Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges

被引:1
作者
Zhao, Qingsong [1 ,2 ,3 ]
Shu, Lei [1 ,4 ]
Li, Kailiang [1 ]
Ferrag, Mohamed Amine [5 ]
Liu, Ximeng [6 ]
Li, Yanbin [1 ]
机构
[1] Nanjing Agr Univ, Coll Artificial Intelligence, Nanjing 210031, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210023, Peoples R China
[3] State Key Lab Cryptol, Beijing 100878, Peoples R China
[4] Univ Lincoln, Sch Engn, Lincoln LN67TS, England
[5] Technol Innovat Inst, Artificial Intelligence & Digital Sci Res Ctr, Masdar City 9639, U Arab Emirates
[6] Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350108, Peoples R China
基金
中国国家自然科学基金;
关键词
Challenges; Internet of Things (IoT); privacy and security; security requirements; solar insecticidal lamps (SIL); AUTHENTICATION SYSTEM; IOT; ARCHITECTURE; LIGHTWEIGHT; INTEGRITY; SCHEME; TRUST;
D O I
10.1109/JAS.2023.123870
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Solar insecticidal lamps (SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things (IoT) has formed a new type of agricultural IoT, known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues. These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL, etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability, and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
引用
收藏
页码:58 / 73
页数:16
相关论文
共 105 条
[1]   C-FLAT: Control-Flow Attestation for Embedded Systems Software [J].
Abera, Tigist ;
Asokan, N. ;
Davi, Lucas ;
Ekberg, Jan-Erik ;
Nyman, Thomas ;
Paverd, Andrew ;
Sadeghi, Ahmad-Reza ;
Tsudik, Gene .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :743-754
[2]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[3]   Anonymous authentication for privacy-preserving IoT target-driven applications [J].
Alcaide, Almudena ;
Palomar, Esther ;
Montero-Castillo, Jose ;
Ribagorda, Arturo .
COMPUTERS & SECURITY, 2013, 37 :111-123
[4]   Low Power Data Integrity in IoT Systems [J].
Aman, Muhammad Naveed ;
Sikdar, Biplab ;
Chua, Kee Chaing ;
Ali, Anwar .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :3102-3113
[5]  
Ateniese G., 2008, P SECURECOMM, DOI [10.1145/1460877.1460889, DOI 10.1145/1460877.1460889]
[6]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[7]   A Data-Based Fault-Detection Model for Wireless Sensor Networks [J].
Bae, Jangsik ;
Lee, Meonghun ;
Shin, Changsun .
SUSTAINABILITY, 2019, 11 (21)
[8]   Securing the Web of Things with Role-Based Access Control [J].
Barka, Ezedine ;
Mathew, Sujith Samuel ;
Atif, Yacine .
CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 :14-26
[9]  
Bertino E., 1994, PROC C WORKSHOP SECU, P96
[10]   DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security [J].
Bi, Shengping ;
Hou, Tao ;
Wang, Tao ;
Liu, Yao ;
Lu, Zhuo ;
Pei, Qingqi .
PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), 2022, :222-232