New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges

The field of IoT has blossomed and is positively influencing many application domains. In this article, we bring out the unique challenges this field poses to research in computer systems and networking. The unique challenges arise from the unique characteristics of IoT systems such as the diversity of application domains where they are used and the increasingly demanding protocols they are being called upon to run (such as video and LIDAR processing) on constrained resources (on-node and network). We show how these open challenges can benefit from foundations laid in other areas, such as fifth-generation network cellular protocols, machine learning model reduction, and device–edge–cloud offloading. We then discuss the unique challenges for reliability, security, and privacy posed by IoT systems due to their salient characteristics which include heterogeneity of devices and protocols, dependence on the physical environment, and the close coupling with humans. We again show how open research challenges benefit from the reliability, security, and privacy advancements in other areas. We conclude by providing a vision for a desirable end state for IoT systems.

[1]  Ramesh Govindan,et al.  Olympian: Scheduling GPU Usage in a Deep Neural Network Model Serving System , 2018, Middleware.

[2]  Prashant J. Shenoy,et al.  Combined heat and privacy: Preventing occupancy detection from smart meters , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[3]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[4]  Shuochao Yao,et al.  Stardust: A deep learning serving system in IoT: demo abstract , 2019, SenSys.

[5]  Russ Housley,et al.  Security flaws in 802.11 data link protocols , 2003, CACM.

[6]  Aurélien Francillon,et al.  What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices , 2018, NDSS.

[7]  Atul Prakash,et al.  Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? , 2017, IEEE Security & Privacy.

[8]  Marcel Großmann,et al.  Cloudless Computing - A Vision to Become Reality , 2020, 2020 International Conference on Information Networking (ICOIN).

[9]  Kehuan Zhang,et al.  Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users , 2019, 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[10]  Ramesh Govindan,et al.  Sensor faults: Detection methods and prevalence in real-world datasets , 2010, TOSN.

[11]  David E. Culler,et al.  Lessons from a Sensor Network Expedition , 2004, EWSN.

[12]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[13]  B. S. Manjunath,et al.  Actor Conditioned Attention Maps for Video Action Detection , 2018, 2020 IEEE Winter Conference on Applications of Computer Vision (WACV).

[14]  Junxuan Zhao,et al.  Detection and tracking of pedestrians and vehicles using roadside LiDAR sensors , 2019, Transportation Research Part C: Emerging Technologies.

[15]  Limin Wang,et al.  Temporal Action Detection with Structured Segment Networks , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[16]  Arijit Mukherjee,et al.  Offloaded Execution of Deep Learning Inference at Edge: Challenges and Insights , 2019, 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[17]  Saurabh Bagchi,et al.  Efficient incremental code update for sensor networks , 2011, TOSN.

[18]  Marcello Pelillo,et al.  Multi-target Tracking in Multiple Non-overlapping Cameras Using Fast-Constrained Dominant Sets , 2019, International Journal of Computer Vision.

[19]  Pascal Vasseur,et al.  Introduction to Multisensor Data Fusion , 2005, The Industrial Information Technology Handbook.

[20]  Daniel C. DuVarney,et al.  Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.

[21]  Fernando A. Kuipers,et al.  SDN and Virtualization Solutions for the Internet of Things: A Survey , 2016, IEEE Access.

[22]  Ramesh Govindan,et al.  CarMap: Fast 3D Feature Map Updates for Automobiles , 2020, NSDI.

[23]  Trent Jaeger,et al.  TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone , 2017, MobiSys.

[24]  Marcel Großmann,et al.  Applicability of Serverless Computing in Fog Computing Environments for IoT Scenarios , 2019, UCC Companion.

[25]  Francesco Solera,et al.  Tracking Social Groups Within and Across Cameras , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[26]  K. C. Gross,et al.  A supervisory control loop with Prognostics for human-in-the-loop decision support and control applications , 2017, 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA).

[27]  Gene Tsudik,et al.  VRASED: A Verified Hardware/Software Co-Design for Remote Attestation , 2019, USENIX Security Symposium.

[28]  L. Balzano,et al.  Blind Calibration of Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[29]  Omair Ahmad Khan,et al.  Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead , 2017, ICFNDS.

[30]  M. Hadi Amini,et al.  Distributed Sensing Using Smart End-User Devices: Pathway to Federated Learning for Autonomous IoT , 2019, 2019 International Conference on Computational Science and Computational Intelligence (CSCI).

