IoT security: Review, blockchain solutions, and open challenges

Future Generation Computer Systems - Tập 82 - Trang 395-411 - 2018
Minhaj Ahmad Khan1, Khaled Salah2
1Bahauddin Zakariya University, Multan, Pakistan
2Khalifa University of Science, Technology & Research, Sharjah, United Arab Emirates

Tài liệu tham khảo

Atzori, 2010, The internet of things: A survey, Comput. Netw., 54, 2787, 10.1016/j.comnet.2010.05.010 Giusto, 2014 B. Heater, Lenovo shows off a pair of intel-powered smart shoes, 2016. URL https://techcrunch.com/2016/06/09/lenovo-smart-shoes/. M. Rouse, I. Wigmore, Internet of things, 2016. URL http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT.. Khan, 2017, Cognitive-radio-based internet of things: Applications, architectures, spectrum related functionalities, and future research directions, IEEE Wirel. Commun., 24, 17, 10.1109/MWC.2017.1600404 Akhtar, 2016, White space: Definitional perspectives and their role in exploiting spectrum opportunities, Telecommun. Policy, 40, 319, 10.1016/j.telpol.2016.01.003 Alaba, 2017, Internet of things security: A survey, J. Netw. Comput. Appl., 88, 10, 10.1016/j.jnca.2017.04.002 Granjal, 2015, Security for the internet of things: A Survey of existing protocols and open research issues, IEEE Commun. Surv. Tutor., 17, 1294, 10.1109/COMST.2015.2388550 Roman, 2011, Key management systems for sensor networks in the context of the internet of things, Comput. Electr. Eng., 37, 147, 10.1016/j.compeleceng.2011.01.009 Granjal, 2008, Why is IPSec a viable option for wireless sensor networks, 802 Cirani, 2013, Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview, Algorithms, 6, 197, 10.3390/a6020197 Butun, 2014, A survey of intrusion detection systems in wireless sensor networks, IEEE Commun. Surv. Tutor., 16, 266, 10.1109/SURV.2013.050113.00191 Abduvaliyev, 2013, On the vital areas of intrusion detection systems in wireless sensor networks, IEEE Commun. Surv. Tutor., 15, 1223, 10.1109/SURV.2012.121912.00006 Mitchell, 2014, Review: a survey of intrusion detection in wireless network applications, Comput. Commun., 42, 1, 10.1016/j.comcom.2014.01.012 S. Yi, Z. Qin, Q. Li, Security and privacy issues of fog computing: A survey, in: Wireless Algorithms, Systems, and Applications the 10th International Conference on, 2015, pp. 1–10. Wang, 2015, Fog computing: Issues and challenges in security and forensics, 53 Sicari, 2015, Security, privacy and trust in internet of things: The road ahead, Comput. Netw., 76, 146, 10.1016/j.comnet.2014.11.008 Roman, 2016, Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges, Future Gener. Comput. Syst. Oleshchuk, 2009, Internet of things and privacy preserving technologies, 336 Zhou, 2017, Security and privacy for cloud-based IoT: Challenges, IEEE Commun. Mag., 55, 26, 10.1109/MCOM.2017.1600363CM Zhang, 2014, IoT security: Ongoing challenges and research opportunities, 230 IoT-A, Internet of Things–Architecture IoT-A Deliverable D1.5 –Final architectural reference model for the IoT v3.0, 2013. URL http://iotforum.org/wp-content/uploads/2014/09/D1.5-20130715-VERYFINAL.pdf. OWASP, Top IoT Vulnerabilities, 2016. URL https://www.owasp.org/index.php/Top_IoT_Vulnerabilities. IEEE, IeEEE Standard for Local and metropolitan networks–Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs), 2012. URL https://standards.ieee.org/findstds/standard/802.15.4-2011.html. T. Winter, P. Thubert, A. Brandt, J.W. Hui, R. Kelsey, Rfc 6550 - rpl: ipv6 routing protocol for low-power and lossy networks, 2012. URL https://tools.ietf.org/html/rfc6550. J. Postel, User datagram protocol, 1980. URL https://tools.ietf.org/html/rfc768. J.W. Hui, P. Thubert, Compression format for IPv6 datagrams over IEEE 802.15.4-based networks, 2011. URL https://tools.ietf.org/html/rfc6282. A. Conta, S. Deering, M. Gupta, Internet control message protocol (ICMPv6) for the internet protocol version 6 (IPv6) specification, 2006. URL https://tools.ietf.org/html/rfc4443. Z. Shelby, K. Hartke, C. Bormann, The constrained application protocol (CoAP), 2014. URL https://tools.ietf.org/html/rfc7252. Xu, 