A survey on privacy and security of Internet of Things

Computer Science Review - Tập 38 - Trang 100312 - 2020
Mark Mbock Ogonji1, George Okeyo2, Joseph Muliaro Wafula1
1School of Computing and Information Technology, Jomo Kenyatta University of Agriculture & Technology, P.O. Box 62000-00200 Nairobi, Kenya
2School of Computer Science and Informatics, De Montfort University, The Gateway, LE1 9BH, Leicester, United Kingdom

Tài liệu tham khảo

Farooq, 2015, A critical analysis on the security concerns of internet of things (IoT), Int. J. Comput. Appl., 111, 1 Gubbi, 2013, Internet of things (IoT): A vision, architectural elements, and future directions, Future Gener. Comput. Syst., 29, 1, 10.1016/j.future.2013.01.010 Bandyopadhyay, 2011, Internet of things: Applications and challenges in technology and standardization, Wirel. Pers. Commun., 58, 49, 10.1007/s11277-011-0288-5 Rao, 2017, Design of architecture for efficient integration of internet of things and cloud computing, Int. J. Adv. Res. Comput. Sci., 8, 392 McEwen, 2013, The internet of things: An overview, Des. Internet Things, 8 W. Mingjun, et al. A research on experimental system for Internet of Things major and application project, in: 3rd International Conference in System Science, Engineering Design and Manufacturing Informatization, ICSEM, 2012, pp. 261–263. Neisse, 2015 Atzori, 2010, The Internet of Things: A survey, Comput. Netw., 54, 2787, 10.1016/j.comnet.2010.05.010 Miorandi, 2012, Ad Hoc Networks Internet of things, : Vision, applications and research challenges, Ad Hoc Netw., 10, 1497, 10.1016/j.adhoc.2012.02.016 Sicari, 2015, Security, Privacy & Trust in Internet of Things : the road ahead, Comput. Netw., 146, 10.1016/j.comnet.2014.11.008 Riahi Sfar, 2018, A roadmap for security challenges in the Internet of Things, Digit. Commun. Netw., 4, 118, 10.1016/j.dcan.2017.04.003 Neshenko, 2019, Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations, IEEE Commun. Surv. Tutor., 29, 2702, 10.1109/COMST.2019.2910750 Pickering, 2016, Systematic quantitative literature reviews what are they and why use them ?, 1 B. Pejcinovic, Using Systematic Literature Reviews to Enhance Student Learning, in: 122nd ASEE Annual Conference & Exposition, 2015. A. Dohr, R. Modre-Osprian, M. Drobics, D. Hayn, G. Schreier, The internet of things for ambient assisted living, in: Seventh International Conference on Information Technology: New Generations, ITNG, 2010, pp. 804–809. 2012 Kumar, 2014, A survey on Internet of Things, : Security and privacy issues, Int. J. Comput. Appl., 90, 20 Uttarkar, 2014, Internet of things, : Architecture and security, Int. J. Comput. Appl., 3, 12 Huang, 2016, SecIoT, : a security framework for the internet of things, Secur. Commun. Netw., 3083, 10.1002/sec.1259 Abomhara, 2014, Security and privacy in the internet of things: current status and open issues, 1 Keyur K Patel, 2016, Internet of things-IOT, : Definition, characteristics, architecture, enabling technologies, application & future challenges, Int. J. Eng. Sci. Comput., 6 Lee, 2015, The Internet of things (IoT): Applications, invest- ments, and challenges for enterprises, Bus. Horiz., 58, 431, 10.1016/j.bushor.2015.03.008 N. Aleisa, K. Renaud, Privacy of the Internet of Things: A Systematic Literature Review, in: Proc. 50th Hawaii Int. Conf. Syst. Sci., 2017. S. Notra, M. Siddiqi, H.H. Gharakheili, V. Sivaraman, R. Boreli, An Experimental Study of Security and Privacy Risks with Emerging Household Appliances ( Position Paper ), in: Commun. Netw. Secur. (CNS), 2014 IEEE Conf., 2014, pp. 79–84. Hernandez, 2014, 1 M. Harbach, S. Fahl, M. Smith, Who’s afraid of which bad Wolf? A survey of IT security risk awareness, in: Proc. Comput. Secur. Found. Work., Vol. 2014-Janua, 2014, pp. 97–110. K. Zhao, L. Ge, A survey on the Internet of things security, in: Proceedings of 9th International Conference on Computational Intelligence and Security, CIS, 2013, pp. 663–667. L.F. Cranor, A Framework for Reasoning About the Human in the Loop, in: Proc. 1st Conf. Usability, Psychol. Secur., 2008, pp. 1:1–1:15. Zghal