skip to main content
10.1145/3293614.3293644acmotherconferencesArticle/Chapter ViewAbstractPublication Pageseatis-orgConference Proceedingsconference-collections
short-paper

Internet of Things: A Survey on Communication Protocol Security

Published:12 November 2018Publication History

ABSTRACT

This paper presents a survey on the main security problems that affect the communication protocols in the context of Internet of Things, in order to identify possible threats and vulnerabilities. The protocols RFID, NFC, 6LoWPAN, 6TiSCH, DTSL, CoAP and MQTT, for a better organization, were explored and categorized in layers according to the TCP / IP reference model. At the end, a summary is presented in tabular form with the security modes used for each protocol is used.

References

  1. {n. d.}. RFID vs. NFC: What's the Difference? http://blog.atlasrfidstore.com/rfid-vs-nfcGoogle ScholarGoogle Scholar
  2. 2011. Coap Technology. Retrieved 15/05/2017 from http://coap.technology/Google ScholarGoogle Scholar
  3. 2011. IPv6 over the TSCH mode of IEEE 802.15.4e (6tisch). Retrieved 18/05/2017 from https://datatracker.ietf.org/wg/6tisch/charter/Google ScholarGoogle Scholar
  4. 2015. Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015. Retrieved 07/05/2017 from https://www.gartner.com/newsroom/id/3165317Google ScholarGoogle Scholar
  5. 2016. Information technology --- Message Queuing Telemetry Transport (MQTT) v3.1.1. Retrieved 19/06/2017 from http://www.iso.org/iso/catalogue_detail.htm?csnumber=69466Google ScholarGoogle Scholar
  6. Nikolaos Alexiou, Stylianos Basagiannis, and Sophia Petridou. 2016. Formal security analysis of near field communication using model checking. Computers & Security 60 (2016), 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Leonardo A Amaral, Fabiano P Hessel, Eduardo A Bezerra, Jerônimo C Corrêa, Oliver B Longhi, and Thiago FO Dias. 2011. eCloudRFID--A mobile software framework architecture for pervasive RFID-based applications. Journal of Network and Computer Applications 34, 3 (2011), 972--979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Sara Amendola, Rossella Lodato, Sabina Manzari, Cecilia Occhiuzzi, and Gaetano Marrocco. 2014. RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet of things journal 1, 2 (2014), 144--152.Google ScholarGoogle Scholar
  9. Mahmoud Ammar, Giovanni Russello, and Bruno Crispo. 2018. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications 38 (2018), 8--27.Google ScholarGoogle ScholarCross RefCross Ref
  10. Jordán Pascual Espada, Oscar Sanjuán Martínez, Juan Manuel Cueva Lovelle, B Cristina Pelayo G-Bustelo, Manuel Álvarez Álvarez, and Alejandro González García. 2011. Modeling architecture for collaborative virtual objects based on services. Journal of Network and Computer Applications 34, 5 (2011), 1634--1647. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Roy Fisher and Gerhard Hancke. 2014. DTLS for lightweight secure data streaming in the internet of things. In P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2014 Ninth International Conference on. IEEE, 585--590. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jorge Granjal, Edmundo Monteiro, and Jorge Sá Silva. 2015. Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials 17, 3 (2015), 1294--1312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Nurul Halimatul Asmak Ismail, Rosilah Hassan, and Khadijah WM Ghazali. 2012. A study on protocol stack in 6lowpan model. Journal of Theoretical and Applied Information Technology 41, 2 (2012), 220--229.Google ScholarGoogle Scholar
  14. Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, and Wei Zhao. 2017. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal 4, 5 (2017), 1125--1142.Google ScholarGoogle ScholarCross RefCross Ref
  15. Anne H Ngu, Mario Gutierrez, Vangelis Metsis, Surya Nepal, and Quan Z Sheng. 2017. IoT middleware: A survey on issues and enabling technologies. IEEE Internet of Things Journal 4, 1 (2017), 1--20.Google ScholarGoogle ScholarCross RefCross Ref
  16. Kim Thuat Nguyen, Maryline Laurent, and Nouha Oualha. 2015. Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks 32 (2015), 17--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Ismael Peña-López et al. 2005. ITU Internet report 2005: the internet of things. (2005).Google ScholarGoogle Scholar
  18. Pavan Pongle and Gurunath Chavan. 2015. A survey: Attacks on RPL and 6LoWPAN in IoT. In Pervasive Computing (ICPC), 2015 International Conference on. IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  19. Reem Abdul Rahman and Babar Shah. 2016. Security analysis of IoT protocols: A focus in CoAP. In Big Data and Smart City (ICBDSC), 2016 3rd MEC International Conference on. IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  20. Yaron Sheffer, Ralph Holz, and Peter Saint-Andre. 2015. Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS). Technical Report.Google ScholarGoogle Scholar
  21. Zach Shelby, Klaus Hartke, and Carsten Bormann. 2014. The constrained application protocol (CoAP). Technical Report.Google ScholarGoogle Scholar
  22. Shubhangi A Shinde, Pooja A Nimkar, Shubhangi P Singh, Vrushali D Salpe, and Yogesh R Jadhav. 2016. MQTT-message queuing telemetry transport protocol. International Journal of Research 3, 3 (2016), 240--244.Google ScholarGoogle Scholar
  23. Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks 76 (2015), 146--164. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Meena Singh, MA Rajan, VL Shivraj, and P Balamuralidhar. 2015. Secure mqtt for internet of things (iot). In Communication systems and network technologies (CSNT), 2015 fifth international conference on. IEEE, 746--751.Google ScholarGoogle Scholar
  25. Saniya Vohra and Rohit Srivastava. 2015. A survey on Techniques for Securing 6LoWPAN. In Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on. IEEE, 643--647.Google ScholarGoogle ScholarCross RefCross Ref
  26. Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li, and Hongbin Zhao. 2017. A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal 4, 5 (2017), 1250--1258.Google ScholarGoogle ScholarCross RefCross Ref
  27. Azam Zavvari and Ahmed Patel. 2012. Critical evaluation of RFID security protocols. International Journal of Information Security and Privacy (IJISP) 6, 3 (2012), 56--74. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Internet of Things: A Survey on Communication Protocol Security

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            EATIS '18: Proceedings of the Euro American Conference on Telematics and Information Systems
            November 2018
            297 pages
            ISBN:9781450365727
            DOI:10.1145/3293614

            Copyright © 2018 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 12 November 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate17of64submissions,27%
          • Article Metrics

            • Downloads (Last 12 months)25
            • Downloads (Last 6 weeks)2

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader