Analysis on functionalities and security features of Internet of Things related protocols

被引:15
作者
Rizzardi, Alessandra [1 ]
Sicari, Sabrina [1 ]
Coen-Porisini, Alberto [1 ]
机构
[1] Univ Insubria, Dipartimento Sci Teor & Applicate, Via Rossi 9, I-21100 Varese, Italy
关键词
Internet of things; Communication protocols; Security; Authentication; Confidentiality; Integrity; Authorization; MUTUAL AUTHENTICATION PROTOCOL; ACCESS-CONTROL; LIGHTWEIGHT; IOT; BLOCKCHAIN; TAXONOMY; SCHEME;
D O I
10.1007/s11276-022-02999-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) paradigm is characterized by the adoption of different protocols and standards to enable communications among heterogeneous and, often, resource-constrained devices. The risk of violation is high due to the wireless nature of the communication protocols usually involved in the IoT environments (e.g., e-health, smart agriculture, industry 4.0, military scenarios). For such a reason, proper security countermeasures must be undertaken, in order to prevent and react to malicious attacks, which could hinder the data reliability. In particular, the following requirements should be addressed: authentication, confidentiality, integrity, and authorization. This paper aims at investigating such security features, which are often combined with native functionalities, in the most known IoT-related protocols: MQTT, CoAP, LoRaWAN, AMQP, RFID, ZigBee, and Sigfox. The advantages and weaknesses of each one will be revealed, in order to point out open issues and best practices in the design of efficient and robust IoT network infrastructure.
引用
收藏
页码:2857 / 2887
页数:31
相关论文
共 94 条
  • [1] Security in Internet of Things: issues, challenges, taxonomy, and architecture
    Adat, Vipindev
    Gupta, B. B.
    [J]. TELECOMMUNICATION SYSTEMS, 2018, 67 (03) : 423 - 441
  • [2] Al-Sarawi Shadi, 2017, 2017 8th International Conference on Information Technology (ICIT). Proceedings, P685, DOI 10.1109/ICITECH.2017.8079928
  • [3] Internet of Things security: A survey
    Alaba, Fadele Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Alotaibi, Faiz
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 10 - 28
  • [4] Albalas F, 2018, INT ARAB J INF TECHN, V15, P550
  • [5] A survey on boosting IoT security and privacy through blockchain Exploration, requirements, and open issues
    Alfandi, Omar
    Khanji, Salam
    Ahmad, Liza
    Khattak, Asad
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (01): : 37 - 55
  • [6] Alliance OM, 2018, OMA, V6, P21
  • [7] Alphand O, 2018, IEEE WCNC
  • [8] Alqahtani B., 2020, 2020 2 INT C COMP IN, P1, DOI [10.1109/ICCIS49240.2020.9257652, DOI 10.1109/ICCIS49240.2020.9257652]
  • [9] Andy S, 2017, 2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), P571
  • [10] Internet of Mobile Things: Overview of LoRaWAN, DASH7, and NB-IoT in LPWANs Standards and Supported Mobility
    Ayoub, Wael
    Samhat, Abed Ellatif
    Nouvel, Fabienne
    Mroue, Mohamad
    Prevotet, Jean-Christophe
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1561 - 1581