Securing Device Connectivity in the Industrial Internet of Things (IoT)

The Internet revolution has produced fundamental changes in the way we work and communicate. It has enabled any-to-any connectivity. This connectivity has evolved through various stages. At the first stage, we saw user locations (homes and offices) connected with business locations through wired Internet connections. At the second stage, mobile user devices (laptops, smartphones, and tablets) are connected to businesses and each other using wireless Internet connections. The transformation brought by the Internet is moving forward and the next target is intelligent connected devices. Today, we see the latest stage of connectivity where intelligent devices connect people, businesses, and other diverse intelligent devices using a mix of wired and wireless Internet connections. These devices need beyond imagination capabilities in order to successfully interact with other device in the real world. The Internet of Things (IoT) expects to bring more profound changes in the world around us, and to do so, the IoT must come up with solutions and strategies to respond to the pressing issues of device connectivity including security, availability, and reliability. This chapter provides a review of various IoT connectivity protocols and analyzes their security capabilities. The chapter also provides some specific recommendations.

[1]  Al-Sakib Khan Pathan,et al.  Wireless Networks and Security, Issues, Challenges and Research Trends , 2013, Wireless Networks and Security.

[2]  Ivana Podnar Zarko,et al.  Comparison of the CUPUS middleware and MQTT protocol for smart city services , 2015, 2015 13th International Conference on Telecommunications (ConTEL).

[3]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[4]  Oscar Garcia-Morchon,et al.  Security Considerations in the IP-based Internet of Things , 2013 .

[5]  Steve Vinoski,et al.  Advanced Message Queuing Protocol , 2006, IEEE Internet Computing.

[6]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[7]  Ramjee Prasad,et al.  Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.

[8]  Peter Saint-Andre Extensible Messaging and Presence Protocol (XMPP): Core , 2011, RFC.

[9]  Dirk Pesch,et al.  Mobile Networks and Management - 5th International Conference, MONAMI 2013, Cork, Ireland, September 23-25, 2013, Revised Selected Papers , 2013, MONAMI.

[10]  Gurpreet Singh,et al.  A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.

[11]  Peter Saint-Andre,et al.  End-to-End Signing and Object Encryption for the Extensible Messaging and Presence Protocol (XMPP) , 2004, RFC.

[12]  Douglas C. Schmidt,et al.  Addressing the challenges of mission-critical information management in next-generation net-centric pub/sub systems with OpenSplice DDS , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[13]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[14]  Aboubaker Lasebae,et al.  Security analysis of the constrained application protocol in the Internet of Things , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).

[15]  Hong Linh Truong,et al.  MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[16]  Gianluca Reali,et al.  Comparison of two lightweight protocols for smartphone-based sensing , 2013, 2013 IEEE 20th Symposium on Communications and Vehicular Technology in the Benelux (SCVT).

[17]  Evangelos N. Gazis,et al.  A survey of technologies for the internet of things , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).