SN Computer Science
(2020) 1:193
https://doi.org/10.1007/s42979-020-00201-3
SURVEY ARTICLE
Security Considerations for Internet of Things: A Survey
Anca Jurcut1
· Tiberiu Niculcea1 · Pasika Ranaweera1 · Nhien‑An Le‑Khac1
Received: 27 January 2020 / Accepted: 18 May 2020
© Springer Nature Singapore Pte Ltd 2020
Abstract
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators, mobiles, computers, meters, or even
vehicles is a critical requirement for the current era. These inter-networked connections are serving the emerging applications
home and building automation, smart cities and infrastructure, smart industries, and smart-everything. However, the security
of these connected Internet of things (IoT) plays a centric role with no margin for error. After a review of the relevant, online
literature on the topic and after looking at the market trends and developments, one can notice that there are still concerns
with regard to security in IoT products and services. This paper is focusing on a survey on IoT security and aims to highlight
the most significant problems related to safety and security in the IoT ecosystems. This survey identifies the general threat
and attack vectors against IoT devices while highlighting the flaws and weak points that can lead to breaching the security.
Furthermore, this paper presents solutions for remediation of the compromised security, as well as methods for risk mitigation, with prevention and improvement suggestions.
Keywords IoT security · IoT threats · Risk mitigation · Quantum computing · Blockchain
Introduction
Internet of things (IoT) is the future of the Internet that will
interconnect billions of intelligent communicating ’things’
to cater diverse services to Information Technology (IT)
users on a daily basis [92]. The IoT continues to affect the
whole aspects of one’s private and professional life. In the
industrial sector, for example, smart devices will evolve to
become active contributors to the business process improving the revenues of equipment manufacturers, Internet-based
services providers, and application developers [3]. The IoT
security is the area of endeavour concerned with safeguarding connected devices and networks in the Internet of things
environment.
* Anca Jurcut
[email protected]
Tiberiu Niculcea
[email protected]
Pasika Ranaweera
[email protected]
Nhien-An Le-Khac
[email protected]
1
School of Computer Science, University College Dublin,
Dublin, Ireland
As IoT devices are interconnecting at every level and everywhere, interacting with each other and the human beings,
it is evident that security takes the spotlight. Securing these
devices will become everyone’s priority, from manufacturers to silicon vendors (or IP developers), to software and
application developers, and to the final consumer, the beneficiary of the security “recipe” that will accompany these
IoT products. Together, they need to adapt to the market
demands, innovate and improve processes, grasp new skills
and learn new methods, raise the awareness, and elaborate
new training and curricula programs.
The wearables are a hallmark of IoT, with designs that
incorporate practical functions and features. From health to
fashion and fitness-oriented devices, wearables make technology pervasive by interweaving it into daily life [105]. The
main goal of these apparatus is to gather data such as heartbeat, burned calories, body or environment temperature, and
so on and send it to the user for information purposes [8].
The wearables need to store the data locally or to the cloud,
to generate historical reports about the achieved progress
of the user.
Undoubtedly, the smart home collects as well an enormous amount of private information. For example, it may
store the records about the absence or movements of the
inhabitants, the temperature levels of the house in different
SN Computer Science
Vol.:(0123456789)
193
Page 2 of 19
rooms, the water and electricity usage, and so on [139].
Much like the emerging smart homes, the smart office or
smart building automatically controls energy-consuming
devices such as heaters and lights to achieve a better efficiency without human intervention or micromanaging
[131].
Smart cities use IoT devices like the connected sensors,
lights, and meters to collect and analyse data for further
usage in improving the infrastructure, public utilities and
services, and much more [49]. The use cases are countless,
but arguably the most important implementation is the smart
grids, which helps tremendously with resource conservation
[19]. In the smart healthcare domain, IoT technologies have
many applications, and some of them are the tracking of
objects and people, including patients, staff or ambulance,
identification of individuals based on pervasive shared biometrics, and automatic data gathering and sensing [141].
The industrial Internet of things (IIoT), known as Industry 4.0, revolutionizes the manufacturing by enabling the
addition and accessibility of far greater amounts of data, at
higher speeds, and a lot more efficiently than before [16].
IIoT networks of smart devices allow industrial organizations to open big data containers and connect people, data,
and processes from the factory floors to the offices of their
executive leaders. Business managers can use IIoT data to
get a full and accurate view of their enterprise health, which
will assist them to make better decisions.
The IoT is also revolutionizing the supply chain management (SCM), a foundational business process that impacts
nearly every enterprise [114]. Some of the possible use cases
for SCM are asset tracking and fleet management. Asset
tracking is possible based on radio frequency identification (RFID) tags or subscriber identity/identification module (SIM) cards with global coverage. This facility allows
a supply chain manager to locate where a product, truck,
or shipping container is, at one given time. Also, the fleet
management enhances operators to know whether asset reliability, availability, and efficiency are all optimized.
The Internet of things is present at every level and sector
of the society and will be even more rooted in, to become the
new everyday normal. As IoT is everywhere, so should privacy and security be, inbuilt from the schematics of a product designer, until the last technician to influence in a way
or the other, the finite apparatus. These devices undoubtedly will allow humans to become more efficient with their
time, energy, and money in ways that are easy to forecast.
Still, the lack of proper security frameworks and safeguards
could lead to privacy being compromised and valuable data
exfiltration to become possible. The convenience that IoT
products and services bring to the lives of individuals has
its price tag, and it could turn out to be a high bill in the end
if security is not taken seriously by all the players of the IoT
ecosystem.
SN Computer Science
SN Computer Science
(2020) 1:193
Contribution
This paper addresses some of the trending problems in
the IoT, such as the ineffective identity, access, and trust
management, by presenting solutions that are available
in the market. The review of the most common threats
and attacks raises the awareness about the importance of
security, whereas exploring the reasons for safety breach
boosts the understanding about why the IoT devices are
still vulnerable. Depending on the fault tolerance capabilities of the apparatus in the aftermath of an attack, the
remediation is not always possible, leading to the immediate replacement of the device for a new one. The operation
is costly, labour-intensive, and time-consuming. Therefore,
risk mitigation needs to be considered by everyone playing
a role in the market. Mitigating risk starts with preventing
the threat from happening. This survey offers guidance for
threat and attack prevention by:
• showing how to raise the level and posture of security
• describing best practices for product design, manufac-
turing and development
• advising the consumers and lawmakers to be security-
minded
• proposing a new design: Another important step in the
reduction of the risk is to innovate and seek improvement.
This research proposes a new design, with mentions of
disruptive technologies in order to replace the usage of
the IT-related system and network models in the IoT ecosystem. The study elaborates as well on the issues posed
by the scalability, complexity, and management of the IoT
networks and identifies solutions for addressing it. With
the advancement of quantum computing, big data and artificial intelligence (AI), predictive data analytics plays an
important role not only in forecasting the future maintenance or the need for process optimization, but also in
identifying device security weaknesses, data breach, and
future possible attacks, before they even happen.
Paper Organization
Rest of the paper is organized into five sections. Section “ Related Work” summarizes the related surveys
and researches that focus on IoT security aspects. In that
section, we have attempted to classify the material under
general, identity management, access control, and trust
management. General IoT threats and vulnerabilities are
presented in Sect. “General IoT Threats, Attacks, andVulnerabilities” where a summary of the threats and attacks
SN Computer Science
(2020) 1:193
are tabulated in Table 1. Our main contribution of this
paper is mentioned in Sect. “Risk Mitigation” that includes
the subsections on risk prevention and security improving
practices. Section “Discussion” discusses the overall contribution of the paper, while Sect. “Conclusions” mentions
the concluding remarks to the paper. The overall structure
of the paper is depicted in Fig. 1.
Related Work
While reviewing the existing work on the IoT security, a few
research papers were chosen as relevant to this study and
synthesized within this section. Looking at the market trends
and developments, one can notice that there are still concerns with regard to security in IoT products and services.
Zhao et al. [154] conducted a survey on IoT security that
expounds security issues related to the three-layer structure
of IoT. The three layers of perception, network, and application are investigated against information, physical, and management security. As perception layer issues, node capture,
fake nodes, malicious data, denial of service (DoS), timing,
routing threats, side-channel attacks (SCAs), and replay
attacks are identified. Similarly, network layer and application layer security issues are presented, while adoptable
security measures are mentioned for each layer to mitigate
the risks.
Ammar et al. [5] surveyed IoT frameworks on the emphasis of security and privacy. This paper clarifies the proposed
Fig. 1 Structure of the paper
Page 3 of 19
193
architecture, and hardware sepcand points out the security
features for 8 IoT frameworks. The considered frameworks
include Amazon Web Service (AWS) IoT, ARM mbed IoT,
Azure IoT suite, Brillo/Weave, Calvin, HomeKit, Kura, and
SmartThings. Authentication, access control, communication, cryptography aspects of security are compared with
these novel platforms. This is a comprehensive survey that
provide valuable insights to IoT developers in selecting the
most suited platform for their application.
Yang et al. [148] conducted a survey that covers the segments: limitations of IoT devices and their solutions, classification of IoT attacks, authentication and access control
mechanisms, and security analysis of different layers. The
paper identifies the battery life, and high-level computations
required for employing strong cryptographic primitives are
the main limitations of IoT devices. As solutions, energy
harvesting and utilizing light-weight security protocols are
proposed. Various existing IoT authentication schemes and
architectures are presented, while security in perception, network, transport, and application layer are discussed.
Lin et al. [96] presented an overview of IoT system architecture, enabling technologies, security, and privacy issues,
while discussing the integration of IoT with edge/fog computing platforms for various applications. Authors are distinguishing cyber-physical systems (CPSs) with IoT stating
that CPS is a vertical architecture that forms separate CPS
systems that do not interconnect, while IoT is presented as a
networking infrastructure that interconnects various systems
for resource sharing, analysis, and management. Confidentiality, integrity, availability, identification/authentication,
privacy, and trust are discussed as security features of IoT.
Moreover, possible security attacks for different layers are
presented, while privacy aspects of IoT are presented for
data collection, data aggregation, data mining, and data analytic cases.
Granjal et al. [53] conducted a comprehensive survey
for analyzing existing communication protocols to identify
security requirements in the intent of securing the communication channels. Protocols available for physical (PHY),
media access control (MAC), network/routing, and application layers were extensively analysed for their security standards to derive security requirements. Among those, IPv6
over low-power wireless personal area networks (6LoWPAN) and routing protocol for low-power and lossy networks
(RPL) protocols were investigated thoroughly due to their
wide adaptability in future IoT applications. Moreover, open
research challenges are addressed in accordance with the
identified security requirements.
