NB-IoT Security: A Survey

In the past few years, the term Internet of Things (IoT) has become very prevalent. In IoT, aggregation of data (from sensors) to processing the data (to the cloud) is energy constraint. To address this challenge, Narrowband- Internet of Things (NB-IoT) is becoming a popular choice for smart devices manufacturer due to its characteristics of high energy-efficient and long battery life. Researchers and academia have addressed the problem related to energy constraints, but it opens the door for security issues related to NB-IoT devices. In this paper, we have done a survey closely related to security issues related to NB-IoT technologies like RFID, WSN, WoT, and IoT. IoT is enabled with five-layered architectures, and each layer is prone to different security attacks. In this paper, we have provided a comparative analysis of security issues in a layer-based approach. We propose the different possible security attacks like shared node attack, synchronization attack, node failure attack, source code attack, and battery drainage attack associated with NB-IoT. To do the performance analysis of security attacks, related matrix, and their mathematical formulation is based on Secrecy Rate and Secrecy Outage Probability for the smart home application. This paper also raises security issues related to smart health and smart agriculture applications.

[1]  Stephen Brown,et al.  A Comparative Survey of LPWA Networking , 2018, ArXiv.

[2]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[3]  Jiming Chen,et al.  Narrowband Internet of Things: Implementations and Applications , 2017, IEEE Internet of Things Journal.

[4]  Javier Gozalvez New 3GPP Standard for IoT [Mobile Radio] , 2016, IEEE Vehicular Technology Magazine.

[5]  Theofilos Chrysikos,et al.  A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security , 2009, SEWCN.

[6]  Erik Wilde,et al.  From the Internet of Things to the Web of Things: Resource-oriented Architecture and Best Practices , 2011, Architecting the Internet of Things.

[7]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[8]  Yuval Elovici,et al.  Detection of Unauthorized IoT Devices Using Machine Learning Techniques , 2017, ArXiv.

[9]  Kai Bu,et al.  You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID , 2017, IEEE Communications Surveys & Tutorials.

[10]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[11]  Reza Ebrahimi Atani,et al.  A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.

[12]  Jin B. Hong,et al.  A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..

[13]  Jiajia Liu,et al.  Smart Attacks against Intelligent Wearables in People-Centric Internet of Things , 2016, IEEE Communications Magazine.

[14]  Xiaohu You,et al.  Narrowband Wireless Access for Low-Power Massive Internet of Things: A Bandwidth Perspective , 2017, IEEE Wireless Communications.

[15]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[16]  Wei Wang,et al.  A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems , 2018, IEEE Transactions on Information Forensics and Security.

[17]  Haider Abbas,et al.  Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.

[18]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[19]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[20]  Jong Hyuk Park,et al.  Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..

[21]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[22]  Tarik Taleb,et al.  An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.

[23]  Debayan Das,et al.  RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.

[24]  Ke Xu,et al.  Mobile Mashup: Architecture, Challenges and Suggestions , 2009, 2009 International Conference on Management and Service Science.

[25]  Ali Dehghantanha,et al.  Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.

[26]  Pritam Gajkumar Shah,et al.  Security with IP Address Assignment and Spoofing for Smart IOT Devices , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[27]  Gongpu Wang,et al.  Secrecy outage probability analysis of multi-user multi-eavesdropper wireless systems , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).

[28]  Guangyi Xiao,et al.  User Interoperability With Heterogeneous IoT Devices Through Transformation , 2014, IEEE Transactions on Industrial Informatics.

[29]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[30]  Ouajdi Korbaa,et al.  A survey on attacks in Internet of Things based networks , 2017, 2017 International Conference on Engineering & MIS (ICEMIS).

[31]  Walid Saad,et al.  Jamming in the Internet of Things: A Game-Theoretic Perspective , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[32]  Jemal H. Abawajy Enhancing RFID Tag Resistance against Cloning Attack , 2009, 2009 Third International Conference on Network and System Security.

[33]  Walaa Hamouda,et al.  Cellular LTE-A Technologies for the Future Internet-of-Things: Physical Layer Features and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[34]  Qinghan Xiao,et al.  RFID Technology, Security Vulnerabilities, and Countermeasures , 2009 .

[35]  Shui Yu,et al.  Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks , 2018, IEEE Internet of Things Journal.

[36]  Je-Hoon Lee,et al.  Parallel Architecture for High-Speed Block Cipher, HIGHT , 2014 .

[37]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[38]  Zygmunt J. Haas,et al.  Security and Privacy in the Internet-of-Things Under Time-and-Budget-Limited Adversary Model , 2015, IEEE Wireless Communications Letters.

[39]  Shigeng Zhang,et al.  Deterministic Detection of Cloning Attacks for Anonymous RFID Systems , 2015, IEEE Transactions on Industrial Informatics.

[40]  Mao Yuxing,et al.  Weak node protection to maximize the lifetime of wireless sensor networks , 2018 .

[41]  Carsten Bormann,et al.  CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.

[42]  Elisa Bertino,et al.  Pareto Optimal Security Resource Allocation for Internet of Things , 2017, ACM Trans. Priv. Secur..

[43]  Siobhán Clarke,et al.  Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.

[44]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[45]  Peter M. Will,et al.  DASHER: A Prototype for Federated E-Commerce Services , 1997, IEEE Internet Comput..

[46]  U. D. Dalal,et al.  Performance Analysis of Black Hole Attack on WiMAX-WLAN Interface Network , 2012, 2012 Third International Conference on Computer and Communication Technology.

[47]  Wei Jiang,et al.  Lightweight RFID Protocol for Medical Privacy Protection in IoT , 2018, IEEE Transactions on Industrial Informatics.

[48]  Emil C. Lupu,et al.  Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks , 2015, IEEE Transactions on Network and Service Management.

[49]  Rongxing Lu,et al.  Securing the Internet of Things in a Quantum World , 2017, IEEE Communications Magazine.

[50]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[51]  Sanjeev Jain,et al.  Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network , 2018, IEEE Transactions on Vehicular Technology.

[52]  Phone Lin,et al.  A survey on NB-IoT downlink scheduling: Issues and potential solutions , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[53]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[54]  Óscar García-Morchón,et al.  End-to-End Transport Security in the IP-Based Internet of Things , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[55]  Zoran Čekerevac,et al.  INTERNET OF THINGS AND THE MAN-IN-THE-MIDDLE ATTACKS – SECURITY AND ECONOMIC RISKS , 2017 .

[56]  Hao Xu,et al.  An overview of 3GPP enhancements on machine to machine communications , 2016, IEEE Communications Magazine.

[57]  Yacine Atif,et al.  Securing the Web of Things with Role-Based Access Control , 2015, C2SI.

[58]  Yong Tang,et al.  Security of Web of Things: A Survey , 2016, IWSEC.

[59]  Weidang Lu,et al.  Small-Cell Assisted Secure Traffic Offloading for Narrowband Internet of Thing (NB-IoT) Systems , 2018, IEEE Internet of Things Journal.

[60]  Sema F. Oktug,et al.  Internet-of-Things security: Denial of service attacks , 2015, 2015 23nd Signal Processing and Communications Applications Conference (SIU).

[61]  Sana Hoor Jokhio,et al.  Node capture attack detection and defence in wireless sensor networks , 2012, IET Wirel. Sens. Syst..

[62]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[63]  Justin P. Coon,et al.  Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[64]  Shahriar Mohammadi,et al.  A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, ArXiv.

[65]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[66]  Danda B. Rawat,et al.  Evaluating Secrecy Outage of Physical Layer Security in Large-Scale MIMO Wireless Communications for Cyber-Physical Systems , 2017, IEEE Internet of Things Journal.

[67]  Sanjay Kumar Madria,et al.  Risk Assessment in a Sensor Cloud Framework Using Attack Graphs , 2017, IEEE Transactions on Services Computing.

[68]  Fredrik Gunnarsson,et al.  LTE release 14 outlook , 2016, IEEE Communications Magazine.

[69]  Shin-Ming Cheng,et al.  Traffic-Aware Patching for Cyber Security in Mobile IoT , 2017, IEEE Communications Magazine.

[70]  Maurizio Rebaudengo,et al.  A Key Distribution Scheme for Mobile Wireless Sensor Networks: $q$ - $s$ -Composite , 2017, IEEE Transactions on Information Forensics and Security.

[71]  Muhammad Usman,et al.  SIT: A Lightweight Encryption Algorithm for Secure Internet of Things , 2017, ArXiv.

[72]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[73]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[74]  Ali Farrokhtala,et al.  Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[75]  Amirhossein Safi,et al.  Improving the security of internet of things using encryption algorithms , 2017, 2017 International Conference on IoT and Application (ICIOT).

[76]  Wenhao Wang,et al.  A Replay-Attack Resistant Authentication Scheme for the Internet of Things , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[77]  Chao Gao,et al.  Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System , 2017, IEEE Internet of Things Journal.

[78]  Pawel Rotter,et al.  A Framework for Assessing RFID System Security and Privacy Risks , 2008, IEEE Pervasive Computing.

[79]  Chien-Ming Chen,et al.  On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags , 2017, The Journal of Supercomputing.