Lu 2018
Lu 2018
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1
A S an emerging technology and, really, a revolution, the infrastructure ensures that devices are maintained in a secure
Internet of Things (IoT) has brought tremendous changes environment and that users can use them appropriately. The
to end users in their daily lives. For individuals, their living, scale of IoT smart devices is very broad, and includes
studying, and working are all involved in the IoT network, computers, smart phones, communication interfaces, operating
taking advantage of smart environments (home and city), systems, lightweight services, and preloaded applications.
eHealth, and transportation systems. For businesses or Equipped with RFID sensors or actuators, intelligent devices
institutions, innovations like advanced automation and can execute accordingly, make decisions autonomously, and
industrial manufacturing, knowledge sharing and data disseminate information to users safely [7], [8].
management, and smart and self-modifying mechanisms and With the advancement of internet and wireless
systems are becoming more and more popular [1]. communication, smart devices and things, and IP protocol and
Due to the rapid development in telecommunication systems, sensor network technologies, more and more network-based
IoT can collaborate with Wireless Sensor Networks (WSNs), objects have been involved in IoT cybersecurity. These
Radio Frequency Identification (RFID), things, and networks in advanced technologies also are having a huge impact on new
any form, at any time, and anywhere. Cybersecurity is the ICT and on Industry 4.0 [9]. Cybersecurity is spread across the
inevitable problem that must be solved in the development of IoT network, a global infrastructure of heterogeneous smart
devices that integrate sensory, communications, networking,
Yang Lu received his B.S. degree from Jilin University, China, in 2004 and 1978, M.S. degree in information science and engineering from the University
the M.S. degree from the University of Manchester, UK, in 2006. He is of Science and Technology of China, in 1981, and Ph.D. degree in systems
currently pursuing his Ph.D. degree in ICT (Information and Communication science and engineering from Portland State University, USA, in 1986 (e-mail:
Technology) in USA. He is a member of IEEE. He has published research [email protected]). (Corresponding Author).
papers in refereed journals published by major publishers such as Elsevier, He is an IEEE Fellow, academician of the European Academy of Sciences,
Taylor and Francis, and World Scientific (e-mail: [email protected]/ziiyuu@ and academician of the Russian Academy of Engineering (formerly USSR
gmail.com). Academy of Engineering). Dr. Xu is a 2016 and 2017 Highly Cited Researcher
Li Da Xu (M’86–SM’11-F’16) received B.S. degree in information science in the field of engineering named by Clarivate Analytics (formerly Thomson
and engineering from the University of Science and Technology of China, in Reuters Intellectual Property & Science).
Copyright (c) 2012 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from
the IEEE by sending a request to [email protected].
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 2
and information processing technologies [1]. In addition, many challenges and opportunities for other interested researchers.
other technologies and devices, such as barcodes, smart phones, According to the five databases, there exist a large number of
social networks, and cloud computing, that are used in IoT journal articles and conference papers related to IoT
influence cybersecurity, to some extent. cybersecurity. For this research, for example, 433 articles
The cybersecurity of IoT is often cited by countries and (IEEE Xplore) from 2013 were chosen. The trend in Figure 1
institutions to implement standards and laws in order to achieve illustrates that cybersecurity is becoming a hot issue in IoT
a high degree of cybersecurity. The United States, China, and research.
the United Kingdom are the three largest countries affected by
IoT cybersecurity threats, especially by smart home attacks II. IOT-BASED CYBERSECURITY MANAGEMENT
[10]. In the U.S., the Cybersecurity for the Internet of Things SYSTEM
(IoT) program has been implemented to control and to improve IoT integrates heterogeneous smart devices into an integrity
the cybersecurity of smart devices and the entire environments network. IoT cybersecurity is a mechanism for the strategic
by standards and guidelines [11]. China’s Cybersecurity Law improvement of, and encompasses all of the changes involved,
(CSL) was initiated on June 1, 2017. The Cyberspace in IoT, to ensure the safety of the entire environment.
Administration of China (CAC) is the primary governmental
authority to supervise and enforce the CSL. The CSL regulates A. Cybersecurity-Oriented IoT Architecture
cybersecurity from different aspects, including network In Table I, the popular IoT cybersecurity architectures from
operation security and network information security, as well as different perspectives are listed. The table clearly illustrates that
managing monitoring, early warning, and emergency responses scholars construct IoT cybersecurity frameworks into three
within mainland China [12]. Europe has made progress in major categories: basic three-layer architecture, derived four-
various sectors, such as energy, vehicles, and residential, in layer architecture, and detailed five-layer architecture. The
cybersecurity [13]. layers are the perception (sensor) layer, the accessing layer, the
network layer, the middleware layer, the application (service)
layer, and the interface layer.
350
Table I
300 SUMMARY OF DIFFERENT IOT ARCHITECTURES
Number of Articles
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 3
can satisfy various industries. The two bottom layers the field memory, disk space, processor time, and configuration
data collection layer and the access gateway layer process data information outages are all potential channels for DoS attacks
collection, the Internet layer serves communication media, and [4], [22]-[24]. A DoS attack has two types: Distributed Denial
the two top layers (the middleware layer and the application of Service (DDoS) and Ordinary DoS [25].
layer) are responsible for data utilization. 1) The Sensing Layer
The architectural design of IoT-based cybersecurity is The sensing layer, which consists of data sensors and
concerned with architecture protocols, wireless networking and networks, can detect, collect, process, and transmit information
communication, principles and functionalities, heterogeneous or data to the entire network [1]. There exist three major
and ubiquitous devices, authentication, lightweight cybersecurity issues at this layer: (1) the strength of wireless
technologies, etc. From the technological perspective, the signals, (2) the exposure of sensor nodes in IoT devices, (3) the
design of the architecture requires accessibility, integrity, dynamic nature of IoT topology, and (4) communication,
availability, scalability, confidentiality, and interoperability computation, and storage and memory constraints [26].
among heterogeneous smart devices [20]. From the This layer employs three popular mechanisms to protect the
hardware/software limitations, the design of the architecture IoT network: the lightweight encryption mechanism, the access
should be used in conjunction with computing and energy, control mechanism, and the nodes authentication mechanism.
memory, tamper-proof packaging, embedded software, and In practice, many attacks and crimes, such as Replay Attacks,
dynamic patches. Since cybersecurity might change or might Timing Attacks, Node Capture Attacks, Malicious Data
need real-time interaction within the related environment, an Attacks, and others, focus on the confidentiality of the
adaptive architecture is needed to assist devices which perception layer.
