skip to main content
10.1145/3361570.3361622acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicistConference Proceedingsconference-collections
short-paper

Security for Internet of Things: A State of the Art on existing Protocols and Open Research issues

Authors Info & Claims
Published:24 March 2019Publication History

ABSTRACT

Internet of Things (IoT) consists of devices, smart objects, and people that are given a unique identifier connected to the internet via wireless network. These devices are usually resources limited such as battery powered, memory and processing capability etc. The migration of these objects to the internet make them susceptible to various attacks related to external or internal unauthorized devices, which affect physical links, radio hops and routing discovery, give rise to malfunction and resources exhausting. The security mechanisms widely used on the Internet are too heavy to be integrated on small constrained objects. Therefore, we need secure protocols or add a security features to the existing ones with a minimum overhead. Routing also is one of the factors that may impact the security. In this paper, we will focus our work on the State of the art of existing protocols and study their vulnerabilities. Potential solutions based on the blockchain technology are also discussed in this paper.

References

  1. Christine Hennebert, Jessye Dos Santos, "Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis," IEEE Internet of Things Journal, vol. 1, no. 5, pp. 384--398, Oct. 2014.Google ScholarGoogle ScholarCross RefCross Ref
  2. Ahmed Mohammed Ibrahim Alkuhlani1, S.B. Thorat, "Internet of Things (IOT) Standards, Protocols and Security Issues." International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue. 11, pp. 491--495, November 2015.Google ScholarGoogle Scholar
  3. Konstantinos Rantos, Alexandros Papanikolaou, Charalampos Manifavas, "IPsec over IEEE 802.15.4 for Low Power and Lossy Networks." MobiWac'13, November 3-8, 2013, Barcelona, Spain.Google ScholarGoogle Scholar
  4. Thebiga M. Noorul, R. Suji Pramilan Noorul Islam, "An analysis of routing protocols in manets and Internet of things." International Conference on IoT and Application (ICIOT); 2017.Google ScholarGoogle Scholar
  5. Anhtuan Le, Jonathan Loo, Yuan Luo, Aboubaker Lasebae, "The Impacts of Internal Threats towards Routing Protocol for Low power and lossy Network Performance," In IEEE Symposuim on Computers and Communications (ISCC), pp. 789--794, 2013. DOI: 10.1109/ISCC.2013.6755045.Google ScholarGoogle Scholar
  6. M. Chernyshev, Z. Baig, O. Bello, S. Zeadally, "Internet of Things (IoT): Research, Simulators, and Testbeds," IEEE Internet of Things Journal, vol. 5, issue. 3, pp. 1--11, 2017.Google ScholarGoogle Scholar
  7. A. Nayyar and R. Singh, "A comprehensive review of simulation tools for wireless sensor networks (WSNs)," Journal of Wireless Networking and Communications, vol. 5, no. 1, pp. 19--47, 2015.Google ScholarGoogle Scholar
  8. Ghada Glissa, Aref Meddeb, "6LoWPAN multi-layered security protocol based on IEEE 802.15.4 security features," IEEE, pp. 264--268, 2017.Google ScholarGoogle Scholar
  9. G. Peretti, V. Lakkundi, and M. Zorzi, "Blinktoscoap: An end-to-end security framework for the internet of things," in 2015 7th International Conference on Communication Systems and Networks (COMSNETS), IEEE, pp. 1--6, 2015.Google ScholarGoogle Scholar
  10. Giulio Peretti, Vishwas Lakkundi, Michele Zorzi, "BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things," Future Information Security Workshop, COMSNETS 2015.Google ScholarGoogle Scholar
  11. Smitesh Mangelkar, Sudhir N. Dhage, Anant V. Nimkar, "A Comparative Study on RPL Attacks and Security Solutions," International Conference on Intelligent Computing and Control (I2C2), 2017.Google ScholarGoogle Scholar
  12. Ghada Glissa, Aref Meddeb, "IEEE 802.15.4 Security Sublayer for OMNET++," Proceeding of the 13th International Conference on Wireless Communciations and Mobile Computing (IWCMW), pp. 1891--1896, 2017. DOI: 10.1109/IWCMC.2017.7986572.Google ScholarGoogle Scholar
  13. Shahid Raza, Simon Duquennoy, Tony Chung, Dogan Yazar, Thiemo Voigt, Utz Roedig, "Securing Communication in 6LoWPAN with Compressed IPsec," Proceedings of the 7th IEEE International Conference on Distributing Computing in Sensor Systems, IEEE DCOSS, June 2011, Barcelona, Spain.Google ScholarGoogle Scholar
  14. Shahid Raza, Simon Duquennoy; Goeran Selander, "Compression of IPsec AH and ESP Headers for Constrained Environments," draft-raza-6lowpan-ipsec-01, 6LoWPAN Working Group S. Raza Internet-Draft, September 3, 2013.Google ScholarGoogle Scholar
  15. Ghada Glissa, Aref Meddeb, "6LowPSec: An End-to-End Security Protocol for 6LoWPAN," Ad Hoc Networks (2018), DOI: 10.1016/j.adhoc.2018.01.013.Google ScholarGoogle Scholar
  16. Kuan Zhang, Xiaohui Liang, Rongxing Lu, Xuemin Shen, "Sybil Attacks And THeir Defenses In The Internet Of Things," IEEE Internet of Things Journal, vol. 1, no. 5, October 2014.Google ScholarGoogle ScholarCross RefCross Ref
