IoT security: Review, blockchain solutions, and open challenges
Tài liệu tham khảo
Atzori, 2010, The internet of things: A survey, Comput. Netw., 54, 2787, 10.1016/j.comnet.2010.05.010
Giusto, 2014
B. Heater, Lenovo shows off a pair of intel-powered smart shoes, 2016. URL https://techcrunch.com/2016/06/09/lenovo-smart-shoes/.
M. Rouse, I. Wigmore, Internet of things, 2016. URL http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT..
Khan, 2017, Cognitive-radio-based internet of things: Applications, architectures, spectrum related functionalities, and future research directions, IEEE Wirel. Commun., 24, 17, 10.1109/MWC.2017.1600404
Akhtar, 2016, White space: Definitional perspectives and their role in exploiting spectrum opportunities, Telecommun. Policy, 40, 319, 10.1016/j.telpol.2016.01.003
Alaba, 2017, Internet of things security: A survey, J. Netw. Comput. Appl., 88, 10, 10.1016/j.jnca.2017.04.002
Granjal, 2015, Security for the internet of things: A Survey of existing protocols and open research issues, IEEE Commun. Surv. Tutor., 17, 1294, 10.1109/COMST.2015.2388550
Roman, 2011, Key management systems for sensor networks in the context of the internet of things, Comput. Electr. Eng., 37, 147, 10.1016/j.compeleceng.2011.01.009
Granjal, 2008, Why is IPSec a viable option for wireless sensor networks, 802
Cirani, 2013, Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview, Algorithms, 6, 197, 10.3390/a6020197
Butun, 2014, A survey of intrusion detection systems in wireless sensor networks, IEEE Commun. Surv. Tutor., 16, 266, 10.1109/SURV.2013.050113.00191
Abduvaliyev, 2013, On the vital areas of intrusion detection systems in wireless sensor networks, IEEE Commun. Surv. Tutor., 15, 1223, 10.1109/SURV.2012.121912.00006
Mitchell, 2014, Review: a survey of intrusion detection in wireless network applications, Comput. Commun., 42, 1, 10.1016/j.comcom.2014.01.012
S. Yi, Z. Qin, Q. Li, Security and privacy issues of fog computing: A survey, in: Wireless Algorithms, Systems, and Applications the 10th International Conference on, 2015, pp. 1–10.
Wang, 2015, Fog computing: Issues and challenges in security and forensics, 53
Sicari, 2015, Security, privacy and trust in internet of things: The road ahead, Comput. Netw., 76, 146, 10.1016/j.comnet.2014.11.008
Roman, 2016, Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges, Future Gener. Comput. Syst.
Oleshchuk, 2009, Internet of things and privacy preserving technologies, 336
Zhou, 2017, Security and privacy for cloud-based IoT: Challenges, IEEE Commun. Mag., 55, 26, 10.1109/MCOM.2017.1600363CM
Zhang, 2014, IoT security: Ongoing challenges and research opportunities, 230
IoT-A, Internet of Things–Architecture IoT-A Deliverable D1.5 –Final architectural reference model for the IoT v3.0, 2013. URL http://iotforum.org/wp-content/uploads/2014/09/D1.5-20130715-VERYFINAL.pdf.
OWASP, Top IoT Vulnerabilities, 2016. URL https://www.owasp.org/index.php/Top_IoT_Vulnerabilities.
IEEE, IeEEE Standard for Local and metropolitan networks–Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs), 2012. URL https://standards.ieee.org/findstds/standard/802.15.4-2011.html.
T. Winter, P. Thubert, A. Brandt, J.W. Hui, R. Kelsey, Rfc 6550 - rpl: ipv6 routing protocol for low-power and lossy networks, 2012. URL https://tools.ietf.org/html/rfc6550.
J. Postel, User datagram protocol, 1980. URL https://tools.ietf.org/html/rfc768.
J.W. Hui, P. Thubert, Compression format for IPv6 datagrams over IEEE 802.15.4-based networks, 2011. URL https://tools.ietf.org/html/rfc6282.
A. Conta, S. Deering, M. Gupta, Internet control message protocol (ICMPv6) for the internet protocol version 6 (IPv6) specification, 2006. URL https://tools.ietf.org/html/rfc4443.
Z. Shelby, K. Hartke, C. Bormann, The constrained application protocol (CoAP), 2014. URL https://tools.ietf.org/html/rfc7252.
