Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey

The integration of low-power wireless sensing and actuating devices with the Internet will provide an important contribution to the formation of a global communications architecture encompassing Wireless Sensor Networks (WSN), and to enable applications using such devices designed to bring unprecedented convenience and economical benefits to our life. Such applications also take place in the context of our current vision on an Internet of Things (IoT), which promises to encompass heterogeneous devices and communication technologies, including WSN. Due to the characteristics of the devices in WSN and to the requirements of applications, low-power wireless communications are employed and the functionalities supported must be carefully balanced against the limited resources at the disposal of applications. Low-power communication technologies are also currently being designed with the purpose of supporting the integration of WSN with the Internet and, as in isolated WSN environments, security will be a fundamental enabling factor of future applications using Internet-integrated WSN. Although various surveys currently exist addressing security mechanisms for WSN environments, our goal is to analyze how security may be addressed as an enabling factor of the integration of low-power WSN with the Internet, in the context of its contribution to the IoT. We analyze the current research and industry proposals supporting this integration, together with the security solutions and mechanisms designed in its context. Our discussion is supported by an analysis on the attack and threat model against Internet-integrated WSN, and on the security requirements to consider in this context. We believe that a survey with such goals may provide an important contribution to readers interested in embracing this important area of research and ours is, as far as our knowledge goes, the first article with such goals.

[1]  Levente Buttyán,et al.  VeRA - Version Number and Rank Authentication in RPL , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[2]  Markus Eurich,et al.  The SENSEI project: integrating the physical world with the digital world of the network of the future , 2009 .

[3]  Lossy Networks Stability Analysis of the Delays of the Routing Protocol over Low Power and , 2010 .

[4]  Michele Zorzi,et al.  An integrated system for secure code distribution in Wireless Sensor Networks , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[5]  Thiemo Voigt,et al.  6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[6]  Vlad Trifa,et al.  Towards the Web of Things: Web Mashups for Embedded Devices , 2009 .

[7]  Thomas Narten,et al.  Neighbor Discovery for IP Version 6 (IPv6) , 1996, RFC.

[8]  HyunGon Kim,et al.  Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[9]  Rodrigo Roman,et al.  Integrating wireless sensor networks and the internet: a security analysis , 2009, Internet Res..

[10]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[11]  Erik Wilde,et al.  A resource oriented architecture for the Web of Things , 2010, 2010 Internet of Things (IOT).

[12]  Hannes Tschofenig,et al.  Internet Engineering Task Force (ietf) Using Raw Public Keys in Transport Layer Security (tls) and Datagram Transport Layer Security (dtls) , 2022 .

[13]  Sandeep Kumar,et al.  Profiling of DTLS for CoAP-based IoT Applications , 2013 .

[14]  Qin,et al.  [IEEE 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC) (Co-Located with CSE 2010) - Hong Kong, China (2010.12.11-2010.12.13)] 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - IOT Gateway: BridgingWireless Sensor Networks into Intern , 2010 .

[15]  Hanno Wirtz,et al.  6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.

[16]  Utz Roedig,et al.  Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.

[17]  Óscar García-Morchón,et al.  End-to-End Transport Security in the IP-Based Internet of Things , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[18]  Ki-Hyung Kim,et al.  IPv6 over Low Power WPAN Security Analysis , 2011 .

[19]  Young-Joo Kim,et al.  SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[20]  Tim Winter,et al.  Routing Requirements for Urban Low-Power and Lossy Networks , 2009, RFC.

[21]  S. Kim,et al.  Trio: enabling sustainable and scalable outdoor wireless sensor network deployments , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.

[22]  Rabia Riaz,et al.  Security analysis survey and framework design for IP connected LoWPANs , 2009, 2009 International Symposium on Autonomous Decentralized Systems.

[23]  M. Shamim Hossain,et al.  A Survey on Sensor-Cloud: Architecture, Applications, and Approaches , 2013, Int. J. Distributed Sens. Networks.

[24]  Mischa Dohler,et al.  A Security Framework for Routing over Low Power and Lossy Networks , 2012 .

[25]  Jakob Buron,et al.  Home Automation Routing Requirements in Low-Power and Lossy Networks , 2008, RFC.

[26]  S. Besen THE EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE: A PRELIMINARY ANALYSIS , 1990 .

[27]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[28]  Emiliano De Cristofaro,et al.  FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks , 2009, WiSec '09.

[29]  Serge Fdida,et al.  Future internet research and experimentation: the FIRE initiative , 2007, CCRV.

[30]  Pekka Nikander,et al.  SEcure Neighbor Discovery (SEND) , 2005, RFC.

[31]  Eric Rescorla,et al.  Extensions for Datagram Transport Layer Security (TLS) in Low Bandwidth Environments , 2006 .

[32]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[33]  Basavaraj Patil,et al.  Transmission of IPv6 Packets over BLUETOOTH Low Energy , 2013 .

[34]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[35]  Vlad Trifa,et al.  Towards physical mashups in the Web of Things , 2009, 2009 Sixth International Conference on Networked Sensing Systems (INSS).

[36]  Mihaela Cardei,et al.  IEEE 802.15.4: Low Rate Wireless Personal Area Networks (PANs) , 2008, Encyclopedia of Wireless and Mobile Communications.

[37]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[38]  T. Braun,et al.  TCP support for sensor networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.