dynamically interact with other things in IoT. At each layer, A Replay Attack is made by spoofing, altering, or replaying
IoT devices and services are vulnerable to malicious attacks that the identity information of smart devices in the IoT network. A
can disrupt or destroy IoT network and services. From the Time Attack is an attacker stealing the encryption key
perspective of cybersecurity, a four-layered IoT architecture associated with time and other important information [27]. A
(Table II) is constructed in our study. Node Capture Attack is when an attacker takes over nodes and
captures useful information and data. In addition, the attacker
TABLE II can send Malicious Data to the layer by adding another node to
A FOUR-LAYERED CYBERSECURITY-ORIENTED the network [26]. A Side Channel Attack (SCA) refers to an
ARCHITECTURE FOR IOT
Layers Description Attack Types
attack on the side leakage information (such as time
Sensing Sensing objects and data. Replay Attacks, Timing consumption, power consumption or electromagnetic radiation,
Attack focus: Attacks, Node Capture etc.) of the encryption device, through the operation process of
confidentiality Attacks, Malicious Data the device [14].
Attacks, SCA (Side
As an example, Hanney needs to prove her identity to Jerry
Channel Attack)
Networking Networking and data Spoofed, altered or to access a web account. Jerry requests her password as proof
transmission. Attack replayed routing of identity, and it is provided by Hanney. At the same time, Jack
focus: confidentiality, information, Sybil, is eavesdropping on the conversation and saves the password.
privacy, and Wormholes
Later, Jack shows the password to Jerry as proof of access to
compatibility
Middleware Data delivery. Attack Malicious Insider, Hanney's website account.
focus: authenticity, underlying infrastructure, 2) The Network Layer
integrity and third-party relationships, The network layer serves the function of data routing and
confidentiality virtualization threat transmission to different IoT hubs and devices over the Internet
Application Requested service Phishing Attack, Virus,
provision. Attack focus: Worms, Trojan Horse and and the mobile network [2]. At this layer, cloud computing
data privacy and identity Spyware, Malicious platforms, Internet gateways, switching, and routing devices are
authentication Scripts, Unauthorized operated by using some of the very recent technologies such as
Access WiFi, LTE, Bluetooth, 3G/4G, Zigbee etc. The network
gateways serve as the mediator between different IoT nodes by
B. The Four Layers and Cybersecurity aggregating, filtering, and transmitting data to and from
different sensors.
The IoT is a global network, in which things or objects can
Confidentiality, privacy, and compatibility are the main
be connected and operated by smart devices such as Radio-
cybersecurity issues at this layer. In the IoT global network, the
Frequency Identification (RFID) tags and readers [21], sensors,
interactive function may be human-to-machine, machine-to-
actuators, smartphones, etc. At each layer, IoT-related things
human, human-to-human, or machine-to-machine. The
are susceptible to Denial of Service attacks (DoS), due to their
interconnection is handled by wired or wireless mechanisms
limited storage capacity, power consumption, and computation
among heterogeneous smart devices. Because everything is
capability.
embedded in the IoT network, attackers have a good chance of
A DoS Attack is an attempt to deny end users access to
evincing criminal activities. Specifically, the network layer is
resources related to the Internet of Things (e.g., machine or
very vulnerable to a type of attack called a Man-in-the-Middle
network resources). Interference channels, bandwidth,
attack. Advanced protocols and software/hardware can detect
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 4
abnormal behaviors or situations to keep IoT secure [28], [29] [32]. The attacker injects malware into the system through
Spoofing, modification, and replay are mutual direct attacks viruses, worms, Trojan horses, and spyware to deny service,
that target data exchange, generate fake and false messages, and change data, and/or access confidential data [36]. When the user
create routing loops between nodes. A Sybil attack is a single monitors the gateway and runs the Active-X script, the system
node that can be located at multiple locations at the same time shuts down. Attackers can control access and steal data [37]. In
across multiple identities. Sybil attacks steal information by an Unauthorized Access Attack, an attacker can easily cause
spreading malware, reducing integrity and resource utilization damage to the system by forbidding access to related services
within the Internet of Things. Social media such as Facebook of IoT or by deleting existing data.
and Twitter are vulnerable to Sybil attacks [30].
C. Attack Taxonomy
As an example, an attacker can contaminate the entire
network by sending fake routing information. On Twitter, a user Due to the heterogeneity of smart devices, communication
is asked to do a survey before allowing him/her to enter the fake protocols, applications, and services, the attacks appear to be
Twitter login page. As the user logs in, the fake page can record malicious. We categorize different attacks into eight
the user's credentials, display the login error, and redirect the classifications [13]. Details are in Figure 2.
user to the real Facebook page. During this operation, the user's
information can be stolen. Device High end class, low end class
3) The Middleware Layer
The middleware layer is based upon the principle of Service
Oriented Architecture (SOA) [2]. It is a software layer between Location Internal, external
network and application levels. At this level, the authenticity,
integrity and confidentiality of all of the exchanged data needs
to be operated and managed. Through the Internet of Things Access Level Active, passive
architecture, intelligent middleware can combine high spatial-
temporal resolution with the ubiquitous nature of sensor
Information Interruption, eavesdropping, modification,
networks and other identifiable things to create dynamic Damage Level fabrication, replay, man-in-the-middle
mechanisms for the physical world in the digital/virtual world IoT
[31]. Attacks
A Malicious Inside Attack is the internal attackers Host Promise User, hardware, software
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 5
Internal threats (“Insider”) originate from inside the IoT this section, we briefly introduce some common
network, and external threats (“Outsider”) originate outside the countermeasures that apply not only to different layers but also
IoT network [42]. In an internal attack, the attacker attempts to to smart devices, intelligent objects, and the entire network.
execute his own malicious code on smart devices in the IoT RFID (Radio Frequency Identification) and WSNs (Wireless
network. There are four types of internal attacks in practice: Sensor Networks) are the two fundamental technologies for the
affected roles, unintentional roles, emotional attackers, and creation and development of IoT. Moreover, technological
technically aware roles. An attacker tries to randomly, and device-involved measures and security schemes are illustrated
without the user’s knowledge, access IoT smart devices outside in detail.
the network, remotely.