Xu, 2005, The feasibility of launching and detecting jamming attacks in wireless networks, 46
Noubir, 2003, Low-power DoS attacks in data wireless LANs and countermeasures, SIGMOBILE Mob. Comput. Commun. Rev., 7, 29, 10.1145/961268.961277
Chae, 2014, Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone, Trans. Info. for. Sec., 9, 1617, 10.1109/TIFS.2014.2341453
Hong, 2013, Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches, IEEE Signal Process. Mag., 30, 29, 10.1109/MSP.2013.2256953
Xiao, 2009, Channel-Based detection of sybil attacks in wireless networks, IEEE Transa. Inf. Forensics Secur., 4, 492, 10.1109/TIFS.2009.2026454
Y. Chen, W. Trappe, R.P. Martin, Detecting and localizing wireless spoofing attacks, in: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2017, pp. 193–202.
Bhattasali, 2011, A survey of recent intrusion detection systems for wireless sensor network, 268
Kim, 2008, Protection against packet fragmentation attacks at 6LoWPAN adaptation layer, 796
Hummen, 2013, 6LoWPAN Fragmentation attacks and mitigation mechanisms, 55
Riaz, 2009, Security analysis survey and framework design for IP connected LoWPANs, 1
Dvir, 2011, VeRA - version number and rank authentication in RPL, 709
Weekly, 2012, Evaluating sinkhole defense techniques in RPL networks, 1
Ahmed, 2016, Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks, Secur. Commun. Netw., 9, 5143, 10.1002/sec.1684
A.A. Pirzada, C. McDonald, Circumventing sinkholes and wormholes in wireless sensor networks, in: International Workshop on Wireless Ad-Hoc Networks, 2005.
Wang, 2008, Visualisation of wormholes in underwater sensor networks: A distributed approach, Int. J. Secur. Netw., 3, 10, 10.1504/IJSN.2008.016198
Wazid, 2016, Design of sinkhole node detection mechanism for hierarchical wireless sensor networks, Sec. Commun. Netw., 9, 4596, 10.1002/sec.1652
Zhang, 2014, Sybil attacks and their defenses in the internet of things, IEEE Internet Things J., 1, 372, 10.1109/JIOT.2014.2344013
G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, B.Y. Zhao, Social turing tests: Crowdsourcing sybil detection, in: Symposium on Network and Distributed System Security, NDSS, 2013.
Granjal, 2014, Network-layer security for the Internet of Things using TinyOS and BLIP, Int. J. Commun. Syst., 27, 1938, 10.1002/dac.2444
Raza, 2011, Securing communication in 6LoWPAN with compressed IPsec, 1
Granjal, 2010, Enabling network-layer security on IPv6 wireless sensor networks, 1
Mahalle, 2013, Identity authentication and capability based access control (iacac) for the internet of things, J. Cyber Secur. Mobility, 1, 309
Sinthan, 2013, Identity authentication and capability based access control (IACAC) for the Internet of Things, J. Cyber Secur. Mob., 1, 309
M. Brachmann, O. Garcia-Morchon, M. Kirsche, Security for practical CoAP applications: Issues and solution approaches, in: 10th GI/ITG KuVS Fachgespraech Sensornetze (FGSN 2011), 2011.
J. Granjal, E. Monteiro, J.S. Silva, End-to-end transport-layer security for internet-integrated sensing applications with mutual and delegated ecc public-key authentication, in: 2013 IFIP Networking Conference, 2013, pp. 1–9.
Peretti, 2015, BlinkToSCoAP: An end-to-end security framework for the Internet of Things, 1
S. Raza, T. Voigt, V. Jutvik, Lightweight IKEv2: a key management solution for both the compressed IPsec and the IEEE 802.15. 4 security, in: Proceedings of the IETF Workshop on Smart Object Security, vol. 23, 2012.
Park, 2016, Mutual authentication scheme in secure internet of things technology for comfortable lifestyle, Sensors, 6, 10.3390/s16010020
Ibrahim, 2016, Octopus: An edge-fog mutual authentication scheme, Internat. J. Netw. Secur., 18, 1089
Henze, 2017, Distributed configuration, authorization and management in the cloud-based internet of things, 185
Brachmann, 2012, End-to-end transport security in the IP-based Internet of Things, 1
Granjal, 2013, Application-layer security for the WoT: extending CoAP to support end-to-end message security for internet-integrated sensing applications, 140
Sethi, 2012, End-to-end security for sleepy smart object networks, 964
Conzon, 2012, The VIRTUS middleware: An XMPP based architecture for secure IoT communications, 1
Liu, 2014, Efficient naming, addressing and profile services in Internet-of-Things sensory environments, Ad Hoc Netw., 18, 85, 10.1016/j.adhoc.2013.02.008
Young, 2011, Overcoming adversaries in sensor networks: A survey of theoretical models and algorithmic approaches for tolerating malicious interference, IEEE Commun. Surv. Tutor., 13, 617, 10.1109/SURV.2011.041311.00156
Xu, 2004, Channel surfing and spatial retreats: Defenses against wireless denial of service, 80
Pecorella, 2016, The role of physical layer security in IoT: A novel perspective, Information, 7, 10.3390/info7030049
Demirbas, 2006, An RSSI-based scheme for sybil attack detection in wireless sensor networks, 564
Q. Li, W. Trappe, Light-weight detection of spoofing attacks in wireless networks, in: 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2006, pp. 845–851.
