Security Challenges and Countermeasures for the Heterogeneity of IoT Applications

DOI: https://doi.org/10.32629/jai.v1i2.25

Deepak Choudhary

Abstract

The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and household settings. As the IoT expands the number of connected devices, there is the potential to allow cyber-attackers into the physical world in which we live, as they seize on security holes in these new systems. New security issues arise through the heterogeneity  of  IoT  applications and devices and their large-scale deployment.

Keywords

IOT, Heterogeneity, Security, Networking, cyber-attacker, deployment, datagram transport layer security, Cryptography

References

  1. Yao, L; Sheng, Q; Dustdar, S. (2015) ‘Web-Based Management of the Internet of Things’. IEEE Internet Computing, 19, 4, 66 – 70.
  2. Kortuem, G; Kawsar, F; Fitton, D; Sundramoorthy, V. (2010) ‘Smart Objects as Building Blocks for the Internet
  3. of Things’. IEEE Internet Computing, 14, 1, 44 – 51.
  4. Shin, D. (2014) ‘A socio-technical framework for Internet-of-Things design: A human-centred design for the Internet of Things’. Telematics and Informatics, 31, 519 –531.
  5. Zhang, Z; Cho, M; Wang, C; Hsu, C; Chen, C; Shieh, S. (2014) ‘IoT security: ongoing challenges and research opportunities’. In Proceedings of 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, 17-19 Nov 2014, Matsue, Japan, pp.230-234.
  6. Riahi, A; Challal, Y; Natalizio, E; Chtourou, Z; Bouabdallah, A. (2013) ‘A systemic approach for IoT security’. In Proceedings of 2013 IEEE International Conference on Distributed Computing in Sensor Systems,
  7. -23 May 2013, Cambridge, MA, US, pp.351-355.
  8. Ghani, H; Khelil, A; Suri, N; Csertan, G; Gonczy, L; Urbanics, G; Clarke, J. (2014) ‘Assessing the Security of Internet Connected Critical Infrastructures’. Security and Communication Networks, 7, 2713 – 2725.
  9. Hassanzadeh, A; Modi, S; Mulchandani, S. (2015) ‘Towards effective security control assignment in the Industrial Internet of Things’. In Proceedings of IEEE 2nd World Forum on Internet of Things, 14-16 Dec 2015, Milan, Italy, pp.795 – 800.
  10. Weber, R. (2010) ‘Internet of Things – New security and privacy challenges’. Computer Law and Security Review, 26, 23 – 30.
  11. Yang, X; Li, Z; Geng, Z; Zhang, H. (2012) ‘A multi-layer security model for Internet of Things’. In Internet of Things (pp.388-393). Springer, Berlin Heidelberg.
  12. Roman, R; Zhou, J; Lopez, J. (2013) ‘On the features and challenges of security and privacy in distributed Internet of Things’. Computer Networks, 57, 2266 – 2279.
  13. Nolin, J; Olson, N. (2016) ‘The Internet of Things and convenience’. Internet Research, 26, 2, 360 – 376.
  14. Petrie, C; Spatscheck, O. (2012) ‘Future Internet Protocols’. IEEE Internet Computing, 16, 6, 11 – 13.
  15. Rosado, D; Gutiérrez, C; Fernández-Medina, E; Piattini, M. (2006) ‘Security patterns and requirements for Internet-based applications’. Internet Research, 16, 5, 519– 536.
  16. Almeida, V; Doneda, D; Monteiro, M.(2015)
  17. ‘Governance challenges for the Internet of Things’. IEEE
  18. Internet Computing, 19, 4, 56 – 59.
  19. Atzori, L; Iera, A; G. Morabito, G. (2010) ‘The Internet of Things: A Survey’. Computer Networks, 54, 15, 2787 –2805.
