Analysis on functionalities and security features of Internet of Things related protocols

被引:15
作者
Rizzardi, Alessandra [1 ]
Sicari, Sabrina [1 ]
Coen-Porisini, Alberto [1 ]
机构
[1] Univ Insubria, Dipartimento Sci Teor & Applicate, Via Rossi 9, I-21100 Varese, Italy
关键词
Internet of things; Communication protocols; Security; Authentication; Confidentiality; Integrity; Authorization; MUTUAL AUTHENTICATION PROTOCOL; ACCESS-CONTROL; LIGHTWEIGHT; IOT; BLOCKCHAIN; TAXONOMY; SCHEME;
D O I
10.1007/s11276-022-02999-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) paradigm is characterized by the adoption of different protocols and standards to enable communications among heterogeneous and, often, resource-constrained devices. The risk of violation is high due to the wireless nature of the communication protocols usually involved in the IoT environments (e.g., e-health, smart agriculture, industry 4.0, military scenarios). For such a reason, proper security countermeasures must be undertaken, in order to prevent and react to malicious attacks, which could hinder the data reliability. In particular, the following requirements should be addressed: authentication, confidentiality, integrity, and authorization. This paper aims at investigating such security features, which are often combined with native functionalities, in the most known IoT-related protocols: MQTT, CoAP, LoRaWAN, AMQP, RFID, ZigBee, and Sigfox. The advantages and weaknesses of each one will be revealed, in order to point out open issues and best practices in the design of efficient and robust IoT network infrastructure.
引用
收藏
页码:2857 / 2887
页数:31
相关论文
共 94 条
  • [21] Choi K., 2012, INT C INF NETW 2012
  • [22] Colitti W., 2011, Extending the Internet to Low power and Lossy Networks
  • [23] Coman F.L., 2019, 2019 Global IoT Summit, P1, DOI 10.1109/GIOTS.2019.8766430
  • [24] Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources
    Cruz-Piris, Luis
    Rivera, Diego
    Marsa-Maestre, Ivan
    de la Hoz, Enrique
    Velasco, Juan R.
    [J]. SENSORS, 2018, 18 (03)
  • [25] Blockchain for Internet of Things: A Survey
    Dai, Hong-Ning
    Zheng, Zibin
    Zhang, Yan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8076 - 8094
  • [26] A Lightweight Blockchain based Two Factor Authentication Mechanism for LoRaWAN Join Procedure
    Danish, Syed Muhammad
    Lestas, Marios
    Asif, Waqar
    Qureshi, Hassaan Khaliq
    Rajarajan, Muttukrishnan
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
  • [27] Taxonomy and analysis of security protocols for Internet of Things
    Das, Ashok Kumar
    Zeadally, Sherali
    He, Debiao
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 110 - 125
  • [28] Dawaliby S, 2016, IEEE 12 INT C WIR MO, DOI 10.1109/WiMOB.2016.7763264
  • [29] Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices
    Dinculeana, Dan
    Cheng, Xiaochun
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (05):
  • [30] Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication
    Diro, Abebe
    Reda, Haftu
    Chilamkurti, Naveen
    Mahmood, Abdun
    Zaman, Noor
    Nam, Yunyoung
    [J]. IEEE ACCESS, 2020, 8 : 60539 - 60551