A. RFID-based Authentication Measures
Without disrupting information and communication in the
IoT network, passive attacks involve monitoring and RFID technology allows the microchip to transmit
eavesdropping to recover information [26], [43]. Contrary to identification information to the reader through wireless
passive attacks, active attacks directly affect the communication. By using RFID devices, people and entities
communication system in the IoT networks. Active attacks can can identify, track, and monitor any object that has an RFID tag
circumvent or destroy smart devices and can destroy or label attached. RFID has been widely used in transportation
information or data [44], [40]. systems, medical records, and supply chain management [54].
The focus of the Interrupt Attack is on interrupting the RFID and the related technologies and instruments will be the
availability of the system. If this occurs, resources will be cornerstone of the upcoming Internet of Things, even as Radio
exhausted and smart devices may shut down [7], [45]. Frequency Identification techniques (RFID) and the related
Eavesdropping on the communication channel prevents the technologies make IoT more feasible and riskier, especially
receiver device from selecting packets to send. RFID devices when one considers possible application for authentication in
are vulnerable to eavesdropping attacks [46]. Attacks can alter the IoT global network.
or modify information or data in the IoT smart devices to RFID devices tag or label each device to enable identification
mislead the communication protocol. This attack threatens the mechanisms in the IoT network. Authentication is a necessary
integrity of the IoT network security requirements [47]. A and viable connection between two things to prevent data
Fabrication Attack occurs when an attacker inserts counterfeit attacks. Specifically, RFID cybersecurity measures include (1)
data into the IoT architecture to create damage to the IoT access control, (2) data encryption, (3) IPSec-based security
information system and to threaten IoT authentication [43]. channels, (4) cryptography technology schemes, and (5)
Credential information or data (such as passwords or keys) physical cybersecurity schemes.
associated with actual users may be misappropriated and Access control is a mechanism to prevent attackers from
abused [48]. Attackers attack software because of IoT device stealing or misusing RFID devices’ information or data, such as
exhaustion or resource buffer overflow vulnerability [49]. label failure, chip protection, and antenna energy analysis. Data
Attackers injecting malicious code or stealing the actual driver encryption is a mechanism that encrypts RFID signals and
or connecting to the device is a Hardware Attack [50], [51]. prevents data privacy through an algorithm. This algorithm also
Since most smart devices are run in an outdoor environment, prevents attackers from eavesdropping and tampering with data
physical attacks are likely to tamper with hardware. Physical during transmission. The IPSec-based secure channel integrates
attacks are similar to hardware attacks. Logical Attacks bring IPSec protocols and security mechanisms to perform
dysfunction to communication systems over the IoT network authentication and encryption over the IoT network. Based on
without harming physical devices [52]. secure communication protocols (hash function, random
Attackers can attack IoT in an abnormal manner. External number mechanism, server data search, logic algorithms, and
attackers may pretend to be insiders and may execute malicious re-encryption mechanisms), cryptographic technology
code on the IoT network. Thus, attackers can attack protocols solutions primarily protect user privacy, in addition to the
by disrupting internal or external networks: key management confidentiality, authenticity, and integrity of RFID systems.
protocol, data aggregation protocol, synchronization protocol, Physical security schemes can be divided into two categories:
etc. Deviation Attacks have two target protocols: application hiding and masking. The hiding schemes eliminate the data
protocol and the network protocol [39]. dependencies of the energy consumption; the masking schemes
randomize the intermediate values of the encryption devices
III. KEY ENABLING MEASUREMENTS [14].
The IoT is susceptible to various security attacks by hackers B. WSN-based Measures
or behavioral criminals. Many researchers [53] have explored Wireless Sensor Network (WSN) technology uses
the IoT security countermeasures from layer-level perspectives. interconnected smart devices for sensing and monitoring. Its
At each layer, the related attacks and countermeasures are applications include environmental monitoring, medical
described. But so many objects, attacks, and countermeasures monitoring, industrial monitoring, traffic monitoring, etc. [55],
are spread across the dynamic network. For instance, DoS [56].
attacks appear at most layers of the IoT network via malicious Data and information are collected and transmitted through
attacking perspectives, and RFID devices use different WSN, in which attackers actively and aggressively attack
countermeasures to deal with attacks throughout IoT. Hence, in
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 6
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 7
IoT is Capability-based Access Control (CapBAC) [66]-[69]. operations and to become more cost-effective tools [71].
CapBAC uses a cryptographic token to protect access rights and Cybersecurity attacks directly threaten the confidentiality,
privileges. The CapBAC schemes have two classifications: the integrity, and availability of healthcare systems, and include
centralized approach, which explores the access control logics DoS attacks, remote brute force attacks, man-in-the-middle
into a central entity in Cloud, and the distributed approach, attacks, password sniffing, Trojan horses, and data tampering.
which embeds the access control logics into IoT smart devices. [72] addresses the security and privacy challenges faced by
The centralized schemes include XACML, SAML based eHealth wireless technologies and eHealth smart devices.
schemes, Kerberos, RADIUS based schemes, OAuth based With the widespread use of IoT technology in healthcare,
schemes, and Context-aware schemes, and the distributed new security and privacy issues have arisen. It allows for data
schemes include Proxy Assisted schemes, Embedded PDP, etc. privacy, reliability, integrity, and unauthorized identification
A centralized approach fulfills the requirements of and tracking of objects. For example, an intruder can use an
interoperability, computation complexity, and memory interfering signal to block an infinite communication line
efficiency. However, the communication between smart between an RFID tag and a reader in IoT, or even spoof an
devices and the external entity has to be overloaded. On the RFID tag to send an error message to the reader. This will lead
other hand, a distributed approach has good level of scalability, to confusion in the medical information system and seriously
but lacks interoperability and memory efficiency [39]. affect the safety of patients. With the development of IoT and
the related technologies, medical care will develop into
intelligence, electronic information, artificial intelligence,
IV. KEY APPLICATIONS IN INDUSTRIES personalization and mobility [19].
The IoT makes full use of things, like smart devices and data B. Smart Domain
from the physical world, in a global network, in order to provide
IoT has connected people to things, like smart homes, smart
secured services to end-users. The IoT cybersecurity system
cities, smart meters, smart devices, smart appliances, and social
will bring tangible benefits to all walks of life. The more
networks. IoT will bring unprecedented improvements in
interactions and interoperability, the higher the standard
quality of life. One of the goals of IoT is to develop smart
mechanisms and services, the more life-cycle management, and
environments and self-conscious/autonomous objects: smart
the better the collaboration between companies. Industry relies
transport, smart cities, smart homes, smart health, smart living,
heavily on control systems, sensor equipment and data
and so on [73], [74].