Rebaï, 2013, An adaptive method for user profile learning, vol. 8133 M. Mezghani, et al. Analyzing tagged resources for social interests detection To cite this version: HAL Id : hal-01178560, in: 16th International Conference on Enterprise Information Systems ICEIS 2014, 2015,pp. 340–345. Tchuente, 2013, Derivation of user profiles from social networks: a community approach of egocentric networks, Ingénierie Syst. Inform., 18, 11 E. Khanfir, C. El Hog, R.B. Djmeaa, I.A.B. Amor, A web service selection framework based on user’s context and qos, in: 2014 IEEE International Conference on Web Services, ICWS, 2014, pp. 708–711. Miranda, 2015, From the internet of things to the internet of people, IEEE Internet Comput., 19, 40, 10.1109/MIC.2015.24 Nitti, 2014, Trustworthiness management in the social internet of things, IEEE Trans. Knowl. Data Eng., 26, 10.1109/TKDE.2013.105 Leloglu, 2017, A review of security concerns in internet of things, J. Comput. Commun., 5, 121, 10.4236/jcc.2017.51010 Rimavicius, 2015, 1 Wind River Systems, 2015 2017 Abdur, 2017, Security issues in the internet of things (IoT): A comprehensive study, Int. J. Adv. Comput. Sci. Appl., 8 Sundmaeker, 2010 Kamrani, 2016 T. Xu, J. Wendt, M. Potkonjak, Security of IoT Systems: Design Challenges and Opportunities, in: IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, 2014, pp. 417–423. M. Hossain, M. Fotouhi, R. Hasan, Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things, in : 2015 IEEE World Congr. Serv., No. June, 2015, pp. 21–28. Babar, 2010, 420 Amine, 2016 Rescorla, 2018 Ziegeldorf, 2014, Privacy in the internet of things : Threats and challenges, Secur. Commun. Netw., 2728, 10.1002/sec.795 R. Kang, L. Dabbish, N. Fruchter, S. Kiesler, My data just goes everywhere:’ User mental models of the internet and implications for privacy and security, in: SOUPS 2015 - Proc. 11th Symp. Usable Priv. Secur., 2019, pp. 39–52. Abdul-Ghani, 2019, A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective, J. Sens. Actuator Netw., 8, 10.3390/jsan8020022 Abuagoub, 2019, IoT Security evolution: Challenges and countermeasures review, Int. J. Commun. Netw. Inf. Secur., 11, 342 Zaslavsky, 2015, 1 Hu, 2016 J. Daubert, A. Wiesmaier, P. Kikiras, A View on Privacy & Trust in IoT, in: IEEE International Conference on Communication (ICC) 2015 Workshop Proceedings, London, UK, 2015. Wang, 2013, Distributed trust management mechanism for the internet of things, Appl. Mech. Mater., 347 Roman, 2011, Securing the internet of things, IEEE Comput., 44, 51, 10.1109/MC.2011.291 I. Andrea, C. Chrysostomou, G. Hadjichristofi, Internet of Things: Security vulnerabilities and challenges, in: Proceedings - IEEE Symposium on Computers and Communications, Vol. 2016-February, 2016. Hassija, 2019, A survey on IoT security: Application areas, security threats, and solution architectures, IEEE Access, 7, 82721, 10.1109/ACCESS.2019.2924045 Bugeja, 2016 Celik, 2019, Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities, ACM Comput. Surv., 52, 10.1145/3333501 Lin, 2016, IoT Privacy and security challenges for smart home environments, Information, 7, 44, 10.3390/info7030044 Falcone, 2018, On the users’ acceptance of IoT systems: A theoretical approach, Information, 9, 10.3390/info9030053 Jain, 2016, Internet of things: Architecture, security goals, and challenges- A survey, Int. J. Innov. Res. Sci. Eng., 2, 154 Weber, 2010, Internet of things – New security and privacy challenges, Comput. Secur. Rev. Sci., 10.1016/j.clsr.2009.11.008 Uludag, 2015 Al-mawee, 2012 W. He, et al. Rethinking access control and authentication for the Home Internet of Things (IoT), in: Proc. 27th USENIX Secur. Symp., 2018, pp. 255–272. T. Le, M.W. Mutka, Access control with delegation for smart home applications, in: IoTDI 2019 - Proc. 2019 Internet Things Des. Implement., 2019, pp. 142–147. B. Anggorojati, P.N. Mahalle, N.R. Prasad, R. Prasad, Capability-based access control delegation model on the federated IoT network, in: Wirel. Pers. Multimed. Commun. (WPMC), 2012 15th Int. Symp., 2012, pp. 