Kliarsky [82] reviewed the existing threats, vulnerabilities, attacks, and intrusion detection methods that apply to
IoT. The Open Web Application Security Project (OWASP)
was identified as a trusted source to be informed of common threats and vulnerabilities. OWASP has published a
SN Computer Science
193
Page 4 of 19
list of what it is considered to be the top IoT vulnerabilities
and mentions username enumeration and weak passwords
as the top vulnerabilities. The paper referred the IoT Reference Model published by Cisco (presented in [29]) to
identify possible attacks at every layer and then depicts the
IoT communication stack by looking at some common IoT
application and link layer protocols and technologies. Further, modus operandi and detection of intrusion for network
assaults like the Mirai IoT botnet, denial of service (DoS),
and routing attacks were presented. According to the paper,
challenges that affect an IoT intrusion detection system
(IDS) deployment include encryption, IPv6, scalability and
management, and the complexity of the deployment.
Rivas [128] explored the possibilities to secure the private IoT home network and presents means of network and
IoT exploitation. The author mentioned that network design
flaws, backdoors, DoS, spying, and man-in-the-middle
(MitM) attacks are the other ways of compromising a network. The paper presented some of the core network services required to raise the security posture such as, Dynamic
Host Control Protocol (DHCP), Domain Name System
(DNS), Dynamic DNS, installation of intrusion detection
and prevention systems (IDPS), proxies, and filtering. The
paper pointed out that keeping an up to date inventory of
the running systems of the connected devices in the network reduces the number of false positives on the IDS and
filters out the protocols, ports, URI, sources, destinations,
and applications. The inventory could be kept accurate by
executing active or passive scans of the network from time
to time.
Abomhara et al. in their paper [1] contributed to a better
understanding of threats and their attributes by classifying
the types of threats, analyzing, and characterizing the intruders and the attacks against IoT devices and services. Data
confidentiality, privacy, and trust are three key problems
with IoT devices and services identified by their research
paper. The research concludes that it is important to consider
security mechanisms for access control, authentication, identity management, and a trust management scheme, from the
early product development stages.
Pawar et al. [118] uncovered the “Sybil attack in Internet of Things”, by analysing the types of assaults according
to Sybil’s attacker capabilities, as well as some defensive
schemes. The schemes include social graphs, behaviour classification, and mobile Sybil detection. The authors argued
that the vulnerability of IoT systems in front of Sybil attacks
leads to the systems generating wrong reports, spamming
the users, spreading malware, and phishing websites, resulting in compromised privacy and private information loss.
In addition, this paper proposed an enhanced algorithm to
increase the detection of Sybil accounts by grouping similar
user clickstream into behavioural clusters and by partitioning a similarity graph to capture the time distances between
SN Computer Science
SN Computer Science
(2020) 1:193
clickstreams sequences. Their study concluded that clickstream models are a powerful technique for user profiling
and that future work needs to be done on the clickstream
models to be able to detect: malicious crowdsourcing workers, forged online reviews about travelling related products,
and identifying new methods of image-spamming attacks.
The work of the authors is valuable to the present survey
as it raises awareness about another type of attack on the
rise, threatening the Internet of things products and services
ecosystem.
Ouaddah et al. [112] conducted a survey on access control models, protocols, and frameworks in IoT. This survey
analysed the security and privacy preserving objectives of
scalability, usability, flexibility, interoperability, context
awareness, distributed, height heterogeneity, light-weight,
user driven, and granularity against the existing access control mechanisms. Role-based access control (RBAC), attribute-based access control (ABAC), Extensible Access Control Markup Language (XACML), capability-based access
control (CapBAC), usage control (UCON), User-Managed
Access (UMA), and OAuth methods are analysed to identifying the challenges in adopting access control schemes
for IoT.
General IoT Threats, Attacks,
and Vulnerabilities
General Threats and Attacks
An attack is an attempt to destroy, expose, alter, disable,
steal, or gain unauthorized access to an asset [123]. An IoT
attack is not peculiar from any typical perpetration conducted against an information system asset. The simplicity
and scale of attacks are varied for IoT circumstances, where
millions and billions of devices are potential victims for
cyber-attacks on a larger scale.
An advanced persistent threat (APT) is a complex set
of stealthy and continuous computer hacking processes,
conducted by a person or a group of individuals targeting
a specific entity [25]. An APT attack is aiming at stealing
high-value information in business and government organizations, such as manufacturing, financial industries, and
national defence [54].
Data and identity theft is another category of attack that
gives grave consequences for the victim. As an example, the
Google Nest thermostat was hacked via a USB connection
within 15 s, in a show-off demonstration during the USA
Black Hat conference in 2014 [67]. This attack scenario
leads to privacy and consumer behaviour leaks, thus transforming the IoT device into a spyware.
The Mirai botnet attack was a botnet distributed denial
of service (DDoS) attack perpetrated employing tens of
SN Computer Science
(2020) 1:193
Page 5 of 19
millions of unprotected IoT devices to disrupt the operations of major Internet Service Providers (ISPs) [84]. This
attack revealed the vulnerabilities of IoT devices proving
their insecurities. The majority of the unknowingly recruited
bots were millions of webcams. One of the after effects of
this attack is that security needs restoration on these webcams and even replacing the cameras, as a final solution.
Ransomware is one of the top competitive online threats,
leading to significant revenue loss for the companies infected
[135]. It is becoming the most successful cyber-based attack
because victims are willing to pay the demanded sum to
regain the access to their private data. Even an adversary
with malicious intent that do not possess a technical background to create a ransomware on their own could purchase
a ransomware package from the dark web. WannaCry,
CryptoLocker, CryptoWall, Petya, Locky, and TeslaCrypt
are some of the frequently used types of ransomware [102].
IoT-based healthcare devices and services could become an
attractive target for ransomware due to their handling of private medical stats.
SCAs are a type of attack that is arduous to mitigate with
conventional means as they are exploiting the vulnerabilities
of IoT devices that solely relies on the manufacturers ability to predicting flaws in their system [154]. Adversaries
are focusing on time consumption, power consumption, or
electromagnetic radiation emitted from the devices. Thus,
shielding devices from such mishandling require more
research, development budget, and time, factors that a typical IoT device manufacturer might not willing to invest in.
IoT devices are prone to man-in-the-middle (MitM)
attacks [107]. A possible attack scenario would be in an
instance where IoT device is communicating with the cloud
193
for execution instructions, administrative decision making,
or firmware updates. An adversary could attempt to redirect
network traffic with an attack conducted at the network level,
to include Address Resolution Protocol (ARP) cache poisoning or Domain Name System (DNS) modification attacks
[62]. A self-signed certificate or tools such as SSLstrip can
help attackers intercept Secure Hypertext Transfer Protocol
(HTTPS) connections [28]. An example of MitM attack was
the reported hacking of a Jeep Cherokee by a team of two
ethical researchers [127]. Security vulnerability existed in
the Uconnect dashboard computer of the car, causing a recall
of 1.4 million vehicles. Table 1 summarizes the threats and
vulnerabilities discussed in this subsection.
Vulnerabilities in IoT Systems
Unlike any traditional IT environment where systems are
separated from the rest or each other by proper physical
security, things in IoT are fixed and unattended. That makes
the IoT systems more prone to tampering in terms of hacking. Companies need to ensure that data collection, storage,
and processing would be continuously secure. It is required
to adopt a new strategy in defence and encrypt data at each
stage. Lack of local data encryption could lead to product
hacking via physical tampering. Having physical access to
a device allows an attacker to alter configuration settings in
the cases of issuing a new device pairing request, resetting
the device to factory settings, generating a new password, or
installing custom fabricated Secure Sockets Layer (SSL) certificates to redirect traffic to another server owned by them.
In cryptography, the terminology of a weak key refers
to the key phrase that is used with a specific cryptographic
Table 1 Summary of general threats and attacks possible for IoT
Threat/attack
Description
Consequences
References
Advanced persistent threat (APT)
An adversary targeting an information
system that launches continual hacking
attempts
A hacking attempt launched with actual
user credentials as an impersonation
attack
DoS attack launched from multiple locations simultaneously
A network of bots acting to compromise a
singular or multiple targets
A malware once installed to a system
demands a ransom (typically financial)
from the owner
Attempting to access the traversing
information of a communication link in
between the sender and the receiver
Analyses a physical property of a device
via tampering
Complete control of the hacked system
and its assets
[25, 54, 75]
Privacy leakages
[67]
Service interruption due to overloading
[75, 84]
A DDoS attack
[84]
Data Identity Theft
Distributed denial of service (DDoS)
attack
Botnet attack
Ransomware
Man-in-the-middle (MitM)
Side-channel attack (SCA)
Denied access to a part or entire system or [102, 135]
threatens to publish sensitive information until the ransom is settled
Revealing the information and protocol,
[31, 73]
injecting false/malicious content
Information, keys, or even a protocol
could be revealed
[75, 154]
SN Computer Science
193
Page 6 of 19
algorithm or a cipher that is exposed with brute force
(exhaustive key search), or guessing. Weak keys usually
represent a tiny fraction of the overall keyspace, the set of
the whole possible permutations of a key. They are very
unlikely to give rise to a security problem. Nevertheless, a
cipher should employ a key with a appropriate length. The
key size or the key length is the number of bits found in
a key and used by a cipher. In practice, cumbersome long
keys are utilized for modern cryptography for achieving
computational security, so that breaking the cryptosystem
is computationally infeasible. Though, the advent of quantum computing proves otherwise. The algorithms that are
used for cryptosystems are either symmetric [e.g. Advanced
Encryption Standard (AES)], asymmetric (e.g. RSA), or
hybrid (combination of both symmetric and asymmetric)
[78]. Such cryptoalgorithms are linked to the weakness of a
key. Depending on the used algorithm, it is common to have
various key sizes for the same level of security. As an example being the security available with a 1024-bit key using
asymmetric RSA considered to be approximately equal in
security to a 80-bit key from a symmetric algorithm [134].
One popular and comfortable method for users to interact
with an IoT device is via a web browser or a smartphone
app. Sometimes, devices with a more processing power run
a small web server that allows the user to use a web-based
graphical user interface (GUI) to send commands. Other
devices offer the user the possibility to interact with them
via their application programming interface (API). When
the user wants to send commands to a device or control it
remotely, they open an inbound port on the router via a Universal Plug and Play (UPnP) request. The lack of encryption is one of the major privacy concerns. Devices can pass
private data, login credentials, or tokens in plain text, letting an attacker intercept them via a network eavesdropping
technique. Cryptographic protocols are required to ensure
the security of both the infrastructure itself and the information that runs through it [72]. Moreover, the design of
such protocols should be robust enough to resist attacks [70,
71, 74] and must be tested for their functional correctness
(i.e. application of formal method) before they are used in
practice [69, 86].
One of the communication protocols prone to eavesdropping is Telnet [142]. The protocol was developed long
before the Internet took shape, in a time when not much
consideration was given to data confidentiality while in
transit. The whole data transmitted with this protocol is
susceptible of being intercepted. Hypertext Transfer Protocol (HTTP) is another example of insecure communication
protocol still in use, which empowers an eavesdropper to
view the communication between a client and the server
[20]. Although the attacker is not able to capture the password from the web server, they are capable of harvesting
other types of data, such as accurate information about the
SN Computer Science
SN Computer Science
(2020) 1:193
configuration or even a valid cookie that will allow them to
impersonate a legitimate user and then gain access to the
administrative interface of the firewall. Simple Network
Management Protocol (SNMP), v1, and v2c are insecure
protocols which expose a firewall for complete reconfiguration in the read-only mode. The File Transfer Protocol
(FTP) and Trivial File Transfer Protocol (TFTP) are used
to copy files from/to a device to update the system configuration or software/firmware. Compared to TFTP, FTP
provides the mechanisms for authentication [104]. Still,
both protocols transmit the data in an unencrypted manner
and are therefore susceptible to an eavesdropping attack.