  17. Pavan Pongle, Gurunath Chavan, "A survey: Attacks on RPL 6LoWPAN in IoT," International Conference on Pervasive Computing (ICPC), 2015.Google ScholarGoogle Scholar
  18. Karishma Chugh, Aboubaker Lasebae, Jonathan Loo, "Case Study of a Black Hole Attack on 6LoWPAN-RPL," SECURWARE 2012: The Sixth International Conference on Emerging Security Information, Systems and Technologies, 2012.Google ScholarGoogle Scholar
  19. Xiong Li, et al. "A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things," IEEE Internet of Things Journal, pp. 1--11, 2017, DOI: 10.1109/JIOT.2017.2787800.Google ScholarGoogle ScholarCross RefCross Ref
  20. Anjana Rajan, Jithish J, Sriram Sankaran, "Sybil Attack in IoT: Modelling and Defenses," 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2323--2327, 2017.Google ScholarGoogle Scholar
  21. Patrick Olivier Kamgueu, Emmanuel Nataf, Thomas Djotio Ndie, "Survey on RPL enhancements: a focus on topology, security and mobility," Computer Communications (2018), DOI: 10.1016/j.comcom.2018.02.011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Faiza Medjek, Djamel Tandjaoui, Imed Romdhani, Nabil Djedjig, "A Trust-based Intrusion Detection System for Mobile RPL Based Network," IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 735--742, 2017.Google ScholarGoogle Scholar
  23. Chris Piro Clay Shields Brian Neil Levine, "Detecting the Sybil Attack in Mobile Ad hoc Networks," IEEE Conference, In Securecomm and Workshops, pp. 1--11, 2006.Google ScholarGoogle Scholar
  24. Anass RGHIOUI, Anass KHANNOUS, Mohammed BOUHORMA, "Denial-of-Service attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition.," Journal of Advanced Computer Science and Technology, vol. 3, no. 2, pp. 143--153, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  25. T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, et aI., "RPL IPv6 Routing Protocol for Low-Power and Lossy Network," RFC 6550, IETF, 2012.Google ScholarGoogle Scholar
  26. John R. Douceur, "They Sybil Attack," In International Workshop on Peer-to-Peer Systems, vol 2429, pp. 251--260, Springer, 2002.Google ScholarGoogle Scholar
  27. Linus Wallgren, Shahid Raza, Thiemo Voigt, "Routing Attacks and Countermeasures in the RPL-Based Internet of Things," In International Journal of Destributed Sensor Networks, vol. 2013, pp. 1--11, 2013.Google ScholarGoogle Scholar
  28. Minhaj Ahmad Khan, Khaled Salah, "IoT security: Review, blockchain solutions, and open challenges," Future Generation Computer Systems. pp. 395--411, 2018.Google ScholarGoogle Scholar
  29. Göran Pulkkis, Jonny Karlsson, and Magnus Westerlund, "Blockchain-Based Security Solutions for IoT Systems, Internet of Things A to Z: Technologies and Applications," First Edition. pp. 253--273, 2018Google ScholarGoogle Scholar
  30. Rahul Agrawal, et al "Continuous Security In IoT Using Blockchain," Internet of Things Business Models, Users, and Networks, pp. 6423--6427, 2018.Google ScholarGoogle Scholar
  31. Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gauravaram, "Blockchain for IoT Security and Privacy: The Case Study of a Smart Home," 2ND IEEE PERCOM Workshop On Security Privacy And Trust In The Internet of Things, 2017.Google ScholarGoogle Scholar
  32. Yash Gupta, Rajeev Shorey, Devadatta Kulkarni, Jeffrey Tew, "The Applicability of Blockchain in the Internet of Things," Proceedings of the 10th International Conference on Communication Systems & Networks (COMSNETS) pp. 561--564, 2018.Google ScholarGoogle Scholar
  33. Thamer A. Alghamdi, Aboubaker Lasebae, Mahdi Aiash, "Security Analysis of the Constrained Application Protocol in the Internet of Things," In Proceeding of the 2nd International Conference on Future Generation Communication Technologies (FGCT), pp. 163--168, 2013. DOI: 10.1109/FGCT.2013.6767217.Google ScholarGoogle Scholar
  34. Jiye Park, Namhi Kang, "Lightweight Secure Communication for CoAP-enabled Internet of Things using Delegated DTLS Handshake," In Proceeding of the 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 28--33. DOI: 10.1109/ICTC.2014.6983078.Google ScholarGoogle Scholar
  35. Mohamed T. HAMMI, Patrick BELLOT, Ahmed SERHROUCHNI, "BCTrust: A decentralized authentication blockchain-based mechanism", IEEE Wireless Communications and Networking Conference (WCNC), pp. 1--6, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Moon Y. Jung, Ju W. Jang, "Data Management and Searching System and Method to Provide Increased Security for IoT Platform", International Conference on Information and Communication Technology Convergence, pp. 273--278, DOI: 10.1109/ICTC.2017.8190803.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICIST '19: Proceedings of the 9th International Conference on Information Systems and Technologies
    March 2019
    249 pages
    ISBN:9781450362924
    DOI:10.1145/3361570

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 24 March 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader