The rise of ransomware and emerging security challenges in the Internet of Things

被引:155
作者
Yaqoob, Ibrar [1 ]
Ahmed, Ejaz [1 ]
Rehman, Muhammad Habib Ur [2 ]
Ahmed, Abdelmuttlib Ibrahim Abdalla [1 ]
Al-garadi, Mohammed Ali [3 ]
Imran, Muhammad [4 ]
Guizani, Mohsen [5 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Ctr Mobile Cloud Comp Res, Kuala Lumpur, Malaysia
[2] COMSATS Inst Informat Technol, Wah Campus, Islamabad 47040, Pakistan
[3] Univ Malaya, Dept Informat Syst, Kuala Lumpur, Malaysia
[4] King Saud Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[5] Univ Idaho, Dept Elect & Comp Engn, Moscow, ID 83843 USA
关键词
Internet of Things; Security; Authentication; Ransomware; Trust; OF-THINGS; KEY ESTABLISHMENT; PRIVACY; IOT; TAXONOMY; ARCHITECTURE; PROTOCOLS; ISSUES; TRUST; POWER;
D O I
10.1016/j.comnet.2017.09.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing miniaturization of smartphones, computers, and sensors in the Internet of Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have become key concerns. Traditional security mechanisms are no longer applicable because of the involvement of resource constrained devices, which require more computation power and resources. This paper presents the ransomware attacks and security concerns in IoT. We initially discuss the rise of ransomware attacks and outline the associated challenges. Then, we investigate, report, and highlight the state-of-the-art research efforts directed at IoT from a security perspective. A taxonomy is devised by classifying and categorizing the literature based on important parameters (e.g., threats, requirements, IEEE standards, deployment level, and technologies). Furthermore, a few credible case studies are outlined to alert people regarding how seriously IoT devices are vulnerable to threats. We enumerate the requirements that need to be met for securing IoT. Several indispensable open research challenges (e.g., data integrity, lightweight security mechanisms, lack of security software's upgradability and patchability features, physical protection of trillions of devices, privacy, and trust) are identified and discussed. Several prominent future research directions are provided. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:444 / 458
页数:15
相关论文
共 89 条
[1]  
Adat V., 2017, TELECOMMUN SYST, P1
[2]   INTERNET-OF-THINGS-BASED SMART ENVIRONMENTS: STATE OF THE ART, TAXONOMY, AND OPEN RESEARCH CHALLENGES [J].
Ahmed, Ejaz ;
Yaqoob, Ibrar ;
Gani, Abdullah ;
Imran, Muhammad ;
Guizani, Mohsen .
IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) :10-16
[3]   Securing Software Defined Networks: Taxonomy, Requirements, and Open Issues [J].
Akhunzada, Adnan ;
Ahmed, Ejaz ;
Gani, Abdullah ;
Khan, Muhammad Khurram ;
Imran, Muhammad ;
Guizani, Sghaier .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) :36-44
[4]   Lightweight Encryption for Smart Home [J].
Al Salami, Sanaah ;
Baek, Joonsang ;
Salah, Khaled ;
Damiani, Ernesto .
PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, :382-388
[5]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[6]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[7]   An Automatic Digital Audio Authentication/Forensics System [J].
Ali, Zulfiqar ;
Imran, Muhammad ;
Alsulaiman, Mansour .
IEEE ACCESS, 2017, 5 :2994-3007
[8]  
Alkeem EAL, 2015, INT CONF INTERNET, P70, DOI 10.1109/ICITST.2015.7412059
[9]  
[Anonymous], 2014, INT J COMPUT APPL
[10]  
[Anonymous], WIRELESS COMMUNICATI