The scope of developing products following the minimum viable product (MVP) technique is to build a product
fast and release it on the market to learn about customer
reactions [109]. A new version of the product lands on the
designing workbench, soon after gathering the feedback
from the previous release ends. The tremendous pressure
to release the MVP in a short amount of time leads to
neglecting the security and privacy of the final product.
Moreover, “ship and forget” mentality of some manufacturers leaves the customers with devices that are running
several years’ old software that were never updated. Thus,
such devices have severe security flaws. On the contrary
even if an update is available, the vast majority of the
typical customers do not have the skills, energy, willingness, or time to go through the hassle of updating their IoT
devices. No matter what manufacturers do, sometimes the
customer still is the weakest link when it comes to securing various IoT devices.
It is a challenge for IoT companies to agree on interoperability protocols and standards for the sharing and protecting of data. Competing standards, proprietary devices,
vendor lock-in, and private networks make it hard for devices
to share a common security protocol. Embracing one IoT
common standard by the companies is one of the barriers
that hold back mass adoption of IoT security protection.
Nonetheless, there are IoT standardization efforts. Samsung,
Intel, and Cisco support the Open Interconnect Consortium
(OIC) [46, 117]. LG, Microsoft, and Qualcomm back The
Linux Foundation’s AllSeen Alliance [94]. Google sponsors
Zigbee and Thread Group Alliance, a UK-based Hypercat
standard [116]. There are even more unifying efforts in the
works that are industry specific to agree on a common networking protocol. Companies still have to conclude the battle for software standards. Gartner argues that the sheer sum
of IoT use cases contributes to a wildly contrasting total of
approaches to solving IoT problems, which creates interoperability challenges and, ultimately security gaps [14].
Devices connected across multiple geographies lead to
practical issues of international enforcement when dealing
with IoT. Country-specific privacy laws are insufficient as
the reach of IoT data is global. Unless there are globally
SN Computer Science
(2020) 1:193
accepted laws which govern the usage of IoT information,
data larceny will continue.
Risk Mitigation
Mitigating the risk of an intrusion attempt or attack against
an IoT device is not an easy thing to do. Having a higher
degree of security protection at every level will discourage
the attacker to pursue his goal further and make him give up
in the end, by cause of the amount of effort and time needed
versus benefits. Mitigation needs to start with prevention,
by involving every actor in the market, from manufacturers
to consumers and lawmakers, and make them understand
the impact of the IoT security threats in a connected world.
Another way to mitigate risk is to keep abreast of the times
by improving and innovating, from the ground up, and by
finding new methods and designs to outgrow the shortcomings of the market.
Prevention
This subsection discusses the solutions that can be employed
for prevention of the security threats in IoT systems, as illustrated in Table 2.
The honeypot system is the new weapon that required to
be included in the cyber-security arsenal of the organizations to defend against attackers that try to penetrate secure
networks through IoT back-doors [7, 35, 113]. A standard
cyber-security defence should include the conventional
prevention techniques along with the visibility to detect
inside-the-network threats in real time, through identification of distinctive threats and their levels by setting up an
incident response playbook to remediate infected systems.
The ThreatMatrix platform provides a form of risk detection
for various categories of dangerous vectors including ransomware, phishing, stolen credentials, and reconnaissance
attacks [65]. The matrix is customized to fit into various
landscapes, which creates a trap out of each IoT network.
The Attivo Networks IoT solution protects widely used protocols such as Extensible Messaging and Presence Protocol
(XMPP), Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), and Digital
Imaging and Communications in Medicine (DICOM) servers which are used by the IoT vendors to support a wide set
of applications that allow for more excellent machine-tomachine communication and monitoring, concerning critical
data and machine status [11]. The Attivo analysis engine is
capable of analyzing the techniques used in the attack, the
lateral movement of the assault, what systems are infected,
and will provide the necessary signatures to stop the attack.
Analyzing the attack improves incident response skills and
capabilities, by automatically or manually blocking and
Page 7 of 19
193
quarantining the attack through integration with third party
systems and solutions for intrusion and prevention.
As IoT market will mature, the general public can access
new professional training, and University taught programs.
Awareness and proper training is paramount for owners of
the smart devices to understand how to implement some
basic security countermeasures that are the first and the best
line of defence [10, 63, 140].
Manufacturers know the best application and intention of
their products. They do not get the direct feedback from the
owner. Many devices include open-source software as part
of the code that is running on the product. Device manufacturers need to maintain lists of open-source components that
are used in the production process. When the community
identifies a vulnerability in one of those components, an
update can be made available quickly to the device owners.
Also, device manufacturers need to ensure that communication procedures are established with the device holder
to allow immediate responses in case these vulnerabilities
arose [108].
Chipsets are the core of the device, and IoT devices make
no exception [22]. The better designed is the chip, the more
secure it is and harder to crack when compared to a software
solution that promises to offer the same functionality. Over
the past five years, silicon suppliers have had to complement
their offering with a full-fledged featured software stack to
support their silicon, and hence, moving beyond hardware
drivers, into network and security stacks or even embedded
operating systems. Atmel Microchip, for example, is putting
the accent on hardware security, by developing world-class
embedded security solutions to ensure trust for each system
design [106].
At the application level, organizations that develop software need to be writing code that is more stable, buoyant and
reliable, with better code development standards, training,
threat analysis and testing. Application developers will have
to team-up with application penetration testers to analyse the
logic and operation of exposed applications, as an attacker
would do in his attempt to gain access to sensitive data or
to bypass logic controls and compromise a system. It is of
high importance to repeatedly test for resistance against
attacks since new ways of assault are developed even after
a product or solution is created and released. In addition to
testing in development and quality assurance phases, testing
IoT systems in production settings is highly recommended.
Extreme physical operating conditions do not have to be
the only test that devices are subject to, but also to extreme
computational conditions, which include resistance to denial
of service (DoS) and jamming-style attacks where a flood of
information hits the product to attempt and confuse, overpower, or disable it [32].
Static analysis and source code reviewing practices do
not detect risks and vulnerabilities from penetration testing
SN Computer Science
193
SN Computer Science
Page 8 of 19
Table 2 Summary of security risk prevention methods for IoT
Risk prevention method
Description
Benefits
Tools/sources
Honeypots
A mechanism that lays a trap on adversaries
who are intending to perform unauthorized
acts
Introducing professional training programs for
IoT users and developers
Detection and counteracting threats without
affecting the information system
ThreatMatrix, Attivo Networks
Raising awareness through training
Immediate response to detected vulnerabilities Quick generation of updates and patches to
detected flows, specially in open-source
software
Security on Chip
Integrating security for IoT chips/hardware at
the manufacturing stage
Exhaustive security testing
Security on SDLC
Legislation’s put forward by the EU for data
protection
An extra layer of security, that adds faster
response due to the implementation at the
perception domain
Maximum assurance granted before releasing
the IoT device to the market
Atmel micro-chip, [85, 115, 126]
Security is addressed as a main goal of all the
software products with improved compatibility and inter-operability
Improved awareness of the general public
and the availability of a legal framework for
accountability of digital and privacy violations
[40, 51, 122]
[23, 56, 98]
[39]
SN Computer Science
GDPR
Better testing schemes should be introduced to
cover penetrative, access, physical, computational aspects
Security practices should be integrated into the
software design stages in SDLC
Users will follow secure practices while aware- Perpetual Solutions, MCU Solutions, cybrary
ness is raised for overcoming general security
attacks such as Phishing attacks
preventing exploitation of well advertised vul- [36]
nerabilities in case of open-source material
(2020) 1:193
SN Computer Science
(2020) 1:193
alone. Organizations and developers need to define flexible
security architecture and deploy data-centric security technologies to support speed, agility, cost-effectiveness, and
innovation, in a highly connected world. For traditional IT
ecosystems, various systems development life cycle (SDLC)
methodologies have already been put in place and proven
to be successful in guiding the processes involved to create a software component that easily integrates with other
software components [143]. Developing for IoT is not very
different and should address all the stages, from design and
development to testing and debugging, to deployment, to
management, and to decommissioning. For developers of
IoT with the mobile client, Cloud or IoT applications finding the right strategy and solutions are not an easy task.
The mission of the developers is not only to bring these
solutions to market rapidly but also to ensure that appropriate security and data protection measures are implemented
from the beginning because no business can afford the high
costs in the aftermath of data theft. Improper security system exposes confidential and valuable customer information,
financial transactions, and mission-critical operational data,
and hence, lowering the risk of data exfiltration needs to be
at the core of their activities [15].
Consumer’s education starts with best practices provided
by the organizations selling the product [137]. The highly
efficient ones include regularly changing passwords, which
is still among the frequent causes for a security breach and
also offering advice on the safety patches and updates. Consumers need a level of confidence and comfort if they are
going to buy IoT products. They trust the manufacturer’s
brand to guarantee some degree of design and quality. When
a consumer values security, they will insist that the goods
they buy are secure and will pay the price that comes with it.
The European Union released new guidelines on how
companies operating in Europe have to handle and protect
the data of their customers. As of 25 May 2018, organizations need to comply with this General Data Protection Regulation (GDPR) [145]. The GDPR introduces developments
in some areas of EU data protection law. They will have a
direct impact on the way product manufacturers, application
developers, social platforms, and other entities involved in
the IoT field and especially design and bring to market IoTbased devices, systems, and applications.
The GDPR imposes obligations on data controllers to
adopt significant new technical and organizational measures to demonstrate their compliance [39]. These include
conducting data protection impact assessments in certain
circumstances which are likely to arise in connection with
IoT systems. The GDPR will confer new substantive rights
of data subjects about their private information. These substantive rights include an express right to be forgotten, the
right to object to automated decision making, and data portability rights. The design and engineering of IoT devices,
Page 9 of 19
193
Fig. 2 Possible improvements for IoT risk mitigation
Fig. 3 Security by design approaches
applications, and systems will need to accommodate the
necessary capabilities to facilitate the exercise of these
rights in compliance with the GDPR, particularly about data
portability.
Improvements
This subsection addresses solutions that can be employed
for improving the security of IoT systems, as illustrated in
Fig. 2.
Security by Design
In embedded systems such as gateways, hubs, and similar
network entry points for devices and things that connect to
them, there is a need for a different approach to be considered when improving security, which starts in the early
SN Computer Science
193
Page 10 of 19
planning of the product with security by design (SbD) concept as depicted in Fig. 3.
• Secure Boot
Security practitioners need to build a multilayered approach
to IoT ecosystem right from initial secure booting to establishing trust and integrity of the software on the IoT device.
