ABSTRACT
Internet of Things (IoT) consists of devices, smart objects, and people that are given a unique identifier connected to the internet via wireless network. These devices are usually resources limited such as battery powered, memory and processing capability etc. The migration of these objects to the internet make them susceptible to various attacks related to external or internal unauthorized devices, which affect physical links, radio hops and routing discovery, give rise to malfunction and resources exhausting. The security mechanisms widely used on the Internet are too heavy to be integrated on small constrained objects. Therefore, we need secure protocols or add a security features to the existing ones with a minimum overhead. Routing also is one of the factors that may impact the security. In this paper, we will focus our work on the State of the art of existing protocols and study their vulnerabilities. Potential solutions based on the blockchain technology are also discussed in this paper.
- Christine Hennebert, Jessye Dos Santos, "Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis," IEEE Internet of Things Journal, vol. 1, no. 5, pp. 384--398, Oct. 2014.Google ScholarCross Ref
- Ahmed Mohammed Ibrahim Alkuhlani1, S.B. Thorat, "Internet of Things (IOT) Standards, Protocols and Security Issues." International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue. 11, pp. 491--495, November 2015.Google Scholar
- Konstantinos Rantos, Alexandros Papanikolaou, Charalampos Manifavas, "IPsec over IEEE 802.15.4 for Low Power and Lossy Networks." MobiWac'13, November 3-8, 2013, Barcelona, Spain.Google Scholar
- Thebiga M. Noorul, R. Suji Pramilan Noorul Islam, "An analysis of routing protocols in manets and Internet of things." International Conference on IoT and Application (ICIOT); 2017.Google Scholar
- Anhtuan Le, Jonathan Loo, Yuan Luo, Aboubaker Lasebae, "The Impacts of Internal Threats towards Routing Protocol for Low power and lossy Network Performance," In IEEE Symposuim on Computers and Communications (ISCC), pp. 789--794, 2013. DOI: 10.1109/ISCC.2013.6755045.Google Scholar
- M. Chernyshev, Z. Baig, O. Bello, S. Zeadally, "Internet of Things (IoT): Research, Simulators, and Testbeds," IEEE Internet of Things Journal, vol. 5, issue. 3, pp. 1--11, 2017.Google Scholar
- A. Nayyar and R. Singh, "A comprehensive review of simulation tools for wireless sensor networks (WSNs)," Journal of Wireless Networking and Communications, vol. 5, no. 1, pp. 19--47, 2015.Google Scholar
- Ghada Glissa, Aref Meddeb, "6LoWPAN multi-layered security protocol based on IEEE 802.15.4 security features," IEEE, pp. 264--268, 2017.Google Scholar
- G. Peretti, V. Lakkundi, and M. Zorzi, "Blinktoscoap: An end-to-end security framework for the internet of things," in 2015 7th International Conference on Communication Systems and Networks (COMSNETS), IEEE, pp. 1--6, 2015.Google Scholar
- Giulio Peretti, Vishwas Lakkundi, Michele Zorzi, "BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things," Future Information Security Workshop, COMSNETS 2015.Google Scholar
- Smitesh Mangelkar, Sudhir N. Dhage, Anant V. Nimkar, "A Comparative Study on RPL Attacks and Security Solutions," International Conference on Intelligent Computing and Control (I2C2), 2017.Google Scholar
- Ghada Glissa, Aref Meddeb, "IEEE 802.15.4 Security Sublayer for OMNET++," Proceeding of the 13th International Conference on Wireless Communciations and Mobile Computing (IWCMW), pp. 1891--1896, 2017. DOI: 10.1109/IWCMC.2017.7986572.Google Scholar
- Shahid Raza, Simon Duquennoy, Tony Chung, Dogan Yazar, Thiemo Voigt, Utz Roedig, "Securing Communication in 6LoWPAN with Compressed IPsec," Proceedings of the 7th IEEE International Conference on Distributing Computing in Sensor Systems, IEEE DCOSS, June 2011, Barcelona, Spain.Google Scholar
- Shahid Raza, Simon Duquennoy; Goeran Selander, "Compression of IPsec AH and ESP Headers for Constrained Environments," draft-raza-6lowpan-ipsec-01, 6LoWPAN Working Group S. Raza Internet-Draft, September 3, 2013.Google Scholar
- Ghada Glissa, Aref Meddeb, "6LowPSec: An End-to-End Security Protocol for 6LoWPAN," Ad Hoc Networks (2018), DOI: 10.1016/j.adhoc.2018.01.013.Google Scholar
- Kuan Zhang, Xiaohui Liang, Rongxing Lu, Xuemin Shen, "Sybil Attacks And THeir Defenses In The Internet Of Things," IEEE Internet of Things Journal, vol. 1, no. 5, October 2014.Google ScholarCross Ref
- Pavan Pongle, Gurunath Chavan, "A survey: Attacks on RPL 6LoWPAN in IoT," International Conference on Pervasive Computing (ICPC), 2015.Google Scholar
- Karishma Chugh, Aboubaker Lasebae, Jonathan Loo, "Case Study of a Black Hole Attack on 6LoWPAN-RPL," SECURWARE 2012: The Sixth International Conference on Emerging Security Information, Systems and Technologies, 2012.Google Scholar