604–608. B. Ur, J. Jung, S. Schechter, The current state of access control for smart devices in homes, in: Workshop on Home Usable Privacy and Security, HUPS, 2014. Hernández-ramos, 2015, 15611 Guoping, 2011, The research of access control based on UCON in the internet of things, J. Softw., 6, 724 Chaabouni, 2019, Network intrusion detection for IoT security based on learning techniques, IEEE Commun. Surv. Tutor., 21, 10.1109/COMST.2019.2896380 Butun, 2020, Security of the internet of things: Vulnerabilities, attacks, and countermeasures, IEEE Commun. Surv. Tutor., 22, 616, 10.1109/COMST.2019.2953364 Gupta, 2015, Security and privacy issues in internet of things (IoT), IJRCS - Int. J. Res. Comput. Sci., 3, 18 Goeke, 2017 Mendez, 2017, 1 Mohaisen, 2013, The sybil attacks and defenses: A survey, Smart Comput. Rev., 3, 10.6029/smartcr.2013.06.009 Singla, 2013, Review on security issues and attacks in wireless sensor networks, IJARCSSE, 3, 529 Tuhin, 2015, Survey of security and privacy issues of internet of things, Int. J. Advanced Networking and Applications, 6, 2372 Kulshrestha, 2014 B. Khoo, RFID as an Enabler of the Internet of Things: Issues of Security and Privacy, in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing 2011, 2011, pp. 709–712. Deng, 2005 Anwar, 2014, Security issues and attacks in wireless sensor network, World Applied Sciences Journal, 30, 1224 Ramakrishna, 2018, A survey on various IoT attacks and its countermeasures, Int. J. Eng. Res. Comput. Sci. Eng., 5, 2320 Premkumar, 2019, Various defense countermeasures against dos attacks in wireless sensor networks, Int. J. Sci. Technol. Res., 8, 2926 Abomhara, 2015, Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks, J. Cyber Secur. Mob., 4, 65, 10.13052/jcsm2245-1439.414 D. Miessler, Securing the Internet of Things : Mapping Attack Surface Areas Using the OWASP IoT Top 10, in: RSA Conference 2015, 2015. OWASP, 2015 European Commission, 2013, 1 Roman, 2013, On the features and challenges, Comput. Netw., 57 Hustinx, 2010, 253 Fischer-Hübner, 2011, IFIP Advances in information and communication technology: Preface Rose, 2015 Baldini, 2018, Ethical design in the internet of things, Sci. Eng. Ethics, 24, 905, 10.1007/s11948-016-9754-5 Bertino, 2010, Web services threats, vulnerabilities, and countermeasures Kizza, 2013 Granjal, 2015, Security for the internet of things: A survey of existing protocols and open research issues, IEEE Commun. Surv. Tutor., 17, 1294, 10.1109/COMST.2015.2388550 OWASP, 2018 A. Cui, S.J. Stolfo, A quantitative analysis of the insecurity of embedded network devices: Results of a wide-area scan, in: Proc. - Annu. Comput. Secur. Appl. Conf. ACSAC, 2010, pp. 97–106. Y.M. Pa Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, C. Rossow, IoTPOT: Analysing the rise of IoT compromises, in: 9th USENIX Work. Offensive Technol., WOOT 2015, 2015. J. Czyz, M. Luckie, M. Allman, M. Bailey, Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy, Netw. Distrib. Syst. Secur. Symp., No. February, 2017, pp. 21–24. Furfaro, 2017, Using virtual environments for the assessment of cybersecurity issues in iot scenarios, Simul. Model. Pract. Theory, 73, 43, 10.1016/j.simpat.2016.09.007 A. Tekeoglu, A.S. Tosun, A testbed for security and privacy analysis of iot devices, in: 2016 IEEE 13th International Conference on. IEEE, 2016 in Mobile Ad Hoc and Sensor Systems, MASS, 2016, pp. 343–348. A. Cui, M. Costello, S.J. Stolfo, When firmware modifications attack: A case study of embedded exploitation, in: NDSS, 2013. Z. Berkay Celik, et al. Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX. Sensitive Information Tracking in Commodity IoT Sensitive Information Tracking in Commodity IoT, in: USENIX Secur. Symp., 2018. J. Wurm, K. Hoang, O. Arias, A.