To establish these, the role-based access control (RBAC)
makes sure that users access only those privileges and applications that they require as part of their job role [111]. Also,
incorporating principle of least privilege, persistent device
authentication and building proper host-based firewalls and
deep packet inspection capability will enhance the trust and
integrity [41, 77]. This deep integration of interconnected
devices that embed into our daily lives means that security
is of paramount importance. Applying add-on security controls to each IoT device is impractical and wasting resources.
Security needs to be inbuilt, fitting the environment and supporting system functionality without restrictions.
When the System-on-Chip (SoC)-based devices boot its
system, authenticity, and integrity of the software, firmware
and hardware components are checked with different means.
The ways to ensuring secure booting and verifying integrity of the installed software and firmware are important for
guaranteeing its reliability in the context of marketing [66].
Methods such as Elliptic Curve Digital Signature Algorithm
(ECDSA), Secure Hash Algorithm (SHA), direct memory
access (DMA), and physical unclonable function (PUF) are
employed for secure booting and remote attestation [58, 68].
Embedding these methods for boot loading processes is mitigating attack scenarios plausible with malicious boot agents.
As such, the groundwork of trust settles, but the device still
needs protection from various run-time threats and malicious intentions.
• Access Control
The operating system’s built-in access controls, mandatory
or role-based, have the benefit of managing the privileges
for the device components and applications so that they only
access those resources assigned to them. In the case of an
intrusion, access control ensures that the intruder has minimal access to other parts of the system. Device-based access
control mechanisms are similar to the network-based access
control systems such as Microsoft Active Directory [5]. If
someone manages to steal corporate credentials and gains
means of entry to the network, the access to such compromised information restricts to only those segments of the
network, authorized by those appropriate credentials. The
principle of least privilege commands that minimal access
required to perform a function need to be permitted, to minimize the effectiveness of a breach of security [77].
SN Computer Science
SN Computer Science
(2020) 1:193
• Network Access Policy
Once the enterprise network incorporates IoT devices, the
IT organization has to create or alter the configuration of the
network access policy as part of a corporate policy enforcement strategy. This strategy needs to determine whether
and how these devices connect to the network, maybe
separated into virtual segments, as well as what role they
will be assigned that will govern their access. Some of the
advantages of network segmentation are improved security,
performance boost, and network problems isolation [24]. By
creating network segments for IoT devices only, the principle
of least privilege is applied, thus limiting further movement
across the network for cyber-criminals with unauthorized
access. Network performance improves by isolating IoT
transactions to a defined segment, which implies minimizing local traffic and in the end reducing network congestion.
For a better isolation of a problem, access to the network can
be handled by implementing another technique, called segregation [9]. Segregation works by combining virtual local
area network (VLAN) and firewalls, where a set of rules is
present and enforces to control which devices are permitted to communicate on that network segment in ingress and
egress directions [89].
• Device Authentication
Device authentication needs to be triggered when the asset is
added to the network for the first time, even before receiving
or transmitting data. Embedded devices do not wait for users
to input the credentials required for accessing the network,
but their identification needs to happen correctly before
authorization. Similar to how user authentication mechanism
allows a user to access the corporate network with a username and a password, machine authentication allows devices
to access the network with a pair of credentials stored in a
secure storage area. These authentication mechanisms are
mostly referred as device-to-device (D2D) authentication,
where authentication credentials are exchanged through a
machine-to-machine (M2M) channel [21, 59]. Resource
constrained nature of IoT devices is encouraging lightweight approaches to maintain the transmission efficiency
in a satisfactory level [2, 52]. Moreover, it will improve the
operating time of the battery operated devices [138]. Thus,
embedding a proper authentication protocol through circumspect designing is vital on both security and transmission
perspective.
PUF is a nascent concept employed for D2D, M2M, IoT
device, and even vehicular entity authentication. The idea of
the PUF is to generate a unique identifier from a challenge
response pair (CRP) that is derived from the unique features
inherited by the circuitry over the fabrication process. The
complexity and the secureness of the PUF based schemes
SN Computer Science
(2020) 1:193
are reliant on the number of CRPs associated with them
[88]. In addition to authentication, PUFs can be employed
for secure storing. New directives on PUFs can be found in
[48, 59, 88, 100, 153].
• Firewalls and Intrusion Prevention Systems
The IoT devices require firewall and deep packet inspection
(DPI) capability to control the traffic that is meant to terminate at the instrument [90]. Deeply embedded devices have
various protocols, distinct from enterprise IT protocols, and
a host-based firewall or intrusion prevention system (IPS) is
highly required [37, 57]. As an example, the smart energy
grid network has its proprietary set of protocols defining
how devices talk to each other [61]. Protocol filtering and
DPI capabilities, applicable to each industry, are required
to identify malicious payloads hiding in non-IT protocols.
The device should not bare itself with filtering higher-level,
general Internet traffic, as the network appliances take care
of that. But it does need to filter the specific data destined to
terminate at the apparatus, in such a way that makes optimal
use of the limited computational resources available.
• Updates and Patches
Once the device is operational, it starts to receive patches
and software updates [95]. Devices need to authenticate the
patches rolled out by the administrators, in a way that does
not consume bandwidth or impair the functionality or safety
of the apparatus itself. Contrary to how companies like
Microsoft send updates to Windows users and tie up their
computers, IoT products need receiving software updates
and security patches in a way that conserves their limited
bandwidth and connectivity and eliminates the possibility
of compromising functional safety [43]. These devices are
in the field, performing critical functions, and are dependent
on the total of security patches that are available to protect
them against the inevitable vulnerabilities of the wild. In
the future, considering the increased numbers of devices
and the expected frequency of updates, this work will transition from active participation by humans to automatic
over-the-air update processing. Exception processing will
become an isolated human intervention rather than handling
and processing each update as it arrives, which suggests an
increased level of monitoring and reporting on the status
and progress of update processing across the inventory of
gateways, routers, and devices involved [42].
• Real-Time Operating Systems
The majority of IoT appliances have common operating systems (OSs) that are incapable of addressing specific security
requirements. These systems tend to be over-featured and
Page 11 of 19
193
geared with functionality that is useless for the connected
devices. Also, there is not much importance given to fixing
the various vulnerabilities caused by the poor design, bad
implementation, or improper use of operating systems in
these products. Building security in at the OS level takes
the stain off device designers and developers and gives them
more time at hand to configure systems to mitigate threats
and ensure their platforms are safe. A real-time operating
system (RTOS) is an operating system that manages the
hardware resources, hosts applications, and processes data in
real time [103]. RTOS defines the real-time task processing
time, interrupt latency, and reliability for both hardware and
applications, and in particular, for low powered and memory
constrained devices and networks [83]. The main difference
between RTOS and a general purpose OS stands in its high
degree of reliability and consistency when measuring application’s task acceptance and completion timing. RTOS is
a critical component to building comprehensive embedded
systems for IoT solutions for both consumer and industrial
IoT [50]. More and more RTOS offerings are surfacing
the IoT market and solutions like KasperskyOS, promise
to bring a multitude of features to strengthen the security
of the device [91]. Some of the main features guaranteed
by RTOS are proprietary microkernel and a free security
engine, multi-level compatibility, security domain separation, mandatory identification and labelling, and various
policies enforcement [6].
Blockchain
IoT concept is in its development stages, but it is already
offering technologies that allow for data collection, remote
monitoring, and control of the devices. As it evolves, IoT
transitions toward becoming a network of real autonomous
devices that interact with each other and with their environment around them to make smart decisions without human
intervention [87]. As such, the blockchain forms the foundation that will support a shared economy that works on M2M
communications [155]. Blockchain technology leads to the
creation of secure mesh networks, where IoT devices will
interconnect while avoiding threats such as impersonation
or device spoofing. As more legitimate nodes register on the
blockchain network, devices will identify and authenticate
each other without a need for central brokers and certification authorities. The network will scale to support more
and more devices without the need for additional resources
[132].
There are possible applications of blockchain technology in the context of IoT security. Blockchain hashes the
device firmware on a continual basis, and if the firmware
state changes by even a single digit by the cause of malware altering the firmware code, then the hash failure will
alert the device owners [93]. To be able to send data or to
SN Computer Science
193
Page 12 of 19
check for new instructions, a device hashes the information it wants to send and places the hash into a blockchain.
Then, the recipient of the package hashes the same data, and
if the resulting hash matches the hash on the blockchain,
then it means that the payload has not changed in transit.
As each device has a blockchain public key, devices need
to encrypt messages to each other employing a challenge/
responses mechanism to ensure the device is in control of
its identity; hence, it might be a useful idea to require a
universal identity protocol for every instrument. Devices
develop their reputation in the same way as Keybase key
directory does, where each device has a public key [79].
Cryptographic reputation systems cover above devices. A
certification agency for things which audits the device and
generates an identity for it on the blockchain could be a
solution. So once the instrument is historically born on the
blockchain, the device’s identity will be irreversible. For
sensors such as global positioning system (GPS), temperature, and humidity, environmental inputs are unique to each
other. This uniqueness in conjunction with the International
Mobile Equipment Identity (IMEI) and Original Equipment
Manufacturer (OEM) firmware hashes are forming a solution that is considered to be the ultimate in tamper-resistant
device identification.
Furthermore, the blockchain technology can be used to
promote digital business process without the need for a complex infrastructure [144]. These blockchain enabled interoperable platforms support companies to exchange authentication information with each other. The lack of shared identity
stacks prevents companies from identifying and authenticating users with other businesses. With the blockchain technology, companies can keep stacks of common identities for
user authentication through biometric data. Blockchain can
support as well an interoperable ledger for identity exchange
among multiple entities. From the cryptography point of
view, the blockchain technology will set up the protocols
for connectivity among devices through a biometric data
validation process. The network running nodes will receive
biometric data associated with respective devices and their
time stamps. The network needs to confirm whether a device
and a particular identity intersected each other within a time
interval, to be able to authenticate a user.
As with each disruptive concept that turns into an effective offering, the blockchain model is not perfect and has its
flaws and shortcomings [152]. Novel attack vectors such as
forking attacks are creating a hassle for IoT service providers as blockchain was the security solution for achieving
a privacy preserving service platform [146]. Scalability is
one of the main issues, considering the tendency towards
centralization with a growing Blockchain [30]. As the blockchain grows, the nodes in the network require more storage,
bandwidth, and computational power to be able to process a
block, which leads to only a handful of the nodes being able
SN Computer Science
SN Computer Science
(2020) 1:193
to process a block. Computing power and processing time is
another challenge, as the IoT ecosystem is very diverse and
not every device will be able to compute the same encryption algorithms at the desired speed. Storage of a continuously increasing ledger database on a broad range of smart
devices with small storage capabilities, such as sensors, is
yet another hurdle. The lack of skilled people to understand
and develop the IoT-blockchain technologies together is
also a challenge. The lack of laws and a compliance code
to follow by the manufacturers and service providers is not
helping both the IoT and blockchain to take off as expected.
IOTA: The Post Blockchain Token
The launch and success of the Bitcoin cryptocurrency during
the last years proved the value of the blockchain technology.