[31]  B. S. Manjunath,et al.  Caesar: cross-camera complex activity recognition , 2019, SenSys.

[32]  Nick Feamster,et al.  User Perceptions of Smart Home IoT Privacy , 2018, Proc. ACM Hum. Comput. Interact..

[33]  Archan Misra,et al.  Eugene: Towards Deep Intelligence as a Service , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[34]  Eytan Modiano,et al.  Network Reliability With Geographically Correlated Failures , 2010, 2010 Proceedings IEEE INFOCOM.

[35]  Saurabh Bagchi,et al.  RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[36]  Lei Chen,et al.  Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT , 2019, IEEE Internet of Things Journal.

[37]  Mohamed R. Amer,et al.  HiRF: Hierarchical Random Field for Collective Activity Recognition in Videos , 2014, ECCV.

[38]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[39]  Dafang Zhuang,et al.  Advances in Multi-Sensor Data Fusion: Algorithms and Applications , 2009, Sensors.

[40]  Shih-Fu Chang,et al.  Online Detection of Action Start in Untrimmed, Streaming Videos , 2018, ECCV.

[41]  Karim Eldefrawy SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust , 2012, NDSS 2012.

[42]  Maarten Weyn,et al.  A Survey of Rigid 3D Pointcloud Registration Algorithms , 2014 .

[43]  Max Mühlhäuser,et al.  End-2-End privacy architecture for IoT , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[44]  Patrick Th. Eugster,et al.  Demo abstract: Diagnostic tracing of wireless sensor networks with TinyTracer , 2011, Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks.

[45]  Earlence Fernandes,et al.  Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[46]  Prashant J. Shenoy,et al.  Private Memoirs of IoT Devices: Safeguarding User Privacy in the IoT Era , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).

[47]  Patrick D. McDaniel,et al.  Protecting consumer privacy from electric load monitoring , 2011, CCS '11.

[48]  Hao Xu,et al.  Data Registration with Ground Points for Roadside LiDAR Sensors , 2019, Remote. Sens..

[49]  Anit Kumar Sahu,et al.  Federated Learning: Challenges, Methods, and Future Directions , 2019, IEEE Signal Processing Magazine.

[50]  Nick Feamster,et al.  Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).

[51]  Zhuo Chen,et al.  Bandwidth-Efficient Live Video Analytics for Drones Via Edge Computing , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).

[52]  Deborah Estrin,et al.  A Collaborative Approach to In-Place Sensor Calibration , 2003, IPSN.

[53]  Saurabh Bagchi,et al.  ACES: Automatic Compartments for Embedded Systems , 2018, USENIX Security Symposium.

[54]  H Parmar,et al.  Adobe's Real Time Messaging Protocol , 2022 .

[55]  Paramvir Bahl,et al.  VideoEdge: Processing Camera Streams using Hierarchical Clusters , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).

[56]  Kirubaraj Ragland,et al.  A Survey on Object Detection, Classification and Tracking Methods , 2014 .

[57]  Zhu Wang,et al.  Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things , 2013, J. Netw. Comput. Appl..

[58]  Jorge Sá Silva,et al.  A Survey on Human-in-the-Loop Applications Towards an Internet of All , 2015, IEEE Communications Surveys & Tutorials.

[59]  Zhongshu Gu,et al.  Securing Real-Time Microcontroller Systems through Customized Memory View Switching , 2018, NDSS.

[60]  Tarek F. Abdelzaher,et al.  FastDeepIoT: Towards Understanding and Optimizing Neural Network Execution Time on Mobile and Embedded Devices , 2018, SenSys.

[61]  Flavio D. Garcia,et al.  Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems , 2016, USENIX Security Symposium.

[62]  Geoffrey H. Tison,et al.  DeepHeart: Semi-Supervised Sequence Learning for Cardiovascular Risk Prediction , 2018, AAAI.

[63]  Silvio Savarese,et al.  Social Scene Understanding: End-to-End Multi-person Action Localization and Collective Activity Recognition , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[64]  Klaus-Robert Müller,et al.  Robust and Communication-Efficient Federated Learning From Non-i.i.d. Data , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[65]  George Danezis,et al.  Towards ensuring client-side computational integrity , 2011, CCSW '11.

[66]  Prem Prakash Jayaraman,et al.  Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..

[67]  Srinivasan Seshan,et al.  Learning Context-Aware Policies from Multiple Smart Homes via Federated Multi-Task Learning , 2020, 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI).

