Skip to main content

Security Challenges and Concerns of Internet of Things (IoT)

  • Chapter
  • First Online:
Cyber-Physical Systems: Architecture, Security and Application

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

Abstract

The Internet of Things (IoT) signifies the interconnection of exceedingly heterogeneous networked entities, for instance, sensors, actuators, smart phones, etc. In accord with concrete functions, the network structure of the IoT is divided into three hierarchies: the bottom hierarchy is the sensing equipment for information acquisition; the middle hierarchy is the network for data transmission, whereas the top hierarchy is intended for applications and middleware. The uniqueness of the IoT proclaims new challenges to security requirements, dissimilar from previous technology trends. Moreover, to guarantee resilience, fail-over and recovery mechanisms must be provided to uphold operations under failure or attacks, and to return to normal operations (failure/attack mitigation). To uphold the end-to-end method, the gateway requirements to endure invisible to the communicating endpoints. The Constrained Application Protocol (CoAP) is an ideal protocol, for being used with constrained devices and low-power networking. To give more security, to the major UDP (User Datagram Protocol) well-known applications, for instance, Voice over IP/Session Initiation Protocol (VoIP/SIP), Datagram Transport Layer Security (DTLS) can run on top of UDP instead of TCP (Transmission Control Protocol). In our research, we have found that hybrid RSA (Rivest–Shamir–Adleman) algorithm can be a good one with efficiency, more security, and more privacy protected way and can work for end-to-end encryption requirements for future Internet of Everything (IoE). In general, future researches in the security issues of the IoT would mostly quintessence on the following characteristics, the open security system, individual privacy protection mode, terminal security function, related laws for the security of the IoT, etc. It is unquestionable that the security of the IoT prerequisites a series of policies, laws, and regulations, perfect security management system for mutual collocation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jara A, Kafle V, Skarmeta A (2013) Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture. Int J Ad Hoc Ubiquitous Comput 13(3-4):228–242

    Article  Google Scholar 

  2. Li S, Gong P, Yang Q, Li M, Kong J, Li P (2013) A secure handshake scheme for mobile-hierarchy city intelligent transportation system. In: International conference on ubiquitous and future networks. ICUFN, Da Nang, pp 190–191

    Google Scholar 

  3. Kang KC, Pang ZB, Wang CC (2013) Security and privacy mechanism for health internet of things. J China Univ Posts Telecommun 20(Suppl 2):64–68

    Article  Google Scholar 

  4. Goncalves F, Macedo J, Nicolau M, Santos A (2013) Security architecture for mobile e-health applications in medication control. In: 2013 21st international conference on software, telecommunications and computer networks. SoftCOM, Primosten, pp 1–8

    Google Scholar 

  5. An J, Gui X, Zhang W, Jiang J, Yang J (2013) Research on social relations cognitive model of mobile nodes in internet of things. J. Netw Comput Appl 36(2):799–810

    Article  Google Scholar 

  6. Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito M (2013) Demo: an ids framework for internet of things empowered by 6lowpan, Berlin, Germany, pp 1337–1339

    Google Scholar 

  7. BETaaS Consortium (2014) BETaaS building the environment for the things as a service D2. 2. 2–Specification of the extended capabilities of the platform, pp 1–61

    Google Scholar 

  8. IoT-A Consortium (2014) IoT-A unified requirements. http://www.iot-a.eu/public/requirements/. 31 Jan 2014

  9. Gao L, Bai X (2014) A unified perspective on the factors influencing consumer acceptance of internet of things technology. Asia Pac J Mark Logist 26(2):211–231

    Article  Google Scholar 

  10. Gazis V (2014) Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Panayotis Kikiras, and Alex Wiesmaier. Security perspectives for collaborative data acquisition in the internet of things. In: International conference on safety and security in internet of things. Springer, New York

    Google Scholar 

  11. IoT-A Consortium (2014) IoT-A – Internet of things architecture. http://www.iot-a.eu/. 27 Jan 2014

  12. Logvinov O, Kraemer B, Adams C, Heiles J, Stuebing G (2014) Mary Lynne Nielsen, and Brenda Mancuso. Standard for an architectural framework for the internet of things (IoT) IEEE P2413 Webinar Panelists, pp 1–12