2005, The feasibility of launching and detecting jamming attacks in wireless networks, 46 Noubir, 2003, Low-power DoS attacks in data wireless LANs and countermeasures, SIGMOBILE Mob. Comput. Commun. Rev., 7, 29, 10.1145/961268.961277 Chae, 2014, Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone, Trans. Info. for. Sec., 9, 1617, 10.1109/TIFS.2014.2341453 Hong, 2013, Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches, IEEE Signal Process. Mag., 30, 29, 10.1109/MSP.2013.2256953 Xiao, 2009, Channel-Based detection of sybil attacks in wireless networks, IEEE Transa. Inf. Forensics Secur., 4, 492, 10.1109/TIFS.2009.2026454 Y. Chen, W. Trappe, R.P. Martin, Detecting and localizing wireless spoofing attacks, in: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2017, pp. 193–202. Bhattasali, 2011, A survey of recent intrusion detection systems for wireless sensor network, 268 Kim, 2008, Protection against packet fragmentation attacks at 6LoWPAN adaptation layer, 796 Hummen, 2013, 6LoWPAN Fragmentation attacks and mitigation mechanisms, 55 Riaz, 2009, Security analysis survey and framework design for IP connected LoWPANs, 1 Dvir, 2011, VeRA - version number and rank authentication in RPL, 709 Weekly, 2012, Evaluating sinkhole defense techniques in RPL networks, 1 Ahmed, 2016, Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks, Secur. Commun. Netw., 9, 5143, 10.1002/sec.1684 A.A. Pirzada, C. McDonald, Circumventing sinkholes and wormholes in wireless sensor networks, in: International Workshop on Wireless Ad-Hoc Networks, 2005. Wang, 2008, Visualisation of wormholes in underwater sensor networks: A distributed approach, Int. J. Secur. Netw., 3, 10, 10.1504/IJSN.2008.016198 Wazid, 2016, Design of sinkhole node detection mechanism for hierarchical wireless sensor networks, Sec. Commun. Netw., 9, 4596, 10.1002/sec.1652 Zhang, 2014, Sybil attacks and their defenses in the internet of things, IEEE Internet Things J., 1, 372, 10.1109/JIOT.2014.2344013 G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, B.Y. Zhao, Social turing tests: Crowdsourcing sybil detection, in: Symposium on Network and Distributed System Security, NDSS, 2013. Granjal, 2014, Network-layer security for the Internet of Things using TinyOS and BLIP, Int. J. Commun. Syst., 27, 1938, 10.1002/dac.2444 Raza, 2011, Securing communication in 6LoWPAN with compressed IPsec, 1 Granjal, 2010, Enabling network-layer security on IPv6 wireless sensor networks, 1 Mahalle, 2013, Identity authentication and capability based access control (iacac) for the internet of things, J. Cyber Secur. Mobility, 1, 309 Sinthan, 2013, Identity authentication and capability based access control (IACAC) for the Internet of Things, J. Cyber Secur. Mob., 1, 309 M. Brachmann, O. Garcia-Morchon, M. Kirsche, Security for practical CoAP applications: Issues and solution approaches, in: 10th GI/ITG KuVS Fachgespraech Sensornetze (FGSN 2011), 2011. J. Granjal, E. Monteiro, J.S. Silva, End-to-end transport-layer security for internet-integrated sensing applications with mutual and delegated ecc public-key authentication, in: 2013 IFIP Networking Conference, 2013, pp. 1–9. Peretti, 2015, BlinkToSCoAP: An end-to-end security framework for the Internet of Things, 1 S. Raza, T. Voigt, V. Jutvik, Lightweight IKEv2: a key management solution for both the compressed IPsec and the IEEE 802.15. 4 security, in: Proceedings of the IETF Workshop on Smart Object Security, vol. 23, 2012. Park, 2016, Mutual authentication scheme in secure internet of things technology for comfortable lifestyle, Sensors, 6, 10.3390/s16010020 Ibrahim, 2016, Octopus: An edge-fog mutual authentication scheme, Internat. J. Netw. Secur., 18, 1089 Henze, 2017, Distributed configuration, authorization and management in the cloud-based internet of things, 185 Brachmann, 2012, End-to-end transport security in the IP-based Internet of Things, 1 Granjal, 2013, Application-layer security for the WoT: extending CoAP to support end-to-end message security for internet-integrated sensing applications, 140 Sethi, 2012, End-to-end