Skip to main content
Erschienen in: Telecommunication Systems 3/2018

13.06.2017

Security in Internet of Things: issues, challenges, taxonomy, and architecture

verfasst von: Vipindev Adat, B. B. Gupta

Erschienen in: Telecommunication Systems | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet technology is very pervasive today. The number of devices connected to the Internet, those with a digital identity, is increasing day by day. With the developments in the technology, Internet of Things (IoT) become important part of human life. However, it is not well defined and secure. Now, various security issues are considered as major problem for a full-fledged IoT environment. There exists a lot of security challenges with the proposed architectures and the technologies which make the backbone of the Internet of Things. Some efficient and promising security mechanisms have been developed to secure the IoT environment, however, there is a lot to do. The challenges are ever increasing and the solutions have to be ever improving. Therefore, aim of this paper is to discuss the history, background, statistics of IoT and security based analysis of IoT architecture. In addition, we will provide taxonomy of security challenges in IoT environment and taxonomy of various defense mechanisms. We conclude our paper discussing various research challenges that still exist in the literature, which provides better understanding of the problem, current solution space, and future research directions to defend IoT against different attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ashton, K. (2009). That internet of things thing. RFiD Journal, 22(7), 97–114. Ashton, K. (2009). That internet of things thing. RFiD Journal, 22(7), 97–114.
2.
Zurück zum Zitat Tewari, A., & Gupta, B. B. (2016). Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing, 73(3), 1085–1102.CrossRef Tewari, A., & Gupta, B. B. (2016). Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing, 73(3), 1085–1102.CrossRef
4.
Zurück zum Zitat Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production, 140, 1454–1464.CrossRef Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production, 140, 1454–1464.CrossRef
5.
Zurück zum Zitat Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: A survey. Future Generation Computer Systems, 56, 684–700.CrossRef Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: A survey. Future Generation Computer Systems, 56, 684–700.CrossRef
6.
Zurück zum Zitat Odelu, V., Das, A. K., Khan, M. K., Choo, K. K. R., & Jo, M. (2017). Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size Keys and ciphertexts. IEEE Access, 5, 3273–3283.CrossRef Odelu, V., Das, A. K., Khan, M. K., Choo, K. K. R., & Jo, M. (2017). Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size Keys and ciphertexts. IEEE Access, 5, 3273–3283.CrossRef
7.
Zurück zum Zitat Kong, L., Khan, M. K., Wu, F., Chen, G., & Zeng, P. (2017). Millimeter-wave wireless communications for IoT-cloud supported autonomous vehicles: Overview, design, and challenges. IEEE Communications Magazine, 55(1), 62–68.CrossRef Kong, L., Khan, M. K., Wu, F., Chen, G., & Zeng, P. (2017). Millimeter-wave wireless communications for IoT-cloud supported autonomous vehicles: Overview, design, and challenges. IEEE Communications Magazine, 55(1), 62–68.CrossRef
8.
Zurück zum Zitat Ab Malek, M. S. B., Ahmadon, M. A. B., Yamaguchi, S., & Gupta, B. B. (2016). On privacy verification in the IoT service based on PN 2. In Proceedings of the Consumer Electronics, IEEE 5th Global Conference on 2016, IEEE. (pp. 1–4). Ab Malek, M. S. B., Ahmadon, M. A. B., Yamaguchi, S., & Gupta, B. B. (2016). On privacy verification in the IoT service based on PN 2. In Proceedings of the Consumer Electronics, IEEE 5th Global Conference on 2016, IEEE. (pp. 1–4).
9.
Zurück zum Zitat Tewari, A., & Gupta, B. B. (2017). A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices. International Journal of Advanced Intelligence Paradigms, 9(2–3), 111–121.CrossRef Tewari, A., & Gupta, B. B. (2017). A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices. International Journal of Advanced Intelligence Paradigms, 9(2–3), 111–121.CrossRef
11.
