Layer Based Security in Internet of Things: Current Mechanisms, Prospective Attacks, and Future Orientation

Internet of things (IoT) has now become a fascinating system that improves information technology for its use in homes, cities and medical sectors. IoT works as an extension of internet to realize interconnections among every day object based on platform independent communication protocols. Object forming IoT must possess sensing, communication, and computation capabilities leading to a convenient as well as economical assistance for society. Interaction among heterogeneous objects enhances the security vulnerabilities in IoT. The current four layered communication stack of IoT supports protocols at each layer for enabling connectivity of heterogeneous objects. With security as a prime concern, communication in IoT need to maintained using a secure mechanism to protect the system from attacks. This paper analyzes various existing protocols at each layer with their inherent security mechanisms and exposing their vulnerabilities to different attacks. This paper will unlock new research areas for improving the inbuilt security mechanisms.

[1]  Douglas Selent ADVANCED ENCRYPTION STANDARD , 2010 .

[2]  Óscar García-Morchón,et al.  End-to-End Transport Security in the IP-Based Internet of Things , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[3]  Laurence T. Yang,et al.  Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things , 2015, IEEE Transactions on Parallel and Distributed Systems.

[4]  Dhananjay Singh Developing an architecture: Scalability, mobility, control, and isolation on future internet services , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[5]  C. K. Jha,et al.  Implementing the Logical Security Framework for E-Commerce Based on Service-Oriented Architecture , 2016 .

[6]  Ashish Kr Luhach,et al.  Applying SOA to an E-commerce system and designing a logical security framework for small and medium sized E-commerce based on SOA , 2014, 2014 IEEE International Conference on Computational Intelligence and Computing Research.

[7]  Chiara Petrioli,et al.  Security as a CoAP resource: An optimized DTLS implementation for the IoT , 2015, 2015 IEEE International Conference on Communications (ICC).

[8]  Daeyoung Kim,et al.  Practical security analysis for the constrained node networks: Focusing on the DTLS protocol , 2015, 2015 5th International Conference on the Internet of Things (IOT).

[9]  Tsvetko Tsvetkov RPL: IPv6 Routing Protocol for LOW Power and Lossy Networks , 2011 .

[10]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[11]  Lan Li Study on security architecture in the Internet of Things , 2012 .

[12]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[13]  Jorge Sá Silva,et al.  End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication , 2013, 2013 IFIP Networking Conference.

[14]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[15]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[16]  Xu Xiaohui,et al.  Study on Security Problems and Key Technologies of the Internet of Things , 2013, 2013 International Conference on Computational and Information Sciences.

[17]  Miao Wu,et al.  Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[18]  Maode Ma,et al.  An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[19]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.