Skip to main content

2017 | OriginalPaper | Buchkapitel

Security Challenges of the Internet of Things

verfasst von : Musa G. Samaila, Miguel Neto, Diogo A. B. Fernandes, Mário M. Freire, Pedro R. M. Inácio

Erschienen in: Beyond the Internet of Things

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) is an environment in which ordinary and complex consumer products, buildings, bridges, animals or even people, etc. are embedded with sensors, equipped with a variety of communication technologies and given unique identifiers that can enable them connect to the Internet. This allows them to talk to each other, collect data and transfer data over the Internet. IoT has the potential to enhance the way we do things by increasing productivity and efficiency. It also has the prospects of delivering significant business benefits. Nonetheless, implementing secure communication in the IoT and integrating security mechanisms into some of its devices have been a major impediment to its progress, resulting in many privacy concerns. Although IoT is a hybrid network of the Internet, many security solutions for the Internet cannot be directly used on the resource-constrained devices of the IoT, hence the need for new security solutions. In this chapter, we discuss the security challenges of the IoT. First, we discuss some basic concepts of security and security requirements in the context of IoT. We then consider fundamental security issues in the IoT and thereafter highlight the security issues that need immediate attention.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat J. M. Batalla, G. Mastorakis, C. X. Mavromoustakis, and J. Zurek. On Cohabitating Networking Technologies with Common Wireless Access for Home Automation Systems Purposes. IEEE Wireless Communication Magazine, 2016. J. M. Batalla, G. Mastorakis, C. X. Mavromoustakis, and J. Zurek. On Cohabitating Networking Technologies with Common Wireless Access for Home Automation Systems Purposes. IEEE Wireless Communication Magazine, 2016.
2.
Zurück zum Zitat A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash. Internet of Things: A Survey on Enabling Technologies, Protocols and Applications. IEEE Commun. Surveys & Tuts., 2015. ISSN 1553-877X. doi:10.1109/COMST.2015.2444095. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash. Internet of Things: A Survey on Enabling Technologies, Protocols and Applications. IEEE Commun. Surveys & Tuts., 2015. ISSN 1553-877X. doi:10.​1109/​COMST.​2015.​2444095.
3.
8.
Zurück zum Zitat J. M. Batalla, M. Gajewski, W. Latoszek, P. Krawiec, C. X. Mavromoustakis, and G. Mastorakis. ID-based Service Oriented Communications for Unified Access to IoT. Computers & Electrical Engineering, pages –, 2016. ISSN 0045-7906. doi:10.1016/j.compeleceng.2016.02.020. J. M. Batalla, M. Gajewski, W. Latoszek, P. Krawiec, C. X. Mavromoustakis, and G. Mastorakis. ID-based Service Oriented Communications for Unified Access to IoT. Computers & Electrical Engineering, pages –, 2016. ISSN 0045-7906. doi:10.​1016/​j.​compeleceng.​2016.​02.​020.
9.
Zurück zum Zitat M. A. Al Faruque and K. Vatanparvar. Energy Management-as-a-Service Over Fog Computing Platform. IEEE Internet of Things Journal, 3(2):161–169, April 2016. ISSN 2327-4662. doi:10.1109/JIOT.2015.2471260. M. A. Al Faruque and K. Vatanparvar. Energy Management-as-a-Service Over Fog Computing Platform. IEEE Internet of Things Journal, 3(2):161–169, April 2016. ISSN 2327-4662. doi:10.​1109/​JIOT.​2015.​2471260.
14.
Zurück zum Zitat S. Raza. Lightweight Security Solutions for the Internet of Things. Dissertation, Malardalen University Sweden, Jun. 2013. S. Raza. Lightweight Security Solutions for the Internet of Things. Dissertation, Malardalen University Sweden, Jun. 2013.
16.