Zurück zum Zitat Molisch, A. F., Balakrishnan, K., Chong, C. C., Emami, S., Fort, A., Karedal, J., et al. (2004). IEEE 802.15. 4a channel model-final report. IEEE P802, 15(04), 0662. Molisch, A. F., Balakrishnan, K., Chong, C. C., Emami, S., Fort, A., Karedal, J., et al. (2004). IEEE 802.15. 4a channel model-final report. IEEE P802, 15(04), 0662.
12.
Zurück zum Zitat Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2–23.CrossRef Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2–23.CrossRef
14.
Zurück zum Zitat Le, A., Loo, J., Lasebae, A., Aiash, M., & Luo, Y. (2012). 6LoWPAN: A study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems, 25(9), 1189–1212.CrossRef Le, A., Loo, J., Lasebae, A., Aiash, M., & Luo, Y. (2012). 6LoWPAN: A study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems, 25(9), 1189–1212.CrossRef
15.
Zurück zum Zitat Sonar, K., & Upadhyay, H. (2014). A survey: DDOS attack on Internet of Things. International Journal of Engineering Research and Development, 10(11), 58–63. Sonar, K., & Upadhyay, H. (2014). A survey: DDOS attack on Internet of Things. International Journal of Engineering Research and Development, 10(11), 58–63.
16.
Zurück zum Zitat Evans, D. (2011). The Internet of Things: How the next evolution of the internet is changing everything. CISCO White Paper, 1(2011), 1–11. Evans, D. (2011). The Internet of Things: How the next evolution of the internet is changing everything. CISCO White Paper, 1(2011), 1–11.
24.
Zurück zum Zitat Says, G. (2015). 6.4 billion connected “Things” will be in use in 2016, up 30 percent from 2015. Laval: Gart. Inc. Says, G. (2015). 6.4 billion connected “Things” will be in use in 2016, up 30 percent from 2015. Laval: Gart. Inc.
27.
Zurück zum Zitat Wood, P., Nahomey, B., Chandrasekar, K., Wallace, S., & Haley, K. (2016). Symantec internet security threat report. Technical report, Symantec Corporation. Wood, P., Nahomey, B., Chandrasekar, K., Wallace, S., & Haley, K. (2016). Symantec internet security threat report. Technical report, Symantec Corporation.
35.
Zurück zum Zitat Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2015). Identity-based encryption with outsourced revocation in cloud computing. IEEE Transactions on Computers, 64(2), 425–437.CrossRef Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2015). Identity-based encryption with outsourced revocation in cloud computing. IEEE Transactions on Computers, 64(2), 425–437.CrossRef
36.
Zurück zum Zitat Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., & Wong, D. S. (2015). L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowledge-Based Systems, 79, 18–26.CrossRef Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., & Wong, D. S. (2015). L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowledge-Based Systems, 79, 18–26.CrossRef
37.
Zurück zum Zitat Zhangjie, F., Xingming, S., Qi, L., Lu, Z. H. O. U., & Jiangang, S. H. U. (2015). Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 98(1), 190–200. Zhangjie, F., Xingming, S., Qi, L., Lu, Z. H. O. U., & Jiangang, S. H. U. (2015). Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 98(1), 190–200.
38.
Zurück zum Zitat Xia, Z., Wang, X., Sun, X., & Wang, Q. (2016). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.CrossRef Xia, Z., Wang, X., Sun, X., & Wang, Q. (2016). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.CrossRef
39.
Zurück zum Zitat Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–2608.CrossRef Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–2608.CrossRef
40.
Zurück zum Zitat Wu, M., Lu, T. J., Ling, F. Y., Sun, J., & Du, H. Y. (2010). Research on the architecture of Internet of Things. In Proceedings of 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) 2010, IEEE (Vol. 5, pp. V5–484). Wu, M., Lu, T. J., Ling, F. Y., Sun, J., & Du, H. Y. (2010). Research on the architecture of Internet of Things. In Proceedings of 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) 2010, IEEE (Vol. 5, pp. V5–484).
41.
Zurück zum Zitat Tan, L., & Wang, N. (2010). Future internet: The Internet of Things. In Proceedings of 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 2010, IEEE (Vol. 5, pp. V5–376). Tan, L., & Wang, N. (2010). Future internet: The Internet of Things. In Proceedings of 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 2010, IEEE (Vol. 5, pp. V5–376).
