A Beginners Guide To Internet of Things Security Attacks Applications Authentication and Fundamentals 9780367430696 - Compress
A Beginners Guide To Internet of Things Security Attacks Applications Authentication and Fundamentals 9780367430696 - Compress
to Internet of Things
Security
A Beginner’s Guide
to Internet of Things
Security
Attacks, Applications,
Authentication, and Fundamentals
B. B. Gupta
Aakanksha Tewari
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources.
Reasonable efforts have been made to publish reliable data and information, but the
author and publisher cannot assume responsibility for the validity of all materials or the
consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders if
permission to publish in this form has not been obtained. If any copyright material has not
been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted,
reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other
means, now known or hereafter invented, including photocopying, microfilming, and
recording, or in any information storage or retrieval system, without written permission
from the publishers.
For permission to photocopy or use material electronically from this work, please access
www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance
Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-
for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of
payment has been arranged.
-B. B. Gupta
-Aakanksha Tewari
Contents
Preface xi
Acknowledgments xiii
Authors xv
vii
viii Contents
41
5.1 Privacy in IoT 41
5.2 Threat to Data Privacy in IoT 43
5.3 Enforcing Trust in IoT 44
5.4 Trust Management 46
5.5 Conclusion 47
References 83
Index 91
Preface
The potential capabilities of Internet of Things (IoT) can reduce a lot of time
and expenditure of various organizations. These devices are excellent data
collectors and sensors; therefore, they can help in efficient decision-making
in a wide range of applications. However, security remains the biggest issue in
the IoT domain. A lot of research is being carried out in this area to provide
strong security and privacy mechanisms in IoT networks. The development
of standards and protocol sets is necessary to build the IoT network properly.
Only time will ultimately tell how far IoT will reach and how it will reshape
the world. However, by the planned integration of existing technologies, we
can make IoT networks secure and more efficient. We address various issues in
securing IoT networks, which enabled us to develop various mutual authentica-
tion protocols that strengthen the security and privacy of IoT devices and pre-
vent confidential data from theft. The present scenario of IoT research is mainly
focused on the development of technologies for its implementation. By exam-
ining the recent statistics and literature, it also uncovers various challenges
that have the potential to prevent IoT from growing to its full potential.
Specifically, the chapters contained in this book are summarized as
follows:
xi
xii Preface
Writing a book is a huge task and more rewarding than one could fathom. This
book entitled A Beginner’s Guide to Internet of Things Security is the result of
great contributions and encouragement from many people. None of this would
have been possible without their ideas and support, which has helped greatly
in enhancing the quality of this book. The authors would like to acknowledge
the incredible CRC Press/Taylor & Francis Group staff, particularly Randi
Cohen and her team, for their continuous assistance and motivation. This book
would not have been possible without their technical support. The authors are
eternally grateful to their families for their love and unconditional support at
all times. In the end, the authors are most thankful towards the Almighty who
is always helping us to overcome every obstacle not only for this work but also
throughout our lives.
September 2019
B. B. Gupta
Aakanksha Tewari
xiii
Authors
xv
Evolution of
Internet of
Things (IoT)
1
History, Forecasts,
and Security
The Internet of Things (IoT) is a new paradigm which is transforming
everything from the consumer market, that is, household devices to industrial
applications at large scales. The Internet was always intended to bring pieces
of software, services, and people together on one platform at a global level [1].
Nowadays with the evolution of IoT, day-to-day objects have also become
a part of the Internet sending and receiving updates continuously from one
place to another. Therefore, we can define IoT as a network of interconnected
devices, which provide services and share data-connecting and performing
tasks in various applications [2].
The highly distributed and dynamic nature of IoT enables it to receive and
store data continuously in huge amounts. For example, in the field of health-
care, it has led to remote health monitoring, emergency notifications, etc. The
consumer electronics markets are also exploding with wearable gadgets [3].
Various domains such as wireless sensor networks (WSN), embedded systems,
and radio frequency identification (RFID) are found to be huge contributors
towards the growth of IoT.
As IoT is an evolving domain, it requires a lot of attention from the
researchers and the industry as well. Various standardization organizations
such as IEEE and IETF are also working towards developing standards and
protocols for IoT architecture. The sensors and actuators that are consumed in
1
2 A Beginner’s Guide to Internet of Things Security
the consumer electronics market are very low cost and small sized and have
high computational capabilities, which are the reasons for the growth of IoT as
automation is made so easy. Industries are also deploying IoT at large scales
such as in retail management and transportation [3,4].
The understructure for IoT is the Internet providing connectivity, which
also adds to the vulnerabilities in these networks. IoT networks face the same
security threats as the Internet; in addition, due to their limited capabilities and
simpler architecture, they are easier to compromise. At the physical layer, most
of the IoT devices use RFID, therefore ensuring that RFID tags can secure our
data from any threat to security and privacy [5].
Our aim is to perform an in-depth analysis of the recent advancements in
the field of security and privacy in IoT networks. Research needs to be done
in order to facilitate the integration of IoT with other technologies in a secure
environment. This can be accomplished by designing standard communi-
cation methodologies and standard protocols. It is a primary requirement
to make IoT power efficient and reliable. The use of proper authentication
mechanisms is one way to ensure security against various attacks and main-
tain the availability and integrity of data and services at all times for autho-
rized users.
The aforementioned trends show that the rapid growth IoT has been in the past
few years as well as its potential growth in the coming years. It is estimated that
the economy of IoT security will be around $28.90 billion in 2020. However,
in 2015, it was $6.89 billion. The growth in IoT requires a significant amount
of investment in its security as well. We need security mechanisms that can
protect the IoT network architecture as a whole [12,13].
The current rate of development in IoT technology will help us predict
its future. Currently, the number of connected IoT devices is around
5 billion, most of which are personal devices. Most of the devices are
1 • Evolution of Internet of Things (IoT) 5
FIGURE 1.2 Percentage growth of IoT applications in the next ten years.
(Source: DBS Bank.)
6 A Beginner’s Guide to Internet of Things Security
carry out attacks, which can disrupt services or transfer control to attackers at
remote locations. IoT devices are vulnerable to various attacks such as replay,
forgery, phishing, and denial of service.
In January 2015, Proofpoint revealed a spamming incident where the traf-
fic was routed through several devices across various countries. This global
attack had more than 750,000 malicious emails transferred from various
locations, which were sent from consumer devices such as home routers,
televisions, media and centers. Later on, it was discovered that at least one
refrigerator was also involved in this attack. It was observed that the incident
started from December 23, 2014, and continued till January 6, 2014, where
the malicious email traffic was sent thrice a day with a burst size of 100,000
emails each. The targets were both enterprises and individuals. The primary
cause of these attacks was a lack of caution and awareness. The attackers
exploited misconfigurations and the continued use of default passwords, which
made the devices vulnerable and easy to control [13–15].
Another wave of IoT attacks occurred in 2016, which mainly involved
devices such as IP cameras and routers. The compromised devices were turned
into botnets. These botnets were used collectively to launch attacks on a large
scale. The cybercriminals are becoming more and more advanced. In an attack
in 2018, a device that controlled around 15 CCTV cameras was attacked.
However, in due time, the security operator detected the malicious activity and
issued a warning that this might infect many more CCTV models. Another
cause of these flaws is a lack of complete patching of IoT devices [16].
The IoT-based companies sometimes ignore security, or they are not expe-
rienced enough to realize the gravity of the situation (Figures 1.3 and 1.4).
Lack of consumer awareness is also a very big cause behind these successful
attacks. Consumers are often excited about the features and functions these
devices provide so that they do not pay attention to security updates and setting
strong passwords.
The attacks are proof of the lack of security schemes in IoT networks,
which need to be taken very seriously. In the current scenario, IoT gadgets are
vulnerable to various attacks that may disrupt their services and transfer the
control to some remote attacker. The attacker can impersonate a server and
make the devices decrease their message-sending rates or increase the rate of
their resource consumption and bandwidth. The attacker might also imper-
sonate any tag and send multiple fake requests to engage servers’ resources
eventually leading to DoS.
IoT devices are also needed to be protected from a wide range of threats,
which include malware infections, disruption of services, and information
theft. The attacker could easily gain in controlling the devices that are a
part of smart home, automobiles, or personal fitness and disease-monitoring
gadgets. An attacker can simply hack the software in a person’s smart watch
or an insulin pump to track their location, or they might gain access to
the information systems present in the automobiles and use them to carry
malicious activities.