Zurück zum Zitat M. Abomhara and G.M. Koien. Security and Privacy in the Internet of Things: Current Status and Open Issues. In IEEE Int. Conf. Privacy Secur. Mobile Syst., May 2014. doi:10.1109/PRISMS.2014.6970594. M. Abomhara and G.M. Koien. Security and Privacy in the Internet of Things: Current Status and Open Issues. In IEEE Int. Conf. Privacy Secur. Mobile Syst., May 2014. doi:10.​1109/​PRISMS.​2014.​6970594.
18.
Zurück zum Zitat I. Alqassem and D. Svetinovic. A Taxonomy of Security and Privacy Requirements for the Internet of Things (IoT). In IEEE Int. Conf. Ind. Eng. Eng. Manag., Dec 2014. doi:10.1109/IEEM.2014.7058837. I. Alqassem and D. Svetinovic. A Taxonomy of Security and Privacy Requirements for the Internet of Things (IoT). In IEEE Int. Conf. Ind. Eng. Eng. Manag., Dec 2014. doi:10.​1109/​IEEM.​2014.​7058837.
19.
23.
Zurück zum Zitat K. Rose, Scott Eldridge, and Lyman Chapin. The Internet of Things: An Overview-Understanding the Issues and Challenges of a More Connected World. The Internet Society, pages 1–50, Oct 2015. K. Rose, Scott Eldridge, and Lyman Chapin. The Internet of Things: An Overview-Understanding the Issues and Challenges of a More Connected World. The Internet Society, pages 1–50, Oct 2015.
25.
Zurück zum Zitat T. Lee. The Hardware Enablers for the Internet of Things - Part I. IEEE Internet of Things Newsletter, Jan 2015. T. Lee. The Hardware Enablers for the Internet of Things - Part I. IEEE Internet of Things Newsletter, Jan 2015.
28.
29.
Zurück zum Zitat E. D. Poorter, I. Moerman, and P. Demeester. Enabling Direct Connectivity Between Heterogeneous Objects in the Internet of Things through a Network-Service-Oriented Architecture. EURASIP J Wireless Commun & Netw., 2011. doi:10.1186/1687-1499-2011-61. E. D. Poorter, I. Moerman, and P. Demeester. Enabling Direct Connectivity Between Heterogeneous Objects in the Internet of Things through a Network-Service-Oriented Architecture. EURASIP J Wireless Commun & Netw., 2011. doi:10.​1186/​1687-1499-2011-61.
30.
Zurück zum Zitat V. L. Shivraj, M. A. Rajan, M. Singh, and P. Balamuralidhar. One Time Password Authentication Scheme Based on Elliptic Curves for Internet of Things (IoT). In IEEE 5th National Symp. Info. Technol.: Towards New Smart World, Feb 2015. doi:10.1109/NSITNSW.2015.7176384. V. L. Shivraj, M. A. Rajan, M. Singh, and P. Balamuralidhar. One Time Password Authentication Scheme Based on Elliptic Curves for Internet of Things (IoT). In IEEE 5th National Symp. Info. Technol.: Towards New Smart World, Feb 2015. doi:10.​1109/​NSITNSW.​2015.​7176384.
31.
Zurück zum Zitat W. Coomans, R. B. Moraes, K. Hooghe, and J. Maes. The 5th Generation Broadband Copper Access. In Proceedings of IEEE 9th ITG Symp. Broadband Coverage in Germany, pages 1–5, April 2015. W. Coomans, R. B. Moraes, K. Hooghe, and J. Maes. The 5th Generation Broadband Copper Access. In Proceedings of IEEE 9th ITG Symp. Broadband Coverage in Germany, pages 1–5, April 2015.
32.
Zurück zum Zitat M.J. Covington and R. Carskadden. Threat Implications of the Internet of Things. In M. Maybaum K. Podins, J. Stinissen, editor, IEEE 5th Int. Conf. Cyber Conflict, pages 1–12, June 2013. M.J. Covington and R. Carskadden. Threat Implications of the Internet of Things. In M. Maybaum K. Podins, J. Stinissen, editor, IEEE 5th Int. Conf. Cyber Conflict, pages 1–12, June 2013.
50.