Xiao, 2007, Fingerprints in the ether: Using the physical layer for wireless authentication, 4646
Harkanson, 2017, Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications, 6:1
D. Eastlake, P.E. Jones, RFC 3174 - US Secure Hash Algorithm 1 (SHA1), 2001. URL https://tools.ietf.org/html/rfc3174.
H. Krawczyk, M. Bellare, R. Canetti, HMAC: keyed-hashing for message authentication, 1997. URL https://tools.ietf.org/rfc/rfc2104.txt.
Rivest, 1978, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, 21, 120, 10.1145/359340.359342
Le, 2013, The impact of rank attack on network topology of routing protocol for low-power and lossy networks, IEEE Sens. J., 13, 3685, 10.1109/JSEN.2013.2266399
Hu, 2005, Ariadne: A secure on-demand routing protocol for ad hoc networks, Wirel. Netw., 11, 21, 10.1007/s11276-004-4744-y
Krontiris, 2008, Intrusion detection of sinkhole attacks in wireless sensor networks, 150
Raju, 2016, Detection of sinkhole attack in wireless sensor network, 629
Ngai, 2006, On the intruder detection for sinkhole attack in wireless sensor networks, 3383
Poovendran, 2007, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, Wirel. Netw., 13, 27, 10.1007/s11276-006-3723-x
Salehi, 2013, Detection of sinkhole attack in wireless sensor networks, 361
C. Tumrongwittayapak, R. Varakulsiripunth, Detecting Sinkhole attacks in wireless sensor networks, in: 2009 ICCAS-SICE, 2009, pp. 1966–1971.
Jang, 2007, A time-based key management protocol for wireless sensor networks, 314
Sharmila, 2011, Detection of sinkhole attack in wireless sensor networks using message digest algorithms, 1
Yu, 2006, SybilGuard: defending against sybil attacks via social networks, SIGCOMM Comput. Commun. Rev., 36, 267, 10.1145/1151659.1159945
Alvisi, 2013, SoK: the evolution of sybil defense via social networks, 382
Cao, 2012
Mohaisen, 2011, Keep your friends close: incorporating trust into social network-based sybil defenses, 1943
Quercia, 2010, Sybil attacks against mobile users: Friends and foes to the rescue, 336
S. Kent, RFC 4302 - ip authentication header, 2005. URL https://tools.ietf.org/html/rfc4302.
S. Kent, RFC 4303 - IP Encapsulating Security Payload (ESP), 2005. URL https://tools.ietf.org/html/rfc4303.
Raza, 2011
Raza, 2014, Secure communication for the Internet of Things–a comparison of link-layer security and IPsec for 6LoWPAN, Secur. Commun. Netw., 7, 2654, 10.1002/sec.406
J.W. Hui, P. Thubert, Compression Format for IPv6 Datagrams in 6LoWPAN Networks draft-ietf-6lowpan-hc-13, 2010. URL https://tools.ietf.org/html/draft-ietf-6lowpan-hc-13.
G. Montenegro, N. Kushalnagar, J.W. Hui, D.E. Culler, Transmission of IPv6 Packets over IEEE 802.15.4 Networks, 2007. URL https://tools.ietf.org/html/rfc4944.
Kothmayr, 2012, 956
Kothmayr, 2013, {DTLS} based security and two-way authentication for the Internet of Things, Ad Hoc Netw., 11, 2710, 10.1016/j.adhoc.2013.05.003
Kinney, 2006
Huang, 2014, Robust multi-factor authentication for fragile communications, IEEE Trans. Dependable Secure Comput., 11, 568, 10.1109/TDSC.2013.2297110
Bohli, 2015, SMARTIE project: Secure IoT data management for smart cities, 1
Stojmenovic, 2016, An overview of fog computing and its security issues, Concurr. Comput. Pract. Exp., 28, 2991, 10.1002/cpe.3485
Chavan, 2014, Secure CoAP using enhanced DTLS for Internet of Things, Internat. J. Innovative Res. Comput. Commun. Eng., 2, 7601
Raza, 2012, 6LoWPAN compressed DTLS for CoAP, 287
Phls, 2014, RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects, 122
BUTLER-Consortium, BUTLER smartlife –uBiquitous, secUre inTernet-of-things with Location and contExt-awaReness, 2014. URL http://cordis.europa.eu/docs/projects/cnect/1/287901/080/deliverables/001-287901BUTLERD25.pdf.