-R. Sadeghi, Y. Jin, Security analysis on consumer and industrial iot devices, in: Design Automation Conference (ASP-DAC), 2016 21st Asia and South Pacific, 2016, pp. 519–524. Singh, 2019, Energy efficient and side-channel secure cryptographic hardware for IoT-edge nodes, IEEE Internet Things J., 10.1109/JIOT.2018.2861324 Jeske, 2017, Familiarity with Internet threats: Beyond awareness, Comput. Secur., 66, 129, 10.1016/j.cose.2017.01.010 Furman, 2012, Basing cyber- security training on user perceptions, IEEE Secur. Priv., 10, 40, 10.1109/MSP.2011.180 Cirani, 2013, 197 S. Aragon, M. Tiloca, M. Maass, M. Hollick, S. Raza, ACE of spades in the iot security game: A flexible ipsec security profile for access control, in: 2018 IEEE Conf. Commun. Netw. Secur., CNS 2018, 2018. Martínez, 2017, A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy, Int. J. Distrib. Sens. Netw., 13, 10.1177/1550147717727974 E. Zeng, F. Roesner, Understanding and improving security and privacy in multi-user smart homes: A design exploration and in-home user study, in: Proc. 28th USENIX Secur. Symp., 2019, pp. 159–176. K. Yang, D. Forte, M. Tehranipoor, Protecting endpoint devices in IoT supply chain. in: 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 351–356. E. Fernandes, J. Paupore, A. Rahmati, D. Simionato, M. Conti, A. Prakash, Flowfence: Practical data protection for emerging iot application frameworks, in: USENIX Security Symposium, 2016. W. Chen, et al. Taprint : Secure Text Input for Commodity Smart Wristbands, in: ACM Int. Conf. Mob. Comput. Netw., 2019. Z. Yan, Q. Song, R. Tan, Y. Li, A.W.K. Kong, Towards touch-to-access device authentication using induced body electric potentials, in: Proc. Annu. Int. Conf. Mob. Comput. Networking, MOBICOM, 2019. X. Li, F. Yan, F. Zuo, Q. Zeng, L. Luo, Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices, in: Proc. 25th Annu. Int. Conf. Mob. Comput. Netw., 2019, pp. 1–17. V. Nguyen, et al. Body-guided communications: A low-power, highly-confined primitive to track and secure every touch, in: Proc. Annu. Int. Conf. Mob. Comput. Networking, MOBICOM, 2018, pp. 353–368. B. Hutchins, M. Zhou, A. Reddy, M. Li, W. Jin, L. Yang, Beat-PIN: A user authentication mechanism for wearable devices through secret beats, in: ASIACCS 2018 - Proc. 2018 ACM Asia Conf. Comput. Commun. Secur., 2018, pp. 101–115. F. Lin, C. Song, Y. Zhuang, W. Xu, C. Li, K. Ren, Cardiac scan: A non-contact and continuous heart-based user authentication system, in: Proc. Annu. Int. Conf. Mob. Comput. Networking, MOBICOM, Vol. Part F1312, 2017, pp. 315–328. H. Feng, K. Fawaz, K.G. Shin, Continuous authentication for voice assistants, in: Proc. Annu. Int. Conf. Mob. Comput. Networking, MOBICOM, vol. Part F1312, 2017, pp. 343–355. M.A.M. Isa, N.N. Mohamed, H. Hashim, S.F.S. Adnan, J. Manan, R. Mahmod, A lightweight and secure tftp protocol for smart environment, in: 2012 IEEE Symposium in Computer Applications and Industrial Electronics, ISCAIE, 2012, pp. 302–306. J. Granjal, E. Monteiro, J.S. Silva, On the effectiveness of end- to-end security for internet-integrated sensing applications, in: 2012 IEEE International Conference in Green Computing and Communications, GreenCom, 2012, pp. 87–93. C. Li, et al. HlcAuth: Key-free and secure communications via home-limited channel, in: ASIACCS 2018 - Proc. 2018 ACM Asia Conf. Comput. Commun. Secur., 2018, pp. 29–35. Chong, 2019, Human factors in the privacy and security of the internet of things, Ergon. Des., 27, 5 Xie, 2014, An item-level access control framework for inter-system security in the internet of things, Appl. Mech. Mater., 1430, 10.4028/www.scientific.net/AMM.548-549.1430 Hoff, 2015, Trust in automation: Integrating empirical evidence on factors that influence trust, Hum. Factors, 57, 407, 10.1177/0018720814547570 M. Patton, E. Gross, R. Chinn, S. Forbis, L. Walker, H. Chen, Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT), in: Joint Intelligence and Security Informatics Conference, JISIC, 2014, pp. 232–235. Z. Zhang, RETRACTED ARTICLE: Research on RMB internationalization path, in: Proc. 2nd Int. Conf. Artif. Intell. Manag. Sci. Electron. Commer., AIMSEC 2011, 2011, pp. 578–581. S. Ferdous, R.K. Hussein, O. Madini, A. Alharthi, R.J. Walters, G. Wills, Threat Taxonomy for Cloud of Things, in: Internet of Things and Big Data Analytics, United Scholars Publications, USA, 2017, pp. 1–27.