Skip to main content

A Security and Confidentiality Survey in Wireless Internet of Things (IoT)

  • Chapter
  • First Online:
Internet of Things and Big Data Applications

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 180))

Abstract

Internet of Things (IoT) is regarded one of the evolving technologies that offers many vertical industries excellent possibilities. The IoT paradigm paves the way for a world that connects many of our every object and communicates with their environments for information collection and task automation. Such a vision requires data privacy, safety, assault robustness, simple deployment, and self-maintenance. Wireless IoT is a successful area that continually collects, exchanges and stores big amounts of data and information. While these data and information are used in wireless IoT for excellent reasons, major dangers emerge as attackers seek to take advantage of the merits of this latest technology for their own benefit. IoT pervasive growth is noticeable worldwide. Devices are readily exposed in such a resource-constrained setting. This paper presents the classic wireless IoT application scenarios, along with associated models of safety and privacy assault. This paper further presents recent advances in Wireless IoT privacy conservation mechanisms along with classification of the application scenarios. In this paper, open problems and future research directions are addressed for the implementation situations in wireless IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rahmani, A.M., Gia, T.N., Negash, B., Anzanpour, A., Azimi, I., Jiang, M., Liljeberg, P.: Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Future Gener. Comput. Syst. 78, 641–658 (2018)

    Article  Google Scholar 

  2. Adeleke, J.A., Moodley, D., Rens, G., Adewumi, A.O.: Integrating statistical machine learning in a semantic sensor web for proactive monitoring and control. Sensors 17, 807 (2017)

    Article  Google Scholar 

  3. Xia, X., Chen, Z., Liu, H., Wang, H., Zeng, F.: A routing protocol for multisink wireless sensor networks in underground coalmine tunnels. Sensors 16, 2032 (2016)

    Article  Google Scholar 

  4. Caballero-Águila, R., Hermoso-Carazo, A., Linares-Pérez, J.: Optimal fusion estimation with multi-step random delays and losses in transmission. Sensors 17, 1151 (2017)

    Article  Google Scholar 

  5. Guijarro, L., Pla, V., Vidal, J.R., Naldi, M., Mahmoodi, T.: Wireless sensor network-based service provisioning by a brokering platform. Sensors 17, 1115 (2017)

    Article  Google Scholar 

  6. Wu, Z., Xu, Y., Yang, Y., Zhang, C., Zhu, X., Ji, Y.: Towards a semantic web of things: a hybrid semantic annotation, extraction, and reasoning framework for cyber-physical system. Sensors 17, 403 (2017)

    Article  Google Scholar 

  7. Choi, H.-S., Rhee, W.-S.: IoT-based user-driven service modeling environment for a smart space management system. Sensors 14, 22039–22064 (2014)

    Article  Google Scholar 

  8. Floris, A., Atzori, L.: Managing the quality of experience in the multimedia internet of things: a layered-based approach. Sensors 16, 2057 (2016)

    Article  Google Scholar 

  9. Bisdikian, C., Kaplan, L., Srivastava, M.: On the quality and value of information in sensor networks. ACM Trans. Sens. Netw. 9, 48 (2013)

    Article  Google Scholar 

  10. Suri, N., Benincasa, G., Lenzi, R., Tortonesi, M., Stefanelli, C., Sadler, L.: Exploring value of information-based approaches to support effective communications in tactical networks. IEEE Commun. Mag. 53, 39–45 (2015)

    Article  Google Scholar 

  11. Liu, J., Hu, Y., Wu, B., Wang, Y., Xie, F.: A hybrid generalized hidden markov model-based condition monitoring approach for rolling bearings. Sensors 17, 1143 (2017)

    Article  Google Scholar 

  12. Guo, Y., Chen, X., Wang, S., Sun, R., Zhao, Z.: Wind turbine diagnosis under variable speed conditions using a single sensor based on the synchrosqueezing transform method. Sensors 17, 1149 (2017)

    Article  Google Scholar 

  13. Nie, P., Dong, T., He, Y., Qu, F.: Detection of soil nitrogen using near infrared sensors based on soil pretreatment and algorithms. Sensors 17, 1102 (2017)

    Article  Google Scholar 

  14. Bellavista, P., Giannelli, C., Zamagna, R.: The PeRvasive environment sensing and sharing solution. Sustainability 9, 585 (2017)

    Article  Google Scholar 

  15. Hu, Q., Wang, S., Bie, R., Cheng, X.: Social welfare control in mobile crowdsensing using zero-determinant strategy. Sensors 17, 1012 (2017)

