the full potential of IoT while ensuring user security and privacy remains an open research challenge. Existing security solutions and techniques are mainly conceived for centralized and distributed information systems and are not directly applicable to IoT-based systems. In fact, IoT systems have unconventional characteristics such as intermittent connectivity, high scalability, dynamic changes and limited resources and thus require a paradigm shift to develop innovative security and privacy solutions. In this survey, we firstly give an overview of security and privacy in IoT. After defining the context of IoT systems, we identify four main characteristics, which imply unprecedented threats and challenges to existing security solutions and techniques. From the perspective of these characteristics and IoT security requirements, we identify and elaborate specific threats and challenges related to the radio-frequency identification (RFID), wireless sensor networks (WSNs) and mobile delay tolerant networks (MDTNs), which are building blocks in many IoT-based systems. In addition, we discuss potential countermeasures to handle IoT threats and challenges.



Similar content being viewed by others
References
ITU-T (2012) ITU-T Recommendation Y.2069 Terms and Definitions for the Internet of Things, Series Y: Global Information Infrastructure, Internet Protocol Aspects and Next-Generation Networks. http://www.itu.int/ITU-T/recommendations/rec.aspx?rec=11700
IDC (2019) The Growth in Connected IoT Devices Is Expected to Generate 79.4ZB of Data in 2025. (2019). https://www.idc.com/getdoc.jsp?containerId=prUS45213219
SANS Institute (2014) Securing the Internet of Things Survey. https://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785
Wind River (2015) Security in the Internet of Things: Lessons from the Past for the Connected Future
Weber Rolf H (2010) Internet of Things new security and privacy challenges. Comput Law Secur Rev 26:23–30
Medaglia CM, Serbanati A (2010) An overview of privacy and security issues in the Internet of Things. The Internet of Things. In: Giusto D, Iera A, Morabito G, Atzori L (Eds.). Springer, pp 389–395
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266–2279
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164
Sen J (2010) Privacy preservation technologies in internet of things. In: The international conference on emerging trends in mathematics. Technology and Management, pp 496–504
Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501
Vikas BO (2015) Internet of things (IoT): a survey on privacy issues and security (2015)
Covington MJ, Carskadden R (2013) Threat implications of the internet of things. In: 5th international conference on cyber conflict (CyCon). IEEE, pp 1–12
Deng J, Han R, Mishra S (2003) Security support for in-network processing in wireless sensor networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM, pp 83–93
Fremantle P (2015) A reference architecture for the internet of things. https://wso2.com/whitepapers/a-reference-architecture-for-the-internet-of-things
Padmavathi DG, Shanmugapriya M (2009) A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint. arXiv:0909.0576
Ren Y, Oleshchuk V, Li FY, Ge X (2011) Security in mobile wireless sensor networks a survey. J Commun 6(2):128–142
ITU-T (2012) ITU-T Recommendation Y. 2060 Overview of the Internet of Things, Series Y: Global Information Infrastructure, Internet Protocol Aspects and Next-Generation Networks. http://www.itu.int/ITU-T/recommendations/rec.aspx?rec=11559
Greenemeier L (2015) Recall shows that a hack attack on car controls is a credible threat. Scientific American
Walters JP, Liang Z, Shi W, Chaudhary V (2007) Wireless sensor network security: a survey. Security in distributed, grid, mobile, and pervasive computing 1(2007):367
Roman R, Najera P, Lopez J (2011b) Securing the internet of things. Computer 44(9):51–58
Agrawal P, Trivedi B (2019) A survey on android malware and their detection techniques. In: 2019 IEEE international conference on electrical, computer and communication technologies (ICECCT), pp 1–6
Mahmoud R et al (2015) Internet of things (IoT) security: current status, challenges and prospective measures. In: Proceedings of the 2015 10th international conference for internet technology and secured transactions (ICITST). IEEE, pp 336–341