The most serious threat IoT devices face is malware such as Trojans,
viruses, and worms that can disable IoT systems. Besides, this work also needs
to be done to ensure that updates received by IoT devices are secure along with
secure default settings. There is still a huge room for improvement when it
comes to securing the IoT architecture.
8 A Beginner’s Guide to Internet of Things Security
1.4 CONCLUSION
Our research work has addressed various issues in securing IoT networks,
which enabled us to develop various mutual authentication protocols that
strengthen the security and privacy of IoT devices and prevent confidential
data from theft. We have discussed that the present scenario of IoT research
is mainly focused on the development of technologies for its implementation.
By examining the recent statistics and literature, we have also uncovered vari-
ous challenges that have the potential to prevent IoT from growing to its full
potential.
The potential capabilities of IoT can reduce a lot of time and expenditure
of various organizations. These devices are excellent data collectors and sen-
sors; therefore, they can help in efficient decision-making in a wide range of
applications. However, security remains the biggest issue in the IoT domain.
A lot of research is being carried out in this area to provide strong security
and privacy mechanisms in IoT networks. The development of standards and
protocol set is necessary to build the IoT network properly. Only time will ulti-
mately tell how far IoT will reach and how it will reshape the world. However,
by the planned integration of existing technologies, we can make IoT networks
secure and more efficient.
IoT Design,
Standards,
and Protocols
2
The Internet of Things (IoT) is a highly distributed and dynamic cyber-physical
system. It integrates devices having sensors, identification systems, storage,
communication, processing, and networking capabilities. With the advance-
ment of technology, sensors and actuators have more complex specifications,
which are available in lesser cost and smaller sizes nowadays. These devices
are making the growth of ubiquitous computing easier. Various industries are
deploying IoT for the development of industrial applications to increase auto-
mation and monitoring. The rapid advancement of technology and industrial-
ization will enable the applications of IoT in various fields and industries. For
example, consider the food industry that has integrated radio frequency iden-
tification (RFID) technology with wireless sensor networks (WSN) in order
to automate the process of monitoring, tracking, and measuring the quality of
food of any food supply chain [1,2].
In this chapter, we will survey the current scenario of security and trust
management in IoT by analyzing existing works and taxonomies of security
schemes and checking their compatibility with the existing IoT applications.
We also open issues and challenges and the expected future trends related to
IoT growth and need of security. The ongoing research in the field of IoT is
majorly focused on technology [3]. The full realization of IoT is not done yet;
therefore, there are huge opportunities of technical growth and development in
the field of IoT. However, the rapid growth rate of technology and the research
in IoT will have applications in the fields such as law, economics, management,
and social studies [4]. RFID technology, which is a primary enabler for IoT,
has also seen a rapid growth in the last couple of years. It has applications in
the field of retail management, transportation and logistics, and healthcare [8].
With the increasing use of RFID, the maintenance of security and data privacy
has also become a chief concern.
RFID systems are always deployed in bulk; these systems comprise a set
of tags that have some storage and computational capabilities. These tags are
11
12 A Beginner’s Guide to Internet of Things Security
a. Node capture: The nodes present at the network gateway are more
likely to be compromised, which may result in the leakage of impor-
tant information that poses a serious threat to the security of the
entire network.
b. Fake node and malicious data: The adversary can add a mali-
cious node to the existing system through which they can circulate
14 A Beginner’s Guide to Internet of Things Security
malicious codes and information over the network, and can infect
the whole system.
c. Replay attack: The adversary replays a previous message to the
destination node so as to compromise the network trust and authen-
tication schemes.
2.3.2 Security Requirements
The security of IoT networks should be addressed by the communication
protocols used at each layer rather than the application of external security
models. The primary security designs aim to ensure confidentiality, integrity,
authentication, and anonymity. The security is ensured with the help of modes,
access control functions, and time synchronization present in IEEE 802.15.4.
For the 6LoWPAN layer, there are no security mechanisms defined so far.
However, the related RFCs mention security challenges and usage of security
in the network layer. For example, RFC 6606 discusses the significances of
security designs with time synchronization and localization. The RPL protocol
incorporates security modes. The control message contains 4-byte security
field. The field code has higher-order bit value to specify whether or not secu-
rity is implemented for the given message [20–23].
CoAP supports security at the application layer in integration with DTLS
(Datagram Transport Layer Security). DTLS ensures confidentiality, integ-
rity, and authentication at the application level. Figure 2.2 shows the security
designs at protocol level for each layer.
carrying out IoT attack campaign (which can be generalized for any security
attack) that is mentioned below:
• Plan: The first step taken by the adversary is planning of the attack,
which is not specific to IoT only. Before carrying out an attack, the
first step is to gain as much information as possible about the net-
work that is to be exploited. The users can gain information by hear-
ing the messages between the IoT devices and the server or between
the devices.
• Deploy: After collecting sufficient information, the attacker plans
the attack campaign, that is, deciding the medium of attack, getting
access to the IoT devices to install malicious software, and extract-
ing information using a remote system.
• Monitor/detect: After the malware is successfully installed in
the devices of an IoT network, the next step is to monitor the
communication and other functionalities of the IoT objects and
gather the required confidential information or bring the network
down, etc.
2 • IoT Design, Standards, and Protocols 19
The IoT devices are basically wireless devices with a limited number of
resources and require the identification of other objects and humans as well.
They are widely accepted in every field these days. But, having a limited
functionality, we require some lightweight mechanisms to secure them from
various attacks, as given in Table 2.1.
2.6 CONCLUSION
The popularity of sensor networks (and in a broader sense IoT) has increased
significantly over the past ten years. Integration of these embedded devices into
the Internet is challenging, since they have characteristics that differ strongly
20 A Beginner’s Guide to Internet of Things Security
from traditional Internet devices, such as very limited energy, memory, and
processing capabilities. Initially, research focused on developing proprietary
solutions that were typically vendor-specific and did not allow end-to-end
connectivity between client devices and sensor devices. However, the use of
standardized protocols enables the integration of constrained devices in the
IPv6 Internet, both at the network level and at the service level. We present a
high-level overview of the ongoing IETF standardization work that focuses on
enabling direct connectivity between clients and sensor devices. To this end,
different IETF groups are currently active. The IETF 6LoWPAN and ROLL
groups focus on the addressability and routing of IPv6, whereas the IETF
CoRE group focuses on realizing an embedded counterpart for RESTful web
services. By combining these protocols, an embedded protocol stack can be
created that has similar characteristics to traditional Internet protocol stacks.
In fact, the IETF protocols are designed to enable easy translation from Internet
protocols to sensor protocols, and vice versa. We also discuss the combina-
tion of IETF protocols enabling a flexible, direct interaction between internet
clients and embedded IoT devices. However, we show that the advent of stan-
dardized protocols is not an end point, but only a starting point for exploring
additional open issues that should be solved to realize an all-encompassing
IoT. Several open challenges remain, such as resource representation, security,
dealing with sleeping nodes, energy efficiency, integration with existing web
service technologies and tools, linking with cloud services, use of semantics,
easy creation of applications, scalability, interoperability with other wireless
standards, and maintainability. Anyone involved in IoT research (whether
dealing with network-layer aspects or service-layer aspects) will, sooner or
later, be confronted with the IETF protocols.
IoT’s
Integration
with Other
3
Technologies
In the early years of development, Internet of Things (IoT) had fewer resources
and machines, which had high-design installation cost. However, in the past
few years, there had been a significant growth in this domain that is making
the resources cheaper, which has led to the advanced research and developments
in this field. In order to perform a real-time evaluation and analysis of an exist-
ing IoT network, we need large-scale and multidisciplinary testbeds, which can
help us overcome the issues faced by these networks. These testbeds enable us to
evaluate whether the new IoT solutions are reasonable. These testbeds also mea-
sure the degree to which these applications will be of use to the consumers [24].
21
22 A Beginner’s Guide to Internet of Things Security
FIGURE 3.1 Design challenges for IoT testbeds (a) 2-level. (b) 3-level.
3.3.1 Data Storage
The rapid growth of IoT has led to the development of new kinds of gadgets in
various domains. The primary aim of any such network is the collection and
processing of data in order to make decisions so as to gain knowledge about
the environment. With the increase in devices, the volume of data over the
Internet has also increased overwhelmingly [29].