Zurück zum Zitat J. T. Ho, D. Dearman, and Khai N. Truong. Improving Users’ Security Choices on Home Wireless Networks. In Proc. 6th ACM Symp. Usable Privacy Secur., 2010. ISBN 978-1-4503-0264-7. doi:10.1145/1837110.1837126. J. T. Ho, D. Dearman, and Khai N. Truong. Improving Users’ Security Choices on Home Wireless Networks. In Proc. 6th ACM Symp. Usable Privacy Secur., 2010. ISBN 978-1-4503-0264-7. doi:10.​1145/​1837110.​1837126.
52.
Zurück zum Zitat M. Rozenfeld. The Value of Privacy: Safeguarding your Information in the Age of the Internet of Everything. The Institute - IEEE News Source, Mar 2014. M. Rozenfeld. The Value of Privacy: Safeguarding your Information in the Age of the Internet of Everything. The Institute - IEEE News Source, Mar 2014.
54.
Zurück zum Zitat A. Grau. Hackers Invade Hospital Networks Through Insecure Medical Equipment. IEEE Spectrum, Jun 2015. A. Grau. Hackers Invade Hospital Networks Through Insecure Medical Equipment. IEEE Spectrum, Jun 2015.
55.
Zurück zum Zitat G. Singh and Supriya. Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES. In IEEE 2nd Int. Conf. Adv. Comput. Netw. & Secur., Dec 2013. doi:10.1109/ADCONS.2013.33. G. Singh and Supriya. Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES. In IEEE 2nd Int. Conf. Adv. Comput. Netw. & Secur., Dec 2013. doi:10.​1109/​ADCONS.​2013.​33.
56.
Zurück zum Zitat A. Fragkiadakis, P. Charalampidis, S. Papadakis, and E. Tragos. Experiences with Deploying Compressive Sensing and Matrix Completion Techniques in IoT Devices. In IEEE 19th Int. Workshop Comput. Aided Modeling & Design Commun. Links & Netw., Dec 2014. doi:10.1109/CAMAD.2014.7033237. A. Fragkiadakis, P. Charalampidis, S. Papadakis, and E. Tragos. Experiences with Deploying Compressive Sensing and Matrix Completion Techniques in IoT Devices. In IEEE 19th Int. Workshop Comput. Aided Modeling & Design Commun. Links & Netw., Dec 2014. doi:10.​1109/​CAMAD.​2014.​7033237.
58.
Zurück zum Zitat M. Alhabeeb, A. Almuhaideb, P. D. Le, and B. Srinivasan. Information Security Threats Classification Pyramid. In IEEE 24th Int. Conf. Adv. Inf. Netw. Appl. Workshops, Apr 2010. doi:10.1109/WAINA.2010. M. Alhabeeb, A. Almuhaideb, P. D. Le, and B. Srinivasan. Information Security Threats Classification Pyramid. In IEEE 24th Int. Conf. Adv. Inf. Netw. Appl. Workshops, Apr 2010. doi:10.​1109/​WAINA.​2010.
61.
Zurück zum Zitat E. Bertino, L. D. Martino, F. Paci, and A. C. Squicciarini. Security for Web Services and Service-Oriented Architectures. Springer, 2010. ISBN 978-3-540-87741-7. doi:10.1007/978-3-540-87742-4. E. Bertino, L. D. Martino, F. Paci, and A. C. Squicciarini. Security for Web Services and Service-Oriented Architectures. Springer, 2010. ISBN 978-3-540-87741-7. doi:10.​1007/​978-3-540-87742-4.
67.
Zurück zum Zitat O. O. Bamasag and K. Youcef-Toumi. Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme. In Proceedings of the WESS’15: Workshop Embedded Syst. Secur. ACM, 2015. ISBN 978-1-4503-3667-3. doi:10.1145/2818362.2818363. O. O. Bamasag and K. Youcef-Toumi. Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme. In Proceedings of the WESS’15: Workshop Embedded Syst. Secur. ACM, 2015. ISBN 978-1-4503-3667-3. doi:10.​1145/​2818362.​2818363.
68.