42.
Zurück zum Zitat Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the Internet of Things: A review. In International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012, IEEE (Vol. 3, pp. 648–651). Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the Internet of Things: A review. In International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012, IEEE (Vol. 3, pp. 648–651).
43.
Zurück zum Zitat Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.CrossRef Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.CrossRef
44.
Zurück zum Zitat Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the Internet of Things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ACM (pp. 13–16). Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the Internet of Things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ACM (pp. 13–16).
45.
Zurück zum Zitat Bonomi, F., Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics. In N. Bessis & C. Dobre (Eds.), Big data and internet of things: A roadmap for smart environments (pp. 169–186). Springer International Publishing. Bonomi, F., Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics. In N. Bessis & C. Dobre (Eds.), Big data and internet of things: A roadmap for smart environments (pp. 169–186). Springer International Publishing.
46.
Zurück zum Zitat Weber, R. H. (2010). Internet of Things-new security and privacy challenges. Computer Law & Security Review, 26(1), 23–30.CrossRef Weber, R. H. (2010). Internet of Things-new security and privacy challenges. Computer Law & Security Review, 26(1), 23–30.CrossRef
47.
Zurück zum Zitat Hu, Z. (2011). The research of several key question of Internet of Things. In International Conference on Intelligence Science and Information Engineering (ISIE), 2011, IEEE (pp. 362–365). Hu, Z. (2011). The research of several key question of Internet of Things. In International Conference on Intelligence Science and Information Engineering (ISIE), 2011, IEEE (pp. 362–365).
48.
Zurück zum Zitat Gan, G., Lu, Z., & Jiang, J. (2011). Internet of Things security analysis. In International Conference on Internet Technology and Applications (iTAP), 2011, IEEE (pp. 1–4). Gan, G., Lu, Z., & Jiang, J. (2011). Internet of Things security analysis. In International Conference on Internet Technology and Applications (iTAP), 2011, IEEE (pp. 1–4).
49.
Zurück zum Zitat Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134.CrossRef Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134.CrossRef
50.
Zurück zum Zitat Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. New Jersey: Wiley. Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. New Jersey: Wiley.
51.
Zurück zum Zitat Riahi, A., Natalizio, E., Challal, Y., Mitton, N., & Iera, A. (2014). A systemic and cognitive approach for IoT security. In International Conference on Computing, Networking and Communications (ICNC), 2014, IEEE (pp. 183–188). Riahi, A., Natalizio, E., Challal, Y., Mitton, N., & Iera, A. (2014). A systemic and cognitive approach for IoT security. In International Conference on Computing, Networking and Communications (ICNC), 2014, IEEE (pp. 183–188).
52.
Zurück zum Zitat Mulligan, G. (2007). The 6LoWPAN architecture. In Proceedings of the 4th Workshop on Embedded Networked Sensors, ACM (pp. 78–82). Mulligan, G. (2007). The 6LoWPAN architecture. In Proceedings of the 4th Workshop on Embedded Networked Sensors, ACM (pp. 78–82).
53.
Zurück zum Zitat Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007). IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals (No. RFC 4919). Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007). IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals (No. RFC 4919).
54.
Zurück zum Zitat Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based Internet of Things. International Journal of Distributed Sensor Networks, 9(8). Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based Internet of Things. International Journal of Distributed Sensor Networks, 9(8).
55.
Zurück zum Zitat Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.CrossRef Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.CrossRef
56.
Zurück zum Zitat Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.CrossRef Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.CrossRef
57.
Zurück zum Zitat Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.CrossRef Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.CrossRef
58.
Zurück zum Zitat Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.CrossRef Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), 54–62.CrossRef
59.
Zurück zum Zitat Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Communications, 11(6), 38–43.CrossRef Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Communications, 11(6), 38–43.CrossRef
60.