  20. Chen, P; Cheng, S; Chen, K. (2014) ‘Information Fusion to Defend Intentional Attack in Internet of Things’. IEEE Internet of Things Journal, 1, 4, 337 – 348.
  21. Granjal, J; Monteiro, E; Silva, J. (2014) ‘Network‐ layer security for the Internet of Things using TinyOS and BLIP’. International Journal of Communication Systems,
  22. , 10, 1938-63.
  23. Mahalle, PN; Anggorojati, B; Prasad, NR; Rasad, R. (2013). ‘Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things’. Journal of Cyber-security and Mobility, 1, 4, 309-348.
  24. Raza, S; Shafagh, H; Hewage, K; Hummen, R; Voigt, T. (2013) ‘Lithe: Lightweight secure CoAP for the Internet of Things’. IEEE Sensors Journal, 13, 10, 3711-3720.
  25. Keoh, S; Kumar, S; Tschofenig, H. (2014) ‘Securing the Internet of Things: A standardization perspective’. IEEE Internet of Things Journal, 1, 3, 265-75.
  26. Sicari, S; Rizzardi, A; Grieco, L; Coen-Porisiniet, A. (2014) ‘Security, privacy and trust in Internet of Things: The road ahead’. Computer Networks, 76, 146 – 164.
  27. Le, A; Loo, J; Lasebae, A; Aiash, M; Luo, Y (2012).
  28. ‘6LoWPAN: a study on QoS security threats and coun- termeasures using intrusion detection system approach’. International Journal of Communication Systems, 25, 9,
  29. -212.
  30. Li, S; Tryfonas, T; Li, H. (2016) ‘The Internet of Things:a security point of view’. Internet Research, 26, 2, 337 –359.
  31. Zhang, K; Liang, X; Lu, R; Shen, X. (2014) ‘Sybil Attacks and Their Defenses in the Internet of Things’. IEEE Internet of Things Journal, 1, 5, 372 – 383.
  32. Porambage, P; Braekeny, A; Gurtovz, A; Ylianttila, M; Spinsanteet, S. (2015) ‘Secure End-to-End Communication for Constrained Devices in IoT-enabled Ambient Assisted Living Systems’. In Proceedings of IEEE 2nd World Forum on Internet of Things, 14-16 Dec
  33. , Milan, Italy, pp.711 – 714.
  34. Nguyen, K; Laurent, M; Nouha Oualhaet, N. (2015)‘Survey on secure communication protocols for the Internet of Things’. Ad Hoc Networks, 32, 17 – 31.
  35. Skarmeta, A; Hernandez-Ramos, J; Moreno, M. (2014) ‘A decentralised approach for Security and Privacy challenges in the Internet of Things’. IEEE World Forum on Internet of Things, 6 – 8 March, 2014, Seoul, Korea, pp.67 – 72.
  36. Oriwoh, E; Sant, P; Epiphaniouet, G. (2013) ‘Guidelines for Internet of Things deployment approaches – The Thing Commandments’. In Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Oct 21-24, 2013, Niagara Falls, Ontario, Canada pp.122 – 13.
  37. Franssila, H. (2016) ‘Enhancing information interaction as a means for situation awareness maintenance in mobile field work’. Cognition, Technology & Work, 18, 3, 567 –582.30. Hou, B. and Sheng-Yang, Y. (2012) ‘Design of Distributed Remote Real-Time Monitoring and Control System Based on Internet’. Journal of Emerging Trends in Computing and Information Sciences, 3, 7, 1068 – 1073.
  38. Li, F; Xiong, P. (2013) ‘Practical secure communication for integrating wireless sensor networks into the Internet of Things’. IEEE Sensors Journal, 13, 10, 3677-84.
  39. Gupta, M; Banerjee, S; Agrawal, M; Rao, H. (2008) ‘Security analysis of Internet technology components enabling globally distributed workplaces – a framework’. ACM Transactions on Internet Technology, 8, 4, 17 – 55.
Copyright © 2019 Deepak Choudhary

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Refbacks

  • There are currently no refbacks.