As data is processed at various layers of IoT, it becomes more structured
and readable (machine readable). Big data and cloud applications provide
various tools for processing and managing the data collected by IoT
sensors [30]. However, due to heterogeneity in the architecture of devices and
data as well as limited processing capabilities, IoT networks have different
design requirements in terms of interoperability, scalability, and security as
compared to the devices currently used on the web [31].
24 A Beginner’s Guide to Internet of Things Security
3.3.2 Cloud Computing
Cloud computing enables pervasive networks with on-demand service and
a pool of shared resources. It also provides unlimited space and loses cost
computation capabilities. The integration of cloud computing with IoT fulfills
the requirements of IoT architecture satisfying all the necessary constraints,
including application, service, and resource management [33–36]. In this
section, we discuss some of the issues with the integration of IoT and cloud.
3.3.3 Big Data
The big data produced by IoT is of different nature than the regular big data
due to heterogeneity and noise in the collected data. It is estimated by HP that
by 2030, the total number of sensors deployed will be in trillions, which will
make IoT a major contributor to big data [37–39]. The primary features that
map IoT data to big data are as follows:
The main features exhibited by big data produced by IoT are as follows:
3.3.4 Fog Computing
The fog extends the cloud to be closer to the things that produce and act on IoT
data. These devices, called fog nodes, can be deployed anywhere with a net-
work connection: on a factory floor, on top of a power pole, alongside a railway
track, in a vehicle, or on an oil rig. Any device with computing, storage, and
network connectivity can be a fog node. Examples include industrial control-
lers, switches, routers, embedded servers, and video surveillance cameras [40].
International Data Corporation (IDC) estimates that the amount of data
analyzed on devices that are physically close to the IoT is approaching 40%.
There is a good reason: analyzing IoT data close to where it is collected
minimizes latency. It offloads the gigabytes of network traffic from the core
network, and it keeps sensitive data inside the network [41]. Analyzing IoT data
close to where it is collected minimizes latency.
28 A Beginner’s Guide to Internet of Things Security
Fog applications are as diverse as the IoT itself. What they have in com-
mon is monitoring or analyzing real-time data from network-connected things
and then initiating an action. The action can involve machine-to-machine
(M2M) communications or human–machine interaction (HMI). Examples
include locking a door, changing equipment settings, applying the brakes on
a train, zooming a video camera, opening a valve in response to a pressure
reading, creating a bar chart, or sending an alert to a technician to make a
preventive repair. The possibilities are unlimited. Developers either port or
write IoT applications for fog at the network edge. The fog nodes closest to
the network edge ingest the data from IoT devices [42,43]. Then, this is crucial
that the fog IoT application directs different types of data to the optimal place
for analysis:
No built-in power sources are added into passive tags. Readers use radio
frequency to power up readers and normally fall into class 0 to 3 range. Class 4
states active tags only that contain their own internal power source to provide
energy for a specific time period for various operations. Class 5 deals with
active tags and readers only that can read data from various tags.
RFID is one of the primary enabling technologies for IoT. RFID is
replacing barcode in most of the applications. Using RFID in integration
with IoT, we can add authentication mechanisms to enhance the security
of devices. In the past few years, various mutual authentication schemes
have been proposed for RFID, which can secure IoT devices from security
threats.
30 A Beginner’s Guide to Internet of Things Security
• Scalability: More and more devices join the IoT network every
day, which raises challenges such as addressing, services, and data
management.
• Heterogeneity: IoT networks consist of different types of devices
gathering and storing different types of data, which needs to be
processed into meaningful information.
• Power and resource constraints: IoT devices have small memory
and low power supply; thus, we need to minimize the use of power
during communications.
• Integration with WSN node: The integration of RFID and WSN can
be possible for high-end applications, but it brings a lot of challenges
alongside; such types of nodes could have more than one sensor and
extra communication capabilities as compared to RFID.
• Vulnerabilities in RFID system: The RFID reader acts as a medium
between the tags and the server, and if in such cases, the number of
tags increases, then the system must always be scalable. For every
tag request, the server has to perform a linear search to identify the
tag and the time of this search process increases with the number
of tags, and it affects the performance of an authentication protocol
and increases the computational overload.
Industrial
Internet of
Things (IIoT)
4
Current industrial trends and initiatives aim to “connect the unconnected.”
Today, millions of embedded devices are used in safety and security critical
applications such as industrial control systems, modern vehicles, and
critical infrastructure. In the past decades, classical production engineering,
automation, and intelligent computation systems merged into the Industrial
Internet of Things (IIoT). The number of computation components integrated
into industrial control systems, production systems, and factories is steadily
increasing.
With the integration of classical computing into production systems,
emerging megatrends, such as mobile computing, cloud computing, and big
data, are becoming important drivers of innovation in the industry. Cloud-
based services are used to monitor and optimize complex supply chains.
Big data algorithms predict machine failures, which reduces downtimes and
maintenance costs; the interconnected production systems enable a tight
integration and optimization of production and business processes as well as
outsourcing production steps to other locations, companies, and freelancers.
In the near future, cloud-based services will allow considering more customer
requirements in the production process and planning, and enabling a new level
of product individualization at a minimal cost. This development driven by
computation systems is also called the “fourth industrial revolution.”
Industrial IoT brings many new challenges with regard to different
aspects, including security, privacy, standardization, legal, and social aspects.
In particular, increased diversity and large numbers of devices in IoT systems
require highly scalable solutions for, for example, naming and addressing, data
communication, knowledge management, and service provisioning. Further,
most IoT devices have only limited resources, which demands architectures
supporting low-power, low-cost, fully networked integrated devices that are
compatible with standard communication techniques.
31
32 A Beginner’s Guide to Internet of Things Security
value lies in the application side of things, and the growth in this industry will
be driven by smart applications from this point forward.
carry huge amounts of data. But this also widens the attack surface. Virtually
anything can become vulnerable, from high-value assets or services, critical
workloads in the cloud, process control subsystems in cyber-physical systems
to critical business and operational data.
Organizations need capabilities that will protect not only their assets and
networks, but also their entire IIoT ecosystems. Equally important is the ability
to respond quickly and effectively in the event of a breach. Organizations of
virtually all types must work to keep pace with ever-evolving IIoT threats.
To better understand IIoT security risks and implications, the IBM Institute
for Business Value (IBV) partnered with Oxford Economics to survey 700
executives. They represent 700 companies in 18 countries from the energy and
industrial sectors, of which 269 were electronics. They are all implementing
IIoT in their plants. The two most prevalent applications are for real-time equip-
ment monitoring and predictive maintenance, at 65% and 58%, respectively.
Automation of machines and processes are also common applications, with
45% and 43% using IIoT technologies to automate machines and workflow,
respectively.
Electronics companies are aware of the cybersecurity risks and are
working to manage their security spending accordingly. But they are less
clear on the combination of IIoT cybersecurity capabilities – skills, controls,
practices, and protective technologies – required to secure their current and
future business from IIoT threats.
4.5 CONCLUSION
To be cyber resilient, IoT manufacturers need to spend more time on security
measures in the product development stage. Products that come with reliable
endpoint protection and detailed monitoring infrastructure are well placed
to meet the security challenges of IIoT in 2018. Another primary task for an
IIoT deployment team is meeting encryption standards. Every interaction with
the system (from any device) must go through generally accepted cryptogra-
phy protocols. The volume of personal information being shared every day
across the network will only rise in the years to come – making encryption
one of the most critical measures from the perspective of privacy. As more
devices connect to a shared network, it becomes harder for IT teams to iden-
tify risks. As the WEF suggest, IIoT deployment teams must build modules
that define all the digital and physical assets that need protection. They also
need to better collect data on potential threats. One of the most significant
problems is when integrity legacy software with IIoT platforms is a lack of
40 A Beginner’s Guide to Internet of Things Security
41
42 A Beginner’s Guide to Internet of Things Security
Control can be lost if someone hacks into the smartphone or computer act-
ing as a remote for the other devices. In the case of computers and smartphones,
this hacking can be done remotely and often undetected. Smartphones, just
like computers, carry an enormous amount of personal information about their
owners. They often link to bank accounts, email accounts, and in some cases
household appliances. Stolen data can result in serious problems. Vehicles
contain many computers that control their function. Initially, these computers
could not be hacked into. With the increased connectivity of the IoT, however,
vehicles are now at risk due to being connected to the Internet.
