ABSTRACT
The world is witnessing the emerging role of Internet of Things (IoT) as a technology that is transforming different industries, global community and its economy. Currently a plethora of interconnected smart devices have been deployed for diverse pervasive applications and services, and billions more are expected to be connected to the Internet in the near future. The potential benefits of IoT include improved quality of life, convenience, enhanced energy efficiency, and more productivity. Alongside these potential benefits, however, come increased security risks and potential for abuse. Arguably, this is partly because many IoT start-ups and electronics hobbyists lack security expertise, and some established companies do not make security a priority in their designs, and hence they produce IoT devices that are often ill-equipped in terms of security. In this paper, we discuss different IoT application areas, and identify security threats in IoT architecture. We consider security requirements and present typical security threats for each of the application domains. Finally, we present several possible security countermeasures, and introduce the IoT Hardware Platform Security Advisor (IoT-HarPSecA) framework, which is still under development. IoT-HarPSecA is aimed at facilitating the design and prototyping of secure IoT devices.
References
- D. Borio, C. O'Driscoll, and J. Fortuny. 2012. GNSS Jammers: Effects and countermeasures. In 6th ESA Workshop on Satellite Navigation Technologies (Navitec 2012) European Workshop on GNSS Signals and Signal Processing. 1--7.Google Scholar
- P. Boughton. 2018. World's Smallest Seismic Sensor for the Internet of Things. (2018). http://www.engineerlive.com/content/world-s-smallest-seismic-sensor-internet-thingsGoogle Scholar
- C. Cervantes, D. Poplade, M. Nogueira, and A. Santos. 2015. Detection of Sinkhole Attacks for Supporting Secure Routing on 6LoWPAN for Internet of Things. In IFIP/IEEE International Symposium on Integrated Network Management (IM). 606--611.Google Scholar
- H. Chan, A. Perrig, and D. Song. 2003. Random Key Predistribution Schemes for Sensor Networks. In Symposium on Security and Privacy, 2003. 197--213. Google Scholar
Digital Library
- A. Das, Rishikesh, and P. N. Astya. 2017. A Relative Survey of Various LEACH based Routing Protocols in Wireless Sensor Networks. In International Conference on Computing, Communication and Automation (ICCCA). 630--636.Google Scholar
- S. N. Firdous, Z. Baig, C. Valli, and A. Ibrahim. 2017. Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. In IEEE International Conference on Internet of Things (iThings). 748--755.Google Scholar
- D. Fraunholz, D. Krohmer, S. D. Anton, and H. Dieter Schotten. 2017. Investigation of Cyber Crime Conducted by Abusing Weak or Default Passwords with a Medium Interaction Honeypot. In International Conference on Cyber Security And Protection Of Digital Services (Cyber Security). 1--7.Google Scholar
- C. C. Grant, A. Jones, A. Hamins, and N. Bryner. Jan., 2015. Realizing the Vision of Smart Fire Fighting. IEEE Potentials 34, 1 (Jan., 2015), 35--40.Google Scholar
Cross Ref
- R. Hoque, S. Hassan, M. A. Sadaf, A. Galib, and T. F. Karim. 2015. Earthquake Monitoring and Warning System. In International Conference on Advances in Electrical Engineering (ICAEE). 109--112.Google Scholar
- M. Ibrahim, A. Elgamri, S. Babiker, and A. Mohamed. 2015. Internet of Things based Smart Environmental Monitoring using the Raspberry-Pi Computer. In 5th International Conference on Digital Information Processing and Communications (ICDIPC). 159--164.Google Scholar
- G. Kambourakis, C. Kolias, and A. Stavrou. 2017. The Mirai Botnet and the IoT Zombie Armies. In IEEE Military Communications Conference (MILCOM). 267--272.Google Scholar
- S. Kapoor, H. Pahuja, and B. Singh. 2016. Real Time Monitoring Alert System for Landslide. In 2nd International Conference on Contemporary Computing and Informatics (IC3I). 584--589.Google Scholar
- G. Kecskemeti, G. Casale, D. N Jha, J. Lyon, and R. Ranjan. 2017. Modelling and Simulation Challenges in Internet of Things. IEEE Cloud Computing 4, 1 (Jan 2017), 62--69.Google Scholar
Cross Ref
- M. Ma, P. Wang, and C. H. Chu. 2018. Redundant Reader Elimination in Large-Scale Distributed RFID Networks. IEEE Internet of Things Journal PP, 99 (2018), 1--1.Google Scholar
- M. Marjani, F. Nasaruddin, A. Gani, A. Karim, I. A. T. Hashem, A. Siddiqa, and I. Yaqoob. 2017. Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges. IEEE Access 5 (2017), 5247--5261.Google Scholar
