A roadmap for security challenges in the Internet of Things

被引:231
作者
Sfar, Arbia Riahi [1 ,2 ]
Natalizio, Enrico [2 ]
Challal, Yacine [3 ]
Chtourou, Zied [1 ]
机构
[1] Mil Acad, VRIT Lab, Nabeul, Tunisia
[2] Univ Technol Compiegne, Sorbonne Univ, CNRS, Heudiasyc UMR 7253, CS 60319, F-60203 Compiegne, France
[3] Ctr Rech Informat Sci & Tech CERIST, Ecole Natl Super Informat ESI, Lab Methodes Concept Syst LMCS, Algiers, Algeria
关键词
Internet of Things; Systemic and cognitive approach; Security; Privacy; Trust; Identification; Access control; ACCESS-CONTROL; BLOCK CIPHER; RFID PRIVACY; TRUST; MANAGEMENT; AUTHENTICATION; IMPLEMENTATION; ARCHITECTURES; PREDICTION; DESIGN;
D O I
10.1016/j.dcan.2017.04.003
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency) as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the IoT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the IoT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current standardization activities are surveyed and discussed to the ensure the security of IoT components and applications.
引用
收藏
页码:118 / 137
页数:20
相关论文
共 160 条
[1]  
3rd Generation Partnership Project, 2005, 35202 3GPP TS
[2]   Data Management for the Internet of Things: Design Primitives and Solution [J].
Abu-Elkheir, Mervat ;
Hayajneh, Mohammad ;
Abu Ali, Najah .
SENSORS, 2013, 13 (11) :15582-15612
[3]  
Abyaneh M.R.S., 2012, TECH REP
[4]  
Aggarwal C.C., 2013, MANAGING MINING SENS, P383, DOI DOI 10.1007/978-1-4614-6309-2_12
[5]  
Ahson S. A., 2008, RFID Handbook: Applications, Technology, Security, and Privacy
[6]  
Anjali S. Khurana, INT J COMPUT SCI COM, V4
[7]  
[Anonymous], 2015, P IEEEACS 12 INT C C
[8]  
[Anonymous], 2015, IACR CRYPTOLOGY EPRI
[9]  
[Anonymous], 1988, Trust: Making and Breaking Cooperative Relations, DOI [DOI 10.2307/591021, 10.2307/2234217]
[10]   Assessing efficiency of trust management in peer-to-peer systems [J].
Aringhieri, R ;
Damiani, E ;
di Vimercati, SD ;
Samarati, P .
Fourteenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Proceedings, 2005, :368-373