In another sense, control can be lost as more and more companies col-
lect data about users. This data often paints a detailed picture of individual
users through the collection of activities online. Everything we search, all of
the activities online, is being tracked by companies that use that data. These
companies often use the data to improve the user’s experience, but they also
use this data to sell user’s products or sell to other companies who sell user’s
products. Innovation in this realm means that the organization must alter
the privacy policies that are in place as well as how they interact with these
devices. Companies will need to take another look at the policies that they
have in place to ensure that consumers are offered opportunities to access and
control their own data. Consumers will become increasingly aware of the pri-
vacy implications of this level of connectivity through an interaction with the
IoT and exposure to the policies that companies provide to them.
Frank Pasquale, law professor and EPIC advisory board member,
discusses privacy concerns related to the IoT in a May 2014 Pew Research
Report. He states that the expansion of the IoT will result in a world that is
more “prison-like” with a “small class of ‘watchers’ and a much larger class of
the experimented upon, the watched.” In another article, he reinforces the idea
that the IoT “will be a tool for other people to keep tabs on what the populace
is doing” [54].
EPIC President, Marc Rotenberg, explains in the Pew Research Report
that the problem with the IoT is that “users are just another category of things,”
and states that this “is worth thinking about more deeply about in the future.”
This is where the concept of “privacy by design” comes into play. In this
approach, manufacturers assess a product’s potential privacy risks and con-
siderations during the design phase, and then adjust or address those issues in
the product’s development and manufacturing process [55]. This concept is a
key feature in the General Data Protection Regulation (GDPR), in which the
most privacy-friendly settings such as those that collect, retain, and share per-
sonal information will be required to be designed and built into new products,
devices, and business processes when the rule takes an effect in 2018.
In general, a manufacturer’s IoT device privacy considerations should
reflect every step of the planned operating life and retirement of a device,
5 • Trust and Privacy in IoT 43
including how to address any associated cloud services, how much data
really needs to be gathered, and what should be done with any retained data.
For instance, these considerations could address the secondary market for
long-lived items such as refrigerators or cars.
IoT finds its applications in many different fields, for example, patients’ remote
monitoring, energy consumption control, traffic control, smart parking system,
inventory management, production chain, customization of the shopping at the
supermarket, and civil protection. For all of them, users require the protection
44 A Beginner’s Guide to Internet of Things Security
of IoT entities. The authors assume that most smart objects are human-carried
or human-related devices, so they are often exposed to public areas and
communicate through wireless, and hence vulnerable to malicious attacks.
Smart objects have heterogeneous features and need to cooperatively work
together. The social relationships considered are friendship, ownership, and
community, since users are friends among themselves (i.e., friendship), users
own the devices (i.e., ownership), and the devices belong to some communities
(i.e., community). Malicious nodes aim at breaking the basic functionality
of IoT by means of trust-related attacks: self-promoting, bad-mouthing, and
good-mouthing. The trust management protocol for IoT proposed in [61] is dis-
tributed, encounter based, and activity based: two nodes that come in touch to
each other or involved in a mutual interaction can directly rate each other and
exchange trust evaluation about the other nodes, so they perform an indirect
rate which seems like a recommendation. The reference parameters to trust
evaluation are honesty, cooperativeness, and community interest.
Therefore, such a dynamic trust management protocol is capable of
adaptively adjusting the best trust parameter setting in response to dynami-
cally changing environments in order to maximize application performance.
A similar approach to provide a trustworthiness evaluation is carried out in
[62] in the so-called Social Internet of Things (SIoT). This paradigm derives
from the integration of social networking concepts into IoT, due to the fact
that the objects belonging to the IoT infrastructure are capable of establishing
social relationships in an autonomous way with respect to their owners. The
challenge addressed in [63] is to build a reputation-based trust mechanism for
the SIoT, which can effectively deal with certain types of malicious behaviors
aimed at misleading other nodes, in order to drive the use of services and
information delivery only towards trusted nodes. A subjective model for the
management of trustworthiness is defined, which builds upon the solutions
proposed for P2P networks. Each node computes the trustworthiness of its
friends based on their own experience and the opinion of the common friends.
As a consequence, a node chooses the provider of the service it needs based on
this highest computed trustworthiness level.
Yet in relation to the social network context, in [64], the authors propose
a secure distributed ad hoc network; it is based on a direct peer-to-peer inter-
actions and the creation of communities in order to grant a quick, easy, and
secure access to users to surf the web; thus, it is close to the social network
concept. Each node (i.e., device) and each community have an identity in the
network and modify the trust of other nodes based on their behavior, thus
establishing a trust chain among users. The parameters analyzed are physical
proximity, fulfillment, consistency of answer, hierarchy on the trusted chain,
similar properties (e.g., age, gender, types of sensors), common goals and war-
rants, history of interaction, availability, and interactions. Chains of confidence
46 A Beginner’s Guide to Internet of Things Security
5.5 CONCLUSION
The real spreading of IoT services requires customized security and privacy
levels to be guaranteed. The broad overview provided with this survey arises
many open issues and shed some light on research directions in the IoT security
field. More in detail, a unified vision regarding the insurance of security and
privacy requirements in such a heterogeneous environment, involving different
technologies and communication standards, is still missing. Suitable solutions
need to be designed and deployed, which are independent from the exploited
platform and able to guarantee: confidentiality, access control, and privacy for
users and things, trustworthiness among devices and users, compliance with
defined security and privacy policies. Research efforts are also required to face
the integration of IoT and communication technologies in a secure middle-
ware, able to cope with the defined protection constraints. Another research
field is that of IoT security in mobile devices, increasingly widespread today.
Much efforts have been (and are being) spent by the worldwide scientific com-
munity to address the aforementioned topics, but there are still many open
issues to be faced.
Authentication
Mechanisms
for IoT
6
Networks
Developing comprehensive security and privacy solutions for IoT requires
revisiting almost all security techniques we may think of. Encryption proto-
cols need to be engineered so as to be efficient and scalable for deployment
on large-scale IoT systems and devices with limited computational resources.
Benchmarks are needed to perform detailed assessments of such protocols.
In addition, as devices may be physically unprotected, attackers may have
access to the state of the memory, while encryption operations are being
performed. Addressing such problems may require new techniques based,
for example, on white-box cryptography.
White-box encryption techniques hide encryption keys by transform-
ing them into large look-up tables in order to make harder for attackers to
extract the keys. Such techniques are, however, very expensive, and many
of the proposed white-box encryption protocols have been cryptanalyzed.
Introducing dynamics in the look-up tables by a shuffling approach may help
in addressing such a problem. In addition, scalability of such protocols is criti-
cal, in that in many safety-sensitive applications, encryption operations must
be very efficient. For example, in a vehicle network, a message from a vehicle
informing other vehicles of a sudden break should be processed very quickly
in order to give the other vehicles enough time to break.
49
50 A Beginner’s Guide to Internet of Things Security
Data security, availability, and quality are critical areas for IoT. Data security
requires, in addition to the use of encryption to secure the data while being
transmitted and at rest, access control policies to govern access to data, by
taking into account information on data provenance and metadata concerning
the data acquisition context, such as location and time. Availability requires
among other things to make sure that relevant data is not lost. Addressing such
requirement entails designing protocols for data acquisition and transmission
that have data loss minimization as a key security goal. Kinesis [69] is an
example of a sensor network system designed to make it possible for sensors
to automatically take response actions in the event of data transmission dis-
ruptions. Ensuring data quality is a major critical requirement in IoT as data
acquired and transmitted by IoT devices may be of poor quality, because of
several reasons such as bad device calibration, device faults, and deliberate
attacks aiming at data deception attacks. Solutions like data fusion need to
be revised and extended to deal with dynamic environments and large-scale
heterogeneous data sources.
6 • Authentication Mechanisms for IoT Networks 51
6.5.1 Hash-Based Protocols
Hash-chain based approaches deploy cryptographic mechanisms to secure pass-
words and other credentials. A hash chain of length “N” is obtained by recursive
application of one-way hash function with an initial value “x”: hN(x) = h(h(…
h(x)…)), such that if an adversary knows hN(x) and “x,” it cannot obtain hN−1(x).