However, as shown above, this technology has some drawbacks, which prevent its mass adoption as the only global
platform for cryptocurrencies. Among these disadvantages,
a particularly notable one is the limitations of making micropayments, which have increased importance for the rapidly
developing IoT industry. Specifically, in the cryptocurrency
systems, a user needs to pay a fee each time he initiates
a transaction; hence, for a small amount, the fee might be
many times larger compared to the transaction, and the transaction would make sense in the first place. These charges
serve as an incentive for the creators of the blocks, and it is
not easy to get rid of them. The existing cryptocurrencies are
independent systems with a distinct separation of roles, for
example, transaction issuers and transaction approvers. Such
systems create inescapable discrimination of some of their
elements which in turn creates conflicts and makes the entire
collection of items to spend resources on conflict resolution.
These arguments justify the search for solutions essentially
peculiar from the blockchain technology, on which the Bitcoin and many other cryptocurrencies base their code.
IOTA is a disruptive transactional settlement and data
transfer layer for the IoT [47]. At the foundation of IOTA,
there is a newly distributed ledger, called the Tangle, which
overcomes the inefficiencies of the blockchain design and
introduces a new way, called directed acyclic graph (DAG),
to reach consensus in a decentralized peer-to-peer system
[44]. The users of IOTA automatically act as validators,
allowing transaction validation to become an intrinsic property of utilizing the network. Each transaction requires that
the sender verifies two previous transactions, which results
in an infinite scalability, as opposed to the blockchain consensus design [45]. It enables people to transfer money
without fees, meaning that even infinitesimally small nanopayments are possible through IOTA. The system could turn
into the missing puzzle piece for the Machine Economy to
emerge and reach its full desired potential. IOTA is meant to
SN Computer Science
(2020) 1:193
be the public, permission-less backbone for IoT that enable
true interoperability between the devices.
Cloud, Fog, and Edge Computing
Cloud computing and IoT build a couple that could work in
a symbiosis. The growth of IoT and the rapid development
of associated technologies create a popular connection of
things that leads to the production of large amounts of data,
which needs to be stored, processed, and accessed. This
newly formed opportunity of cloud computing and IoT will
enable new monitoring services and high processing of sensory data streams [17]. For example, cloud computing stores
the sensory data, so that it is used later for smart monitoring
and actuation with other smart IoT products. Ultimately, the
goal is to transform the data into insight and drive productivity and cost-effective actions from this. The cloud plays
the role to serve as the brain to improved decision-making
and optimized Internet-based interactions. Cloud computing
offers a realistic utility-based model that will enable businesses and users to access applications on demand anytime
and from anywhere [4]. Amazon, Microsoft, and IBM are
some of the major companies that are providing cloud computing services which have also incorporated offerings for
the IoT market, like AWS IoT [18], Azure IoT Suite [81],
and Watson IoT [55].
Infrastructure-as-a-Service (IaaS) provides the necessary
hardware and software upon which a customer can build a
customized computing environment. Computing and data
storage resources, as well as the communications channel,
are bound together with these IT resources to assure the
stability of applications used in the cloud [119]. Symphony
Link, offered by Link Labs, is a wireless solution for enterprise and industrial which connects IoT devices to the cloud
securely [97]. The Symphony Link design is for Low Power
Wide Area Network (LPWAN) applications, which are easily scalable and have high reliability.
In a Platform-as-a-Service (PaaS), a proprietary language
is supported and provided by the platform’s owner [119].
The platform eases communication, monitoring, billing, and
other aspects, to ensure the scalability and flexibility of an
application. Nonetheless, there are some limitations, regarding the programming model and supported languages, the
ability to access resources and the long-term persistence.
Other platforms like Wind RiverⓇ HelixTM and ARMmbed
IoT Device Platform provide a portfolio of software, technologies, tools, developer ecosystem, and cloud services for
dealing with the challenges and opportunities at the system
level, created by the IoT [80, 110]. These tools make the
creation and deployment of commercial, standards-based
IoT solutions possible at scale. Blockchain-as-a-Service platforms are starting to become popular due to its wide adaptability in Bitcoin and cryptocurrency applications, which is
Page 13 of 19
193
considered as a solid innovation during the last eleven years
of its presence in the financial trading markets [132]. The
application of this emerging technology is showing great
promise in the enterprise.
Software-as-a-Service (SaaS) enables cost-effective
value added services for many IoT applications that provision real-time data visualization and analytical support for
its consumers [125]. These services mimic the application
service provider (ASP) on the application layer. Usually, a
specific company that uses the service would run, maintain,
and facilitate support so that it assures reliability over an
extended period. Device Authority’s KeyScaler IoT IAM
platform can assist in solving mass device provisioning,
secure onboarding, certificate revocation and rotation, and
solving credential management problems for Amazon Web
Service (AWS)-based IoT customers [34]. This is an important step to take in securing IoT devices and their data. AWS
IoT cloud platform lets connected devices to interact with
cloud applications and other assets easily and supports a
vast amount of messages to be processed and routed to AWS
endpoints.
Although powerful, the cloud model is not the best choice
for environments where Internet connectivity is limited or
operations are time-critical. In scenarios such as patient care,
milliseconds have fatal consequences [151]. As well in the
vehicle-to-vehicle (V2V) communications, the prevention
of collisions and accidents relies on the low latency of the
responses [133]. Due to these novel requirements, cloud
computing is not consistently viable for many IoT applications. Thus, it is replaced by the edge computing paradigms
such as fog computing, mobile cloud computing (MCC), and
multi-access edge computing (MEC) [38, 120, 124, 150].
Fog computing, also known as fogging, is a decentralized computing infrastructure in which the data, compute,
storage, and applications split in an efficient way between
the data source and the cloud [99]. Fog computing extends
the cloud computing and services alike, to the edge of the
network, by bringing the advantages and the power of the
cloud to where the data arise initially as illustrated in Fig. 4.
The main goal of fogging is to improve efficiency and also
to reduce the quantity of data that moves to the cloud for
processing, analysis, and storage. In fogging, data processing takes place in a router, gateway or a data hub on a smart
device, which sends it further to sources for processing and
storing that reduce the bandwidth payload towards the cloud.
The back-and-forth communication between IoT devices and
the cloud can negatively affect the overall performance and
security of the IoT asset. The distributed approach of fogging
addresses the problem of the high amount of data coming
from smart sensors and IoT devices, which would be costly
and time-consuming to send to the cloud each time. Fog
networking complements the cloud computing and allows
short-term analytics at the edge while the cloud performs
SN Computer Science
193
Page 14 of 19
Fig. 4 Extension of cloud services to the edge by fog computing
resource-intensive, longer-term analytics [136]. Trends demonstrated that inexpensive, low-power processing, and storage are becoming more available and will drive the growth
and usage of fog computing in IoT. Processing of data
migrates even closer to the edge and becomes deeply rooted
in the very same devices that created the data initially, thus
generating even greater possibilities for M2M intelligence
and interactions.
Quantum Security, AI, and Predictive Data Analytics
In quantum computing (QC), computations are handled
faster than the classical computers which surpasses its capabilities with a considerable margin [121]. The QC allows
for more data crunch with quantum speed and the ability
to run an entire set of inputs at the same time, thus getting
instant results. Security experts are predicting that quantum cryptography will replace the existing security solutions in all digital systems that are prone to data hacking,
including national defence, finance, self-driving vehicle
industry, and the IoT, with the potential to be unhackable
[130]. Quantum computers will become a technological
reality sooner than expected, and it is vital to study the
cryptographic schemes used by adversaries with access to a
quantum computer. Post-quantum cryptography is the study
of such plans that arose from the fundamentals of popular
encryption and signature schemes [26]. Existing elliptic
curves and Rivest–Shamir–Adleman (RSA) algorithms can
be broken using Shor’s algorithm on a quantum computer
SN Computer Science
SN Computer Science
(2020) 1:193
via factoring and computing discrete logarithms [13, 129].
Though, schemes such as McEliece, lattice, hash, code, multivariate, and super-singular elliptic curve isogeny methods
are envisaged to develop Quantum Resistant (QR) security
systems [12, 27, 64, 101].
Quantum encryption methods are being engineered by
embedding quantum mechanics on microchips/processors
to enhance the security of random number generation in
cryptographic protocols [33]. The security of cryptographic
protocols is dependent on the randomness of the keys. At
present, the vast majority of these protocols use algorithmic
pseudo-random number generators. The approach followed
by [149] could be employed for revolutionizing randomness
in existing security and communication protocols to prevent
hacking and guessing attempts.
In the IoT ecosystem, the volume of data and also the
data types are increasing. Data comes from a wide variety of
sources. It is obvious that the conventional computing systems cannot handle the amount of data generated from IoT
based sensors and meters serving myriads of services and
applications. The method of predictive analytics is facilitating the decision makers to sort and understand the type,
amount, and frequency of data to be expected, so that they
can take immediate actions [76]. The precision of the prediction method is reliant on the amount, variation, and duration
of data. Predictive data analytics will be a core solutions to
provide close-to-zero downtime for many sectors; especially,
industrial automation. Prevention of failures occurring on
mission-critical devices and forecasting the domino-effect
originated from the incident is plausible with predictive
analytics performed on IoT systems. Security-wise, it is
capable of discovering a data breach before it happens. Predictive data analytics will be supported by machine learning
approaches executed on edge, without the requirement of
connecting to the Internet. In a smart city, various systems
such as traffic system, lights, motion sensors, closed-circuit
television (CCTV), meters, utilities, and smart buildings
exist. QC can potentially handle the verification and the
validation process faster across every system and ensure
continuous optimization for these systems.
Given the new data and scenarios, artificial intelligence
(AI) and IoT are shaping up to be a symbiotic pairing, where
AI depends and thrives upon high data inputs that IoT delivers [60]. Cognitive systems of AI evolve and improve over
time, inferring new knowledge without being explicitly programmed to do so. Another way that AI can pair up with IoT
technologies is by bringing cognitive power to the edges
of IoT, through embodied cognition [147]. That means AI
capabilities are placed in an object, avatar, or space (such
as the walls of a spacecraft), enabling it to understand its
environment, and then reason, and learn. These objects may
have the ability to interact in more natural human-like ways,
such as written and verbal communications and gestures,
SN Computer Science
(2020) 1:193
with the observations of actual humans living and working
in their proximity.
Discussion
Our survey unveils concerns over some outstanding issues
of IoT ecosystem. The most relevant are the management of
the identity, access control, and trust towards IoT products
and services. Ineffective authentication methods introduce
a trust deficit across IoT network gateways, which expose
these devices and their data to perpetrators. Another point in
question is the use of centralized, traditional IT computing
systems, and network models in an IoT environment that are
meant to be self-governed and decentralized. IoT belongs to
the new era, and every actor that has a role to play in this
environment needs to adapt to the requirements of this new
ecosystem. These systems contain continuously growing,
huge number of devices, and the scalability, complexity, and
management of the environment are yet another open issue.