    Google Scholar 

  13. Zanella A, Bui N, Castellani AP, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1:22–32

    Article  Google Scholar 

  14. Grieco LA, Alaya MB, Monteil T, Drira KK (2014) Architecting information centric ETSI-M2M systems. In: IEEE PerCom

    Google Scholar 

  15. Anderson J, Rainie L (2014) The internet of things will thrive by 2025, Pew research internet project. http://www.pewinternet.org/2014/05/14/internet-of-things/

  16. Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134

    Article  Google Scholar 

  17. Piro G, Boggia G, Grieco LA (2014) A standard compliant security framework for IEEE 802.15.4 networks. In: Proceedings of IEEE world forum on internet of things (WF-IoT), Seoul, South Korea, pp 27–30

    Google Scholar 

  18. Lee J-Y, Lin W-C, Huang Y-H (2014) A lightweight authentication protocol for internet of things. In: 2014 international symposium on next-generation electronics, ISNE 2014, Kwei-Shan, pp 1–2

    Google Scholar 

  19. Turkanovi M, Brumen B, Hlbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112

    Article  Google Scholar 

  20. Ye N, Zhu Y, Wang R-CB, Malekian R, Lin Q-M (2014) An efficient authentication and access control scheme for perception layer of internet of things. Appl Math Inf Sci 8(4):1617–1624

    Article  Google Scholar 

  21. Cherkaoui A, Bossuet L, Seitz L, Selander G, Borgaonkar R (2014) New paradigms for access control in constrained environments. In: 2014 9th international symposium on reconfigurable and communication-centric systems-on-chip (ReCoSoC), Montpellier, pp 1–4

    Google Scholar 

  22. Sicari S, Rizzardi A, Cappiello C, Coen-Porisini A (2014) A NFP model for internet of things applications. In: Proceedings of IEEE WiMob, Larnaca, Cyprus, pp 164–171

    Google Scholar 

  23. Wang X, Zhang J, Schooler E, Ion M (2014) Performance evaluation of attribute-based encryption: Toward data privacy in the IoT. In: 2014 IEEE international conference on communications, ICC 2014, Sydney, NSW, pp 725–730

    Google Scholar 

  24. Su J, Cao D, Zhao B, Wang X, You I (2014) ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things. Futur Gener Comput Syst 33:11–18

    Article  Google Scholar 

  25. Peng LB, Ru-chuan WB, Xiao-yu S, Long C (2014) Privacy protection based on key-changed mutual authentication protocol in internet of things. Commun Comput Inf Sci 418:345–355

    Google Scholar 

  26. Ukil A, Bandyopadhyay S, Pal A (2014) IoT-privacy: to be private or not to be private. In: Proceedings – IEEE INFOCOM, Toronto, ON, pp 123–124

    Google Scholar 

  27. Sicari S, Cappiello C, Pellegrini FD, Miorandi D, Coen-Porisini A (2014) A security-and quality-aware system architecture for internet of things. Inf Syst Front 18:1–13

    Google Scholar 

  28. Tormo GD, Marmol FG, Perez GM (2014) Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Futur Gener Comput Syst 49:113–124

    Article  Google Scholar 

  29. Gu L, Wang J, Sun BB (2014) Trust management mechanism for internet of things. China Commun 11(2):148–156

    Article  Google Scholar 

  30. Liu Y-B, Gong X-H, Feng Y-F (2014) Trust system based on node behavior detection in internet of things. Tongxin Xuebao/J Commun 35(5):8–15

    Google Scholar 

  31. Singh J, Bacon J, Eyers D (2014) Policy enforcement within emerging distributed, event-based systems. In: DEBS 2014 – Proceedings of the 8th ACM international conference on distributed event-based systems, pp 246–255

    Google Scholar 

  32. Neisse R, Steri G, Baldini G (2014) Enforcement of security policy rules for the internet of things. In: Proceedings of IEEE WiMob, Larnaca, Cyprus, pp 120–127

    Google Scholar 

  33. Gòmez-Goiri A, Orduna P, Diego J, de Ipina DL (2014) Otsopack: lightweight semantic framework for interoperable ambient intelligence applications. Comput Hum Behav 30:460–467

    Article  Google Scholar 

  34. Colistra G, Pilloni V, Atzori L (2014) The problem of task allocation in the internet of things and the consensus-based approach. Comput Netw 73:98–111

    Article  Google Scholar 

  35. Wang Y, Qiao M, Tang H, Pei H (2014) Middleware development method for internet of things. Liaoning Gongcheng Jishu Daxue Xuebao (Ziran Kexue Ban)/J Liaoning Tech Univ (Nat Sci Ed) 33(5):675–678