6.5.2 ECC-Based Protocols
The current state-of-the-art authentication protocols for RFID systems include
various categories of solutions such as mechanisms built up on public key cryp-
tography or other mechanism to provide security at low cost by using simpler
techniques to ensure tag security. The use of public key cryptography for low-
cost devices is not a very efficient idea as it requires a lot of resources and
space. Similarly, if we attempt to use existing symmetric key solution with
these devices, the protocols fail to work efficiently due to different network
conditions and lesser resources.
ECC has been providing very efficient substitution to public key cryp-
tography for low-cost devices because it requires very small keys to provide
security and privacy comparable to traditional public key cryptography-based
schemes. The first ECC-based authentication protocol for RFID devices was
proposed by Tulys and Batina in 2006 [82]. However, later on, Lee et al. [83]
found out some weaknesses in this protocol and proposed a new solution to
address these issues.
Liao and Hsiao [84] proposed another ECC-based solution that did not
use any hash functions or complex computations, and hence, it was very
simple to implement and was suitable for passive tags also. Later on, Peeters
and Hermans [85] proved that the aforementioned protocol is unable to ensure
security against tracking, spoofing, and cloning. It also fails to ensure privacy.
Liao and Hsiao [75] proposed another authentication protocol, which claimed
to ensure privacy and anonymity; they also presented proofs that the protocol
ensures security against tracking and tag cloning.
Tan [86] proposed a three-factor-based key exchange mechanism for
secure communication between low-cost devices. However, this scheme was
unable to secure the devices against Denial of Service (DoS) and replay
attacks. To overcome the vulnerabilities of Tan’s protocol [86], Arshad
and Nikooghadam [87] presented an ECC-based authentication proto-
col. However, Lu et al. [88] showed that Arshad and Nikooghadam’s [87]
protocol is vulnerable to password attacks, which can make tags vulnerable
to impersonation.
6.5.3 PUF-Based Protocols
A physically unclonable function (PUF) is used to map a set of challenge val-
ues to set of response values based on a complex function. The complex func-
tion is based on a physical system and computes a response value for each
challenge. PUFs provide a cost-effective security protocol. There are various
6 • Authentication Mechanisms for IoT Networks 57
ways to implement a PUF, for example, using silicon physical systems, which
hides timing and delay of Integrated Circuits (ICs). PUFs are embedded in
devices and track even various changes in the host environment, for example,
temperature and pressure. A different response value will be generated every
time the host environment changes. Thus, PUFs are hard to predict due to dif-
ferent responses even with a slight change in the challenge values. However,
some solutions [89–93] suggested that in order to obtain the secret value from
the token, the PUF has to deploy some error correction techniques, which
increase the cost of computations.
Some other works have also explored various weaknesses that exist in
PUF-based functions. Most of the PUFs fail to ensure a mutual authentication
between the tag and the reader. PUF-based approaches also have scalability
issues and are prone to DoS attacks, which can disrupt the connection and
services between the server and the tag permanently.
6.5.4 HB Protocols
Hopper and Blum [94] proposed an authentication scheme in 2001, known as
HB protocol. These protocols rely on Learning Parity with Noise (LPN) prob-
lem, which is a computationally hard problem.
LPN problem [95]: Assume P to be a matrix with the dimension q, x to be
a k-bit binary vector, and υ to be a vector such that wt(υ) ≤ q·η, where η ∈ [0, ½]
and the size of v is q-bits. If we have z = P·x ⊕ υ, then the LPN problem is to
obtain x0 such that |P·x0 ⊕ υ | ≤ q·η.
LPN has various applications in cryptography as it is able to provide
a stepping stone for provably secure solutions; that is, it can be mathe-
matically shown that the solution is able to resist an active attacker in the
existing environment. These schemes are very simple and take only a few
step; thus, these schemes are very feasible for low-cost devices. The cryp-
tographic schemes are mostly decisional; for the LPN problem, it can be
shown that there is not a very significant difference between the decisional
approach and the search approach. The cryptographic notions that can be
derived from this problem can be collision resistant. The LPN problem is
assumed to be collision resistant and remains a hard problem even for non-
uniform noise values.
Juels and Weis [96,110] presented another HB-based approach for RFID
systems referred to as HB+ [97]. They also demonstrated an active attack and
added some other minor computations to improve the HB protocol. Later on,
Gilbert et al. [98] proved that both HB and HB+ schemes are vulnerable to
man-in-the-middle attacks.
58 A Beginner’s Guide to Internet of Things Security
6.5.5 Ultra-Lightweight Protocols
The fourth class of protocols is the ultra-lightweight protocols, which are
entirely developed using bitwise operations such as OR, AND, XOR, rotation,
or permutation. These protocols have the lowest overhead in terms of storage
and computation.
In SASI [99], each tag has an ID and shares a pseudonym (IDS) and
key value with the backend database server. The length of each of them is
96-bits. SASI ensures strong authentication and integrity, and uses bitwise
XOR (⊕)(⊕), bitwise OR (∨)(∨), bitwise AND (∧)(∧), addition mod 2n(+),
and left rotate (Rot(x, y)) operation, which left rotates the value of x with
y-bits. Complex operations such as hash functions are not used by this proto-
col. However, this protocol is susceptible to disclosure attacks and does not
ensure untraceability.
Peris-Lopez et al. proposed LMAP [100] protocol that used simple bit-
wise operations XOR (⊕)(⊕), bitwise OR (∨)(∨), bitwise AND (∧)(∧), and addi-
tion mod 2m (+). This protocol ensures a mutual authentication and security
from various attacks without the use of complex operations like hashing. This
scheme uses an index pseudonym (IDS), which is 96-bits in length. Here, the
IDS is the index of the row where all the tag-related data are stored. Each tag
has key, which is divided into four parts of 96-bits each.
M2AP [101] protocol, which is very similar to LMAP [100], is also a
lightweight mutual authentication protocol for RFID tags, where the index
pseudonym updation procedure is different from LMAP while key updating
operations remain the same. Both LMAP and M2AP [101] ensure anonym-
ity and mutual authentication and provide security against various attacks,
such as replay attacks and man-in-the-middle attacks. However, both of
these protocols are susceptible to desynchronization and full- disclosure
attacks.
Another protocol called EMAP [102], which is based on challenge–
response mechanism, is an authentication scheme for passive tags. Most of
the complex computations in this protocol are performed by the reader, and
tags perform lightweight operations such as hash. It only requires one storage
unit for the tag in addition to the ID for storing authentication-related data.
This protocol also ensures confidentiality, integrity, and untraceability.
Peris-Lopez et al. proposed the Gossamer protocol [103], which addresses
the weaknesses of SASI [99] such as desynchronization and disclosure attacks.
It uses dual rotations and MixBits operation, which is a lightweight function
(i.e., combination of bitwise right shift and addition operations). However, this
protocol has low throughput.
6 • Authentication Mechanisms for IoT Networks 59
6.6 CONCLUSION
IoT is the next step towards using Internet anywhere and anytime. IoT allows
to connect people and devices (things) anytime and anyplace, with anything
and anyone. The main security issues related to IoT are explained in brief.
By observation, it is easy to understand that there is no project still in work,
which satisfies all security issues in IoT. Also, there is no single project that
provides policy enforcement in the IoT. In summary, an accomplished vision
admiring the assurance of security and privacy constraints in a dissimilar
environment, which implies that current security services are insufficient for
such contradictory technologies and communication standard. As IoT deals
with interconnecting various heterogeneous things, currently there are many
challenges occurring while building it. So this area has many open research
issues. The future research directions mainly consist of how to deal with the
challenges, may be related to security issues, faced by IoT.
Provable
Security
Models and
7
Existing
Protocols
Internet of Things (IoT) devices have restricted resources and energy; how-
ever, they require regular updates and identification from other devices and the
backend server. Thus, security is also a major concern, and the most common
way to do it is mutual authentication between the communicating parties. The
authentication schemes used for RFID tags are generally lightweight consider-
ing the constraints over IoT devices.
The RFID tags have a capacity of few kbs and deploy around 5,000–6,000
gates, out of which only a few hundred can be devoted to security functions.
However, the classical cryptography authentication protocols require around
30,000–40,000 logic gates. In addition to that, we also have to consider the
limited battery power.
However, in spite of these issues, the use of RFID tags in various fields
has been increasing rapidly. Nevertheless, we cannot ignore the privacy issues
related to these systems. The items deploying these tags may reveal confiden-
tial data such as location due to predictability. A very common solution to this
issue is the use of random values as keys. There are many more issues such
as above, which are faced by RFID systems. For example, various security
models do not take into consideration that an adversary could be able to attack
a tag physically, for example, tampering of the tag.