networks. The disadvantages of this trend have led to an
Cybersecurity includes illegal access to information and
increase in the number and the types of cybersecurity threats.
attacks, resulting in a disruption of service availability. Data
Cybersecurity attacks against infrastructure and systems have
privacy and emergency responses trigger technical challenges
become commonplace in various industries, among medical
in smart environments. For cybersecurity purposes, the IoT
services, smart cities and home design, and transportation and
infrastructure needs to be confidential, auto-immune, and
parking systems.
reliable, in order to protect and to improve the smart
A. Healthcare Service Industry environment. For example, in a smart home, only authorized
The basic characteristics of IoT are the comprehensive users can monitor all the IoT-related smart devices. The
recognition of information, reliable delivery of information and password for IoT-related smart devices should be kept
smart processing of information. The development of IoT has confidential. Auto-immunity protects a family from potential
promoted the informationization process of the medical system. intruders through an alarm [75].
The application of IoT technology in the medical field will A smart home is a collection of devices that make up a variety
improve the cooperation and integration of traditional of smart system. A dynamic heterogeneous architecture is built
information technology in the healthcare industry [1], [2]. through the awareness layer, the network layer and the
IoT cybersecurity in the healthcare industry is associated application layer. In the smart home system architecture based
with medical information, identification, hospital emergency, on IoT, there is a unified operating standard between the
remote monitoring and home care, drug and production universal IoT devices. The IoT device organization system
supervision, medical equipment and medical waste tracking, connects to the access center without directly accessing related
blood management, infection control and many more [70]. For devices. Wireless communication methods are commonly used
example, traditionally medical information needs to be between IoT devices and access centers. Users can interact and
manually entered to generate information, networks, and manage with IoT devices through different platforms. For
individual functions. Each department and participant are example, a personal computer. Commonly used interaction
relatively independent, and information is asymmetry. IoT methods are: directly interacting with the device through the
technology completely breaks these limits with its terminal access center; connecting to the Internet center through the
scalability and accessibility. It enables healthcare systems to Internet cloud service [73].
more effectively improve overall information levels and C. Transportation and Parking System
collaborate on a variety of service functions.
The Transportation IoT was proposed in the context of the
In the healthcare environment, wireless wearable devices can
development of IoT. In the context of the application of IoT-
use IoT-derived data and information to improve basic
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 8
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 9
mechanisms are access control and the authentication process device (eg, a mobile phone) and communicated with the cloud
[76]. or sent directly to the terminal device, then forwarding the
Many access control techniques have been proposed, from control commands to the device terminal. In this way, smart
the previous literature, to ensure confidentiality in IoT. One devices in IoT can be controlled in any situation that may
standard approach is Role-Based Access Control (RBAC). interfere with the internet, thereby enabling intelligent
RBAC integrates with real-time and dynamic data streams operations related to data [100].
management systems in IoT to ensure data authenticity,
C. Research Trends
confidentiality, and integrity during transmission [88]-[90]. The
second mechanism is a key distribution scheme, that is, secure The IoT is an emerging technology that changes all of aspects
data aggregation in wireless sensor networks such as SEDAN of society, both for people and for business. With the advance
[91] and SAWAN [92]. In addition, in order to avoid of IoT, many advanced technologies and mechanisms are being
unauthorized access, anonymization techniques based on data initiated.
suppression, randomization or cloaking have been proposed 1) Cloud service security
[93], [94]. Cloud computing is based on distributed computing, parallel
Privacy in data collection, sharing, and management open computing, grid computing and virtualization. Cloud
new research issues in IoT. RFID-related devices and computing can provide massive information storage and
technologies are one viable way to protect data security. Many analytics for IoT. With the development of IoT, how to analyze
mechanisms have been proposed to address data privacy issues and process a large amount of data and information is a real
in IoT cybersecurity, such as Kaos [95], Tropos [96], NFR [97], problem. One potential solution is to integrate cloud computing
GBRAM [98], PRIS [99]. In addition, security mechanisms, into IoT system. Using cloud computing to build an IoT
like Data Encryption (RSA, DSA, BLOWFISH and DES) and platform can reduce costs and achieve efficient calculation and
Biometric Verification, can prevent unauthorized users from storage [101]. Cloud computing provides a high-quality and
accessing data [47]. Data integrity refers to the protection of reliable architecture for IoT and is conducive to the massive
information or data from attacks or external influences during expansion of IoT. However, because the cloud computing
transmission and reception, maintaining the originality, platform is a relatively open platform, there are many security
accuracy, and unfalsification of data [2]. The security risks in its operation procedure.
mechanisms are Cyclic Redundancy Check (CRC) and Version There is a tendency for IoT systems and services to be
Control. Data availability ensures that authorized users access removed and hosted on cloud platforms, so that devices and
their information resources in both normal and abnormal applications can be accessed at anytime from anywhere,
conditions. A Denial-of-Service (DoS) Attack is one of the without boundaries. Smart devices can be deployed and linked
popular attacks that cybersecurity should focus on. Most to cloud services through Wi-Fi and wireless Internet
functional devices have a more or less security risk. For connectivity systems. The IoT relies on cloud services such as
example, the car's central control display system, webcam, Storage-as-a-Service (SaaS) and Database-as-a-Service (DaaS)
home alarms, etc. IoT devices do not focus on enhancing the to store sensor data [102]. However, cybersecurity concerns
security of data information in all aspects of access, have increased. Ways to integrate and improve the existing IoT
transmission, and storage of data information, but are always systems and mechanisms in order to prevent attacks toward
concerned with the capabilities of the extended device. cloud-based IoT services will attract more and more attention.
