ABSTRACT
This paper presents a survey on the main security problems that affect the communication protocols in the context of Internet of Things, in order to identify possible threats and vulnerabilities. The protocols RFID, NFC, 6LoWPAN, 6TiSCH, DTSL, CoAP and MQTT, for a better organization, were explored and categorized in layers according to the TCP / IP reference model. At the end, a summary is presented in tabular form with the security modes used for each protocol is used.
- {n. d.}. RFID vs. NFC: What's the Difference? http://blog.atlasrfidstore.com/rfid-vs-nfcGoogle Scholar
- 2011. Coap Technology. Retrieved 15/05/2017 from http://coap.technology/Google Scholar
- 2011. IPv6 over the TSCH mode of IEEE 802.15.4e (6tisch). Retrieved 18/05/2017 from https://datatracker.ietf.org/wg/6tisch/charter/Google Scholar
- 2015. Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015. Retrieved 07/05/2017 from https://www.gartner.com/newsroom/id/3165317Google Scholar
- 2016. Information technology --- Message Queuing Telemetry Transport (MQTT) v3.1.1. Retrieved 19/06/2017 from http://www.iso.org/iso/catalogue_detail.htm?csnumber=69466Google Scholar
- Nikolaos Alexiou, Stylianos Basagiannis, and Sophia Petridou. 2016. Formal security analysis of near field communication using model checking. Computers & Security 60 (2016), 1--14. Google ScholarDigital Library
- Leonardo A Amaral, Fabiano P Hessel, Eduardo A Bezerra, Jerônimo C Corrêa, Oliver B Longhi, and Thiago FO Dias. 2011. eCloudRFID--A mobile software framework architecture for pervasive RFID-based applications. Journal of Network and Computer Applications 34, 3 (2011), 972--979. Google ScholarDigital Library
- Sara Amendola, Rossella Lodato, Sabina Manzari, Cecilia Occhiuzzi, and Gaetano Marrocco. 2014. RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet of things journal 1, 2 (2014), 144--152.Google Scholar
- Mahmoud Ammar, Giovanni Russello, and Bruno Crispo. 2018. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications 38 (2018), 8--27.Google ScholarCross Ref
- Jordán Pascual Espada, Oscar Sanjuán Martínez, Juan Manuel Cueva Lovelle, B Cristina Pelayo G-Bustelo, Manuel Álvarez Álvarez, and Alejandro González García. 2011. Modeling architecture for collaborative virtual objects based on services. Journal of Network and Computer Applications 34, 5 (2011), 1634--1647. Google ScholarDigital Library
- Roy Fisher and Gerhard Hancke. 2014. DTLS for lightweight secure data streaming in the internet of things. In P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2014 Ninth International Conference on. IEEE, 585--590. Google ScholarDigital Library
- Jorge Granjal, Edmundo Monteiro, and Jorge Sá Silva. 2015. Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials 17, 3 (2015), 1294--1312.Google ScholarDigital Library
- Nurul Halimatul Asmak Ismail, Rosilah Hassan, and Khadijah WM Ghazali. 2012. A study on protocol stack in 6lowpan model. Journal of Theoretical and Applied Information Technology 41, 2 (2012), 220--229.Google Scholar
- Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, and Wei Zhao. 2017. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal 4, 5 (2017), 1125--1142.Google ScholarCross Ref
- Anne H Ngu, Mario Gutierrez, Vangelis Metsis, Surya Nepal, and Quan Z Sheng. 2017. IoT middleware: A survey on issues and enabling technologies. IEEE Internet of Things Journal 4, 1 (2017), 1--20.Google ScholarCross Ref
- Kim Thuat Nguyen, Maryline Laurent, and Nouha Oualha. 2015. Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks 32 (2015), 17--31. Google ScholarDigital Library
- Ismael Peña-López et al. 2005. ITU Internet report 2005: the internet of things. (2005).Google Scholar
- Pavan Pongle and Gurunath Chavan. 2015. A survey: Attacks on RPL and 6LoWPAN in IoT. In Pervasive Computing (ICPC), 2015 International Conference on. IEEE, 1--6.Google ScholarCross Ref
- Reem Abdul Rahman and Babar Shah. 2016. Security analysis of IoT protocols: A focus in CoAP. In Big Data and Smart City (ICBDSC), 2016 3rd MEC International Conference on. IEEE, 1--7.Google ScholarCross Ref
- Yaron Sheffer, Ralph Holz, and Peter Saint-Andre. 2015. Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS). Technical Report.Google Scholar
- Zach Shelby, Klaus Hartke, and Carsten Bormann. 2014. The constrained application protocol (CoAP). Technical Report.Google Scholar
- Shubhangi A Shinde, Pooja A Nimkar, Shubhangi P Singh, Vrushali D Salpe, and Yogesh R Jadhav. 2016. MQTT-message queuing telemetry transport protocol. International Journal of Research 3, 3 (2016), 240--244.Google Scholar
- Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks 76 (2015), 146--164. Google ScholarDigital Library
- Meena Singh, MA Rajan, VL Shivraj, and P Balamuralidhar. 2015. Secure mqtt for internet of things (iot). In Communication systems and network technologies (CSNT), 2015 fifth international conference on. IEEE, 746--751.Google Scholar
- Saniya Vohra and Rohit Srivastava. 2015. A survey on Techniques for Securing 6LoWPAN. In Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on. IEEE, 643--647.Google ScholarCross Ref
- Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li, and Hongbin Zhao. 2017. A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal 4, 5 (2017), 1250--1258.Google ScholarCross Ref
- Azam Zavvari and Ahmed Patel. 2012. Critical evaluation of RFID security protocols. International Journal of Information Security and Privacy (IJISP) 6, 3 (2012), 56--74. Google ScholarDigital Library
Index Terms
- Internet of Things: A Survey on Communication Protocol Security
Recommendations
Internet of things security: challenges and perspectives
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud ComputingNo one can deny that the Internet of Things (IOT) will revolutionize our daily thanks to its many benefits in order to improve and simplify people's lives. Us any new technology the internet of things has a number of problems that prevents it to reach ...
Cyberentity Security in the Internet of Things
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Comments