However, this situation must always be considered as products with low
cost can be physically compromised very easily. Any adversary can carry out
“reset” attacks and side-channel attacks by influencing the physical conditions
61
62 A Beginner’s Guide to Internet of Things Security
of the tags, that is, varying power and voltage. Some models, however, take
this into consideration while examining a protocol’s security.
Many researchers have been working on these past couples of years to
ensure the security and privacy of RFID systems. However, there is still no
generic solution to this problem as most of the existing solutions are specific
to particular scenarios or provide security against certain types of attacks.
In addition to finding security solutions for RFID devices, researchers are
also working on developing formal models, which can be used to prove the
strength of protocols. These models help in analyzing the design and work-
ing of RFID protocols. They also emphasize the strengths and weaknesses of
a protocol. However, these models also suffer from various deficiencies; for
example, most of the frameworks do not fully comprehend the effects of func-
tionalities and the level of access provided to the adversary on the system.
7.1.1 Vaudeney’s Model
This model [104] has the capability to affect all the ongoing communications
between entities and is able to perform a man-in-the-middle attack on any
entity accessible to the adversary. It also has the authority to get the output of
a device authentication (0 or 1). The adversary in this model is able to select or
deselect tags randomly which are moving in and out of the range. The adver-
sary has the ability to corrupt tags by extracting the details of their internal
state. During any ongoing session, the adversary has a temporary identifier for
the tags within its range.
7 • Provable Security Models 63
Adversary: it is an algorithm that interacts with tags, has a public key, and
requires oracles to carry out its operations. Vaudeney classified adversaries
into the following categories:
• Attack phase: During this phase, the adversary interacts with the
system and queries with the oracle to gather information.
• Analysis phase: During this phase, the adversary is given a table of
tags, among which it has to identify the legitimate and fake tags.
A generates results as 0 or 1. If the output is 1, A wins.
ExpVaudeney(S,A)
Attack phase
■ Challenger initializes system S and a key is sent to A.
■ Depending upon the class A belongs to, it communicates with tags and oracles
to gather information during a protocol session.
Analysis phase
■ A analyzes S without any oracle.
■ A is sent a table by DrawTag oracle.
■ On basis of previous interactions, A outputs 0 or 1.
• Nonobvious link: a link between two virtual tags (v1, v2) is said to
be nonobvious if
i. Both tags refer to the same tag ID.
ii. A “dummy” adversary that can call DrawTag, CreateTag,
Free, Corrupt, and oracle is unable to generate this link with
probability ≥ 1/2.
• A nonobvious link can be categorized into the following classes:
i. Standard: if both virtual tags are not corrupted by the adversary.
ii. Past: if v1 is uncorrupted.
iii. Future: if v2 is uncorrupted.
iv. We have Future(Strongest Privacy) ⊇ Past ⊇ Standard.
( )
ExpUNT ( S , A ) = Pr ( Awins ) – Pr AD wins ≤ ∈
Canard et al.’s model has most certainly overcome some of the demer-
its of Vaudeney’s by using A D and nonobvious links, but it still can-
not be used with every scheme due to the use of nontrivial links and
the limited scope within which untraceability is defined (as shown
in Figure 7.2).
Correctness: A scheme S is correct for any class of adversary A, if
any A ∈ {Strong, Destructive, Weak} is a PPT algorithm where
SuccessCORRECT (S, A) is negligible (as shown in Figure 7.3). It can
be stated as:
SuccessCORRECT ( S , A ) = Pr ExpCORRECT ( S , A ) = 0
66 A Beginner’s Guide to Internet of Things Security
ExpCORRECT(S,A)
For an algorithm run for each adversary (PPT), there is a real-world simula-
tion of the algorithm, which can be modeled into an ideal-world scenario in
the presence of a simulated adversary A in such a way that Z cannot be able to
distinguish if it is interacting with the adversary and algorithm instance in the
ideal world or the real world.
The adversary in the UC security model interacts with both real-world and
ideal-world environments. The adversary can eavesdrop into all the commu-
nications and can schedule the activation sequence of the entities. Every ses-
sion has an identifier “sid,” which is shared by all the entities involved in the
communication. During the session initiation, Z becomes active first and then
activates the adversary. If Z stops, the whole simulation is aborted. Z may also
allow more than one protocol session to run simultaneously.
In the ideal scenario, the UC framework implements an anonymous
authentication and anonymous key exchange functionality. To ensure anonym-
ity in all the channels, anonymous wireless communications are involved.
Figures 7.4 and 7.5 give a brief description of authentication and key exchange
functionalities.
There are many ways for combining more than one protocol together, for
example, sequential or concurrent executions. The protocol executions can be
run by one or more than one entity and have one or more inputs and outputs.
All of the scenarios can be considered as special cases of UC framework by
varying uses of synchronization, sub-session, and inputs.
• To assign a new secret key to the tag, the SetKey message is used.
When the tag receives SetKey message, it discards the old key value
and a new arbitrary secret is allotted to the tag.
• The TagInit message initializes the session key to a new value,
discards the current session details, and issues a new session key.
• The ReaderInit message is used by R to initialize a new session.
68 A Beginner’s Guide to Internet of Things Security
Anonymous mutual authentication functionality has a session identifier ‘sid’ shared by all the entities
A requests to impersonate T:
IMPERSONATE(s,T)
If INIT(s,server) is stored locally AND T is impersonated by A
Return ACCEPT (T) to server
Anonymous mutual authentication functionality has a session identifier ‘sid’ shared by all the entities
A requests to impersonate T:
IMPERSONATE(s,T)
If INIT(s,server) is stored locally AND T is impersonated by A
Return ACCEPT(T) to server
In this approach, it is assumed that the adversary A listens and controls all
the ongoing communications between the reader and the tags. Here, one reader
R and a tags (T ∈ Tags), at the end of each session if one protocol party finds
the other to be legitimate it outputs Accept.
A has the ability to issue the following queries:
In the game that is to be played between the party and the adversary, the goal
of the adversary is to identify the correct tag, and both of them must be fresh;
that is, it has not been issued any corrupt queries. The following phases are
considered in the game:
= Pr [ b ′ = b ] – 1 2
adversary that cannot corrupt a tag under any circumstances (the possibility
of this happening is very low), this model is feasible. Other models such as
UC and Juels–Weis assume that a tag can always be corrupted. However, in
Juels–Weis challenge phase, the adversary is unable to corrupt any of the tags.
Vaudeney’s model also provides an adversary with the authority to corrupt
tags at the end of the protocol run under the forward secrecy notion. However,
the Juels–Weis model has some constraints. It can also allow the adversary to
corrupt a tag only to back-trace previous sessions that come under their notion
of forward privacy.
Both Vaudeney’s and Canard et al.’s models define a strong adversary,
which has no restrictions on any kind of tag corruption. Initially, Vaudeney’s
model has failed to achieve the highest level of privacy, which can be reached
in all other models. However, Ouafi et al. have extended Vaudeney’s model to
incorporate the notion of strong privacy.
UC allows more parallel and sequential runs of protocols and is able to
incorporate all the tags present in the system at a time. However, Juels–Weis
model specifies no tag at the initial stage, and the adversary is allowed to study
(n − 1) tags at most.
An Internet of
Things (IoT)-
Based Security
8
Approach
Ensuring Robust
Location
Privacy for the
Healthcare
Environment
Recently, various applications of IoT are being developed for the healthcare
domain. In this chapter, our contribution is to design a lightweight security
approach for the Internet of Things (IoT) devices in healthcare. The main goal
is to make patients’ lives easier and comfortable and to provide them more
effective treatment. In addition, we also intend to address the issues related
to location privacy and security due to the deployment of IoT devices. We
have proposed a very simple mutual authentication protocol, which provides
strong location privacy using hash function, pseudo-random number generator
(PRNG), and bitwise operation. The security strength of our protocol is veri-
fied through a formal proof model for location privacy.
73
74 A Beginner’s Guide to Internet of Things Security
crucial to mitigate the security risks and to develop strong and secure networks
keeping in mind the cost barrier.
IoT-based healthcare systems are networks containing devices that are
interconnected and perform sharing and processing of a significant amount of
data. Securing these networks requires cryptographic techniques, which can
be adapted as per the architecture and computing capabilities of IoT devices.