Traditional security models cannot adapt to new security Cloud security includes technologies, security controls, and
challenges and the age of information data brought about by strategies developed for protecting cloud databases and services
IoT. Security issues directly affect the further development and such as infrastructure (IaaS) platform (PaaS), software (SaaS),
application of IoT. Data security and disposal are issues that and infrastructure (IaaS).
cannot be avoided by security issues [1]. The big data of IoT is stored in a server with a cloud
The rapid development of big data and IoT has brought computing platform. Cloud computing servers are distributed
convenience to people, and we also encounter unprecedented around the world. The diversity and complexity of the server
information security risks [100]. As early as July 2015, determines that the user does not know where the data is stored,
American auto companies recalled more than one million and the security risks exist. Cloud computing mainly uses
vehicles using the Uconnect system. The reason is that there are virtual technology to achieve data sharing, and many virtual
large security holes in the in-vehicle system. Hackers can use machines share one resource. Once encryption or isolation of
these vulnerabilities to remotely control the onboard system to one piece of data is not achieved, the data is transparent and
shut down the engine, accelerate and decelerate the vehicle, and easily exploited by illegal users. The cloud computing platform
cause brake failure. Due to the virtual nature of IoT, its does not guarantee the complete security of end-user
operating mode relies on the collection and processing of data information. The end-user is handed over to the cloud
resources. Currently, IoT and big data technologies combine computing platform. Cloud computing platforms analyze and
multiple services. For example, wireless communication process data and have data access. In this way, the end-user
technology (Bluetooth, WI-FI, ZigBee), hardware, device and doesn’t have complete control over the data. In the process of
applications, mobile applications, cloud services. On the mobile calculating and processing data in the cloud, the data is easily
side, the mobile application is first downloaded by the mobile leaked. There are also security risks in transmitting and using
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 10
data in IoT systems [103]. security mechanisms are key factors in ensuring the high level
Establishing a secure network environment. A trusted cloud of security and privacy. The demand for IoT-related services
computing platform provides supercomputing capabilities for will continue to grow. The core of supporting IoT is a large-
data storage and web applications. The security measures of the scale connection among different things with a delay of about 1
cloud computing platform, such as physical security, system millisecond. The current network has bottlenecks that are
security, network security, database security, etc., ensure the difficult to achieve. It is possible for 5G networks to fill this
basic computing power of the platform and protect cloud- gap, mainly because of the low latency, wide coverage, ultra-
related end-user’s data security and privacy from the dense networks, and large-scale connections of 5G.
unauthorized access and potential threats. Encryption 3) QoS-based (Quality of service) Design
technology is used to protect data. Encryption is a way to handle The ubiquitous IoT requires complex cybersecurity systems
secret locks and passwords efficiently. Cloud computing-based to accomplish different tasks. A QoS-based (Quality of Service)
IoT systems, encryption technologies, authentication and cybersecurity infrastructure has the potential to protect and to
access, and anonymous algorithms will be the means to protect improve the entire IoT network. QoS research is needed to
data security and privacy in the near future [103]. support the development of IoT. QoS management schemes can
2) 5G improve the levels of RFID system and of cybersecurity
The key technologies of 5G are wireless technology and infrastructure [109].
network technology. Wireless technologies include massive Although a lot of research has been done on IoT
MIMO technology, multiple access technology, ultra-high- cybersecurity issues, such as architecture and protocol design,
density network technology, multi-carrier technology and countermeasures, and applications, the quality of service (QoS)
modulation coding technology. Network technologies include in IoT cybersecurity is still an unexplored field of research.
network slicing technology, mobile edge computing Consider, for example, (1) IoT-related resource constraints.
technology, control plane/user plane separation technology and QoS-based cybersecurity mechanisms should be simplified in
network function reconstruction technology [104]. order to solve constraints involved in IoT, such as energy,
With the development of connectivity technology and the bandwidth, memory, etc. (2) Data privacy. QoS-based
integration with smart devices, 5G will enhance the ubiquity, cybersecurity mechanisms should take into account the issue of
reliability, scalability, and cost-effectiveness of seamless global data privacy, which is critical to IoT security. (3) Scalability. A
IoT [104]. Because of more IP identifiable objects, IPv6 is QoS-based network security mechanism should be able to
replacing IPv4 to implement IoT, since more bandwidth is expand to a large number of sensor nodes and smart devices.
needed to solve more traffic issues and delays. Hence, the new 4) Other trends
generation of communication (5G) has been created and can Fault Tolerance Mechanism The higher the limit on smart
provide speed between 10-800Gbps, while the current devices, the worse the performance of the device, and the more
technology (4G) has only provided at a speed of 2-1000 Mbps. susceptible the devices are to attacks. IoT objects should have
5G technology can also integrate both IPv4 and IPv6. The certain defensive mechanisms that can be used flexibly when
implementation of 5G will enhance many technologies: needed and can recover from any possible damage. Hence, fault
Heterogeneous Networks (HetNets), Software Defined tolerance is indispensable to cybersecurity [28]. IoT Forensics.
Networks (SDNs), Massive MIMO, and Multiple Radio Since IoT is a comprehensive definition, crimes such as
Access, etc. [105], [106]. The development of mobile devices computer crimes or cloud crimes should be IoT crimes, which
and smartphones enables users to achieve exponential data involve any abnormal activity or behavior in the IoT paradigm.
flow. [107] depicts the use of small cells (e.g., femtocells) in an IoT-related crimes are related to smart devices, services, and
IoT environment. Femtocell will integrate voice, video and data communication channels. An effective way to investigate these
for mobile users. Proper traffic modeling and deployment crimes is to perform digital forensic procedures within the IoT
strategies will improve the overall performance of femtocell network [39]. Self-Management. One of the ultimate goals of
networks in the IoT environment. Furthermore, the Industrial the IoT is to self-manage everything, in order to meet the
Internet of Things (IIoT) is a rapidly evolving Internet network requirements of different entities (such as people, companies,
[24], and embedded sensors are the primary tool for collecting and institutions). Smart things can be performed without
and exchanging data. 5G technology and healthcare systems restrictions. For example, smart devices can self-configure,
can be integrated. Users can interact with various types of self-maintain, self-repair, and can even play an active role in
sensors through a secure wireless medical sensor network their own disposal [31]. Blockchain Embedded Cybersecurity
(WMSN) [108]. Design. The interoperability, integrity, and autonomy of RFID
However, as a global dynamic environment, rich source data and wireless sensor network technologies, and their low-cost
integrates unlimited systems, and attackers have a great transmission capacity may lead to dynamic system
opportunity to identify vulnerable targets and to launch attacks interconnection of distributed resource entities through the IoT
within the IoT network. Cybersecurity issue, such as data network. Cryptography consists of a public key and a private
privacy, information transmission management, security key. The private key needs to be associated with unrelated and
protocols and mechanisms all need to be considered within IoT constrained objects in the dynamic network. In the long run,
interoperability of 5G technology. Mobile communication smart devices need to be rekeyed in order to ensure the security
networks have high security requirements. QoS and industry of information and data [28], [110], [111].