Zurück zum Zitat Modares, H., Salleh, R., & Moravejosharieh, A. (2011). Overview of security issues in wireless sensor networks. In Third International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2011, IEEE (pp. 308–311). Modares, H., Salleh, R., & Moravejosharieh, A. (2011). Overview of security issues in wireless sensor networks. In Third International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2011, IEEE (pp. 308–311).
61.
Zurück zum Zitat Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In Proceedings of the 8th International Conference Advanced Communication Technology, 2006. ICACT 2006, IEEE (Vol. 2, p. 6). Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In Proceedings of the 8th International Conference Advanced Communication Technology, 2006. ICACT 2006, IEEE (Vol. 2, p. 6).
62.
Zurück zum Zitat Singh, S., & Verma, H. K. (2011). Security for wireless sensor network. International Journal on Computer Science and Engineering, 3(6), 2393–2399. Singh, S., & Verma, H. K. (2011). Security for wireless sensor network. International Journal on Computer Science and Engineering, 3(6), 2393–2399.
63.
Zurück zum Zitat Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.CrossRef Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.CrossRef
64.
Zurück zum Zitat Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: Analysis & defenses. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, ACM (pp. 259–268). Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: Analysis & defenses. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, ACM (pp. 259–268).
65.
Zurück zum Zitat Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. INFOCOM 2003. IEEE Societies, IEEE (Vol. 3, pp. 1976–1986). Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. INFOCOM 2003. IEEE Societies, IEEE (Vol. 3, pp. 1976–1986).
66.
Zurück zum Zitat Zia, T., & Zomaya, A. (2006). Security issues in wireless sensor networks. In International Conference on Systems and Networks Communications, ICSNC’06, 2006, IEEE (p. 40). Zia, T., & Zomaya, A. (2006). Security issues in wireless sensor networks. In International Conference on Systems and Networks Communications, ICSNC’06, 2006, IEEE (p. 40).
67.
Zurück zum Zitat Khan, R., Khan, S. U., Zaheer, R., & Khan, S. (2012). Future internet: Ihe Internet of Things architecture, possible applications and key challenges. In 10th International Conference on Frontiers of Information Technology (FIT), 2012, IEEE (pp. 257–260). Khan, R., Khan, S. U., Zaheer, R., & Khan, S. (2012). Future internet: Ihe Internet of Things architecture, possible applications and key challenges. In 10th International Conference on Frontiers of Information Technology (FIT), 2012, IEEE (pp. 257–260).
68.
Zurück zum Zitat Weber, R. H. (2015). Internet of Things: Privacy issues revisited. Computer Law & Security Review, 31(5), 618–627.CrossRef Weber, R. H. (2015). Internet of Things: Privacy issues revisited. Computer Law & Security Review, 31(5), 618–627.CrossRef
69.
Zurück zum Zitat Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer. Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer.
70.
Zurück zum Zitat Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.CrossRef Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.CrossRef
71.
Zurück zum Zitat Eastlake 3rd, D., & Jones, P. (2001). US secure hash algorithm 1 (SHA1)(No. RFC 3174). Eastlake 3rd, D., & Jones, P. (2001). US secure hash algorithm 1 (SHA1)(No. RFC 3174).
72.
Zurück zum Zitat Gilbert, H., & Handschuh, H. (2004). Security analysis of SHA-256 and sisters. In M. Matsui & R. J. Zuccherato (Eds.), Selected areas in cryptography. SAC 2003. Lecture notes in computer science (Vol. 3006, pp. 175–193). Springer, Berlin, Heidelberg. Gilbert, H., & Handschuh, H. (2004). Security analysis of SHA-256 and sisters. In M. Matsui & R. J. Zuccherato (Eds.), Selected areas in cryptography. SAC 2003. Lecture notes in computer science (Vol. 3006, pp. 175–193). Springer, Berlin, Heidelberg.
73.
Zurück zum Zitat Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 24, 210–223.CrossRef Kalra, S., & Sood, S. K. (2015). Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 24, 210–223.CrossRef
74.
Zurück zum Zitat Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks, 11(8), 2661–2674.CrossRef Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks, 11(8), 2661–2674.CrossRef
75.