    Google Scholar 

  36. Ferreira H, De Sousa R Jr, De Deus F, Canedo E (2014) Proposal of a secure, deployable and transparent middleware for internet of things. In: Iberian conference on information systems and technologies. CISTI, Barcelona, pp 1–4

    Google Scholar 

  37. Niu B, Zhu X, Chi H, Li H (2014) Privacy and authentication protocol for mobile RFID systems. Wireless Pers Commun 77(3):1713–1731

    Article  Google Scholar 

  38. Jeong Y-S, Lee J, Lee J-B, Jung J-J, Park J (2014) An efficient and secure m-IPS scheme of mobile devices for human-centric computing. J Appl Math 2014:1–8

    Google Scholar 

  39. Geng J, Xiong X (2014) Research on mobile information access based on internet of things. Appl Mech Mater 539:460–463

    Article  Google Scholar 

  40. Kubler S, Frmling K, Buda A (2014) A standardized approach to deal with firewall and mobility policies in the IoT. Pervasive Mobile Comput 20:100–114

    Article  Google Scholar 

  41. Daubert J, Wiesmaier A, Kikiras P (2015) A view on privacy & trust in IoT. In: IOT/CPS-Security Workshop, IEEE international conference on communications, ICC 2015, London, GB, June 08–12, 2015, page to appear. IEEE

    Google Scholar 

  42. Sadeghi AR, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial internet of things. In: Annual design automation conference. ACM, New York, p 54

    Google Scholar 

  43. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164

    Article  Google Scholar 

  44. Zhang Z-k, Cheng M, Cho Y, Shieh S (2015) Emerging security threats and countermeasures in IoT. In: ACM symposium on information, computer and communications security. ACM, New York, pp 1–6

    Google Scholar 

  45. Bhattacharjya A, Zhong X, Wang J (2016) Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA. In: Proceedings of the international conference on internet of things and cloud computing (ICC 2016) ISBN 978-1-4503-4063-2/16/03. The Møller Centre-Churchill College, Cambridge. https://doi.org/10.1145/2896387.2896431

    Google Scholar 

  46. BUTLER Project. http://www.iot-butler.eu

  47. EU-Japan Project. http://www.eurojapan-ict.org/

  48. European FP7 IoT@Work project. http://iot-at-work.eu

  49. HYDRA Project. http://www.hydramiddleware.eu/

  50. Usable Trust in the Internet of Things. http://www.utrustit.eu/

  51. iCORE Project. http://www.iot-icore.eu

  52. HACMS Project. http://www.defenseone.com/technology

  53. National Science Foundation Project. http://www.nsf.gov

  54. FIRE EU-China Project. http://www.euchina-fire.eu/

  55. FIRE EU-Korea Project. http://eukorea-fire.eu/

  56. Bhattacharjya A, Zhong X, Wang J (2018) An end to end users two way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures. Int J Inf Comput Secur 10(1):63–79

    Article  Google Scholar 

  57. Bhattacharjya A, Zhong X, Wang J, Xing L (2018) On mapping of address and port using translation (MAP-T). Int J Inf Comput Secur. http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijics. https://doi.org/10.1504/IJICS.2018.10008372

    Article  Google Scholar 

  58. Bhattacharjya A, Zhong X, Wang J (2018) HYBRID RSA based highly efficient, reliable and strong personal full mesh networked messaging scheme. Int J Inf Comput Secur. http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijics. https://doi.org/10.1504/IJICS.2018.10010256

    Article  Google Scholar 

  59. Bhattacharjya A, Zhong X, Wang J, Xing L (2018) Secure IoT structural design for smart cites. In: Smart cities cybersecurity and privacy. Elsevier, New York. ISBN: 9780128150320. https://www.elsevier.com/books/smart-cities-cybersecurity-and-privacy/rawat/978-0-12- 815032-0

    Chapter  Google Scholar 

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (No. 61631013) and Key Laboratory of Universal Wireless Communications (Beijing University of Posts and Telecommunications), Ministry of Education, P.R. China (No. KFKT-2014101).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Aniruddha Bhattacharjya or Xing Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bhattacharjya, A., Zhong, X., Wang, J., Li, X. (2019). Security Challenges and Concerns of Internet of Things (IoT). In: Guo, S., Zeng, D. (eds) Cyber-Physical Systems: Architecture, Security and Application. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-92564-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92564-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92563-9

  • Online ISBN: 978-3-319-92564-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics