IoT Security Based on Content-Centric Networking Architecture

The internet of things (IoT) is a concept that is revolutionizing our daily lives along with different areas of industry. All existing objects will be connected to the internet. All the possibilities offered by IoT are very promising. However, setting up these architectures poses various problems. The exponential increase in devices is a challenge to the current internet architecture and represents a major security weakness of the internet of things. Indeed, securing these devices poses a significant security challenge. Thus, the emergence of the internet of things requires the design and deployment of new solutions. In this chapter, the authors propose content-centric networking (CCN) as a potential alternative networking solution for the IoT. The authors show that the implementation of CCN architecture in IoT can address several IoT requirements including security challenges.

[1]  Horst Hellbrück,et al.  CCN-WSN - A lightweight, flexible Content-Centric Networking protocol for wireless sensor networks , 2013, 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[2]  Jussi Kangasharju,et al.  Content-Centric Networking in the Internet of Things , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[3]  Deborah Estrin,et al.  Building efficient wireless sensor networks with low-level naming , 2001, SOSP.

[4]  Lixia Zhang,et al.  Data naming in Vehicle-to-Vehicle communications , 2012, 2012 Proceedings IEEE INFOCOM Workshops.

[5]  Xiaoming Fu,et al.  COPSS-lite: Lightweight ICN Based Pub/Sub for IoT Environments , 2017, ArXiv.

[6]  Salvatore J. Stolfo,et al.  A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan , 2010, ACSAC '10.

[7]  Thomas C. Schmidt,et al.  Information centric networking in the IoT: experiments with NDN in the wild , 2014, ICN '14.

[8]  Thomas C. Schmidt,et al.  RIOT OS: Towards an OS for the Internet of Things , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[9]  Anders Lindgren,et al.  Requirements and Challenges for IoT over ICN : IETF Internet-Draft draft-zhang-icnrg-icniot-requirements-01 , 2016 .

[10]  Christian Bonnet,et al.  Demonstrating Named Data Networking integration into DataTweet IoT Architecture , 2017, 2017 11th International Conference on Research Challenges in Information Science (RCIS).

[11]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[12]  Mike Ryan,et al.  Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.

[13]  Antonella Molinaro,et al.  E-CHANET: Routing, forwarding and transport in Information-Centric multihop wireless networks , 2013, Comput. Commun..

[14]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[15]  Wu Wu Adapting Information-Centric Networking to Small Sensor Nodes for Heterogeneous IoT Networks , 2017 .

[16]  Nabil Kannouf,et al.  Security on RFID technology , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).

[17]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[18]  Giuseppe Piro,et al.  Information centric services in Smart Cities , 2014, J. Syst. Softw..

[19]  Khalil Drira,et al.  Named Data Networking: A Promising Architecture for the Internet of Things (IoT) , 2018, Int. J. Semantic Web Inf. Syst..

[20]  Abdelmalek Azizi,et al.  A game theoretic approach to multipath traffic control in Content-Centric Networking , 2016, 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS).

[21]  Uichin Lee,et al.  Greening the internet with content-centric networking , 2010, e-Energy.

[22]  Olivier Festor,et al.  CCNx for Contiki: implementation details , 2012 .

[23]  Daniele Puccinelli,et al.  Special issue on "Internet of Things: Research challenges and Solutions" , 2016, Comput. Commun..

[24]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[25]  Antonio Iera,et al.  Named data networking for IoT: An architectural perspective , 2014, 2014 European Conference on Networks and Communications (EuCNC).

[26]  Eleonora Borgia,et al.  The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..

[27]  Thomas Engel,et al.  CCN traffic optimization for IoT , 2013, 2013 Fourth International Conference on the Network of the Future (NoF).

[28]  Antonella Molinaro,et al.  Caching in Named Data Networking for the wireless Internet of Things , 2015, 2015 International Conference on Recent Advances in Internet of Things (RIoT).

[29]  Aikaterini Mitrokotsa,et al.  Classification of RFID Attacks , 2008, IWRT.

[30]  Mario Gerla,et al.  Content Centric Networking in tactical and emergency MANETs , 2010, 2010 IFIP Wireless Days.

[31]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[32]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.