Current research on Internet of Things (IoT) security: A survey

Abstract The results of IoT failures can be severe, therefore, the study and research in security issues in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy, confidentiality, ensure the security of the users, infrastructures, data, and devices of the IoT, and guarantee the availability of the services offered by an IoT ecosystem. Thus, research in IoT security has recently been gaining much momentum with the help of the available simulation tools, modellers, and computational and analysis platforms. This paper presents an analysis of recent research in IoT security from 2016 to 2018, its trends and open issues. The main contribution of this paper is to provide an overview of the current state of IoT security research, the relevant tools,IoT modellers and simulators.

[1]  Jin B. Hong,et al.  A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..

[2]  Ajay Kumar Nain,et al.  A Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design , 2017, IEEE Transactions on Computers.

[3]  Victor I. Chang,et al.  A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment , 2018, Future Gener. Comput. Syst..

[4]  Yunsik Son,et al.  Design and Implementation of the Intelligent Convergence Security System for Hazard Event on IoT Environments , 2018 .

[5]  Sung-Gi Min,et al.  An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks , 2017, Sensors.

[6]  Mingwu Zhang,et al.  After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange , 2018, IEEE Systems Journal.

[7]  Awais Ahmad,et al.  Real-time secure communication for Smart City in high-speed Big Data environment , 2017, Future Gener. Comput. Syst..

[8]  Peter Herrmann,et al.  A Trust-based Resilient Routing Mechanism for the Internet of Things , 2017, ARES.

[9]  Daojing He,et al.  Flight Security and Safety of Drones in Airborne Fog Computing Systems , 2018, IEEE Communications Magazine.

[10]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[11]  Yi Zhang,et al.  Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice , 2018, J. Hardw. Syst. Secur..

[12]  Narendra S. Chaudhari,et al.  SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network , 2018, IEEE Access.

[13]  Seokhoon Kim,et al.  Safe Data Transmission Architecture Based on Cloud for Internet of Things , 2015, Wireless Personal Communications.

[14]  Sheetal Kalra,et al.  A lightweight biometrics based remote user authentication scheme for IoT services , 2017, J. Inf. Secur. Appl..

[15]  Cheng-Chi Lee,et al.  An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System , 2017, Sensors.

[16]  Nicola Zannone,et al.  Access control in Internet-of-Things: A survey , 2019, J. Netw. Comput. Appl..

[17]  Yonghun Kim,et al.  Achievable Multi-Security Levels for Lightweight IoT-Enabled Devices in Infrastructureless Peer-Aware Communications , 2017, IEEE Access.

[18]  Yu Zhang,et al.  A remote attestation mechanism for the sensing layer nodes of the Internet of Things , 2018, Future Gener. Comput. Syst..

[19]  Tao Peng,et al.  Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things , 2018, Secur. Commun. Networks.

[20]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[21]  Victor C. M. Leung,et al.  Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper , 2016, IEEE Access.

[22]  Jin Kwak,et al.  System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats , 2018, KSII Trans. Internet Inf. Syst..

[23]  Weisong Shi,et al.  On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..

[24]  Xu Wu,et al.  A multi-domain trust management model for supporting RFID applications of IoT , 2017, PloS one.

[25]  Zhenguo Chen,et al.  Trust Model of Wireless Sensor Networks and Its Application in Data Fusion , 2017, Sensors.

[26]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[27]  Im-Yeong Lee,et al.  A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments , 2018, KSII Trans. Internet Inf. Syst..

[28]  Avijit Mathur,et al.  A secure end-to-end IoT solution , 2017 .

[29]  Xiaoyu Hong,et al.  Blockchain Based Credibility Verification Method for IoT Entities , 2018, Secur. Commun. Networks.

[30]  Jian Shen,et al.  A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server , 2017, Comput. Electr. Eng..

[31]  Antonio F. Gómez-Skarmeta,et al.  TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..

[32]  Yu Cheng,et al.  Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.

[33]  Taekyoung Kwon,et al.  Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks , 2018, IEEE Access.

[34]  Sayan Kumar Ray,et al.  SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..

[35]  V. Natarajan,et al.  Lightweight key agreement protocol for IoT based on IKEv2 , 2017, Comput. Electr. Eng..

[36]  Fast and efficient probing of heterogeneous IoT networks , 2018, Int. J. Netw. Manag..

[37]  Mohammed Baqer M. Kamel,et al.  STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET , 2017, 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).

[38]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[39]  Zhen Qin,et al.  Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things , 2017, Mob. Inf. Syst..

[40]  Soufiene Djahel,et al.  Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.

[41]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[42]  Ahmed Serhrouchni,et al.  Bubbles of Trust: A decentralized blockchain-based authentication system for IoT , 2018, Comput. Secur..

