Perception layer security in Internet of Things

被引:121
作者
Khattak, Hasan Ali [1 ]
Shah, Munam Ali [2 ]
Khan, Sangeen [3 ]
Ali, Ihsan [4 ]
Imran, Muhammad [5 ]
机构
[1] COMSATS Univ, Comp Sci, Islamabad, Pakistan
[2] COMSATS Univ, Islamabad, Pakistan
[3] COMSATS Univ, Comp Sci Dept, Islamabad, Pakistan
[4] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[5] King Saud Univ, Coll Appl Comp Sci, Riyadh, Saudi Arabia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 100卷 / 144-164期
关键词
Perception layer; Internet of Things; Security; Radio frequency identification; Wireless sensor networks; WIRELESS SENSOR NETWORKS; CYBER-PHYSICAL SYSTEMS; RFID-TAGS; AD HOC; IOT; ATTACKS; CHALLENGES; ISSUES; COMMUNICATION; ARCHITECTURE;
D O I
10.1016/j.future.2019.04.038
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Things (IoT) is one of the rising innovations of the current era that has largely attracted both the industry and the academia. Life without the IoT is entirely indispensable. To dispel the doubts, if any, about the widespread adoption, the IoT certainly necessitates both technically and logically correct solutions to ensure the underlying security and privacy. This paper explicitly investigates the security issues in the perception layer of IoT, the countermeasures and the research challenges faced for large scale deployment of IoT. Perception layer being one of the important layers in IoT is responsible for data collection from things and its successful transmission for further processing. The contribution of this paper is twofold. Firstly, we describe the crucial components of the IoT (i.e., architectures, standards, and protocols) in the context of security at perception layer followed by IoT security requirements. Secondly, after describing the generic IoT-layered security, we focus on two key enabling technologies (i.e., RFID and sensor network) at the perception layer. We categorize and classify various attacks at different layers of both of these technologies through taxonomic classification and discuss possible solutions. Finally, open research issues and challenges relevant to the perception layer are identified and analyzed. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:144 / 164
页数:21
相关论文
共 245 条
[111]  
Khattak HA, 2014, INT BHURBAN C APPL S, P499, DOI 10.1109/IBCAST.2014.6778196
[112]  
Kinoshita S., 2004, Transactions of the Information Processing Society of Japan, V45, P2007
[113]   Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures [J].
Komninos, Nikos ;
Philippou, Eleni ;
Pitsillides, Andreas .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1933-1954
[114]  
Kulkarni PH, 2016, 2016 International Conference on Internet of Things and Applications (IOTA), P107, DOI 10.1109/IOTA.2016.7562704
[115]  
Lakhanpal R, 2016, INT CONF COMPUT POW, P283, DOI 10.1109/ICCPEIC.2016.7557211
[116]  
Laurie Adam, 2007, Network Security, V2007, P4, DOI 10.1016/S1353-4858(07)70080-6
[117]   6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach [J].
Le, Anhtuan ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Aiash, Mahdi ;
Luo, Yuan .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (09) :1189-1212
[118]   Building smart grid to power the next century in Taiwan [J].
Lee, Amy H. I. ;
Chen, Hsing Hung ;
Chen, Jack .
RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2017, 68 :126-135
[119]   Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things [J].
Li, Fagen ;
Xiong, Pan .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3677-3684
[120]  
Li L., 2012, P 2012 INT C MEAS IN, V1, P374