[68]  Song-Chun Zhu,et al.  Cross-View People Tracking by Scene-Centered Spatio-Temporal Parsing , 2017, AAAI.

[69]  Xin Wang,et al.  Clipper: A Low-Latency Online Prediction Serving System , 2016, NSDI.

[70]  Yuan Tian,et al.  SmartAuth: User-Centered Authorization for the Internet of Things , 2017, USENIX Security Symposium.

[71]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[72]  Gene Tsudik,et al.  SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust , 2012, NDSS.

[73]  Javier Lorca,et al.  Quantifying data rate and bandwidth requirements for immersive 5G experience , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[74]  Patrick D. McDaniel,et al.  Program Analysis of Commodity IoT Applications for Security and Privacy , 2018, ACM Comput. Surv..

[75]  Prashant Shenoy,et al.  RepEL: A Utility-Preserving Privacy System for IoT-Based Energy Meters , 2020, 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI).

[76]  Cees Snoek,et al.  Spatial-Aware Object Embeddings for Zero-Shot Localization and Classification of Actions , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[77]  Ramesh Govindan,et al.  AVR: Augmented Vehicular Reality , 2018, MobiSys.

[78]  J. Zico Kolter,et al.  REDD : A Public Data Set for Energy Disaggregation Research , 2011 .

[79]  Gustavo Alonso,et al.  Declarative Support for Sensor Data Cleaning , 2006, Pervasive.

[80]  Emiliano De Cristofaro,et al.  Knock Knock, Who's There? Membership Inference on Aggregate Location Data , 2017, NDSS.

[81]  Jun Zhao,et al.  Differentially Private Collaborative Learning for the IoT Edge , 2019, EWSN.

[82]  Tony Givargis,et al.  FlashBox: a system for logging non-deterministic events in deployed embedded systems , 2009, SAC '09.

[83]  Brandon Lucia,et al.  Adaptive low-overhead scheduling for periodic and reactive intermittent execution , 2020, PLDI.

[84]  Lorrie Faith Cranor,et al.  A Framework for Reasoning About the Human in the Loop , 2008, UPSEC.

[85]  Bronis R. de Supinski,et al.  Automatic fault characterization via abnormality-enhanced classification , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).

[86]  Byung-Gon Chun,et al.  PRETZEL: Opening the Black Box of Machine Learning Prediction Serving Systems , 2018, OSDI.

[87]  Saurabh Bagchi,et al.  Aveksha: a hardware-software approach for non-intrusive tracing and profiling of wireless embedded systems , 2011, SenSys.

[88]  Hui Liu,et al.  On-Demand Deep Model Compression for Mobile Devices: A Usage-Driven Model Selection Framework , 2018, MobiSys.

[89]  Divesh Srivastava,et al.  Integrating Conflicting Data: The Role of Source Dependence , 2009, Proc. VLDB Endow..

[90]  Jun Zhao,et al.  Mobile Edge Computing, Blockchain and Reputation-based Crowdsourcing IoT Federated Learning: A Secure, Decentralized and Privacy-preserving System , 2019, ArXiv.

[91]  Tarek F. Abdelzaher,et al.  DeepIoT: Compressing Deep Neural Network Structures for Sensing Systems with a Compressor-Critic Framework , 2017, SenSys.

[92]  Qiang Wang,et al.  Reprogramming wireless sensor networks: challenges and approaches , 2006, IEEE Network.

[93]  Giovanni Vigna,et al.  HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation , 2020, USENIX Security Symposium.

[94]  Haimonti Dutta,et al.  NILMTK: an open source toolkit for non-intrusive load monitoring , 2014, e-Energy.

[95]  Prashant J. Shenoy,et al.  Non-Intrusive Occupancy Monitoring using Smart Meters , 2013, BuildSys@SenSys.

[96]  Haryong Song,et al.  Robust Vision-Based Relative-Localization Approach Using an RGB-Depth Camera and LiDAR Sensor Fusion , 2016, IEEE Transactions on Industrial Electronics.

[97]  S Abirami,et al.  Suspicious Human Activity Detection from Surveillance Videos , 2012 .

[98]  François Brémond,et al.  Globality–Locality-Based Consistent Discriminant Feature Ensemble for Multicamera Tracking , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[99]  Yubin Xia,et al.  vTZ: Virtualizing ARM TrustZone , 2017, USENIX Security Symposium.

[100]  Matthew Hicks,et al.  Intermittent Computation without Hardware Support or Programmer Intervention , 2016, OSDI.