Various such protocols have been proposed in the past few years. One of the
major security concerns is that one single device cannot be considered alone
because even if a single device in the network is vulnerable to outsider threats,
it will provide a gateway for unauthorized access to the whole network. To
remedy this issue, we need to ensure that all the devices in the network are
secure against tracking and disclosure attacks so that the device identification,
location, and communication data remains secure.
In this chapter, we propose a simple lightweight mutual authentication pro-
tocol for healthcare systems with low computation and storage requirements.
Our protocol uses a minimal number of messages between the reader and the
tag for authentication purposes. We deploy one-way hash, random number
generator, and bitwise shift operation for our protocol, which ensures mutual
authentication between the tag and the reader. Location privacy is one of the
primary requirements for any device. Our protocol ensures strong security by
providing both indistinguishability and forward secrecy. We have deployed a
formal model to give a demonstration of security provided by the proposed
protocol to ensure security, privacy, and correctness.
which is sent via radio frequency, and records the communication between
the server and the tag. However, it is not possible for the attacker to decrypt
the hash values; therefore, each message has a new random variable value. For
each tag, these values will be different; thus, the intercepted information is of
no use to the attacker (Figure 8.2).
Phase I: Initialization
1. Set each tag ti ∈ T with secret key ki.
2. Save ki ∀ ti ∈ T in the reader’s database.
e
1
Adv gA ( ti ) = k
2
≤ ( n − 1) Adv gA ( t1 )
e
1 1
≤ ( n − 1) k ≤ ( n − 1) ke
2 2
8.7 CONCLUSION
The increasing cost of healthcare is a big issue these days as everyone can-
not afford the resources. The main aim behind the integration of IoT with
healthcare is to provide healthcare facilities to anyone at any place. Although
the devices may be large or may be as small as rice grain installed inside a
human being or an animal, it is important to secure these devices as they
deal with human-related data and vitals. In this chapter, we have presented
82 A Beginner’s Guide to Internet of Things Security
a very simple yet strong location privacy authentication solution for such
devices, which can be implemented at very low cost without affecting the
device mobility as it does not require any higher-layer resources. Our pro-
tocol is suitable for both passive and active tags. Further, our work can be
extended to make the proposed solution suitable for other business models,
taking into account their functional and nonfunctional requirements. At the
physical level, we can work on variants of our protocol to be based on some
hard-mathematical problems.
References
1. J. Buckley (ed.) The Internet of Things: From RFID to the Next-Generation
Pervasive Networked Systems. Auerbach Publications, New York, 2006.
2. L. Atzori, A. Iera, G. Morabito, “The Internet of Things: a survey,” Comput.
Netw. vol. 54, pp. 2787–2805, 2010.
3. M. Zorzi, A. Gluhak, S. Lange, A. Bassi, “From today’s Intranet of Things to a
future Internet of Things: a wireless- and mobility-related view,” IEEE Wirel.
Commun. vol. 17, pp. 43–51, 2010.
4. H.S. Ning, Z.O. Wang, “Future Internet of Things architecture: Like mankind
neural system or social organization framework?” IEEE Commun. Lett. vol. 15,
pp. 461–463, 2011.
5. K.E. Psannis, S. Xinogalos, A. Sifaleras, “Convergence of Internet of Things
and mobile cloud computing,” Syst. Sci. Control Eng. Open Access J. vol. 2,
no. 1, pp. 476–483, 2014.
6. R. Roman, P. Najera, J. Lopez “Securing the Internet of Things,” Computer
vol. 44, no. 9, 51–58, 2011.
7. J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, “Internet of Things (IoT): a
vision, architectural elements, and future directions,” Futur. Gener. Comput.
Syst. vol. 29, no. 7, pp. 1645–1660, 2013.
8. K. Ashton, “That ‘Internet of Things’ thing,” RFiD J. 2009. www.itrco.jp/
libraries/RFIDjournalThat%20Internet%20of%20Things%20Thing.pdf, Last
accessed January 2019.
9. Near Field Communications History “Timeline of RFID technology,” 2016.
Available at: www.nfcnearfieldcommunication.org/timeline.html, Last accessed
January 2019.
10. Postscapes, “History of Internet of Things,” 2016. Available at: http://postscapes.
com/internet-of-things-history, Last accessed January 2019.
11. E. Welbourne, L. Battle, G. Cole et al. “Building the Internet of Things Using
RFID: the RFID ecosystem experience,” IEEE Computing Society, 2009.
Available at: http://homes.cs.washington.edu/~magda/papers/welbourne-
ieeeic09.pdf, Last accessed January 2019.
12. G. Abramovich, “15 facts about Internet Of Things,” April 2015, Available at:
www.cmo.com/articles/2015/4/13/mind-blowing-stats-Internet-of-things-iot.
html, Last accessed January 2019.
13. J. Hanson, “The 10 challenges of securing IoT communications,” May 2015,
Available at: www.pubnub.com/blog/2015-05-04-10-challenges-securing-iot-
communications-iot-security/, Last accessed January 2019.
14. Cyber Security Ventures, “IoT Security Report, Q3 2015.” Available at: http://
cybersecurityventures.com/internet-of-things-security-report-q3-2015/, Last
accessed April 2016.
83
84 References
15. Sophos Labs, “Mobile and IoT attacks: SophosLabs 2019 Threat Report.”
Available at: https://nakedsecurity.sophos.com/2018/11/23/mobile-and-iot-
attacks-sophoslabs-2019-threat-report/, Last accessed January 2019.
16. Forbes, “2017 Roundup of Internet Of Things forecasts.” Available at: www.
forbes.com/sites/louiscolumbus/2017/12/10/2017-roundup-of-internet-of-
things-forecasts/#2bbbc6541480, Last accessed January 2019.
17. IT Pro, “IoT malware tripled in the first half of 2018.” Available at: www.
itpro.co.uk/malware/31945/iot-malware-tripled-in-the-first-half-of-2018, Last
accessed January 2019.
18. J. Granjal, E. Monteiro, and J. Sá Silva, “Security for the Internet of Things: A
survey of existing protocols and open research issues,” IEEE Commun. Surveys
Tuts., vol. 17, no. 3, pp. 1294–1312, 3rd Quart., 2015.
19. IEEE Standard for Information Technology, Telecommunications and infor-
mation exchange between systems-Local and metropolitan area networks-
Specific requirements Part 15.4: Wireless Medium Access Control (MAC)
and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal
Area Networks (WPANs) Amendment 3: Alternative Physical Layer
Extension to support the Japanese 950 MHz bands, IEEE Std 802.15.4d-
2009 (Amendment to IEEE Std 802.15.4-2006), (2009) 1–27 doi:10.1109/
IEEESTD.2009.4840354.
20. S. Raza, S. Duquennoy, T. Voigt, “Securing communication in 6LoWPAN
with compressed IPsec,” in International Conference on Distributed
Computing in Sensor Systems (DCOSS), Barcelona, 1–8 2011. doi:10.1109/
DCOSS.2011.5982177.
21. T. Clausen, U. Herberg, and M. Philipp, “A critical evaluation of the IPv6 routing
protocol for low power and lossy networks (RPL),” in Proceedings of the IEEE
7th International Conference on Wireless and Mobile Computing, Istanbul,
2011, pp. 365–372.
22. Z. Shelby, K. Hartke, C. Bormann, and B. Frank, Constrained Application
Protocol (CoAP).draft-ietf-core-coap-18. Internet Eng. Task Force (IETF),
Fremont, CA, 2013.
23. W. Colitti, K. Steenhaut, N. De Caro, B. Buta, and V. Dobrota, “Evaluation of
constrained application protocol for wireless sensor networks,” in Proceedings of
the 18th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN),
Chapel Hill, NC, 2011, pp. 1–6.
24. T. Borgohain, U. Kumar, S. Sanyal, “Survey of operating systems for the IoT
environment,” arXiv preprint arXiv:1504.02517, 2015/4/13.
25. Arm Limited MBed OS, Available at: https://mbed.org/technology/os/ Last
accessed February 2018.
26. E. Baccelli, O. Hahm, M. Günes, M. Wählisch, and T.C. Schmidt, “RIOT
OS: Towards an OS for the Internet of Things,” in Proceedings of the IEEE
Conference on Computer Communications Workshops (INFOCOM WKSPS),
Turin, Italy, 2013, pp. 79–80.