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 11
VI. CONCLUSION [17] X. Jia, O. Feng, T. Fan, and Q. Lei, “RFID Technology and Its
Applications in Internet of Things (IoT),” In Proc. of the 2nd IEEE
In the Internet of Things (IoT), people, protocols and International Conference on Consumer Electronics, Communications and
principles, wireless networking and communication, devices, Networks (CECNet), Apr. 2012, pp.1282-1285.
and technologies collaborate as virtual entities that achieve [18] M. C. Domingo, “An overview of the internet of things for people with
disabilities,” J. Netw. Comput. Appl., vol.35, no.2, pp.584-596, 2012.
common goals. The IoT has dramatically changed the entire [19] F. Alsubaei, A. Abuhussein, and S. Shiva. "Security and Privacy in the
world and our daily lives. Cybersecurity guarantees that IoT Internet of Medical Things: Taxonomy and Risk Assessment," Local Computer
will become a secure network for people, software/hardware, Networks Workshops (LCN Workshops), 42nd Conference on. IEEE, 2017, pp.
processes, and things. If so, IoT will offer the world a higher 112-120, doi: 10.1109/LCN.Workshops.2017.72.
[20] S. A. Alabady, F. Al-Turjman, and S. Din, “A novel security model for
level of accessibility, integrity, availability, scalability, cooperative virtual networks in the IoT era”, Springer International Journal of
confidentiality, and interoperability. At the same time, Parallel Programming, 2018, doi: 10.1007/s10766-018-0580-z.
cybersecurity issues will be one of the primary tasks of IoT in [21] C. Sun, “Application of RFID technology for logistics on internet of
the coming years. things,” AASRI Procedia, vol.1, pp.106-111, 2012.
[22] S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, “Proposed
In this article, we have vigorously surveyed the important Security Model and Threat Taxonomy for the Internet of Things,” In Proc. of
aspects of IoT cybersecurity, specifically, the state-of-the-art of the Recent Trends in Network Security and Applications. Springer, 2010, pp.
the current position and potential future directions, the major 420–429
countermeasures against IoT attacks, and the applications in [23] P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, “Identity
authentication and capability based access control (IACAC) for the internet of
industries. In addition, we introduced and discussed a possible things,” Journal of Cyber Security and Mobility, vol. 1, no. 4, pp. 309–348,
four-layered IoT cybersecurity infrastructure and a taxonomy 2013.
of attacks on IoT cybersecurity. [24] A. R. Sadeghi, C. Wachsmann, and M. Waidner. “Security and Privacy
Challenges in Industrial Internet of Things,” In Annual Design Automation
Conference, ACM, 2015, pp. 54.
REFERENCES [25] A. Belapurkar, A. Chakrabarti, H. Ponnapalli, N. Varadarajan, S.
[1] L. Xu, W. He, and S. Li, “Internet of Things in industries: a survey,” IEEE Padmanabhuni, and S. Sundarrajan, Distributed Systems Security: Issues,
Trans. Ind. Informat., vol. 10, no. 4, pp. 2233-2243, 2014. Processes and Solutions. Wiley Publishing, Chichester, UK, 2009.
[2] L. Atzori, A. Iera, and G. Morabito, “The internet of things: a survey,” [26] M. Farooq, M. Waseem, A. Khairi, and S. Mazhar, "A critical analysis on
Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010. the security concerns of internet of things (IoT)," Perception, vol. 111, no. 7,
[3] D. Bandyopadhyay, and J. Sen, “Internet of things: applications and pp. 1-6, 2015.
challenges in technology and standardization,” Wireless Pers. Commun., [27] S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, “Security, privacy
vol.58, no.1, pp.49-69, 2011. and trust in internet of things: The road ahead,” Computer Networks, vol. 76,
[4] R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security pp. 146 – 164, 2015. [Online]. Available: http://www.sciencedirect.com
and privacy in distributed internet of things," Comput. Netw., vol. 57, no. 10, /science/article/pii/S1389128614003971.
pp. 2266-2279, 2013. [28] R. Roman, P. Najera, and J. Lopez, “Securing the internet of things,”
[5] Gartner (2015). Gartner Says 4.9 Billion Connected "Things" Will Be in Use Computer, vol.44, no.9, pp.51-58, 2011.
in 2015 [Online]. Available: http://www.gartner.com/newsroom/id/2905717, [29] R. E. Crossler, F. Bélanger, and D. Ormond, "The quest for complete
accessed on Jun. 29, 2018. security: An empirical analysis of users’ multi-layered protection from security
[6] D. Evans (2011), “The Internet of things: How the next evolution of the threats," Information Systems Frontiers, pp. 1-15, 2017, Online published, doi:
Internet is changing everything,” CISCO, San Jose, CA, USA, White Paper, 10.1007/s10796-017-9755-1.
Available: https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_ [30] H. Kumar, D. Sarma, and A. Kar, “Security threats in wireless sensor
IBSG_ 0411FINAL .pdf, accessed on Jun. 25, 2018. networks,” IEEE Aerosp. Electron. Syst. Mag., vol. 23, no. 6, pp. 39–45, Jun.
[7] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the Internet of Things: A 2008.
Review,” In Proc. of the Computer Science and Electronics Engineering [31] M. Abomhara and G. M. Koien, ‘‘Security and Privacy in the Internet of
(ICCSEE), vol. 3. IEEE, 2012, pp. 648–651. Things: Current Status and Open Issues,’’ In Proc. IEEE Int. Conf. Privacy
[8] M. Covington and R. Carskadden, “Threat Implications of the Internet of Security Mobile Syst., May 2014, pp. 1-8, doi:
Things,” In Proc. of the 5th International Conference on Cyber Conflict 10.1109/PRISMS.2014.6970594.
(CyCon). IEEE, 2013, pp. 1–12. [32] S. Li and L. Xu, Securing the Internet of Things. Syngress Publishing,
[9] Y. Lu, "Industry 4.0: a survey on technologies, applications and open Cambridge, MA, 2017.
research issues," J. of Ind. Inform. Integ., vol. 6, pp. 1-10, 2017. [33] A. Mukherjee, ‘‘Physical-Layer Security in the Internet of Things: Sensing
[10] Helpnetsecurity (2017). US, China and the UK are top regions affected by and Communication Confidentiality under Resource Constraints,’’ In Proc.
