Taxonomy and analysis of security protocols for Internet of Things

被引:117
作者
Das, Ashok Kumar [1 ]
Zeadally, Sherali [2 ]
He, Debiao [3 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[2] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
[3] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 89卷
基金
中国国家自然科学基金;
关键词
Access control; Authentication; Identity management; IoT; Key management; Security; Privacy; Sensing devices; ACCESS-CONTROL PROTOCOL; WIRELESS SENSOR NETWORKS; KEY-ESTABLISHMENT SCHEME; AUTHENTICATION PROTOCOL; USER AUTHENTICATION; IOT; MANAGEMENT; COMMUNICATION; ATTACKS;
D O I
10.1016/j.future.2018.06.027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) is a system of physical as well as virtual objects (each with networking capabilities incorporated) that are interconnected to exchange and collect information locally or remotely over the Internet. Since the communication often takes place over the Internet, it is vulnerable to various security threats in an IoT environment. We first discuss essential security requirements that are needed to secure IoT environment. We also discuss the threat model and various attacks related to the IoT environment. We then present a taxonomy of security protocols for the IoT environment which includes important security services such as key management, user and device authentication, access control, privacy preservation, and identity management. We also present a comparative study of recently proposed IoT-related state-of-art security protocols in terms of various security and functionality features they support. Finally, we discuss some future challenges for loT security protocols that need to be addressed in the future. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:110 / 125
页数:16
相关论文
共 95 条
[1]  
ALMAHMUD A, 2012, INT J COMPUT APPL, V41, P18, DOI DOI 10.5120/5602-7858
[2]  
[Anonymous], 2002, P 9 ACM C COMPUT COM, DOI DOI 10.1145/586110.586117
[3]  
[Anonymous], 2016 IEEE 1 INT C PO
[4]  
[Anonymous], 2014, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing ISSNIP
[5]  
[Anonymous], 1979, Technical Report
[6]  
[Anonymous], PERFORMANCE COMP ELL
[7]  
[Anonymous], 2004, the third international symposium on Information processing in sensor networks
[8]   Holistic Privacy-Preserving Identity Management System for the Internet of Things [J].
Bernal Bernabe, Jorge ;
Hernandez-Ramos, Jose L. ;
Skarmeta Gomez, Antonio F. .
MOBILE INFORMATION SYSTEMS, 2017, 2017
[9]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[10]  
Blundo C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P471