Cross Ref
- S. Nastic, H. L. Truong, and S. Dustdar. 2017. Data and Control Points: A Programming Model for Resource-constrained IoT Cloud Edge Devices. In IEEE International Conference on Systems, Man, and Cybernetics (SMC). 3535--3540.Google Scholar
- D. Niewolny. 2014. How the Internet of Things Is Revolutionizing Healthcare. (2014). http://cache.freescale.com/files/corporate/doc/white_paper/IOTREVH\EALCARWP.pdf (accessed 20.02.15).Google Scholar
- NIST. May, 2015. Research Roadmap for Smart Fire Fighting. Technical Report. 1--223 pages.Google Scholar
- S. R. Oh and Y. G. Kim. 2017. Security Requirements Analysis for the IoT. In International Conference on Platform Technology and Service (PlatCon). 1--6.Google Scholar
- A. A. Osuwa, E. B. Ekhoragbon, and L. T. Fat. 2017. Application of Artificial Intelligence in Internet of Things. In 9th International Conference on Computational Intelligence and Communication Networks (CICN). 169--173.Google Scholar
- S. M. A. Oteafy and H. S. Hassanein. 2018. IoT in the Fog: A Roadmap for Data-Centric IoT Development. IEEE Communications Magazine 56, 3 (MARCH 2018), 157--163. Google Scholar
Digital Library
- J. Pacheco, D. Ibarra, A. Vijay, and S. Hariri. 2017. IoT Security Framework for Smart Water System. In IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA). 1285--1292.Google Scholar
- B. D. Patel and A. D. Patel. 2016. A Trust Based Solution for Detection of Network Layer Attacks in Sensor Networks. In International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE). 121--126.Google Scholar
- Q. Qi and F. Tao. 2018. Digital Twin and Big Data Towards Smart Manufacturing and Industry 4.0: 360 Degree Comparison. IEEE Access PP, 99 (2018), 1--1.Google Scholar
- Y. Qiu and M. Ma. 2016. APMIPv6-Based Secured Mobility Scheme for 6LoWPAN. In IEEE Global Communications Conference (GLOBECOM). 1--6.Google Scholar
- M. G. Samaila, M. Neto, D. A. B. Fernandes, M. M. Freire, and P. R. M. Inácio. May, 2018. Challenges of securing Internet of Things devices: A survey. Security and Privacy 1, 2 (May, 2018), e20. arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1002/spy2.20Google Scholar
Cross Ref
- M. G. Samaila, J. B. F. Sequeiros, A. F. P. P. Correia, M. M. Freire, and P. R. M. Inácio. 2018. Networks of the Future. CRC Press, Chapter A Quick Perspective on the Current State of IoT Security: A Survey, 431--464.Google Scholar
- A. Shifa, M. N. Asghar, and M. Fleury. 2016. Multimedia Security Perspectives in IoT. In Sixth International Conference on Innovative Computing Technology (INTECH). 550--555.Google Scholar
- S. Singh and N. Singh. 2015. Internet of Things (IoT): Security Challenges, Business Opportunities Reference Architecture for E-commerce. In International Conference on Green Computing and Internet of Things (ICGCIoT). 1577--1581. Google Scholar
Digital Library
- Y. SivaKrishna, P. Rajalakshmi, J. Bandaru, A. Kumar, M. P. R. S. Kiran, M. A. Zubair, and U. B. Desai. 2015. Performance Analysis of Hybrid Multiple Radio IoT Architecture for Ubiquitous Connectivity. In IEEE 2nd World Forum on Internet of Things (WF-IoT). 198--203. Google Scholar
Digital Library
- E. Smith and L. Fuller. 2017. Control Systems and the Internet of Things -Shrinking the Factory. In 56th FITCE Congress. 68--73.Google Scholar
- S. W. Soliman, M. A. Sobh, and A. M. Bahaa-Eldin. 2017. Taxonomy of Malware Analysis in the IoT. In 12th International Conference on Computer Engineering and Systems (ICCES). 519--529.Google Scholar
- W. Sun, J. Liu, and H. Zhang. 2017. When Smart Wearables Meet Intelligent Vehicles: Challenges and Future Directions. IEEE Wireless Communications 24, 3 (Jun. 2017), 58--65.Google Scholar
- N. Tuptuk and S. Hailes. 2018. Security of smart manufacturing systems. Journal of Manufacturing Systems 47 (2018), 93--106.Google Scholar
Cross Ref
- P. Varga, S. Plosz, G. Soos, and C. Hegedus. May, 2017. Security Threats and Issues in Automation IoT,. In 13th IEEE International Workshop on Factory Communication Systems (WFCS). 1--6.Google Scholar
- J. Voas. 2016. Demystifying the Internet of Things. Computer 49, 6 (June 2016), 80--83. Google Scholar
Digital Library
- wiseGEEK. 2015. What is a Barbie Doll? (2015). http://www.wisegeek.com/what-is-a-barbie-doll.htm (accessed 19.02.15).Google Scholar
- T. Yalçin. 2016. Compact ECDSA Engine for IoT Applications. Electronics Letters 52, 15 (2016), 1310--1312.Google Scholar
Cross Ref
Index Terms
Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains

Mário M. Freire


Comments