Hummen, 2013, Tailoring end-to-end IP security protocols to the Internet of Things, 1
Prez, 2016, ARMOUR: Large-scale experiments for IoT security trust, 553
Brachmann, 2012, Security considerations around end-to-end security in the IP-based Internet of Things, 1
Gmez-Goiri, 2014, Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications, Comput. Hum. Behav., 30, 460, 10.1016/j.chb.2013.06.022
OneM2M, Security solutions –OneM2M Technical Specification, 2017. URL http://onem2m.org/technical/latest-drafts.
Ferreira, 2014, Proposal of a secure, deployable and transparent middleware for Internet of Things, 1
Antonopoulos, 2014
The-Bitcoin-Foundation, How does Bitcoin work?, 2014. URL https://bitcoin.org/en/how-it-works.
BitInfoCharts, Block - Bitcoin Wiki, 2016. URL https://en.bitcoin.it/wiki/Block.
EtherScan, Ethereum Average BlockTime Chart, 2016. URL https://etherscan.io/chart/blocktime.
Linux-Foundation, Blockchain technologies for business, 2017. URL https://www.hyperledger.org/.
C. Kuhlman, What is eris? 2016 Edition, 2016. URL https://monax.io/2016/04/03/wtf-is-eris/.
Stellar, Stellar network overview, 2014. URL https://www.stellar.org/developers/guides/get-started/..
Ripple, Ripple network, 2013. URL https://ripple.com/network.
All-In-Bits, Introduction to tendermint, 2017. URL https://tendermint.com/intro.
Mattila, 2016, The blockchain phenomenon: The disruptive potential of distributed consensu architectures, 10.1596/1813-9450-7856
EconoTimes, Safeshare releases first blockchain insurance solution for sharing economy, 2016. URL https://www.econotimes.com/SafeShare-Releases-First-Blockchain-Insurance-Solution-For-Sharing-Economy-181326.
IBM, IBM blockchain based on hyperledger fabric from the linux foundation, 2017. URL https://www.ibm.com/blockchain/hyperledger.html.
Friese, 2014, Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative, 1
Otte, 2017, TrustChain: A Sybil-resistant scalable blockchain, Future Gener. Comput. Syst., 10.1016/j.future.2017.08.048
M. Conoscenti, A. Vetro, J.C.D. Martin, Blockchain for the Internet of Things: A systematic literature Review, in: The 3rd International Symposium on Internet of Things: Systems, Management, and Security, IOTSMS-2016, 2016.
G. Zyskind, O. Nathan, A. Pentland, Enigma: decentralized computation platform with guaranteed privacy, 2015. URL http://enigma.media.mit.edu/enigma~full.pdf.
Zhang, 2015, An IoT electric business model based on the protocol of bitcoin, 184
Wörner, 2014, When your sensor earns money: Exchanging data for cash with bitcoin, 295
L. Axon, Privacy-awareness in Blockchain-based PKI, Tech. Rep. 2015. URL https://ora.ox.ac.uk/objects/uuid:f8377b69-599b-4cae-8df0-f0cded53e63b/datastreams/ATTACHMENT01.
C. Fromknecht, D. Velicanu, S. Yakoubov, CertCoin: A namecoin based decentralized authentication system, 2014. URL https://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubov-certcoin.pdf.
A. Bahga, V.K. Madisetti, Blockchain platform for industrial Internet of Things, Tech. Rep. 2016. URL http://file.scirp.org/pdf/JSEA_2016102814012798.pdf.
Christidis, 2016, Blockchains and smart contracts for the Internet of Things, IEEE Access, 4, 2292, 10.1109/ACCESS.2016.2566339
Pureswaran, 2014
Kamalinejad, 2015, Wireless energy harvesting for the Internet of Things, IEEE Commun. Mag., 53, 102, 10.1109/MCOM.2015.7120024
Li, 2017, A survey on the security of blockchain systems, Future Gener. Comput. Syst., 10.1016/j.future.2017.08.020