    Article  Google Scholar 

  16. Longo, F., Bruneo, D., Distefano, S., Merlino, G., Puliafito, A.: Stack4Things: a sensing-and-actuation-as-a-service framework for IoT and cloud integration. Ann. Telecommun. 72, 53–70 (2017)

    Article  Google Scholar 

  17. Manzalini, A., Crespi, N.: An edge operating system enabling anything-as-a-service. IEEE Commun. Mag. 54, 62–67 (2016)

    Article  Google Scholar 

  18. Amadeo, M., Molinaro, A.: CHANET: a content-centric architecture for IEEE 802.11 MANETs. In: Proceedings of the International Conference on the Network of the Future, Paris, France, 28–30 Nov 2011

    Google Scholar 

  19. Mendes, P.: Combining data naming and context awareness for pervasive networks. J. Netw. Comput. Appl. 50, 114–125 (2015)

    Article  Google Scholar 

  20. Delmastro, F., Arnaboldi, V., Conti, M.: People-centric computing and communications in smart cities. IEEE Commun. Mag. 54, 122–128 (2016)

    Article  Google Scholar 

  21. Chen, P.Y., Cheng, S.M., Hsu, H.Y.: Analysis of information delivery dynamics in cognitive sensor networks using epidemic models. IEEE Internet Things J. (2017)

    Google Scholar 

  22. Al-Turjman, F.: Energy-aware data delivery framework for safety-oriented mobile IoT. IEEE Sens. J. (2017)

    Google Scholar 

  23. Hamrioui, S., Lorenz, P.: Bio inspired routing algorithm and efficient communications within IoT. IEEE Netw. 31, 74–79 (2017)

    Google Scholar 

  24. Pilloni, V., Atzori, L., Mallus, M.: Dynamic involvement of real-world objects in the IoT: a consensus-based cooperation approach. Sensors 17, 484 (2017)

    Article  Google Scholar 

  25. Cao, Y., Yu, W., Ren, W., Chen, G.: An overview of recent progress in the study of distributed multi-agent coordination. IEEE Trans. Ind. Inform. 9, 427–438 (2013)

    Article  Google Scholar 

  26. Caraguay, Á.L.V., Villalba, L.J.G.: Monitoring and discovery for self-organized network management in virtualized and software defined networks. Sensors 17, 731 (2017)

    Article  Google Scholar 

  27. Sotres, P., Santana, J.R., Sánchez, L., Lanza, J., Muñoz, L.: Practical lessons from the deployment and management of a smart city internet-of-things infrastructure: the SmartSantander testbed case. IEEE Access 5, 14309–14322 (2017)

    Article  Google Scholar 

  28. Uke, S.N., Mahajan, A.R., Thool, R.C.: UML modeling of physical and data link layer security attacks in WSN. Int. J. Comput. Appl. 70(11) (May 2013)

    Google Scholar 

  29. Li, H., Chen, Y., He, Z.: The survey of RFID attacks and defenses. In: 8th International Conference on IEEE Wireless Communications, Networking and Mobile Computing (WiCOM) (2012)

    Google Scholar 

  30. Kandah, F., Singh, Y., Zhang, W., Wang, C.: Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks. In: Security and Communication Networks, pp. 1939-0122 (2013)

    Google Scholar 

  31. Farooq, M.U., Waseem, M., Khairi, A., Mazhar, S.: A critical analysis on the security concerns of Internet of Things (IoT). Int. J. Comput. Appl. (0975 8887) 111(7) (Feb 2015)

    Google Scholar 

  32. Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180–187, Larnaca (2015)

    Google Scholar 

  33. Chelli, K.: Security issues in wireless sensor networks: attacks and countermeasures. In: Proceedings of the World Congress on Engineering, vol. 1, 2015

    Google Scholar 

  34. Pathan, A.S.K., Lee, H.W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: 2006 8th International Conference Advanced Communication Technology, vol. 2, p. 1048 (2006)

    Google Scholar 

  35. Modares, H., Salleh, R., Moravejosharieh, A.: Overview of security issues in wireless sensor networks. In: 2011 Third International Conference on Computational Intelligence, Modelling and Simulation, pp. 308–311 (2011)

    Google Scholar 

  36. Kobo, H.I., Abu-Mahfouz, A.M., Hancke, G.P.: A survey on software-defined wireless sensor networks: challenges and design requirements. IEEE Access 5, 1872–1899 (2017)