IoT security threats, [Online]. Available: IEEE, vol. 103, no. 10, pp. 1747–1761, Oct. 2015.
https://www.helpnetsecurity.com/2017/08/16/regions-iot-security-threats/, [34] K. Hashizume, D. G Rosado, E.Fernández-Medina, E. B. Fernandez, “An
accessed on Jun. 20, 2018. analysis of security issues for cloud computing”, Journal of Internet Services
[11] NIST (2016), NIST Cybersecurity for IoT Program. [Online]. Available: and Applications, vol. 4, no. 1, pp. 5, 2013.
https://www.nist.gov/programs-projects/nist-cybersecurity-iot-program, [35] K. Nagaraju and R. Sridaran, "A survey on security threats for cloud
accessed on Jun. 19, 2018. computing," International Journal of Engineering Research & Technology, vol.
[12] KPMG (2017), Overview of China’s Cybersecurity Law. [Online]. 1, no. 7, pp. 1-10, 2012.
Available: https://assets.kpmg.com/content/dam/kpmg/cn/pdf/en/2017/02/ [36] Q. Xu, P. Ren, H. Song, and Q. Du, “Security enhancement for IoT
overview-of-cybersecurity-law.pdf, accessed on Jun. 15, 2018. communications exposed to eavesdroppers with uncertain locations,” IEEE
[13] R. H. Weber, “Internet of things-new security and privacy challenges,” Access, vol. 4, pp. 2840–2853, 2016.
Comput. Law Security Rev., vol. 26, no. 1, pp. 23–30, 2010. [37] Y. Zou, X. Wang, W. Shen, and L. Hanzo, “Security versus reliability
[14] K. Zhao and L. Ge, ‘‘A Survey on the Internet of Things Security,’’ In analysis of opportunistic relaying,” IEEE Trans. Veh. Technol., vol. 63, no. 6,
Proc. 9th Int. Conf. Comput. Intell. Secur. (CIS), Dec. 2013, pp. 663–667. pp. 2653–2661, Jul. 2014.
[15] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the [38] M. Hossain, R. Hasan, and A. Skjellum, "Securing the Internet of Things:
internet of things: perspectives and challenges,” Wireless Networks, vol. 20, pp. A Meta-Study of Challenges, Approaches, and Open Problems," Distributed
2481–2501, 2014. Computing Systems Workshops (ICDCSW), 2017 IEEE 37th International
[16] R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, "Internet of things Conference on. IEEE, 2017, pp. 220-225.
(IoT) Security: Current Status, Challenges and Prospective Measures," In [39] M. Hossain, M. Fotouhi, and R. Hasan, “Towards an analysis of security
Internet Technology and Secured Transactions (ICITST), 2015 10th issues, challenges, and open problems in the IoT,” In Services (SERVICES),
International Conference, IEEE, 2015, pp. 336-341. 2015 IEEE World Congress on IEEE, 2015, pp. 21-28.
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 12
[40] A. Mayzaud, R. Badonnel, and I. Chrisment, “A taxonomy of attacks in [64] Z. Shelby, K. Hartke, C. Bormann, and B. Frank, “Constrained application
rpl-based internet of things,” International Journal of Network Security, vol. protocol (CoAP),” IETF 2013. [Online]. Available:
18, no. 3, pp. 459–473, 2016. http://tools.ietf.org/html/draft-ietf-corecoap-18.
[41] S. U. Rehman, K. W. Sowerby, and C. Coghill, “Analysis of impersonation [65] T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, and G. Carle, “A DTLS based
attacks on systems using RF fingerprinting and low-end receivers,” End-to-End Security Architecture for the Internet of Things with Two-Way
J. Comput. Syst. Sci., vol. 80, no. 3, pp. 591–601, 2014. Authentication,” In Proc. IEEE 37th Conf. Local Comput. Netw. Workshops,
[42] T.-G. Lupu, I. Rudas, and N. Mastorakis, “Main Types of Attacks in Oct. 2012, pp. 956–963.
Wireless Sensor Networks,” In WSEAS International Conference, Proc. Recent [66] S. Cirani, M. Picone, P. Gonizzi, L. Veltri, and G. Ferrari, “IoT-OAS: An
Advances in Computer Engineering, no. 9. WSEAS, 2009. oauth-based authorization service architecture for secure services in IoT
[43] S. Alam and D. De, “Analysis of security threats in wireless sensor scenarios,” IEEE Sensors J., vol. 15, no. 2, pp. 1224–1234, Feb. 2015.
network,” International Journal of Wireless and Mobile Networks, vol. 6, no. [67] R. Hummen, H. Shafagh, S. Raza, T. Voig, and K. Wehrle, “Delegation-
2, pp. 35–46, Apr. 2014. based Authentication and Authorization for the IP-based Internet of things,” in
[44] A. K. Rai, R. R. Tewari, and S. K. Upadhyay, "Different types of attacks Proc. 11th Annu. IEEE Int. Conf. Sens., Commun. Netw. (SECON), 2014, pp.
on integrated manet-internet communication," International Journal of 284–292.
Computer Science and Security, vol. 4, no. 3, pp. 265-274, 2010. [68] P. Pereira, J. Eliasson, and J. Delsing, “An Authentication and Access
[45] T. Heer, O. Garcia-Morchon, R. Hummen, S. Loong Keoh, S. S. Kumar, Control Framework for COAP-based Internet of Things,” In Proc. 40th Annu.
and K.Wehrle, “Security challenges in the IP-based internet of things,” Wireless Conf. IEEE Ind. Electron. Soc. (IECON), TX, USA, Oct. 2014, pp. 5293–5299.
Pers. Commun., vol. 61, pp. 527–542, 2011. [69] B. Anggorojati, P. N. Mahalle, N. R. Prasad, and R. Prasad, "Capability-
[46] G. P. Hancke and S. C. Centre, “Eavesdropping Attacks on High- based Access Control Delegation Model on the Federated IoT Network," In Int'l
Frequency RFID Tokens,” In Proc. Workshop Radio Frequency Identification Symposium on Wireless Personal Multimedia Communications (WPMC), 2012,
Security, Jul. 2008, pp. 100–113. pp. 604-608.
[47] Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc networks,” [70] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of
In Proc. 6th Int’l. Conf. Mobile Comp. Net., MobiCom 2000, Aug. 2000, pp. things: vision, applications and research challenges,” Ad Hoc Netw., vol. 10,
275–83. no. 7, pp. 1497–1516, 2012.