Vasilomanolakis E et al (2015) On the security and privacy of internet of things architectures and systems. In: 2015 International workshop on secure internet of things (SIoT). IEEE 2015, pp 49–57
Isaac M, Frenkel S (2018) Facebook security breach exposes accounts of 50 million users. The New York Times. https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html (visited on 01/21/2019)
CSPAN (2017) Senate Banking Committee Hearing on Equifax Data Breach. https://www.c-span.org/video/?434469-1/equifax-ceo-testifies-senate-banking-panel (visited on 04/28/2020)
Borgohain T, Kumar U, Sanyal S (2015) Survey of security and privacy issues of internet of things. arXiv:1501.02211 [cs]
Covington MJ, Carskadden R (2013) Threat implications of the internet of things. In: 2013 5th international conference on cyber conflict (CyCon). IEEE, pp 1–12
Nada A, Omer R, Charith P (2021) Security and privacy requirements for the internet of things: a survey. ACM Trans Internet Things 2(1):202
Dimitriou T (2005) A lightweight RFID protocol to protect against traceability and cloning attacks. In: Security and privacy for emerging areas in communications networks, 2005. IEEE, pp 59–66
Evans D, Eyers DM (2012) Efficient data tagging for managing privacy in the internet of things. In: Proceedings of the 2012 IEEE international conference on green computing and communications (GreenCom). IEEE, pp 244–248
Wang Y, Wen Q (2012) A privacy enhanced DNS scheme for the internet of things. In: Proceedings of the international conference on communication technology & application. IET
Liao B, Ali Y, Nazir S, He L, Khan HU (2020) Security analysis of IoT devices by using mobile computing: a systematic literature review. IEEE Access 8:120331–120350
Alizadeh M, Zamani M, Shahemabadic AR, Shayan J, Azarnik A (2013) A survey on attacks in RFID networks. Open Int J Inf 1:1
Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classifying RFID attacks and defenses. Inf Syst Front 12(5):491–505
Hancke GP, Kuhn MG (2005) An RFID distance bounding protocol. In: First international conference on security and privacy for emerging areas in communications networks (SecureComm). IEEE, pp 67–73
Singelee D, Preneel B (2005) Location verification using secure distance bounding protocols. In: IEEE international conference on conference mobile adhoc and sensor systems. IEEE, 7 pp
Rhee K, Kwak J, Kim S, Won D (2005) Challenge-response based RFID authentication protocol for distributed database environment. In: Security in pervasive computing. Springer, pp 70–84
Tuyls P, Batina L (2006) RFID-tags for anti-counterfeiting. In: Topics in cryptologyCT-RSA. Springer, pp 115–131
Mirowski L, Hartnett J (2007) Deckard: a system to detect change of RFID tag ownership. Int J Comput Sci Netw Secur 7(7):89–98
Kavitha T, Sridharan D (2010) Security vulnerabilities in wireless sensor networks: a survey. J Inf Assur Secur 5(1):31–44
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and counter-measures. Ad hoc Netw 1(2):293–315
Saxena M (2007) Security in wireless sensor networks-a layer based classification. Department of Computer Science, Purdue University
Yu Y, Govindan R, Estrin D (2001) Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks. Technical Report. Technical report ucla/csd- tr-01-0023, UCLA Computer Science Department
Raymond DR, Midkiff SF (2008) Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput 7(1):74–81
Parno B, Perrig A, Gligor V (2005) Distributed detection of node replication attacks in sensor networks. In: IEEE symposium on security and privacy. IEEE, pp 49–63
Karygiannis Tom, Eydt Bernard, Barber Greg, Bunn Lynn, Phillips Ted (2007) Guidelines for securing radio frequency identification (RFID) systems. NIST Spec Publ 80(2007):1–154
Sarma S, Weis S, Engels D (2002) RFID systems and security and privacy implications. In: Cryptographic hardware and embedded systems (CHES). Number 2523 in Lecture Notes in Computer Science. Springer, Berlin Heidelberg, pp 454–469
Wang Y, Attebury G, Ramamurthy B (2006) A survey of security issues in wireless sensor networks. (2006)
Wood AD, Stankovic J (2002) Denial of service in sensor networks. Computer 35(10):54–62