security for sleepy smart object networks, 964 Conzon, 2012, The VIRTUS middleware: An XMPP based architecture for secure IoT communications, 1 Liu, 2014, Efficient naming, addressing and profile services in Internet-of-Things sensory environments, Ad Hoc Netw., 18, 85, 10.1016/j.adhoc.2013.02.008 Young, 2011, Overcoming adversaries in sensor networks: A survey of theoretical models and algorithmic approaches for tolerating malicious interference, IEEE Commun. Surv. Tutor., 13, 617, 10.1109/SURV.2011.041311.00156 Xu, 2004, Channel surfing and spatial retreats: Defenses against wireless denial of service, 80 Pecorella, 2016, The role of physical layer security in IoT: A novel perspective, Information, 7, 10.3390/info7030049 Demirbas, 2006, An RSSI-based scheme for sybil attack detection in wireless sensor networks, 564 Q. Li, W. Trappe, Light-weight detection of spoofing attacks in wireless networks, in: 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2006, pp. 845–851. Xiao, 2007, Fingerprints in the ether: Using the physical layer for wireless authentication, 4646 Harkanson, 2017, Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications, 6:1 D. Eastlake, P.E. Jones, RFC 3174 - US Secure Hash Algorithm 1 (SHA1), 2001. URL https://tools.ietf.org/html/rfc3174. H. Krawczyk, M. Bellare, R. Canetti, HMAC: keyed-hashing for message authentication, 1997. URL https://tools.ietf.org/rfc/rfc2104.txt. Rivest, 1978, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, 21, 120, 10.1145/359340.359342 Le, 2013, The impact of rank attack on network topology of routing protocol for low-power and lossy networks, IEEE Sens. J., 13, 3685, 10.1109/JSEN.2013.2266399 Hu, 2005, Ariadne: A secure on-demand routing protocol for ad hoc networks, Wirel. Netw., 11, 21, 10.1007/s11276-004-4744-y Krontiris, 2008, Intrusion detection of sinkhole attacks in wireless sensor networks, 150 Raju, 2016, Detection of sinkhole attack in wireless sensor network, 629 Ngai, 2006, On the intruder detection for sinkhole attack in wireless sensor networks, 3383 Poovendran, 2007, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, Wirel. Netw., 13, 27, 10.1007/s11276-006-3723-x Salehi, 2013, Detection of sinkhole attack in wireless sensor networks, 361 C. Tumrongwittayapak, R. Varakulsiripunth, Detecting Sinkhole attacks in wireless sensor networks, in: 2009 ICCAS-SICE, 2009, pp. 1966–1971. Jang, 2007, A time-based key management protocol for wireless sensor networks, 314 Sharmila, 2011, Detection of sinkhole attack in wireless sensor networks using message digest algorithms, 1 Yu, 2006, SybilGuard: defending against sybil attacks via social networks, SIGCOMM Comput. Commun. Rev., 36, 267, 10.1145/1151659.1159945 Alvisi, 2013, SoK: the evolution of sybil defense via social networks, 382 Cao, 2012 Mohaisen, 2011, Keep your friends close: incorporating trust into social network-based sybil defenses, 1943 Quercia, 2010, Sybil attacks against mobile users: Friends and foes to the rescue, 336 S. Kent, RFC 4302 - ip authentication header, 2005. URL https://tools.ietf.org/html/rfc4302. S. Kent, RFC 4303 - IP Encapsulating Security Payload (ESP), 2005. URL https://tools.ietf.org/html/rfc4303. Raza, 2011 Raza, 2014, Secure communication for the Internet of Things–a comparison of link-layer security and IPsec for 6LoWPAN, Secur. Commun. Netw., 7, 2654, 10.1002/sec.406 J.W. Hui, P. Thubert, Compression Format for IPv6 Datagrams in 6LoWPAN Networks draft-ietf-6lowpan-hc-13, 2010. URL https://tools.ietf.org/html/draft-ietf-6lowpan-hc-13. G. Montenegro, N. Kushalnagar, J.W. Hui, D.E. Culler, Transmission of IPv6 Packets over IEEE 802.15.4 Networks, 2007. URL https://tools.ietf.org/html/rfc4944. Kothmayr, 2012, 956 Kothmayr, 2013, {DTLS} based security and two-way authentication for the Internet of Things, Ad Hoc Netw., 11, 2710, 10.1016/j.adhoc.2013.05.003 Kinney, 2006 Huang, 2014, Robust multi-factor authentication for fragile communications, IEEE Trans. Dependable Secure Comput., 11, 568, 10.1109/TDSC.2013.2297110 Bohli, 2015, SMARTIE project: Secure IoT data