Taxonomy and analysis of security protocols for Internet of Things

被引:117
作者
Das, Ashok Kumar [1 ]
Zeadally, Sherali [2 ]
He, Debiao [3 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[2] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
[3] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 89卷
基金
中国国家自然科学基金;
关键词
Access control; Authentication; Identity management; IoT; Key management; Security; Privacy; Sensing devices; ACCESS-CONTROL PROTOCOL; WIRELESS SENSOR NETWORKS; KEY-ESTABLISHMENT SCHEME; AUTHENTICATION PROTOCOL; USER AUTHENTICATION; IOT; MANAGEMENT; COMMUNICATION; ATTACKS;
D O I
10.1016/j.future.2018.06.027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) is a system of physical as well as virtual objects (each with networking capabilities incorporated) that are interconnected to exchange and collect information locally or remotely over the Internet. Since the communication often takes place over the Internet, it is vulnerable to various security threats in an IoT environment. We first discuss essential security requirements that are needed to secure IoT environment. We also discuss the threat model and various attacks related to the IoT environment. We then present a taxonomy of security protocols for the IoT environment which includes important security services such as key management, user and device authentication, access control, privacy preservation, and identity management. We also present a comparative study of recently proposed IoT-related state-of-art security protocols in terms of various security and functionality features they support. Finally, we discuss some future challenges for loT security protocols that need to be addressed in the future. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:110 / 125
页数:16
相关论文
共 95 条
[51]   Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks [J].
Jiang, Qi ;
Zeadally, Sherali ;
Ma, Jianfeng ;
He, Debiao .
IEEE ACCESS, 2017, 5 :3376-3392
[52]  
Johnson D., 1999, TECHNICAL REPORT COR
[53]   Smart Cities: Concepts, Architectures, Research Opportunities [J].
Khatoun, Rida ;
Zeadally, Sherali .
COMMUNICATIONS OF THE ACM, 2016, 59 (08) :46-57
[54]   Enhanced Novel Access Control Protocol over Wireless Sensor Networks [J].
Kim, Hyun-Sung ;
Lee, Sung-Woon .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2009, 55 (02) :492-498
[55]   Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY [J].
Kim Thuat Nguyen ;
Oualha, Nouha ;
Laurent, Maryline .
INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, 2016, 9895 :19-34
[56]   Survey on secure communication protocols for the Internet of Things [J].
Kim Thuat Nguyen ;
Laurent, Maryline ;
Oualha, Nouha .
AD HOC NETWORKS, 2015, 32 :17-31
[57]  
Kim YH, 2006, LECT NOTES COMPUT SC, V4217, P437
[58]  
Kocher P., 1999, LECT NOTES COMPUTER, V1666, P388, DOI DOI 10.1007/3-540-48405-1_25
[59]   HMQV: A high-performance secure Diffle-Hellman protocol [J].
Krawczyk, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 :546-566
[60]   An Energy-Efficient Access Control Scheme for Wireless Sensor Networks based on Elliptic Curve Cryptography [J].
Le, Xuan Hung ;
Lee, Sungyoung ;
Butun, Ismail ;
Khalid, Murad ;
Sankar, Ravi ;
Kim, Miso ;
Han, Manhyung ;
Lee, Young-Koo ;
Lee, Heejo .
JOURNAL OF COMMUNICATIONS AND NETWORKS, 2009, 11 (06) :599-606