Zurück zum Zitat Dunkels, A. (2012). Contiki: The open source OS for the Internet of Things. Accessed 20 March 2017. Dunkels, A. (2012). Contiki: The open source OS for the Internet of Things. Accessed 20 March 2017.
76.
Zurück zum Zitat Amin, S. O., Siddiqui, M. S., Hong, C. S., & Lee, S. (2009). RIDES: Robust intrusion detection system for IP-based ubiquitous sensor networks. Sensors, 9(5), 3447–3468.CrossRef Amin, S. O., Siddiqui, M. S., Hong, C. S., & Lee, S. (2009). RIDES: Robust intrusion detection system for IP-based ubiquitous sensor networks. Sensors, 9(5), 3447–3468.CrossRef
77.
Zurück zum Zitat Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422–426.CrossRef Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), 422–426.CrossRef
78.
Zurück zum Zitat Le, A., Loo, J., Luo, Y., & Lasebae, A. (2011). Specification-based IDS for securing RPL from topology attacks. In Wireless Days (WD), 2011 IFIP, IEEE (pp. 1–3). Le, A., Loo, J., Luo, Y., & Lasebae, A. (2011). Specification-based IDS for securing RPL from topology attacks. In Wireless Days (WD), 2011 IFIP, IEEE (pp. 1–3).
79.
Zurück zum Zitat Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-of-service detection in 6LoWPAN based Internet of Things. In IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2013, IEEE (pp. 600–607). Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-of-service detection in 6LoWPAN based Internet of Things. In IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2013, IEEE (pp. 600–607).
80.
Zurück zum Zitat Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., & Spirito, M. A. (2013). DEMO: An IDS framework for internet of things empowered by 6LoWPAN. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, ACM (pp. 1337–1340). Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., & Spirito, M. A. (2013). DEMO: An IDS framework for internet of things empowered by 6LoWPAN. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, ACM (pp. 1337–1340).
81.
Zurück zum Zitat Gupta, B. B., Joshi, R. C., & Misra, M. (2009). Defending against distributed denial of service attacks: Issues and challenges. Information Security Journal: A Global Perspective, 18(5), 224–247. Gupta, B. B., Joshi, R. C., & Misra, M. (2009). Defending against distributed denial of service attacks: Issues and challenges. Information Security Journal: A Global Perspective, 18(5), 224–247.
82.
Zurück zum Zitat Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046–2069.CrossRef Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046–2069.CrossRef
83.
Zurück zum Zitat Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.CrossRef Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.CrossRef
84.
Zurück zum Zitat Haas, A., Haas, M., & Weinert, M. (2015). The Internet of Things is already here, but who bears the risks? Haas, A., Haas, M., & Weinert, M. (2015). The Internet of Things is already here, but who bears the risks?
85.
Zurück zum Zitat Esraa Alomari, R. A., Manickam, S., et al. (2012). Botnet-based distributed denial of service (DDoS) attacks on web servers: Classification and art. International Journal of Computer Application (IJCA), 49(07), 24–32.CrossRef Esraa Alomari, R. A., Manickam, S., et al. (2012). Botnet-based distributed denial of service (DDoS) attacks on web servers: Classification and art. International Journal of Computer Application (IJCA), 49(07), 24–32.CrossRef
86.
Zurück zum Zitat Chhabra, M., et al. (2013). A novel solution to handle DDOS attack in MANET. Journal of Information Security, 4(3), 165.CrossRef Chhabra, M., et al. (2013). A novel solution to handle DDOS attack in MANET. Journal of Information Security, 4(3), 165.CrossRef
87.
Zurück zum Zitat Gupta, B. B., & Badve, O. P. (2016). Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Computing and Applications, 1–28. Gupta, B. B., & Badve, O. P. (2016). Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Computing and Applications, 1–28.
Metadaten
Titel
Security in Internet of Things: issues, challenges, taxonomy, and architecture
verfasst von
Vipindev Adat
B. B. Gupta
Publikationsdatum
13.06.2017
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 3/2018
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-017-0345-9

Weitere Artikel der Ausgabe 3/2018

Telecommunication Systems 3/2018 Zur Ausgabe

Neuer Inhalt