management for smart cities, 1 Stojmenovic, 2016, An overview of fog computing and its security issues, Concurr. Comput. Pract. Exp., 28, 2991, 10.1002/cpe.3485 Chavan, 2014, Secure CoAP using enhanced DTLS for Internet of Things, Internat. J. Innovative Res. Comput. Commun. Eng., 2, 7601 Raza, 2012, 6LoWPAN compressed DTLS for CoAP, 287 Phls, 2014, RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects, 122 BUTLER-Consortium, BUTLER smartlife –uBiquitous, secUre inTernet-of-things with Location and contExt-awaReness, 2014. URL http://cordis.europa.eu/docs/projects/cnect/1/287901/080/deliverables/001-287901BUTLERD25.pdf. Hummen, 2013, Tailoring end-to-end IP security protocols to the Internet of Things, 1 Prez, 2016, ARMOUR: Large-scale experiments for IoT security trust, 553 Brachmann, 2012, Security considerations around end-to-end security in the IP-based Internet of Things, 1 Gmez-Goiri, 2014, Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications, Comput. Hum. Behav., 30, 460, 10.1016/j.chb.2013.06.022 OneM2M, Security solutions –OneM2M Technical Specification, 2017. URL http://onem2m.org/technical/latest-drafts. Ferreira, 2014, Proposal of a secure, deployable and transparent middleware for Internet of Things, 1 Antonopoulos, 2014 The-Bitcoin-Foundation, How does Bitcoin work?, 2014. URL https://bitcoin.org/en/how-it-works. BitInfoCharts, Block - Bitcoin Wiki, 2016. URL https://en.bitcoin.it/wiki/Block. EtherScan, Ethereum Average BlockTime Chart, 2016. URL https://etherscan.io/chart/blocktime. Linux-Foundation, Blockchain technologies for business, 2017. URL https://www.hyperledger.org/. C. Kuhlman, What is eris? 2016 Edition, 2016. URL https://monax.io/2016/04/03/wtf-is-eris/. Stellar, Stellar network overview, 2014. URL https://www.stellar.org/developers/guides/get-started/.. Ripple, Ripple network, 2013. URL https://ripple.com/network. All-In-Bits, Introduction to tendermint, 2017. URL https://tendermint.com/intro. Mattila, 2016, The blockchain phenomenon: The disruptive potential of distributed consensu architectures, 10.1596/1813-9450-7856 EconoTimes, Safeshare releases first blockchain insurance solution for sharing economy, 2016. URL https://www.econotimes.com/SafeShare-Releases-First-Blockchain-Insurance-Solution-For-Sharing-Economy-181326. IBM, IBM blockchain based on hyperledger fabric from the linux foundation, 2017. URL https://www.ibm.com/blockchain/hyperledger.html. Friese, 2014, Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative, 1 Otte, 2017, TrustChain: A Sybil-resistant scalable blockchain, Future Gener. Comput. Syst., 10.1016/j.future.2017.08.048 M. Conoscenti, A. Vetro, J.C.D. Martin, Blockchain for the Internet of Things: A systematic literature Review, in: The 3rd International Symposium on Internet of Things: Systems, Management, and Security, IOTSMS-2016, 2016. G. Zyskind, O. Nathan, A. Pentland, Enigma: decentralized computation platform with guaranteed privacy, 2015. URL http://enigma.media.mit.edu/enigma~full.pdf. Zhang, 2015, An IoT electric business model based on the protocol of bitcoin, 184 Wörner, 2014, When your sensor earns money: Exchanging data for cash with bitcoin, 295 L. Axon, Privacy-awareness in Blockchain-based PKI, Tech. Rep. 2015. URL https://ora.ox.ac.uk/objects/uuid:f8377b69-599b-4cae-8df0-f0cded53e63b/datastreams/ATTACHMENT01. C. Fromknecht, D. Velicanu, S. Yakoubov, CertCoin: A namecoin based decentralized authentication system, 2014. URL https://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubov-certcoin.pdf. A. Bahga, V.K. Madisetti, Blockchain platform for industrial Internet of Things, Tech. Rep. 2016. URL http://file.scirp.org/pdf/JSEA_2016102814012798.pdf. Christidis, 2016, Blockchains and smart contracts for the Internet of Things, IEEE Access, 4, 2292, 10.1109/ACCESS.2016.2566339 Pureswaran, 2014 Kamalinejad, 2015, Wireless energy harvesting for the Internet of Things, IEEE Commun. Mag., 53, 102, 10.1109/MCOM.2015.7120024 Li, 2017, A survey on the security of blockchain systems, Future Gener. Comput. Syst., 10.1016/j.future.2017.08.020