Layer based security in Narrow Band Internet of Things (NB-IoT)

Abstract In the recent years, the growth of technology and the resulting transformation is happening at a rapid pace. In this junction, IoT has provided a great platform and bridge between these technologies. A lot of research regarding the application of IoT Systems has been done in the recent years but one area that lacks research is security issues in Narrow Band Internet of Things (NB-IoT).It is noticed that security and Privacy in NB-IoT system is a challenging task for researchers and academia. Application of NB-IoT in Defense security opened a new way for the researchers but at the same time security threat can lead to drastic loss. Nowadays, MEMS-NB-IoT device (Bug)/ BOT are being used for carrying out any malicious security attack. This can be a serious area of concern in the case of defense security. These MEMS device are very dangerous and it can spoof data from any type of network. The size of this device is very small, it can travel to any location for monitoring the enemy movement, and it is very difficult to identify these types of bugs. These BOT device very sensitive at Perception and Network Layered. In this paper, we have provided detail analysis of IoT/NB-IoT Layered architecture. A novel proposal depicting security attack in a Smart home system with IoT and NB-IoT enabled devices is presented. The Secrecy Rate (SR), the Secrecy Outage Probability (SOP) is being calculated, and performance analysis of IoT system in the presence of Bugs for a smart home system is carried out. Simulations have been performed and the performance analysis done is based on Security non-outage probability vs security rate with real time analysis.

[1]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[2]  Sema F. Oktug,et al.  Internet-of-Things security: Denial of service attacks , 2015, 2015 23nd Signal Processing and Communications Applications Conference (SIU).

[3]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[4]  Rakesh Kumar Jha,et al.  NB-IoT Security: A Survey , 2020, Wireless Personal Communications.

[5]  Hong-Han Shuai,et al.  Eavesdropping prevention for heterogeneous Internet of Things systems , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[6]  Walid Saad,et al.  Jamming in the Internet of Things: A Game-Theoretic Perspective , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[7]  Sanjeev Jain,et al.  A Survey on Energy Efficient Narrowband Internet of Things (NBIoT): Architecture, Application and Challenges , 2019, IEEE Access.

[8]  Nasir Ghani,et al.  Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.

[9]  Dipti Jadhav,et al.  Security threats in the application layer in IOT applications , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[10]  Weidang Lu,et al.  Small-Cell Assisted Secure Traffic Offloading for Narrowband Internet of Thing (NB-IoT) Systems , 2018, IEEE Internet of Things Journal.

[11]  Wenhao Wang,et al.  A Replay-Attack Resistant Authentication Scheme for the Internet of Things , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[12]  Ke Xu,et al.  Mobile Mashup: Architecture, Challenges and Suggestions , 2009, 2009 International Conference on Management and Service Science.

[13]  Sana Hoor Jokhio,et al.  Node capture attack detection and defence in wireless sensor networks , 2012, IET Wirel. Sens. Syst..

[14]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[15]  Saru Kumari,et al.  Comments on “Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0” , 2020, IEEE Internet of Things Journal.

[16]  Sanjeev Jain,et al.  Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network , 2018, IEEE Transactions on Vehicular Technology.

[17]  Mohsen Guizani,et al.  Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid , 2020, IEEE Transactions on Industrial Informatics.

[18]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[19]  Biplab Sikdar,et al.  A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.

[20]  Ouajdi Korbaa,et al.  A survey on attacks in Internet of Things based networks , 2017, 2017 International Conference on Engineering & MIS (ICEMIS).

[21]  Phone Lin,et al.  A survey on NB-IoT downlink scheduling: Issues and potential solutions , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[22]  Emil C. Lupu,et al.  Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks , 2015, IEEE Transactions on Network and Service Management.

[23]  Ali Farrokhtala,et al.  Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[24]  Jemal H. Abawajy Enhancing RFID Tag Resistance against Cloning Attack , 2009, 2009 Third International Conference on Network and System Security.

[25]  Siobhán Clarke,et al.  Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.

[26]  Abhishek Roy,et al.  Narrowband Internet of Things: A Comprehensive Study , 2020, Comput. Networks.

[27]  Georges Kaddoum,et al.  Securing Fog-to-Things Environment Using Intrusion Detection System Based On Ensemble Learning , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[28]  Yuxiang Chen,et al.  IoT-based smart homes: A review of system architecture, software, communications, privacy and security , 2018, Internet Things.

[29]  Ralf Steinmetz,et al.  Threat as a Service?: Virtualization's Impact on Cloud Security , 2012, IT Professional.

[30]  Tarik Taleb,et al.  UAV-Based IoT Platform: A Crowd Surveillance Use Case , 2017, IEEE Communications Magazine.

[31]  Dimitri Konstantas,et al.  A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model , 2018 .

[32]  Byung-Seo Kim,et al.  Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.

[33]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[34]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[35]  K SudeendraKumar,et al.  Security Enhancements to System on Chip Devices for IoT Perception Layer , 2017, 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS).

[36]  Chao Gao,et al.  Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System , 2017, IEEE Internet of Things Journal.

[37]  Nirwan Ansari,et al.  A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[38]  Olav Tirkkonen,et al.  NB-IoT Technology Overview and Experience from Cloud-RAN Implementation , 2017, IEEE Wireless Communications.

[39]  Albert Y. Zomaya,et al.  A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks , 2019, IEEE Transactions on Network and Service Management.