Sen J (2010) A survey on wireless sensor network security. arXiv preprint. arXiv:1011.1529 (2010)
Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. The 3rd international symposium on Information processing in sensor networks. ACM, pp 259–268
Zhang Q, Wang P, Reeves DS, Ning P (2005) Defending against sybil attacks in sensor networks. In: 25th IEEE international conference on distributed computing systems workshops. IEEE, pp 185–191
Sarma D, Kumar H, Kar A (2006) Security threats in wireless sensor networks. In: The 40th annual 2006 international carnahan conference on security technology. IEEE, pp 243– 251
GS1 (2014) EPC Tag Data Standard (2014). http://www.gs1.org/epc/tag-data-standard
Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter D, Mller G, Stephan W, Ullmann M (Eds) Security in pervasive computing. Number 2802 in Lecture Notes in Computer Science. Springer, pp 201–212
Juels A, Brainard J (2004) Soft blocking: flexible blocker tags on the cheap. In: The ACM workshop on privacy in the electronic society. ACM, pp 1–7
Rieback MR, Crispo B, Tanenbaum AS (2005) RFID guardian: a battery-powered mobile device for RFID privacy management. In: Information security and privacy. Springer, pp 184–194
Kinoshita S, Hoshino F, Komuro T, Fujimura A, Ohkubo M (2004) Low-cost RFID privacy protection scheme. IPS J 45(8):2007–2021
Jøsang A, Pope S (2005) User centric identity management. In: Proceedings of the AusCERT Asia Pacific information technology security conference, Brisbane, Australia, pp 22–26
Jøsang A, Zomai MA, Suriadi S (2007) Usability and privacy in identity management architectures. In: Proceedings of the Fifth Australasian symposium on ACSW frontiers, Ballarat, Australia, 30 January–2 February 2007
Maler E, Reed D (2008) The venn of identity: options and issues in federated identity management. IEEE Secur Priv 6:16–23
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf. Accessed 31 Aug 2018
Ethereum—A next-generation smart contract and decentralized application platform. https://github.com/Ethereum/wiki/wiki/White-Paper. Accessed 31 Aug 2018
Zhu X, Badr Y, Pacheco J, Hariri S (2017) Autonomic identity framework for the internet of things. In: Proceedings of the 2017 international conference on cloud and autonomic computing (ICCAC), Tucson, AZ, USA, 18–22, pp 69–79
Adrian P, Robert S, Justin DT, Victor W, Culler DE (2002) SPINS: security protocols for sensor networks. Wirel Netw 8(5):521–534
Zhou Y, Fang Y (2006) A scalable key agreement scheme for large scale networks. In: The 2006 IEEE international conference on networking, sensing and control (ICNSC). IEEE, pp 631–636
Zhou Y, Fang Y (2006) Scalable link-layer key agreement in sensor networks. In: Military communications conference (MILCOM). IEEE, pp 1–6
Yun Z, Yuguang F, Yanchao Z (2008) Securing wireless sensor networks: a survey. Commun Surv Tutor 10(3):6–28
Shi C, Luo X, Traynor P, Ammar MH, Zegura EW (2012) Arden: anonymous networking in delay tolerant networks. Ad Hoc Netw 10(6):918–930
Zhu B, Wan Z, Kankanhalli MS, Bao F, Deng RH (2004) Anonymous secure routing in mobile ad-hoc networks. In: The 29th Annual IEEE international conference on local computer networks. IEEE, pp 102–108
Lu X, Hui P, Towsley D, Pu J, Xiong Z (2010) Anti-localization anonymous routing for delay tolerant network. Comput Netw 54(11):1899–1910
Defrawy K, Tsudik G (2011) Privacy-preserving location-based on-demand routing in MANETs. IEEE J Sel Areas Commun 29(10):1926–1934
Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: The 1st international conference on mobile systems, applications and services. ACM, pp 31–42
BUTLER (2014) uBiquitous, secUre inTernet-of-Things with Location and contExt-awaReness. https://cordis.europa.eu/project/rcn/101349_en.html (visited on 08/19/2018)
NIST (1998) Skipjack and KEA Algorithm Specifications Version 2.0
Ronald R (1992) The MD5 message-digest algorithm. http://tools.ietf.org/html/rfc1321?ref=driverlayer.com
Rivest RL (1995) The RC5 encryption algorithm. In: Fast software encryption. Springer, pp 86–96
Daemen J, Rijmen V (2002) The design of Rijndael, AES—The Advanced Encryption Standard. Springer-Verlag (238 pp)
Schneier B, Kelsey J, Whiting D, Wagner D, Hall C (1998) Twofish: a 128-bit block cipher. Current 21(1):1–27