The complex nature of the IoT network comes from the different types of devices connecting to edge to fog, and to the
cloud. Due to this heterogeneous nature, outstanding points
in question come from the continuously evolving attacks
and threats lurking the IoT systems and services in addition
to sheer number of reasons that lead to security breaches.
Therefore, the scalability of the network is questionable.
Although IoT is a decentralized environment, device management is not always considered, especially for credentials
and certificates distribution and revocation, and more often,
the transactional traffic does not separate from the administrative data movement. Thus, generic and reliable security
solutions should be adopted in the design stage as explicated
in the paper for mitigating the risks and vulnerabilities.
Conclusions
This paper offers market-available solutions to deal with
the lack of identity, access, and trust for IoT products and
services; proposes new data-computing models to address
the scalability, complexity, and management of the environment; and elaborates on the concept of security by design
to meet the requirements for device management. Although
this paper advises IoT makers to seek new ways and methods to adapt their offerings to the new ecosystem and move
away from traditional IT security practices, more research
is needed on the topic.
The responsibility for implementing proper security
solutions does not depend on a single party of the IoT ecosystem, but rather on all the actors involved, from silicon
suppliers to manufacturers, to developers, to lawmakers,
and the final customer. Mitigating risks associated with
Page 15 of 19
193
security breaches are possible, if security receives consideration from early product planning and design, and if
some basic prevention mechanisms are in place. Enactment and standardization will simplify the manufacturing
and development processes, give the market an incentive
for mass- adoption, and also increase the security posture of IoT products and services. Security will have to
be inbuilt so that IoT can withstand a chance against the
threats that technology advancements will bring along.
With the technological advancements of quantum computing, AI, and cognitive systems, and with the continuous development and mass adoption of IoT ecosystem, the
current security practices and methodologies will become
part of the past. Quantum computing, not only that it can
break through any form of security that is known to human
kind, but it can also offer the solution to finding the formula for tight security. IoT will vastly benefit from these
technology advancements, especially from the quantum
mechanics science on a microchip. Further research is
recommended, once the technology matures and evolves,
to discover how the security of the future impacts on the
Internet of things ecosystem.
Compliance with Ethical Standards
Conflict of interest The authors declare that they have no conflict of
interest.
Ethical Approval This article does not contain any studies with human
participants or animals performed by any of the authors.
References
1. Abomhara M, et al. Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks. J Cyber Secur
Mobil. 2015;4(1):65–88.
2. Abro A, Deng Z, Memon KA. A lightweight elliptic-elgamalbased authentication scheme for secure device-to-device communication. Future Internet. 2019;11(5):108.
3. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M,
Ayyash M. Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor.
2015;17(4):2347–76.
4. Almorsy M, Grundy J, Müller I. An analysis of the cloud
computing security problem. 2016. arXiv preprint arXiv
:1609.01107
5. Ammar M, Russello G, Crispo B. Internet of things: a survey on
the security of iot frameworks. J Inf Secur Appl. 2018;38:8–27.
6. Andrews SK, Rajavarman V, Ramamoorthy S. Implementing an
IoT vehicular diagnostics system under an Rtos environment over
ethernet IP. Medico Legal Update. 2018;18(1):548–54.
7. Anirudh M, Thileeban SA, Nallathambi DJ. Use of honeypots
for mitigating dos attacks targeted on IoT networks. In: 2017
International conference on computer, communication and signal
processing (ICCCSP). IEEE; 2017. p. 1–4.
SN Computer Science
193
Page 16 of 19
8. Arias O, Wurm J, Hoang K, Jin Y. Privacy and security in internet of things and wearable devices. IEEE Trans Multi Scale
Comput Syst. 2015;1(2):99–109.
9. Arnaud J, Wright J. Network segregation in the digital substation. In: 13th International conference on development in power
system protection 2016 (DPSP). IET; 2016. p. 1–4.
10. Attify: IoT Security Exploitation Training. 2019. https://www.
attify.com/iot-secur ity-exploitation-training. Accessed 4 Sept
2019
11. Attivo: Deception for attack detection of IoT devices. 2017. https
://attivonetworks.com/documentation/Attivo-Networks-IoT.pdf.
Accessed 4 Sept 2019.
12. Banerjee U, Pathak A, Chandrakasan AP. 2.3 an energy-efficient
configurable lattice cryptography processor for the quantumsecure internet of things. In: 2019 IEEE international solid-state
circuits conference-(ISSCC). IEEE; 2019. p. 46–8.
13. Banerjee U, Ukyab TS, Chandrakasan AP. Sapphire: a configurable crypto-processor for post-quantum lattice-based protocols.
IACR Trans Cryptogr Hardw Embed Syst. 2019;2019:17–61.
14. Bär S, Reinhold O, Alt R. The role of cross-domain use cases in
IoT: a case analysis. In: Proceedings of the 52nd Hawaii international conference on system sciences; 2019.
15. Bodeau DJ, Graubart R, Fabius-Greene J. Improving cyber security and mission assurance via cyber preparedness (cyber prep)
levels. In: 2010 IEEE Second international conference on social
computing. IEEE; 2010. p. 1147–52.
16. Borhani M, Liyanage M, Sodhro A, Kumar P, Jurcut A, Gurtov
G. Secure and resilient communications in the industrial internet.
In: Rak J, Hutchison D, editors. Guide to disaster-resilient communication networks. Computer communications and networks.
Basel: Springer; 2020.
17. Cai H, Xu B, Jiang L, Vasilakos AV. Iot-based big data storage
systems in cloud computing: perspectives and challenges. IEEE
Internet Things J. 2016;4(1):75–87.
18. Calderoni L. Preserving context security in AWS IoT core. In:
Proceedings of the 14th international conference on availability,
reliability and security. ACM; 2019. p. 78.
19. Calvillo CF, Sánchez-Miralles A, Villar J. Energy management and planning in smart cities. Renew Sustain Energy Rev.
2016;55:273–87.
20. Calzavara S, Focardi R, Nemec M, Rabitti A, Squarcina M.
Postcards from the post-http world: amplification of https vulnerabilities in the web ecosystem. In: Postcards from the postHTTP world: amplification of HTTPS vulnerabilities in the web
ecosystem. IEEE; 2019. p. 0.
21. Cao M, Wang L, Xu H, Chen D, Lou C, Zhang N, Zhu Y, Qin Z.
Sec-d2d: a secure and lightweight d2d communication system
with multiple sensors. IEEE Access. 2019;7:33759–70.
22. Chahid Y, Benabdellah M, Azizi A. Internet of things security.
In: 2017 International conference on wireless technologies,
embedded and intelligent systems (WITS). IEEE; 2017. p. 1–6.
23. Chen CK, Zhang ZK, Lee SH, Shieh S. Penetration testing in the
IoT age. Computer. 2018;51(4):82–5.
24. Chen D. Iot network segmentation when sensors fail. engrXiv.
2018. https://doi.org/10.31224/osf.io/9dy5x.
25. Chen J, Su C, Yeh KH, Yung M. Special issue on advanced
persistent threat. Elsevier. 2018. https://doi.org/10.1016/j.futur
e.2017.11.005.
26. Chen L, Chen L, Jordan S, Liu YK, Moody D, Peralta R, Perlner
R, Smith-Tone D. Report on post-quantum cryptography. US
Department of Commerce, National Institute of Standards and
Technology; 2016.
27. Cheng C, Lu R, Petzoldt A, Takagi T. Securing the internet of things in a quantum world. IEEE Commun Mag.
2017;55(2):116–20.
SN Computer Science
SN Computer Science
(2020) 1:193
28. Chordiya AR, Majumder S, Javaid AY. Man-in-the-middle
(mitm) attack based hijacking of http traffic using open source
tools. In: 2018 IEEE international conference on electro/information technology (EIT). IEEE; 2018. p. 0438–43.
29. Cisco: The Internet of Things Reference Model. 2014. http://cdn.
iotwf.com/resources/71/IoT Reference Model White Paper June
4 2014.pdf. Accessed 30 Aug 2019.
30. Conoscenti M, Vetro A, De Martin JC. Blockchain for the internet of things: a systematic literature review. In: 2016 IEEE/ACS
13th international conference of computer systems and applications (AICCSA). IEEE; 2016. p. 1–6.
31. Conti M, Dragoni N, Lesyk V. A survey of man in the middle
attacks. IEEE Commun Surv Tutor. 2016;18(3):2027–51.
32. Coşkun Y, Eygi M, Sezgin G, Kurt GK. Jamming resilience of
LTE networks: a measurement study. In: International telecommunications conference. Springer; 2019. p. 151–62.
33. Devi RS, Balaguru RJB, Amirtharajan R, Praveenkumar P. A
novel quantum encryption and authentication framework integrated with IoT. In: Mahmood Z, editor. Security, privacy and
trust in the IoT environment. Berlin: Springer; 2019. p. 123–50.
34. DeviceAuthority: Keyscaler platform overview. 2019. https://
www.deviceauthority.com/platform/platform-overview. Accessed
9 Sept 2019.
35. Dowling S, Schukat M, Melvin H. A zigbee honeypot to assess
IoT cyberattack behaviour. In: 2017 28th irish signals and systems conference (ISSC). IEEE; 2017. p. 1–6.
36. Duan R, Bijlani A, Ji Y, Alrawi O, Xiong Y, Ike M, Saltaformaggio B, Lee W. Automating patching of vulnerable open-source
software versions in application binaries. In: NDSS; 2019.
37. Endler M, Silva A, Cruz RA. An approach for secure edge computing in the internet of things. In: 2017 1st cyber security in
networking conference (CSNet). IEEE; 2017. p. 1–8.
38. Escamilla-Ambrosio P, Rodríguez-Mota A, Aguirre-Anaya E,
Acosta-Bermejo R, Salinas-Rosales M. Distributing computing
in the internet of things: cloud, fog and edge computing overview. In: NEO 2016. Springer; 2018. p. 87–115.
39. EU: General Data Protection Regulation. 2019. https://gdpr-info.
eu. Accessed 4 Sept 2019.
40. Fernandes AM, Pai A, Colaco LMM. Secure SDLC for IoT based
health monitor. In: 2018 Second international conference on electronics, communication and aerospace technology (ICECA).
IEEE; 2018. p. 1236–41.
41. Fernandes E, Jung J, Prakash A. Security analysis of emerging
smart home applications. In: 2016 IEEE symposium on security
and privacy (SP). IEEE; 2016. p. 636–54.
42. Fernandes E, Paupore J, Rahmati A, Simionato D, Conti M,
Prakash A. Flowfence: practical data protection for emerging IoT
application frameworks. In: 25th {USENIX} security symposium
({USENIX} Security 16); 2016. p. 531–48.
43. Fernandes E, Rahmati A, Eykholt K, Prakash A. Internet of
things security research: a rehash of old ideas or new intellectual
challenges? IEEE Secur Priv. 2017;15(4):79–84.
44. Ferraro P, King C, Shorten R. IOTA-based directed acyclic
graphs without orphans. 2018. arXiv preprint arXiv:1901.07302.