    Article  Google Scholar 

  37. Zia, T., Zomaya, A.: Security issues in wireless sensor networks. In: 2006 International Conference on Systems and Networks Communications (ICSNC06), p. 40 (2006)

    Google Scholar 

  38. Adedeji, Hamam, Y., Abe, B., Abu-Mahfouz, A.M.: Improving the physical layer security of wireless communication networks using spread spectrum coding and artificial noise approach. In: Southern Africa Telecommunication Networks and Applications Conference, George, Western Cape, South Africa, pp. 80–81 (Sept 2016)

    Google Scholar 

  39. Abdul, W., Kumar, P.: A survey on attacks, challenges and security mechanism in wireless sensor network. JIRST-International Journal for Research in Science & Technology 1(8), 189–196 (Jan 2015)

    Google Scholar 

  40. Douceur, J.R.: The Sybil attacks. In: First International Workshop on Peer-to Peer Systems (IPTPS’02), (Mar 2002)

    Google Scholar 

  41. Zulkifli, M.Z.W.M: Attack on cryptography (2008)

    Google Scholar 

  42. Lee, J.-Y., Lin, W.-C., Huang, Y.-H.: A lightweight authentication protocol for internet of things. In: International Symposium on Next Generation Electronics Taiwan, pp. 1–2 (May 2014)

    Google Scholar 

  43. Hu, C., Zhang, J., Wen, Q.: An identity-based personal location system with protected privacy in IoT. In: EEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT) China, pp. 192–195 (Oct 2011)

    Google Scholar 

  44. Du, X.J., et al.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007)

    Article  MathSciNet  Google Scholar 

  45. Porambage, P., Braeken, A., Schmitt, C., Gurtov, A., Ylianttila, M., Stiller, B.: Group key establishment for enabling secure multicast communication in wireless sensor network deployed for IoT Applications. IEEE Access 3, 1503–1511 (2015)

    Article  Google Scholar 

  46. Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the internet of things (IoT). In: Industrial Engineering and Engineering Management (IEEM) Malaysia, pp. 1244–1248 (Dec 2014)

    Google Scholar 

  47. Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 2266–2279 (2013)

    Article  Google Scholar 

  48. Gou, Q., Yan, L., Liu, Y., Li, Y.: Construction and strategies in IoT security system. In: IEEE International Conference on Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), and IEEE Cyber, Physical and Social Computing (CPSCom) China, pp. 1129–1132 (Aug 2013)

    Google Scholar 

  49. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: The road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  50. Hong, S.G., Lee, H., Choi, J.C., Bae, M.N., Lee, K.B.: Internet of things software platforms technology trends. Electron. Telecommun. Trends 30, 39–48 (2015)

    Google Scholar 

  51. Zhu, H., et al.: Duth: a user-friendly dual-factor authentication for android smartphone devices. Secur. Commun. Netw. 8(7), 1213–22 (2015)

    Article  Google Scholar 

  52. Zhu, Z.G., et al.: Prometheus: privacy-aware data retrieval on hybrid cloud. In: Proceedings of IEEE INFOCOM 2013, Turin, Italy, pp. 2643–51 (2013)

    Google Scholar 

  53. Ji, M.J., Zhang, P.C.: Transactive control and coordination of multiple integrated energy systems. In: Proceedings of IEEE Conference on Energy Internet and Energy System Integration, Beijing, China, pp. 1–6 (2017)

    Google Scholar 

  54. Yang, Q.R. et al.: Decentralized security constrained economic dispatch for global energy internet and practice in Northeast Asia. In: Proceedings of IEEE Conference on Energy Internet and Energy System Integration, Beijing China, 2017, pp. 1–6

    Google Scholar 

  55. Zhou, X.L. et al.: ACPP: an effective privacy preserving scheme for precise location sharing in internet of vehicles. In: Proceedings of IEEE International Conference on Information and Automation, Macau SAR, China, July 2017, pp. 883–87

    Google Scholar 

  56. Kumar, P., et al.: Anonymous secure framework in connected smart home environments. IEEE Trans. Inf. Forensics Secur. 12(4), 968–79 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitin Mittal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Garg, A., Mittal, N., Diksha (2020). A Security and Confidentiality Survey in Wireless Internet of Things (IoT). In: Balas, V., Solanki, V., Kumar, R. (eds) Internet of Things and Big Data Applications. Intelligent Systems Reference Library, vol 180. Springer, Cham. https://doi.org/10.1007/978-3-030-39119-5_5

Download citation

Publish with us

Policies and ethics