Securing the Internet of Things: Challenges, threats and solutions

被引:155
作者
Grammatikis, Panagiotis I. Radoglou [1 ]
Sarigiannidis, Panagiotis G. [1 ]
Moscholios, Ioannis D. [2 ]
机构
[1] Univ Western Macedonia, Dept Informat & Telecommun Engn, Kozani, Greece
[2] Univ Peloponnese, Dept Informat & Telecommun, Tripolis, Greece
关键词
Countermeasures; Cyberattacks; Internet of Things; Privacy; Protocols; Risk assessment; Security; INTRUSION DETECTION; OPERATING SYSTEM; ACCESS-CONTROL; ATTACKS; PRIVACY; IOT; COUNTERMEASURES; PROTOCOLS; NETWORKS; SERVICE;
D O I
10.1016/j.iot.2018.11.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is the next technological leap that will introduce significant improvements to various aspects of the human environment, such as health, commerce, and transport. However, despite the fact that it may bring beneficial economic and social changes, the security and the privacy protection of objects and users remain a crucial challenge that has to be addressed. Specifically, now the security measures have to monitor and control the actions both of users and objects. However, the interconnected and independent nature of objects, as well as their constrained capabilities regarding the computing resources make impossible the applicability of the conventional security mechanisms. Moreover, the heterogeneity of various technologies which the IoT combines increases the complexity of the security processes, since each technology is characterized by different vulnerabilities. Furthermore, the tremendous amounts of data which is generated by the multiple interactions between the users and objects or among the objects make harder their management and the functionality of the access control systems. In this context, this paper intends to provide a comprehensive security analysis of the IoT, by examining and assessing the potential threats and countermeasures. More detailed, after studying and determining the security requirements in the context of the IoT, we implement a qualitative and quantitative risk analysis, investigating the security threats per layer. Subsequently, based on this process we identify the suitable countermeasures and their limitations, paying special attention to the IoT protocols. Finally, we provide research directions for future work. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:41 / 70
页数:30
相关论文
共 148 条
[1]  
Aditya, 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE), P428, DOI 10.1109/ICACCE.2018.8441725
[2]  
Aggarwal R. K., 2017, 2017 2 INT C TEL NET, P1
[3]   IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey [J].
Ahmed, Amjed Sid Ahmed Mohamed Sid ;
Hassan, Rosilah ;
Othman, Nor Effendy .
IEEE ACCESS, 2017, 5 :18187-18210
[4]   Securing the Neighbour Discovery Protocol in IPv6 State-ful Address Auto-configuration [J].
Ahmed, Nadeem ;
Sadiq, Adeel ;
Farooq, Anum ;
Akram, Rabia .
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, :96-103
[5]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[6]   A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems [J].
Alcaraz, Cristina ;
Lopez, Javier .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (04) :419-428
[7]  
Alexander A., 2012, Rpl: Ipv6 routing protocol for low-power and lossy networks, P157, DOI DOI 10.17487/RFC6550
[8]   Designing Future Disaster Response TeamWearables from a Grounding in Practice [J].
Alharthi, Sultan A. ;
Sharma, Hitesh Nidhi ;
Sunka, Sachin ;
Dolgov, Igor ;
Toups, Zachary O. .
PROCEEDINGS OF THE TECHNOLOGY, MIND, AND SOCIETY CONFERENCE (TECHMINDSOCIETY'18), 2018,
[9]  
Alphand O, 2018, IEEE WCNC
[10]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42