27. A. Dunkels, B. Gronvall, and T. Voigt, “Contiki—A lightweight and flexible
operating system for tiny networked sensors,” in Proceedings of the 29th Annual
IEEE International Conference on Local Computer Networks, Tampa, FL,
2004, pp. 455–462.
References 85
44. N. Wu, M. Nystrom, T. Lin, and H. Yu, “Challenges to global RFID adoption,”
Technovation, vol. 26, pp. 1317–1323, 2006.
45. R. Ratasuk, A. Prasad, Z. Li, A. Ghosh, and M.A. Uusitalo. “Recent advance-
ments in M2M communications in 4G networks and evolution towards 5G,” in
Innovation in Clouds, Internet and Networks, Paris, 2015, pp. 52–57.
46. B. Ray, “What is M2M? 2018 Update,” Available at: www.link-labs.com/blog/
what-is-m2m, Last accessed September 2019.
47. Business Wire, “Internet of Things (IoT) & Machine-to-Machine (M2M)
industry almanac, 2019.” Available at: www.businesswire.com/news/
home/20190501005539/en/Internet-Things-IoT-Machine-to-Machine-M2M-
Industry-Almanac, Last accessed September 2019.
48. A. Holst, “M2M (machine-to-machine) - statistics & facts.” Available at: www.
statista.com/topics/1843/m2m-machine-to-machine/, Last accessed September
2019.
49. K. Fischer and J. Gesner, “Security architecture elements for IoT enabled
automation networks,” in 2012 IEEE 17th Conference on Emerging
Technologies Factory Automation (ETFA), Krakow, Poland, September 2012,
pp. 1–8.
50. S. Pirbhulal, H. Zhang, M.E. E Alahi, H. Ghayvat, S.C. Mukhopadhyay, Y.T.
Zhang, W. Wu, “A novel secure IoT-based smart home automation system
using a wireless sensor network,” Sensors, vol. 17, p. 69, 2016. doi:10.3390/
s17010069.
76. J. Chou, “An efficient mutual authentication RFID scheme based on elliptic
curve cryptography,” J. Supercomput., vol. 70, no. 1, pp. 75–94, 2014.
77. Y.-J. Tu and S. Piramuthu. “RFID distance bounding protocols,” in 1st
International EURASIP Workshop in RFID Technology, Vienna, Austria, 2007.
79. S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, “Security & privacy aspects
of low-cost radio frequency identification systems,” Security in Pervasive
Computing, LNCS no. 2802, 2004, pp. 201–212.
80. A. Henrici, P. Muller, “Hash-based enhancement of location privacy for radio-
frequency identification devices using varying identifiers,” in International
Workshop on Pervasive Computing and Communication Security PerSec,
Orlando, FL, 2004, pp. 149–153.
81. D. Molnar, D. Wagner, “Privacy and security in library RFID: Issues, practices,
and architectures,” in Conference on Computer and Communications Security—
ACM CCS, Washington, DC, 2004, pp. 210–219. (ISBN: 1-58113-961-6).
82. P. Tuyls, L. Batina, “RFID-tags for anti-counterfeiting,” In Topics in Cryptology
(CT-RSA’06), LNCS 3860, 2006, pp. 115–131.
83. Y.K. Lee, L. Batina, and I. Verbauwhede, “EC-RAC (ECDLP based random-
ized access control): Provably secure RFID authentication protocol,” in IEEE
International Conference on RFID, Las Vegas, NV, 2008, pp. 97–104.
84. Y. Liao and C. Hsiao, “A secure ECC-based RFID authentication scheme
integrated with ID-verifier transfer protocol,” Ad Hoc Networks, 2013,
doi:10.1016/j.adhoc.2013.02.004.
92. D. Sadhya and S.K. Singh, “Providing robust security measures to Bloom
filter based biometric template protection schemes,” Comput. Secur., vol. 67,
pp. 59–72, 2017.
93. E. Aysu, D. Gulcan, P. Moriyama, Schaumont, and M. Yung, “End-to-
end design of a PUF-based privacy preserving authentication protocol,”
in Proceedings of the 17th International Conference on Cryptographic
Hardware and Embedded Systems (CHES), vol. 9293, Saint-Malo, France,
September 2015, pp. 556–576.
94. N.J. Hopper and M. Blum, “Secure human identification protocols, Advances
in Cryptology – ASYACRYPT’2001,” Lecture Notes in Computer Science,
vol. 2248, Springer, 2001, pp. 52–66.
95. M.L. Blum, M.J. Furst, R.J. Kearns, “Lipton, crypto-graphic primitives based on
hard learning problems, Advances in Cryptology – CRYPTO’93,” Lecture Notes
in Computer Science, Springer, 1993, pp. 278–291.
96. A. Aysu, Y. Wang, P. Schaumont, and M. Orshansky, “New maskless debias-
ing method for lightweight physical unclonable function,” in Proceedings of
the IEEE International Symposium on Hardware Oriented Security and Trust
(HOST), McLean, VA, May 2017, pp. 134–139.
97. J. Katz, J.S. Shin, “Parallel and concurrent security of the HB and HB+
protocols,” Cryptology ePrint Archive, Report 2005/461, 2005, http://eprint.
iacr.org.
98. H. Gilbert, M. Robshaw, H. Silbert, “An active attack against HB+ – A provable
secure lightweight authentication protocol,” Cryptology ePrint Archive, Report
2005/237, 2005, http://eprint.iacr.org.
99. H.-Y. Chien, “SASI: A New Ultralightweight RFID Authentication Protocol
Providing Strong Authentication and Strong Integrity”, IEEE Trans. Depend.
Secure Comput., vol. 4, no. 4, pp. 337–340, 2007.
91
92 Index
D H
Database issues in IoT, 24 Harvard Business Review, 5
Data integration requirements, 25 Hash-based protocols, 53–55
Data management, 15 HB protocols, 57
Data privacy, 43–44 Healthcare domain, location privacy
Data reuse tools, 24 abstract overview, 74–75
Data security, 50 authentication scheme, concept of, 78
Data storage, 23–25 performance analysis, 81
Data, types of, 28 problem definition, 74
Denial of service (DoS) attack, 19 protocol description
Destructive adversary, 63 IoT devices authentication, 76
Desynchronization attack, 19 mutual authentication protocol, 75–76
DTLS (Datagram Transport Layer Security), 16 security analysis
“Dummy” adversary, 65 game-based security model, 78–79
strong location privacy, 80–81
E Healthcare industry, IoT applications, 36
Heterogeneity, 14, 30
ECC, see Elliptic curve cryptography (ECC) Hewlett-Packard (HP), 5
Echo, Amazon, 3 HMI, see Human-machine interaction (HMI)
Elliptic curve cryptography (ECC), 53, 56 HomeKit, Apple, 3
EMAP protocol, 58 HP, see Hewlett-Packard (HP)
Embedded systems, 17, 32, 34 Human–machine interaction (HMI), 28
Energy capacity, 51
EPCglobal, 29 I
Evolution of IoT
security, fundamentals of IBV, see Institute for Business Value (IBV)
different layers, 8 ICs, see Integrated Circuits (ICs)
IoT system, 8–9 ICT, see Information and communication
statistics and forecasts, 4–7 technology (ICT)
IDC, see International Data Corporation (IDC)
F Identifier (ID), 74
IDS, see Index pseudonym (IDS)
Fake node and malicious data attack, 13 IEEE 802.15.4, 15, 16
Fog computing, 27–28 IEEE design standards, 17
Food supply chain (FSC), 36–37 IETF (Internet Engineering Task Force), 15,
Forward adversary, 63 17, 22
Forward secrecy, 9, 76, 80 Index pseudonym (IDS), 58
“Fourth industrial revolution,” 31 Indistinguishability, 76, 80
FSC, see Food supply chain (FSC) Industrial control systems, 38
FTBAC, see Trust-Based Access Control Industrial Internet of Things (IIoT)
(FTBAC) applications, 35–37
Full disclosure attack, 19 and cybersecurity, 38–39
Fuzzy approach, 45 M2M TO IoT, 32–34
secure automation, 34–35
G wireless communications, 33
Information and communication technology
Game-based security model, 62, 78–79 (ICT), 2
General Data Protection Regulation (GDPR), 42 Information Flow Control, 44
Index 93
Improved
A streamlined A single point search and
experience for of discovery discovery of
our library for all of our content at both
customers eBook content book and
chapter level