Abstract
The Internet of Things (IoT) signifies the interconnection of exceedingly heterogeneous networked entities, for instance, sensors, actuators, smart phones, etc. In accord with concrete functions, the network structure of the IoT is divided into three hierarchies: the bottom hierarchy is the sensing equipment for information acquisition; the middle hierarchy is the network for data transmission, whereas the top hierarchy is intended for applications and middleware. The uniqueness of the IoT proclaims new challenges to security requirements, dissimilar from previous technology trends. Moreover, to guarantee resilience, fail-over and recovery mechanisms must be provided to uphold operations under failure or attacks, and to return to normal operations (failure/attack mitigation). To uphold the end-to-end method, the gateway requirements to endure invisible to the communicating endpoints. The Constrained Application Protocol (CoAP) is an ideal protocol, for being used with constrained devices and low-power networking. To give more security, to the major UDP (User Datagram Protocol) well-known applications, for instance, Voice over IP/Session Initiation Protocol (VoIP/SIP), Datagram Transport Layer Security (DTLS) can run on top of UDP instead of TCP (Transmission Control Protocol). In our research, we have found that hybrid RSA (Rivest–Shamir–Adleman) algorithm can be a good one with efficiency, more security, and more privacy protected way and can work for end-to-end encryption requirements for future Internet of Everything (IoE). In general, future researches in the security issues of the IoT would mostly quintessence on the following characteristics, the open security system, individual privacy protection mode, terminal security function, related laws for the security of the IoT, etc. It is unquestionable that the security of the IoT prerequisites a series of policies, laws, and regulations, perfect security management system for mutual collocation.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Jara A, Kafle V, Skarmeta A (2013) Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture. Int J Ad Hoc Ubiquitous Comput 13(3-4):228–242
Li S, Gong P, Yang Q, Li M, Kong J, Li P (2013) A secure handshake scheme for mobile-hierarchy city intelligent transportation system. In: International conference on ubiquitous and future networks. ICUFN, Da Nang, pp 190–191
Kang KC, Pang ZB, Wang CC (2013) Security and privacy mechanism for health internet of things. J China Univ Posts Telecommun 20(Suppl 2):64–68
Goncalves F, Macedo J, Nicolau M, Santos A (2013) Security architecture for mobile e-health applications in medication control. In: 2013 21st international conference on software, telecommunications and computer networks. SoftCOM, Primosten, pp 1–8
An J, Gui X, Zhang W, Jiang J, Yang J (2013) Research on social relations cognitive model of mobile nodes in internet of things. J. Netw Comput Appl 36(2):799–810
Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito M (2013) Demo: an ids framework for internet of things empowered by 6lowpan, Berlin, Germany, pp 1337–1339
BETaaS Consortium (2014) BETaaS building the environment for the things as a service D2. 2. 2–Specification of the extended capabilities of the platform, pp 1–61
IoT-A Consortium (2014) IoT-A unified requirements. http://www.iot-a.eu/public/requirements/. 31 Jan 2014
Gao L, Bai X (2014) A unified perspective on the factors influencing consumer acceptance of internet of things technology. Asia Pac J Mark Logist 26(2):211–231
Gazis V (2014) Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Panayotis Kikiras, and Alex Wiesmaier. Security perspectives for collaborative data acquisition in the internet of things. In: International conference on safety and security in internet of things. Springer, New York
IoT-A Consortium (2014) IoT-A – Internet of things architecture. http://www.iot-a.eu/. 27 Jan 2014
Logvinov O, Kraemer B, Adams C, Heiles J, Stuebing G (2014) Mary Lynne Nielsen, and Brenda Mancuso. Standard for an architectural framework for the internet of things (IoT) IEEE P2413 Webinar Panelists, pp 1–12
Zanella A, Bui N, Castellani AP, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1:22–32
Grieco LA, Alaya MB, Monteil T, Drira KK (2014) Architecting information centric ETSI-M2M systems. In: IEEE PerCom
Anderson J, Rainie L (2014) The internet of things will thrive by 2025, Pew research internet project. http://www.pewinternet.org/2014/05/14/internet-of-things/
Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134
Piro G, Boggia G, Grieco LA (2014) A standard compliant security framework for IEEE 802.15.4 networks. In: Proceedings of IEEE world forum on internet of things (WF-IoT), Seoul, South Korea, pp 27–30
Lee J-Y, Lin W-C, Huang Y-H (2014) A lightweight authentication protocol for internet of things. In: 2014 international symposium on next-generation electronics, ISNE 2014, Kwei-Shan, pp 1–2
Turkanovi M, Brumen B, Hlbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112
Ye N, Zhu Y, Wang R-CB, Malekian R, Lin Q-M (2014) An efficient authentication and access control scheme for perception layer of internet of things. Appl Math Inf Sci 8(4):1617–1624
Cherkaoui A, Bossuet L, Seitz L, Selander G, Borgaonkar R (2014) New paradigms for access control in constrained environments. In: 2014 9th international symposium on reconfigurable and communication-centric systems-on-chip (ReCoSoC), Montpellier, pp 1–4
Sicari S, Rizzardi A, Cappiello C, Coen-Porisini A (2014) A NFP model for internet of things applications. In: Proceedings of IEEE WiMob, Larnaca, Cyprus, pp 164–171
Wang X, Zhang J, Schooler E, Ion M (2014) Performance evaluation of attribute-based encryption: Toward data privacy in the IoT. In: 2014 IEEE international conference on communications, ICC 2014, Sydney, NSW, pp 725–730