Zurück zum Zitat M.A. Jan, P. Nanda, Xiangjian He, Zhiyuan Tan, and Ren Ping Liu. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In IEEE 13th Int. Conf. Trust, Secur. & Privacy Comput. Commun., Sept 2014. doi:10.1109/TrustCom.2014.31. M.A. Jan, P. Nanda, Xiangjian He, Zhiyuan Tan, and Ren Ping Liu. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In IEEE 13th Int. Conf. Trust, Secur. & Privacy Comput. Commun., Sept 2014. doi:10.​1109/​TrustCom.​2014.​31.
69.
Zurück zum Zitat K. Fan, J. Li, H. Li, X. Liang, X. Shen, and Y. Yang. ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things. In IEEE 4th Int. Conf. Intell. Netw. Collab. Systs., Sept 2012. doi:10.1109/iNCoS.2012.48. K. Fan, J. Li, H. Li, X. Liang, X. Shen, and Y. Yang. ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things. In IEEE 4th Int. Conf. Intell. Netw. Collab. Systs., Sept 2012. doi:10.​1109/​iNCoS.​2012.​48.
70.
Zurück zum Zitat G. Zhao, X. Si, J. Wang, X. Long, and T. Hu. A Novel Mutual Authentication Scheme for Internet of Things. In IEEE Proceedings of Int. Conf. Modeling, Identification & Control, June 2011. doi:10.1109/ICMIC.2011.5973767. G. Zhao, X. Si, J. Wang, X. Long, and T. Hu. A Novel Mutual Authentication Scheme for Internet of Things. In IEEE Proceedings of Int. Conf. Modeling, Identification & Control, June 2011. doi:10.​1109/​ICMIC.​2011.​5973767.
71.
Zurück zum Zitat G. Bansod, N. Raval, N. Pisharoty, and A. Patil. Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security. Cryptology ePrint Archive: Report 2014/1016,, Dec 2014. URL https://eprint.iacr.org/2014/1016. Cited 12 Nov 2015. G. Bansod, N. Raval, N. Pisharoty, and A. Patil. Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security. Cryptology ePrint Archive: Report 2014/1016,, Dec 2014. URL https://​eprint.​iacr.​org/​2014/​1016. Cited 12 Nov 2015.
75.
Zurück zum Zitat I. Mansour, G. Chalhoub, and P. Lafourcade. Key Management in Wireless Sensor Networks. J Sensor & Actuator Netws., 2015. doi:10.3390/jsan4030251. I. Mansour, G. Chalhoub, and P. Lafourcade. Key Management in Wireless Sensor Networks. J Sensor & Actuator Netws., 2015. doi:10.​3390/​jsan4030251.
76.
Zurück zum Zitat M. Ge and K. R. Choo. A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks. Springer International Publishing Switzerland, 2014. doi:10.1007/978-3-319-11698-3 35. M. Ge and K. R. Choo. A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks. Springer International Publishing Switzerland, 2014. doi:10.​1007/​978-3-319-11698-3 35.
77.
Zurück zum Zitat Cisco Systems. Public Key Infrastructure Certificate Revocation List Versus Online Certificate Status Protocol. White Paper, pages 1–6, 2004. Cisco Systems. Public Key Infrastructure Certificate Revocation List Versus Online Certificate Status Protocol. White Paper, pages 1–6, 2004.
78.
Zurück zum Zitat S. L. Keoh, S. S. Kumar, and H. Tschofenig. Securing the Internet of Things: A Standardization Perspective. IEEE Internet of Things J, June 2014. ISSN 2327-4662. doi:10.1109/JIOT.2014.2323395. S. L. Keoh, S. S. Kumar, and H. Tschofenig. Securing the Internet of Things: A Standardization Perspective. IEEE Internet of Things J, June 2014. ISSN 2327-4662. doi:10.​1109/​JIOT.​2014.​2323395.
Metadaten
Titel
Security Challenges of the Internet of Things
verfasst von
Musa G. Samaila
Miguel Neto
Diogo A. B. Fernandes
Mário M. Freire
Pedro R. M. Inácio
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-50758-3_3

Neuer Inhalt