[43]  Ashok Kumar Das,et al.  Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment , 2017, IEEE Internet of Things Journal.

[44]  Ilsun You,et al.  Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks , 2017, IEEE Access.

[45]  Zahid Mahmood,et al.  A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks , 2017, Sensors.

[46]  Dheerendra Mishra,et al.  Secure and efficient user authentication scheme for multi-gateway wireless sensor networks , 2017, Ad Hoc Networks.

[47]  Jin B. Hong,et al.  Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities , 2018, Future Gener. Comput. Syst..

[48]  Ido Nevat,et al.  Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things , 2017, IEEE Internet of Things Journal.

[49]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[50]  Jian Shen,et al.  An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment , 2017, J. Netw. Comput. Appl..

[51]  A. V. Deshpande,et al.  Trust Management Model based on Fuzzy Approach for Ubiquitous Computing , 2016, Int. J. Ambient Comput. Intell..

[52]  Mehdi Hosseinzadeh,et al.  A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks , 2018, Wirel. Pers. Commun..

[53]  Fan Wu,et al.  A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things , 2018, IEEE Internet of Things Journal.

[54]  Eun-Jun Yoon,et al.  Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.

[55]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[56]  Zhuzhong Qian,et al.  AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks , 2017, J. Parallel Distributed Comput..

[57]  Mauro Conti,et al.  Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.

[58]  Widyawan,et al.  Internet of Things (IoT) Framework for Granting Trust among Objects , 2017, J. Inf. Process. Syst..

[59]  Kun Yang,et al.  CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain , 2017, ACM Trans. Design Autom. Electr. Syst..

[60]  Pavan Pongle,et al.  A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[61]  Masoumeh Safkhani,et al.  Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things , 2017, The Journal of Supercomputing.

[62]  Sung Bum Pan,et al.  Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs , 2018, Wirel. Commun. Mob. Comput..

[63]  Satish Anamalamudi,et al.  AODV routing protocol for Cognitive radio access based Internet of Things (IoT) , 2018, Future Gener. Comput. Syst..

[64]  Aref Meddeb,et al.  6LowPSec: An end-to-end security protocol for 6LoWPAN , 2018, Ad Hoc Networks.

[65]  Tie Qiu,et al.  A Secure Time Synchronization Protocol Against Fake Timestamps for Large-Scale Internet of Things , 2017, IEEE Internet of Things Journal.

[66]  Meng Wu,et al.  Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance , 2017, Comput. Networks.

[67]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[68]  HwangHyun Cheon,et al.  Design and Implementation of a Reliable Message Transmission System Based on MQTT Protocol in IoT , 2016 .

[69]  Nasser-Eddine Rikli,et al.  Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks , 2016, Int. J. Distributed Sens. Networks.

[70]  Mirko Perkusich,et al.  A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things , 2018, Secur. Commun. Networks.

[71]  Muthu Ramachandran,et al.  Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..

[72]  Asaf Shabtai,et al.  Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks , 2017, IEEE Transactions on Mobile Computing.

[73]  Alessandro Neri,et al.  Security Access Protocols in IoT Capillary Networks , 2017, IEEE Internet of Things Journal.

[74]  Yacine Challal,et al.  A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.

[75]  Dengguo Feng,et al.  AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS , 2018, Comput. Networks.

[76]  Maode Ma,et al.  A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks , 2016, IEEE Transactions on Industrial Informatics.

[77]  Ingrid Moerman,et al.  IETF Standardization in the Field of the Internet of Things (IoT): A Survey , 2013, J. Sens. Actuator Networks.

[78]  Ali Reza Honarvar,et al.  An Intelligent Security Approach using Game Theory to Detect DoS Attacks In IoT , 2017 .

[79]  Tarik Taleb,et al.  An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.

[80]  Joy Iong-Zong Chen,et al.  Embedding the MRC and SC Schemes into Trust Management Algorithm Applied to IoT Security Protection , 2018, Wirel. Pers. Commun..

[81]  Riccardo Rovatti,et al.  Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks , 2018, IEEE Transactions on Information Forensics and Security.

[82]  Ion Bica,et al.  A security authorization scheme for smart home Internet of Things devices , 2017, Future Gener. Comput. Syst..

[83]  JiSu Park,et al.  Design and Implementation of a Reliable Message Transmission System Based on MQTT Protocol in IoT , 2016, Wirel. Pers. Commun..

[84]  Tong Li,et al.  A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT , 2018, Secur. Commun. Networks.

[85]  Edith Beigné,et al.  AES Datapath Optimization Strategies for Low-Power Low-Energy Multisecurity-Level Internet-of-Things Applications , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[86]  Muhammad Khurram Khan,et al.  Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.

[87]  Jong Hyuk Park,et al.  Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..

[88]  Chunhua Jin,et al.  Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network , 2018, Journal of Medical Systems.