[101]  Anuj Srivastava,et al.  Action Recognition Using Rate-Invariant Analysis of Skeletal Shape Trajectories , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[102]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[103]  Ju Ren,et al.  Distilling at the Edge: A Local Differential Privacy Obfuscation Framework for IoT Data Analytics , 2018, IEEE Communications Magazine.

[104]  Philipp Sommer,et al.  Minerva: distributed tracing and debugging in wireless sensor networks , 2013, SenSys '13.

[105]  Paramvir Bahl,et al.  Live Video Analytics at Scale with Approximation and Delay-Tolerance , 2017, NSDI.

[106]  Patrick Th. Eugster,et al.  Prius: generic hybrid trace compression for wireless sensor networks , 2012, SenSys '12.

[107]  Joan Serrat,et al.  Management and orchestration challenges in network functions virtualization , 2016, IEEE Communications Magazine.

[108]  Yi-Mao Hsiao,et al.  H.264 video transmissions over wireless networks: Challenges and solutions , 2011, Comput. Commun..

[109]  Hovav Shacham,et al.  On the effectiveness of address-space randomization , 2004, CCS '04.

[110]  Takeo Kato,et al.  An obstacle detection method by fusion of radar and motion stereo , 2002, SICE 2003 Annual Conference (IEEE Cat. No.03TH8734).

[111]  Ahmad-Reza Sadeghi,et al.  SeED: secure non-interactive attestation for embedded devices , 2017, WISEC.

[112]  user surfaces,et al.  Data Execution Prevention , 2011 .

[113]  Kaiqi Huang,et al.  An Equalized Global Graph Model-Based Approach for Multicamera Object Tracking , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[114]  Luca Bruno,et al.  AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares , 2014, NDSS.

[115]  Aakanksha Chowdhery,et al.  Reinventing Video Streaming for Distributed Vision Analytics , 2018, HotCloud.

[116]  Mehdi Bennis,et al.  Toward Interconnected Virtual Reality: Opportunities, Challenges, and Enablers , 2016, IEEE Communications Magazine.

[117]  Hyoseung Kim,et al.  Energy scheduling for task execution on intermittently-powered devices , 2020, SIGBED Rev..

[118]  Yan Zhang,et al.  Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[119]  Omar Alrawi,et al.  SoK: Security Evaluation of Home-Based IoT Deployments , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[120]  Patrick Th. Eugster,et al.  TARDIS: software-only system-level record and replay in wireless sensor networks , 2015, IPSN '15.

[121]  Gianpaolo Francesco Trotta,et al.  Computer vision and deep learning techniques for pedestrian detection and tracking: A survey , 2018, Neurocomputing.

[122]  Yuan Qi,et al.  Minimizing private data disclosures in the smart grid , 2012, CCS '12.

[123]  David Brumley,et al.  Towards Automated Dynamic Analysis for Linux-based Embedded Firmware , 2016, NDSS.

[124]  Carlo Tomasi,et al.  Features for Multi-target Multi-camera Tracking and Re-identification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[125]  Saurabh Bagchi,et al.  Protecting Bare-Metal Embedded Systems with Privilege Overlays , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[126]  Xiaohua Tong,et al.  A Linear Feature-Based Approach for the Registration of Unmanned Aerial Vehicle Remotely-Sensed Images and Airborne LiDAR Data , 2016, Remote. Sens..

[127]  Brandon Lucia,et al.  Adaptive Dynamic Checkpointing for Safe Efficient Intermittent Computing , 2018, OSDI.

[128]  T. Wark,et al.  Real-time Image Streaming over a Low-Bandwidth Wireless Camera Network , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[129]  A. Habib,et al.  Photogrammetric and Lidar Data Registration Using Linear Features , 2005 .

[130]  N. Truong,et al.  A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things , 2016 .

[131]  Mikko Majanen,et al.  Use Cases and Communications Architecture for 5G-Enabled Road Safety Services , 2018, 2018 European Conference on Networks and Communications (EuCNC).

[132]  Beijia Zhang,et al.  Localizing Ground Penetrating RADAR: A Step Toward Robust Autonomous Ground Vehicle Localization , 2016, J. Field Robotics.

[133]  Brandon Lucia,et al.  Alpaca: intermittent execution without checkpoints , 2017, Proc. ACM Program. Lang..

[134]  Yuguang Fang,et al.  EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis , 2018, IEEE Internet of Things Journal.