- Xiong Li, et al. "A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things," IEEE Internet of Things Journal, pp. 1--11, 2017, DOI: 10.1109/JIOT.2017.2787800.Google ScholarCross Ref
- Anjana Rajan, Jithish J, Sriram Sankaran, "Sybil Attack in IoT: Modelling and Defenses," 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2323--2327, 2017.Google Scholar
- Patrick Olivier Kamgueu, Emmanuel Nataf, Thomas Djotio Ndie, "Survey on RPL enhancements: a focus on topology, security and mobility," Computer Communications (2018), DOI: 10.1016/j.comcom.2018.02.011.Google ScholarDigital Library
- Faiza Medjek, Djamel Tandjaoui, Imed Romdhani, Nabil Djedjig, "A Trust-based Intrusion Detection System for Mobile RPL Based Network," IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 735--742, 2017.Google Scholar
- Chris Piro Clay Shields Brian Neil Levine, "Detecting the Sybil Attack in Mobile Ad hoc Networks," IEEE Conference, In Securecomm and Workshops, pp. 1--11, 2006.Google Scholar
- Anass RGHIOUI, Anass KHANNOUS, Mohammed BOUHORMA, "Denial-of-Service attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition.," Journal of Advanced Computer Science and Technology, vol. 3, no. 2, pp. 143--153, 2014.Google ScholarCross Ref
- T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, et aI., "RPL IPv6 Routing Protocol for Low-Power and Lossy Network," RFC 6550, IETF, 2012.Google Scholar
- John R. Douceur, "They Sybil Attack," In International Workshop on Peer-to-Peer Systems, vol 2429, pp. 251--260, Springer, 2002.Google Scholar
- Linus Wallgren, Shahid Raza, Thiemo Voigt, "Routing Attacks and Countermeasures in the RPL-Based Internet of Things," In International Journal of Destributed Sensor Networks, vol. 2013, pp. 1--11, 2013.Google Scholar
- Minhaj Ahmad Khan, Khaled Salah, "IoT security: Review, blockchain solutions, and open challenges," Future Generation Computer Systems. pp. 395--411, 2018.Google Scholar
- Göran Pulkkis, Jonny Karlsson, and Magnus Westerlund, "Blockchain-Based Security Solutions for IoT Systems, Internet of Things A to Z: Technologies and Applications," First Edition. pp. 253--273, 2018Google Scholar
- Rahul Agrawal, et al "Continuous Security In IoT Using Blockchain," Internet of Things Business Models, Users, and Networks, pp. 6423--6427, 2018.Google Scholar
- Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gauravaram, "Blockchain for IoT Security and Privacy: The Case Study of a Smart Home," 2ND IEEE PERCOM Workshop On Security Privacy And Trust In The Internet of Things, 2017.Google Scholar
- Yash Gupta, Rajeev Shorey, Devadatta Kulkarni, Jeffrey Tew, "The Applicability of Blockchain in the Internet of Things," Proceedings of the 10th International Conference on Communication Systems & Networks (COMSNETS) pp. 561--564, 2018.Google Scholar
- Thamer A. Alghamdi, Aboubaker Lasebae, Mahdi Aiash, "Security Analysis of the Constrained Application Protocol in the Internet of Things," In Proceeding of the 2nd International Conference on Future Generation Communication Technologies (FGCT), pp. 163--168, 2013. DOI: 10.1109/FGCT.2013.6767217.Google Scholar
- Jiye Park, Namhi Kang, "Lightweight Secure Communication for CoAP-enabled Internet of Things using Delegated DTLS Handshake," In Proceeding of the 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 28--33. DOI: 10.1109/ICTC.2014.6983078.Google Scholar
- Mohamed T. HAMMI, Patrick BELLOT, Ahmed SERHROUCHNI, "BCTrust: A decentralized authentication blockchain-based mechanism", IEEE Wireless Communications and Networking Conference (WCNC), pp. 1--6, 2018.Google ScholarDigital Library
- Moon Y. Jung, Ju W. Jang, "Data Management and Searching System and Method to Provide Increased Security for IoT Platform", International Conference on Information and Communication Technology Convergence, pp. 273--278, DOI: 10.1109/ICTC.2017.8190803.Google Scholar
Recommendations
Internet of things security: challenges and perspectives
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud ComputingNo one can deny that the Internet of Things (IOT) will revolutionize our daily thanks to its many benefits in order to improve and simplify people's lives. Us any new technology the internet of things has a number of problems that prevents it to reach ...
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Threat-Based Security Analysis for the Internet of Things
SIOT '14: Proceedings of the 2014 International Workshop on Secure Internet of ThingsThe Internet of Things (IoT) is an emerging paradigm focusing on the inter-connection of things or devices to each other and to the users. This technology is anticipated to become an integral milestone in the development of smart homes and smart cities. ...
Comments