45. Florea BC. Blockchain and internet of things data provider for
smart applications. In: 2018 7th mediterranean conference on
embedded computing (MECO). IEEE; 2018. p. 1–4.
46. Florit L. The role of open source in IoT. In: Rayes A, Salam S,
editors. Internet of things from hype to reality. Berlin: Springer;
2019. p. 315–27.
47. Gaggioli A. Blockchain technology: living in a decentralized
everything. Cyberpsychol Behav Soc Netw. 2018;21(1):65–6.
48. Gao Y, Ranasinghe DC, Al-Sarawi SF, Kavehei O, Abbott D.
Emerging physical unclonable functions with nanotechnology.
IEEE Access. 2016;4:61–80.
SN Computer Science
(2020) 1:193
49. Gharaibeh A, Salahuddin MA, Hussini SJ, Khreishah A, Khalil I,
Guizani M, Al-Fuqaha A. Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun Surv
Tutor. 2017;19(4):2456–501.
50. Gomes RM, Baunach M. Code generation from formal models
for automatic RTOS portability. In: 2019 IEEE/ACM international symposium on code generation and optimization (CGO).
IEEE; 2019. p. 271–2.
51. Gopal TS, Meerolla M, Jyostna G, Eswari PRL, Magesh E. Mitigating mirai malware spreading in IoT environment. In: 2018
International conference on advances in computing, communications and informatics (ICACCI). IEEE; 2018. p. 2226–30.
52. Gope P. LAAP: lightweight anonymous authentication protocol for D2D-aided fog computing paradigm. Comput Secur.
2019;86:223–37.
53. Granjal J, Monteiro E, Silva JS. Security for the internet of
things: a survey of existing protocols and open research issues.
IEEE Commun Surv Tutor. 2015;17(3):1294–312.
54. Grooby S, Dargahi T, Dehghantanha A. Protecting IoT and ICS
platforms against advanced persistent threat actors: analysis of
apt1, silent chollima and molerats. In: Dehghantanha A, Choo
KK, editors. Handbook of big data and IoT security. Berlin:
Springer; 2019. p. 225–55.
55. Guth J, et al. A detailed analysis of IoT platform architectures:
concepts, similarities, and differences. In: Di Martino B, Li KC,
Yang L, Esposito A, editors. Internet of everything. Internet of
Things (Technology, Communications and Computing). Singapore: Springer; 2018.
56. Guzman A, Gupta A. IoT penetration testing cookbook: identify vulnerabilities and secure your smart devices. Birmingham:
Packt Publishing Ltd.; 2017.
57. Hadar N, Siboni S, Elovici Y. A lightweight vulnerability mitigation framework for IoT devices. In: Proceedings of the 2017
workshop on internet of things security and privacy. ACM; 2017.
p. 71–5.
58. Haj-Yahya J, Wong MM, Pudi V, Bhasin S, Chattopadhyay A.
Lightweight secure-boot architecture for RISC-v system-on-chip.
In: 20th International symposium on quality electronic design
(ISQED). IEEE; 2019. p. 216–23.
59. Hao P, Wang X, Shen W. A collaborative PHY-aided technique for end-to-end iot device authentication. IEEE Access.
2018;6:42279–93.
60. Hao Y, Miao Y, Hu L, Hossain MS, Muhammad G, Amin SU.
Smart-edge-cocaco: Ai-enabled smart edge with joint computation, caching, and communication in heterogeneous IoT. IEEE
Netw. 2019;33(2):58–64.
61. Hittini H, Abdrabou A, Zhang L. Sadsa: security aware distribution system architecture for smart grid applications. In: 2016 12th
international conference on innovations in information technology (IIT). IEEE; 2016. p. 1–6.
62. Hussain MA, Jin H, Hussien ZA, Abduljabbar ZA, Abbdal SH,
Ibrahim A. Enc-DNS-HTTP: utilising DNS infrastructure to
secure web browsing. Secur Commun Netw. 2017;. https://doi.
org/10.1155/2017/9479476.
63. IoT-Security-Foundation: IoT Security Training. 2019. https://
www.iotsecurityfoundation.org/iot-security-training/. Accessed
4 Sept 2019.
64. Jalali A, Azarderakhsh R, Kermani MM. Neon sike: supersingular isogeny key encapsulation on armv7. In: International conference on security, privacy, and applied cryptography engineering.
Springer; 2018. p. 37–51.
65. Jang SE, Park ST, Lee SJ. A study on online fraud and abusing
detection technology using web-based device fingerprinting. J
Korea Inst Inf Secur Cryptol. 2018;28(5):1179–95.
66. Javed B, Iqbal MW, Abbas H. Internet of things (IoT) design
considerations for developers and manufacturers. In: 2017 IEEE
Page 17 of 19
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
193
international conference on communications workshops (ICC
workshops). IEEE; 2017. p. 834–9.
Jin Y. Embedded system security in smart consumer electronics.
In: Proceedings of the 4th international workshop on trustworthy
embedded devices. ACM; 2014. p. 59.
Jones S, Tremlet C, Jackson M. The fundamentals of secure boot
and secure download: how to protect firmware and data within
embedded devices. 2019. https://www.maximintegrated.com/en/
app-notes/index.mvp/id/6426. Accessed 4 Sept 2019.
Jurcut A. Automated logic-based technique for formal verification of security protocols. J Adv Comput Netw. 2018;6:77–85.
Jurcut A, Coffey T, Dojen R. Design guidelines for security protocols to prevent replay and parallel session attacks. J Comput
Secur. 2014;45:255–73.
Jurcut A, Coffey T, Dojen R. Design requirements to counter parallel session attacks in security protocols. In: 12th IEEE annual
conference on privacy, security and trust (PST–14). IEEE; 2014.
p. 298–305.
Jurcut A, Coffey T, Dojen R. A novel security protocol attack
detection logic with unique fault discovery capability for
freshness attacks and interleaving session attacks. IEEE Trans
Dependable Secure Comput. 2017;16:969–83.
Jurcut A, Coffey T, Dojen R, Gyorodi R. Analysis of a keyestablishment security protocol. J Comput Sci Control Syst.
2008;1:42–7.
Jurcut A, Coffey T, Dojen R, Gyorodi R. Security protocol
design: a case study using key distribution protocols. J Comput
Sci Control Syst. 2009;2:16–21.
Jurcut AD, Ranaweera P, Xu L. Introduction to IoT security. In:
Liyanage M, Braeken A, Kumar P, Ylianttila M, editors. IoT
security: advances in authentication. New York: Wiley; 2020. p.
27–64.
Karimanzira D, Rauschenbach T. Enhancing aquaponics management with IoT-based predictive analytics for efficient information
utilization. Inf Process Agric. 2019;6:375–85.
Kasinathan P, Cuellar J. Securing the integrity of workflows in
IoT. In: EWSN; 2018. p. 252–7.
Kaushik S, Gandhi C. Cloud data security with hybrid symmetric
encryption. In: 2016 International conference on computational
techniques in information and communication technologies
(ICCTICT). IEEE; 2016. p. 636–40.
Keybase: Secure groups, files, and chat for everyone. https://
keybase.io/. Accessed 9 Sept 2019.
Klas GI. Edge cloud to cloud integration for IoT. 2016. https
://yucianga.info/wpcontent/uploads/2016/02/16_02_04_Edge_
cloud_to_coud_integration_for_IoT_v1.pdf. Accessed 28 Aug
2019.
Klein S. IoT solutions in microsoft’s Azure IoT suite. Berlin:
Springer; 2017.
Kliarsky A. Detecting attacks against the “internet of things”.
SANS Institute InfoSec reading room. 2017. https://www.sans.
org/readi ng-room/white paper s/detec tion/detec ting-attac ks039-internet-things-039-37712.
Kodali RK, Yadavilli S. Mongoose RTOS based IoT implementation of surveillance system. In: 2018 International conference
on communication, computing and internet of things (IC3IoT).
IEEE; 2018. p. 155–8.
Kolias C, Kambourakis G, Stavrou A, Voas J. Ddos in the IoT:
Mirai and other botnets. Computer. 2017;50(7):80–4.
Kumar S, Sahoo S, Mahapatra A, Swain AK, Mahapatra K. Security enhancements to system on chip devices for IoT perception
layer. In: 2017 IEEE international symposium on nanoelectronic
and information systems (iNIS). IEEE; 2017. p. 151–6.
Kumar T, Braeken A, Jurcut AD, et al. Age: authentication in
gadget-free healthcare environments. Inf Technol Manag. 2019.
https://doi.org/10.1007/s10799-019-00306-z.
SN Computer Science
193
Page 18 of 19
87. Kyriazis D, Varvarigou T. Smart, autonomous and reliable internet of things. Proc Comput Sci. 2013;21:442–8.
88. Labrado C, Thapliyal H. Hardware security primitives for vehicles. IEEE Consum Electron Mag. 2019;8(6):99–103.
89. Lehocine MB, Batouche M. Flexibility of managing VLAN
filtering and segmentation in SDN networks. In: 2017 International symposium on networks, computers and communications
(ISNCC). IEEE; 2017. p. 1–6.
90. Leloglu E. A review of security concerns in internet of things. J
Comput Commun. 2016;5(1):121–36.
91. Levshun D, Chechulin A, Kotenko I, Chevalier Y. Design and
verification methodology for secure and distributed cyber-physical systems. In: 2019 10th IFIP international conference on new
technologies, mobility and security (NTMS). IEEE; 2019. p. 1–5.
92. Li S, Da Xu L, Zhao S. The internet of things: a survey. Inf Syst
Front. 2015;17(2):243–59.
93. Lim JM, Kim Y, Yoo C. Chain veri: blockchain-based firmware
verification system for IoT environment. In: 2018 IEEE international conference on internet of things (iThings) and IEEE green
computing and communications (GreenCom) and IEEE cyber,
physical and social computing (CPSCom) and IEEE smart data
(SmartData). IEEE; 2018. p. 1050–6.
94. Lin ATY, Lee J, Lee D, Chen CC. The development of IC packaging under the internet of things standards. In: 2016 11th International microsystems, packaging, assembly and circuits technology conference (IMPACT). IEEE; 2016. p. 209–11.
95. Lin H, Bergmann N. Iot privacy and security challenges for smart
home environments. Information. 2016;7(3):44.
96. Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W. A survey
on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J.
2017;4(5):1125–42.
97. LinkLabs: Symphony link-internet of things wireless LPWA.
https://www.link-labs.com/symphony. Accessed 9 Sept 2019.
98. Mahmoodi Y, Reiter S, Viehl A, Bringmann O, Rosenstiel W.
Attack surface modeling and assessment for penetration testing
of IoT system designs. In: 2018 21st Euromicro conference on
digital system design (DSD). IEEE; 2018. p. 177–81.
99. Mahmud R, Kotagiri R, Buyya R. Fog computing: a taxonomy,
survey and future directions. In: Internet of everything. Springer;
2018. p. 103–30.
100. Marchand C, Bossuet L, Mureddu U, Bochard N, Cherkaoui A, Fischer V. Implementation and characterization of a
physical unclonable function for iot: a case study with the
tero-puf. IEEE Trans Comput Aided Des Integr Circuits Syst.