Su J, Cao D, Zhao B, Wang X, You I (2014) ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things. Futur Gener Comput Syst 33:11–18
Peng LB, Ru-chuan WB, Xiao-yu S, Long C (2014) Privacy protection based on key-changed mutual authentication protocol in internet of things. Commun Comput Inf Sci 418:345–355
Ukil A, Bandyopadhyay S, Pal A (2014) IoT-privacy: to be private or not to be private. In: Proceedings – IEEE INFOCOM, Toronto, ON, pp 123–124
Sicari S, Cappiello C, Pellegrini FD, Miorandi D, Coen-Porisini A (2014) A security-and quality-aware system architecture for internet of things. Inf Syst Front 18:1–13
Tormo GD, Marmol FG, Perez GM (2014) Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Futur Gener Comput Syst 49:113–124
Gu L, Wang J, Sun BB (2014) Trust management mechanism for internet of things. China Commun 11(2):148–156
Liu Y-B, Gong X-H, Feng Y-F (2014) Trust system based on node behavior detection in internet of things. Tongxin Xuebao/J Commun 35(5):8–15
Singh J, Bacon J, Eyers D (2014) Policy enforcement within emerging distributed, event-based systems. In: DEBS 2014 – Proceedings of the 8th ACM international conference on distributed event-based systems, pp 246–255
Neisse R, Steri G, Baldini G (2014) Enforcement of security policy rules for the internet of things. In: Proceedings of IEEE WiMob, Larnaca, Cyprus, pp 120–127
Gòmez-Goiri A, Orduna P, Diego J, de Ipina DL (2014) Otsopack: lightweight semantic framework for interoperable ambient intelligence applications. Comput Hum Behav 30:460–467
Colistra G, Pilloni V, Atzori L (2014) The problem of task allocation in the internet of things and the consensus-based approach. Comput Netw 73:98–111
Wang Y, Qiao M, Tang H, Pei H (2014) Middleware development method for internet of things. Liaoning Gongcheng Jishu Daxue Xuebao (Ziran Kexue Ban)/J Liaoning Tech Univ (Nat Sci Ed) 33(5):675–678
Ferreira H, De Sousa R Jr, De Deus F, Canedo E (2014) Proposal of a secure, deployable and transparent middleware for internet of things. In: Iberian conference on information systems and technologies. CISTI, Barcelona, pp 1–4
Niu B, Zhu X, Chi H, Li H (2014) Privacy and authentication protocol for mobile RFID systems. Wireless Pers Commun 77(3):1713–1731
Jeong Y-S, Lee J, Lee J-B, Jung J-J, Park J (2014) An efficient and secure m-IPS scheme of mobile devices for human-centric computing. J Appl Math 2014:1–8
Geng J, Xiong X (2014) Research on mobile information access based on internet of things. Appl Mech Mater 539:460–463
Kubler S, Frmling K, Buda A (2014) A standardized approach to deal with firewall and mobility policies in the IoT. Pervasive Mobile Comput 20:100–114
Daubert J, Wiesmaier A, Kikiras P (2015) A view on privacy & trust in IoT. In: IOT/CPS-Security Workshop, IEEE international conference on communications, ICC 2015, London, GB, June 08–12, 2015, page to appear. IEEE
Sadeghi AR, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial internet of things. In: Annual design automation conference. ACM, New York, p 54
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164
Zhang Z-k, Cheng M, Cho Y, Shieh S (2015) Emerging security threats and countermeasures in IoT. In: ACM symposium on information, computer and communications security. ACM, New York, pp 1–6
Bhattacharjya A, Zhong X, Wang J (2016) Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA. In: Proceedings of the international conference on internet of things and cloud computing (ICC 2016) ISBN 978-1-4503-4063-2/16/03. The Møller Centre-Churchill College, Cambridge. https://doi.org/10.1145/2896387.2896431
BUTLER Project. http://www.iot-butler.eu
EU-Japan Project. http://www.eurojapan-ict.org/
European FP7 IoT@Work project. http://iot-at-work.eu
HYDRA Project. http://www.hydramiddleware.eu/
Usable Trust in the Internet of Things. http://www.utrustit.eu/
iCORE Project. http://www.iot-icore.eu
HACMS Project. http://www.defenseone.com/technology
National Science Foundation Project. http://www.nsf.gov
FIRE EU-China Project. http://www.euchina-fire.eu/
FIRE EU-Korea Project. http://eukorea-fire.eu/
Bhattacharjya A, Zhong X, Wang J (2018) An end to end users two way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures. Int J Inf Comput Secur 10(1):63–79
Bhattacharjya A, Zhong X, Wang J, Xing L (2018) On mapping of address and port using translation (MAP-T). Int J Inf Comput Secur. http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijics. https://doi.org/10.1504/IJICS.2018.10008372
Bhattacharjya A, Zhong X, Wang J (2018) HYBRID RSA based highly efficient, reliable and strong personal full mesh networked messaging scheme. Int J Inf Comput Secur. http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijics. https://doi.org/10.1504/IJICS.2018.10010256
Bhattacharjya A, Zhong X, Wang J, Xing L (2018) Secure IoT structural design for smart cites. In: Smart cities cybersecurity and privacy. Elsevier, New York. ISBN: 9780128150320. https://www.elsevier.com/books/smart-cities-cybersecurity-and-privacy/rawat/978-0-12- 815032-0
Acknowledgments
This work is supported by National Natural Science Foundation of China (No. 61631013) and Key Laboratory of Universal Wireless Communications (Beijing University of Posts and Telecommunications), Ministry of Education, P.R. China (No. KFKT-2014101).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Bhattacharjya, A., Zhong, X., Wang, J., Li, X. (2019). Security Challenges and Concerns of Internet of Things (IoT). In: Guo, S., Zeng, D. (eds) Cyber-Physical Systems: Architecture, Security and Application. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-92564-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-92564-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-92563-9
Online ISBN: 978-3-319-92564-6
eBook Packages: EngineeringEngineering (R0)