[39]  Jean-Philippe Vasseur,et al.  Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.

[40]  Adam Dunkels,et al.  Efficient application integration in IP-based sensor networks , 2009, BuildSys '09.

[41]  Carsten Bormann,et al.  CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.

[42]  Jorge Sá Silva,et al.  End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication , 2013, 2013 IFIP Networking Conference.

[43]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[44]  Rachid Beghdad,et al.  Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.

[45]  Mohamed F. Younis,et al.  Intelligent Gateways Placement for Reduced Data Latency in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[46]  Thiemo Voigt,et al.  Lightweight IKEv2: A Key Management Solution for both Compressed IPsec and IEEE 802.15.4 Security , 2012 .

[47]  LeAnhtuan,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012 .

[48]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.

[49]  Kyung Sup Kwak,et al.  An overview of IEEE 802.15.6 standard , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).

[50]  Dominique Barthel,et al.  Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks , 2012, RFC.

[51]  Zach Shelby,et al.  CoAP Security Options , 2011 .

[52]  Gang Gan,et al.  Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.

[53]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[54]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[55]  Suman Nath,et al.  SenseWeb: An Infrastructure for Shared Sensing , 2007, IEEE MultiMedia.

[56]  Ignas G. Niemegeers,et al.  IEEE 802.11ah: Advantages in standards and further challenges for sub 1 GHz Wi-Fi , 2012, 2012 IEEE International Conference on Communications (ICC).

[57]  Marimuthu Palaniswami,et al.  Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[58]  Siarhei Kuryla,et al.  RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .

[59]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[60]  Jari Arkko,et al.  End-to-end security for sleepy smart object networks , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.

[61]  Guifen Gu,et al.  The survey of GSM wireless communication system , 2010, 2010 International Conference on Computer and Information Application.

[62]  S. Chia The Universal Mobile Telecommunication System , 1992, IEEE Communications Magazine.

[63]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[64]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[65]  Klaus Hartke,et al.  Practical Issues with Datagram Transport Layer Security in Constrained Environments , 2014 .

[66]  Gilles Grimaud,et al.  The Web of Things: Interconnecting Devices with High Usability and Performance , 2009, 2009 International Conference on Embedded Software and Systems.

[67]  Zach Shelby,et al.  Transmission of IPv6 Packets over DECT Ultra Low Energy , 2013 .

[68]  Syed Obaid Amin,et al.  A novel Intrusion Detection Framework for IP-based sensor networks , 2009, 2009 International Conference on Information Networking.

[69]  Roberto Di Pietro,et al.  Mobility and Cooperation to Thwart Node Capture Attacks in MANETs , 2009, EURASIP J. Wirel. Commun. Netw..

[70]  Eric Anderson,et al.  X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks , 2006, SenSys '06.

[71]  Carsten Bormann,et al.  Using CoAP with IPsec , 2012 .

[72]  Carsten Bormann,et al.  Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.

[73]  Jorge Sá Silva,et al.  Network‐layer security for the Internet of Things using TinyOS and BLIP , 2014, Int. J. Commun. Syst..

[74]  Xiaoran Jiang,et al.  TCP over 6LoWPAN for Industrial Applications: An Experimental Study , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.

[75]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[76]  Utz Roedig,et al.  Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[77]  Kevin Weekly,et al.  Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[78]  Jorge Sá Silva,et al.  Enabling Network-Layer Security on IPv6 Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[79]  Jonathan Loo,et al.  The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.

[80]  Qian Zhu,et al.  IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[81]  Jon Postel,et al.  User Datagram Protocol , 1980, RFC.

[82]  Jerald Martocci,et al.  Building Automation Routing Requirements in Low-Power and Lossy Networks , 2010, RFC.

[83]  Samuel Wieland Design and implementation of a gateway for Web-based interaction and management of embedded devices , 2009 .

[84]  Dirk Westhoff,et al.  Security enhanced multi-hop over the air reprogramming with Fountain Codes , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[85]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[86]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[87]  Kristofer S. J. Pister,et al.  Industrial Routing Requirements in Low-Power and Lossy Networks , 2009, RFC.

[88]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[89]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[90]  Daniel Minoli IPv6 Over Low‐Power WPAN (6Lowpan) , 2013 .

[91]  Georg Carle,et al.  A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.

[92]  Suman Nath,et al.  SensorMap for Wide-Area Sensor Webs , 2007, Computer.

[93]  Jorge Sá Silva,et al.  Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications , 2013, WWIC.

[94]  Esko Dijk,et al.  DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs) , 2012 .

[95]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[96]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[97]  Jorge Sá Silva,et al.  A secure interconnection model for IPv6 enabled wireless sensor networks , 2010, 2010 IFIP Wireless Days.

[98]  Bogdan M. Wilamowski,et al.  The Transmission Control Protocol , 2005, The Industrial Information Technology Handbook.

[99]  Pascal Thubert,et al.  Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.

[100]  Tzeta Tsao A Security Design for RPL: IPv6 Routing Protocol for Low Power and Lossy Networks , 2010 .

[101]  Kamin Whitehouse,et al.  Stream Feeds - An Abstraction for the World Wide Sensor Web , 2008, IOT.

[102]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[103]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[104]  Klaus Wehrle,et al.  Towards viable certificate-based authentication for the internet of things , 2013, HotWiSec '13.