2017;37(1):97–109.
101. Mavroeidis V, Vishi K, Zych MD, Jøsang A. The impact of quantum computing on present cryptography. 2018. arXiv preprint
arXiv:1804.00200.
102. Mehnaz S, Mudgerikar A, Bertino E. Rwguard: a real-time detection system against cryptographic ransomware. In: International
symposium on research in attacks, intrusions, and defenses.
Springer; 2018. p. 114–36.
103. Milinković A, Milinković S, Lazić L. Choosing the right RTOS
for IoT platform. Infoteh Jahorina. 2015;14:504–9.
104. Mohamed N, Yussoff Y, Isa M, Hashim H. Symmetric encryption
using pre-shared public parameters for a secure TFTP protocol.
J Eng Sci Technol. 2017;12(1):98–112.
105. Mukhopadhyay SC, Islam T. Wearable sensors; applications,
design and implementation. IOP ebooks. Bristol, UK: IOP Publishing; 2017. ISBN: 978-0-7503-1505-0.
106. Naimi S, Naimi S, Mazidi MA. The AVR microcontroller and
embedded systems using assembly and C: using Arduino Uno
and Atmel Studio; 2017.
107. Navas RE, Le Bouder H, Cuppens N, Cuppens F, Papadopoulos
GZ. Do not trust your neighbors! a small IoT platform illustrating
SN Computer Science
SN Computer Science
108.
109.
110.
111.
112.
113.
114.
115.
116.
117.
118.
119.
120.
121.
122.
123.
124.
125.
126.
(2020) 1:193
a man-in-the-middle attack. In: International conference on adhoc networks and wireless. Springer; 2018. p. 120–5.
Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N.
Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun Surv Tutor. 2019;21:2702–33.
Nguyen-Duc A, Khalid K, Shahid Bajwa S, Lønnestad T. Minimum viable products for internet of things applications: common
pitfalls and practices. Fut Internet. 2019;11(2):50.
Oktug SF, Yaslan Y, Gulacar H. A prediction module for smart
city IoT platforms. In: Mouftah HT, Erol-Kantarci M, Rehmani
MH, editors. Transportation and power grid in smart cities: communication networks and services. New York: Wiley; 2018. p.
269–90.
Ouaddah A, Elkalam AA, Ouahman AA. Towards a novel
privacy-preserving access control model based on blockchain
technology in IoT. In: Europe and MENA cooperation advances
in information and communication technologies. Springer; 2017.
p. 523–33.
Ouaddah A, Mousannif H, Elkalam AA, Ouahman AA. Access
control in IoT: survey and state of the art. In: 2016 5th international conference on multimedia computing and systems
(ICMCS). IEEE; 2016. p. 272–7.
Pa YMP, Suzuki S, Yoshioka K, Matsumoto T, Kasama T, Rossow C. Iotpot: a novel honeypot for revealing current IoT threats.
J Inf Process. 2016;24(3):522–33.
Papert M, Pflaum A. Development of an ecosystem model for
the realization of internet of things (IoT) services in supply chain
management. Electron Mark. 2017;27(2):175–89.
Park HK, Lee K. A design of an AES-based security chip for IoT
applications using verilog HDL. Trans Korean Inst Electr Eng P.
2018;67(1):9–14.
Park J, Jung M, Rathgeb EP. Survey for secure IoT group communication. In: 2019 IEEE international conference on pervasive computing and communications workshops (PerCom workshops). IEEE; 2019. p. 1026–31.
Park S. OCF: new open IoT consortium. In: 2017 31st international conference on advanced information networking and
applications workshops (WAINA). IEEE; 2017. p. 356–9.
Pawar S, Vanwari P. Sybil attack in internet of things. Int J Eng
Innov Technol (IJESIT). 2016;5(4):96–105.
Pflanzner T, Kertész A. A survey of IoT cloud providers. In: 2016
39th international convention on information and communication
technology, electronics and microelectronics (MIPRO). IEEE;
2016. p. 730–5.
Porambage P, Okwuibe J, Liyanage M, Ylianttila M, Taleb T.
Survey on multi-access edge computing for internet of things
realization. IEEE Commun Surv Tutor. 2018;20(4):2961–91.
Preskill J. Quantum computing in the NISQ era and beyond.
Quantum. 2018;2:79.
Rahman AFA, Daud M, Mohamad MZ. Securing sensor to cloud
ecosystem using internet of things (IoT) security framework. In:
Proceedings of the international conference on internet of things
and cloud computing; 2016. p. 1–5.
Rajkumar MN. A survey on latest dos attacks: classification and
defense mechanisms. Int J Innov Res Comput Commun Eng.
2013;1(8):1847–60.
Ranaweera P, Jurcut AD, Liyanage M. Realizing multi-access
edge computing feasibility: security perspective. In: 2019 IEEE
conference on standards for communications and networking
(CSCN). IEEE; 2019. p. 1–7.
Ray PP. A survey of iot cloud platforms. Future Comput Inf J.
2016;1(1–2):35–46.
Ray S. System-on-chip security assurance for IoT devices: cooperations and conflicts. In: 2017 IEEE custom integrated circuits
conference (CICC). IEEE; 2017. p. 1–4.
SN Computer Science
(2020) 1:193
127. Ring T. Connected cars-the next targe tfor hackers. Netw Secur.
2015;2015(11):11–6.
128. Rivas M. Securing the home IoT network. SANS Institute InfoSec
Reading Room. 2017. https://www.sans.org/reading-room/white
papers/hsoffice/securing-20home-iot-network-37717.
129. Roetteler M, Naehrig M, Svore KM, Lauter K. Quantum resource
estimates for computing elliptic curve discrete logarithms. In:
International conference on the theory and application of cryptology and information security. Springer; 2017. p. 241–70.
130. Routray SK, Jha MK, Sharma L, Nyamangoudar R, Javali A,
Sarkar S. Quantum cryptography for IoT: aperspective. In: 2017
International conference on IoT and application (ICIOT). IEEE;
2017. p. 1–4.
131. Ryu M, Kim J, Yun J. Integrated semantics service platform for
the internet of things: a case study of a smart office. Sensors.
2015;15(1):2137–60.
132. Samaniego M, Deters R. Blockchain as a service for IoT. In: 2016
IEEE international conference on internet of things (iThings)
and IEEE green computing and communications (GreenCom)
and IEEE cyber, physical and social computing (CPSCom) and
IEEE smart data (SmartData). IEEE; 2016. p. 433–6.
133. Samarakoon S, Bennis M, Saad W, Debbah M: Federated learning for ultra-reliable low-latency v2v communications. In: 2018
IEEE global communications conference (GLOBECOM). IEEE;
2018. p. 1–7.
134. Sari A, Rahnama B, Eweoya I, Agdelen Z. Energizing the
advanced encryption standard (AES) for better performance. Int
J Sci Eng Res. 2016;7(4):992–1000.
135. Scaife N, Carter H, Traynor P, Butler KR. Cryptolock (and drop
it): stopping ransomware attacks on user data. In: 2016 IEEE
36th international conference on distributed computing systems
(ICDCS). IEEE; 2016. p. 303–12.
136. Singh S, Yassine A. Iot big data analytics with fog computing for
household energy management in smart grids. In: International
conference on smart grid and internet of things. Springer; 2018.
p. 13–22.
137. Slama D, Puhlmann F, Morrish J, Bhatnagar RM. Enterprise IoT:
strategies and best practices for connected products and services.
Sebastopol: O’Reilly Media Inc.; 2015.
138. Souri A, Hussien A, Hoseyninezhad M, Norouzi M. A systematic
review of IoT communication strategies for an efficient smart
environment. Trans Emerg Telecommun Technol. 2019. https://
doi.org/10.1002/ett.3736.
139. Stojkoska BLR, Trivodaliev KV. A review of internet of
things for smart home: challenges and solutions. J Clean Prod.
2017;140:1454–64.
140. Tonex: Iot security training course. 2019. https ://www.tonex
.com/iot-security-training-course/. Accessed 4 Sept 2019.
141. Tyagi S, Agarwal A, Maheshwari P. A conceptual framework for
IoT-based healthcare system using cloud computing. In: 2016 6th
international conference-cloud system and big data engineering
(confluence). IEEE; 2016. p. 503–7.
Page 19 of 19
193
142. Vaidya T, Burger E, Sherr M, Shields C. Where art thou, eve?
Experiences laying traps for internet eavesdroppers. In: 10th {
USENIX} workshop on cyber security experimentation and test
({CSET} 17); 2017.
143. Vijayasarathy LR, Butler CW. Choice of software development
methodologies: do organizational, project, and team characteristics matter? IEEE Softw. 2015;33(5):86–94.
144. Viriyasitavat W, Da Xu L, Bi Z, Pungpapong V. Blockchain
and internet of things for modern business process in digital
economy—the state of the art. IEEE Trans Comput Soc Syst.
2019;6(6):1420–32.
145. Voigt P, Von dem Bussche A. The EU general data protection
regulation (GDPR): a practical guide. 1st ed. Cham: Springer;
2017.
146. Wang S, Wang C, Hu Q. Corking by forking: vulnerability analysis of blockchain. In: IEEE INFOCOM 2019-IEEE conference
on computer communications. IEEE; 2019. p. 829–37.
147. Yang K, Liu S, Cai L, Yilmaz Y, Chen PY, Walid A. Guest editorial special issue on AI enabled cognitive communication and
networking for IoT. IEEE Internet Things J. 2019;6(2):1906–10.
148. Yang Y, Wu L, Yin G, Li L, Zhao H. A survey on security and
privacy issues in internet-of-things. IEEE Internet Things J.
2017;4(5):1250–8.
149. Yang YG, Zhao QQ. Novel pseudo-random number generator
based on quantum random walks. Sci Rep. 2016;6:20362.
150. Yi S, Qin Z, Li Q. Security and privacy issues of fog computing:
a survey. In: International conference on wireless algorithms,
systems, and applications. Springer; 2015. p. 685–95.
151. Yilmaz O. Ultra-reliable and low-latency 5G communication.
In: Proceedings of the European conference on networks and
communications (EuCNC-16); 2016.
152. Zamani E, He Y, Phillips M. On the security risks of the blockchain. J Comput Inf Syst. 2018. https://doi.org/10.1080/08874
417.2018.1538709.
153. Zhang J, Tan X, Wang X, Yan A, Qin Z. T2fa: transparent twofactor authentication. IEEE Access. 2018;6:32677–86.
154. Zhao K, Ge L. A survey on the internet of things security. In:
2013 Ninth international conference on computational intelligence and security. IEEE; 2013. p. 663–7.
155. Zorzo AF, Nunes HC, Lunardi RC, Michelin RA, Kanhere SS.
Dependable IoT using blockchain-based technology. In: 2018
eighth Latin-American symposium on dependable computing
(LADC). IEEE; 2018. p. 1–9.
Publisher’s Note Springer Nature remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.
SN Computer Science