Matsui M (1997) New block encryption algorithm MISTY. In: Fast software encryption. Springer, pp 54–68
3GPP (1999) Specification of the 3GPP confidentiality and integrity algorithms document 2: KASUMI specification. ETSI/SAGE Specification Version 1:SAGE
Aoki K, Ichikawa T, Kanda M, Matsui M, Moriai S, Nakajima J, Tokita T (2001) Specification of Camellia – a 128-Bit Block Cipher. http://info.isl.ntt.co.jp/camellia/
Yee WL, Jeroen D, Pieter H (2006) Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans Sens Netw 2(1):65–93
Schneier Bruce (1997) Cover and title pages. Appl Cryptogr 1997:125–147
Eastlake D, Paul J (2001) US Secure Hash Algorithm 1 (SHA1). Technical Report. http://www.rfc-editor.org/info/rfc3174
Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Analyzing and modeling encryption overhead for sensor network nodes. In: The 2nd ACM international conference on Wireless sensor networks and applications. ACM, pp 151–159
Rabin MO (1979) Digitalized signatures and public-key functions as intractable as factorization. Technical Report, DTIC Document
Hoffstein J, Pipher J, Silverman JH (1998) NTRU: a ring-based public key cryptosystem. In: Algorithmic number theory. Springer, pp 267–288
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Miller V (1986) Use of elliptic curves in cryptography. In: Advances in cryptologyCRYPTO85 proceedings. Springer, pp 417–426
Gura N, Patel A, Wander A, Eberle H, Shantz S (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Cryptographic hardware and embedded systems (CHES). Springer, pp 119–132
Wander AS, Gura N, Eberle H, Gupta V, Shantz SC (2005) Energy analysis of public-key cryptography for wireless sensor networks. In: 3rd International conference on pervasive computing and communications (PerCom). IEEE, pp 324–328
Ning P, Liu A, Kampanakis P (2007) TinyECC: elliptic curve cryptography for sensor networks. Online (September, 2005)
Rodrigo R, Cristina A, Javier L, Nicolas S (2011) Key management systems for sensor networks in the context of the internet of things. Comput Electr Eng 37(2):147–159
Aristides M, Damianos G, Charalampos K, Grammati P (2009) A survey on jamming attacks and countermeasures in WSNs. Commun Surv Tutor 11(4):42–56
Stoyanova M, Nikoloudakis Y, Panagiotakis S, Pallis E, Markakis EK (2020) A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues. IEEE Commun Surv Tutor 22(2):1191–1221
Mohanta BK, Jena D, Ramasubbareddy S, Daneshmand M, Gandomi AH (2021) Addressing security and privacy issues of IoT using blockchain technology. IEEE Internet Things J 8(2):881–888
Ma M, Lin W, Pan D, Wang P, Zhou Y, Liang X (2017) Data and decision intelligence for internet of things: putting human in the loop. In: IEEE international conference on big data security on cloud, IEEE international conference on high performance and smart computing (HPSC), and IEEE international conference on intelligent data and security (IDS), pp 190–195
Garrido-Hidalgo C, Hortelano D, Roda-Sanchez L, Olivares T, Ruiz MC, Lopez V (2018) IoT heterogeneous mesh network deployment for human-in-the-loop challenges towards a social and sustainable industry 4.0. IEEE Access 6:28417–28437
Lorrie FC (2008) A framework for reasoning about the human in the loop. UPSEC, 15 p
Salam MA, Koone ME, Thirumuruganathan S, Das G, Roy SB(2019) A human-in-the-loop attribute design framework for classification. The World Wide Web Conference (WWW). Association for Computing Machinery, pp 1612–1622
Funding
This research work is supported by the IndustryXchange seed Grant, Pennsylvania State University and the Research Council (TRC), Sultanate of Oman (Block Fund-Research Grant)
Author information
Authors and Affiliations
Contributions
Y.B. initiated the research. X.Z wrote the original draft preparation. Y.B wrote, reviewed, edited and prepared revised versions. Y.B. and X.Z. have contributed equally. M.A. wrote, reviewed and prepared the final version. All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Badr, Y., Zhu, X. & Alraja, M.N. Security and privacy in the Internet of Things: threats and challenges. SOCA 15, 257–271 (2021). https://doi.org/10.1007/s11761-021-00327-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11761-021-00327-z