Top 12 layer-wise security challenges and a secure architectural solution for Internet of Things

被引:4
作者
Aryavalli, Sriranga Narasimha Gandhi [1 ]
Kumar, Hemantha [1 ]
机构
[1] Univ Mysore UOM, Dept Studies Comp Sci, Mysore, India
关键词
Network Intrusion Prevention Systems (NIPS); Network Intrusion Detection Systems (NIDS); Internet of Things (IoT); Smart Internet of Things (SIoT); Secure Architecture Design; Secure Design; Secure Engineering; Unified Secure Architecture Solution for IoT;
D O I
10.1016/j.compeleceng.2022.108487
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Digitalization, intelligent virtual assistants, and smart consumer products prepare us for life at every stage. Smart IoT, Sensor nodes, software communicate with one another via voice and emotions, simplifying our lives. Smart IoT is becoming more prevalent in our daily lives. Even though the use of Smart IOTs has grown in Geometric progression, the security of these devices remains traditional. Technically, most security discussions revolve around the implementation of better Network Intrusion Prevention/Detection Systems (NIPS/NIDS), the installation of a traditional firewall, or the use of proxy scanners, which is the standard recommendation of se-curity vendors. All architectures are rooted in the same zeal that drives cyber warfare. However, when considering the Narrowband Internet of Things, the packet size is too small, and the memory and processors are so small that they cannot hold the packets for inspections, and the lucrative protocols will not work. Malicious hackers, BOTs, Trozens, and Honeypots may tamper with and virtually control these smart Internet of Things (IoT) to steal/tamper sensitive infor-mation for filthy lucre, financial reward, or, to put it simply, money in this cyber warfare. All of these issues stem from a lack of proper security design controls, architectural security flaws, and a failure to apply Secure by Design principles. Fixing these security controls earlier in the process will save us a significant amount of time, energy, and money spent on repairing broken IoT se-curity flaws and performance aesthetics. If we consider the Shift Left Secure by Design/Archi-tecture Journey in the Internet of Things Security Architecture, these Architectural/Design flaws can be identified in earlier stages and will help the delivery teams to plan necessary security controls in the IoT use cases.In this paper, the author discusses Layer-wise Security Challenges, Attack Vectors, and Architectural Flaws, and proposes a secure architectural solution for the Internet of Things (IoT) that assists delivery teams in securely designing/architecting resource -intensive smart Internet of Things (IoT)/Narrowband (NIoT) use cases earlier in the Life cycle by employing the Secure Design Shift Left approach. In this smart digital IoT era, the author also suggests future research directions for future generations to increase security.
引用
收藏
页数:15
相关论文
共 18 条
  • [1] Ahmed Khalaf Bashar, 2019, IEEE ACCESS, P2169
  • [2] Alhammadi NAM, 2022, J GLOB SCI RES, V7
  • [3] [Anonymous], INTERNET THINGS TEDD
  • [4] [Anonymous], WHO SHOULD BEAR COST
  • [5] Botnets and Internet of Things Security
    Bertino, Elisa
    Islam, Nayeem
    [J]. COMPUTER, 2017, 50 (02) : 76 - 79
  • [6] Connected Car: Technologies, Issues, Future Trends
    Coppola, Riccardo
    Morisio, Maurizio
    [J]. ACM COMPUTING SURVEYS, 2016, 49 (03)
  • [7] Ferreira AG, 2016, PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), P1920, DOI 10.1109/ICIT.2016.7475060
  • [8] Guardian The., 2016, Guardian
  • [9] Hafeez Ibbad., 2016, P 2016 ACM WORKSHOP, P55
  • [10] Herzberg B., 2016, Breaking Down Mirai: An IoT DDoS Botnet Analysis