[48] M. Uma and G. Padmavathi, “A survey on various cyber attacks and their [71] S. Li, L. Xu, and S. Zhao, “The internet of things: a survey,” Information
classification”, International Journal of Network Security, vol. 15, no. 6, pp. Systems Frontiers, vol.17, no.2, pp.243-259, 2015.
391-397, 2013. [72] Omoogun, Michelle, et al. "When eHealth Meets the Internet of Things:
[49] M. Ali, S. U. Khan, and A. V. Vasilakos, “Security in cloud computing: Pervasive Security and Privacy Challenges." In Cyber Security and Protection
opportunities and challenges,” Inf. Sci., vol. 305, pp. 357– 383, 2015, Of Digital Services (Cyber Security), 2017 International Conference on. pp. 1-
doi:10.1016/j.ins.2015.01.025. 7, IEEE.
[50] A. Perrig, J. Stankovich, and D. Wagner, “Security in wireless sensor [73] C. W. Tsai, C. F. Lai, and A. V. Vasilakos, ‘‘Future internet of things: open
networks,” Commun. ACM, vol. 47, no. 6, pp. 53–57, Jun. 2004. issues and challenges,’’ Wireless Netw., vol. 20, no. 8, pp. 2201-2217, 2014.
[51] H. Abie and I. Balasingham, “Risk-based Adaptive Security for Smart IoT [74] Y. Mehmood, F. Ahmad, I. Yaqoob, A. Adnane, M. Imran, and S. Guizani,
in eHealth,” In Proc. of the 7th International Conference on Body Area “Internet-of-things-based smart cities: Recent advances and challenges,” IEEE
Networks. ICST, 2012, pp. 269–275. Commun. Mag., vol. 55, no. 9, pp. 16–24, Jan. 2017.
[52] S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, “Proposed [75] A. S. Elmaghraby, M. M. Losavio, “Cyber security challenges in smart
Security Model and Threat Taxonomy for the Internet of Things (IoT),” ser. cities: safety, security and privacy,” Journal of Advanced Research, Volume 5,
Communications in Computer and Information Science. Springer Berlin No. 4, pp. 491-497, July 2014, doi: 10.1016/j.jare.2014.02.006.
Heidelberg, 2010, vol. 89, book section 42, pp. 420–429. [Online]. Available: [76] R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future Internet: The
http://dx.doi.org/10.1007/978-3-642-14478-3 42 Internet of Things Architecture, Possible Applications and Key Challenges,” In
[53] J. P. Walters and Z. Liang, “Wireless Sensor Network Security: A Survey,” Proc. 10th Int. Conf. FIT, 2012, pp. 257–260.
Security in Distributed, Grid, and Pervasive Computing, Ed. Y. Xiao, Auerbach [77] A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah, “A
Publishing, CRC Press, 2006. Systemic Approach for IoT Security,” In Distributed Computing in Sensor
[54] E. W. T. Ngai, K. K. Moon, F. J. Riggins, and C. Y. Yi, “RFID research: Systems (DCOSS), 2013 IEEE International Conference on. IEEE, 2013, pp.
an academic literature review (1995–2005) and future research directions,” Int. 351–355.
J. Prod. Econ., vol. 112, no. 2, pp. 510–520, 2008. [78] Z. K. Zhang, M. C. Y. Cho, C. W. Wang, C. W. Hsu, C. K. Chen, and S.
[55] S. Li, L. Xu, and X. Wang, “Compressed sensing signal and data Shieh, "IoT security: ongoing challenges and research opportunities." In
acquisition in wireless sensor networks and internet of things,” IEEE Trans. Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th
Ind. Informat., vol. 9, no. 4, pp. 2177–2186, Nov. 2013. International Conference on, IEEE, 2014, pp. 230-234.
[56] W. He and L. Xu, “Integration of distributed enterprise applications: a [79] J. Granjal, E. Monteiro, and J. S. Silva, ‘‘Security for the Internet of
survey,” IEEE Trans. Ind. Informat., vol. 10, no. 1, pp. 35–42, Feb. 2014 Things: A survey of Existing Protocols and Open Research Issues,’’ IEEE
[57] A. Perrig et al., “SPINS: security protocols for sensor networks,” Wireless Commun. Survey Tuts., vol. 17, no. 3, pp. 1294–1312, 3rd Quart., 2015.
Networks, vol. 8, pp. 521–34, 2000. [80] K. T. Nguyen, M. Laurent, and N. Oualha, ‘‘Survey on secure
[58] F. Al-Turjman and S. Alturjman, “Confidential Smart-Sensing Framework communication protocols for the Internet of Things,’’ Ad Hoc Netw., vol. 32,
in the IoT Era”, The Springer Journal of Supercomputing, 2018, doi: pp. 17–31, Sep. 2015.
10.1007/s11227-018-2524-1. [81] IEEE Standard for Local and Metropolitan Area Networks—Part 15.4:
[59] D. Liu, P. Ning, and R. Li, “Establishing pairwise keys in distributed sensor Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Std.
networks,” ACM Trans. Inform. System Security (TISSEC), vol. 8, pp. 41–77, 802.15.4-2011 (Revision of IEEE Std. 802.15.4-2006), (2011) 1-314, 2011.
2005. [82] IEEE Standard for Local and Metropolitan Area Networks—Part 15.4:
[60] Y. B. Saied and A. Olivereau, “D-HIP: A distributed key exchange scheme Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1:
for HIP-based Internet of Things,” in WoWMoM, IEEE, 2012, Online MAC Sublayer, IEEE Std. 802.15.4e-2012 (Amendment to IEEE Std. 802.15.4-
published, doi: 10.1109/WoWMoM.2012.6263785 2011), (2012) 1-225, 2012.
[61] R. Hummen, J. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, “Towards [83] N. Kushalnagar, G. Montenegro, and C. Schumacher, “IPv6 over Low-
Viable Certificate-based Authentication for the Internet of Things,” In Proc. Power Wireless Personal Area Networks (6LoWPANs): Overview,
2nd ACM Workshop Hot Topics Wireless Netw. Security Privacy, 2013, pp. 37– Assumptions, Problem Statement, Goals,” RFC 4919, 2007, [Online].
42. Available: https://www.rfc-editor.org/rfc/pdfrfc/rfc4919.txt.pdf.
[62] S. L. Keoh, S. S. Kumar, and O. Garcia-Morchon, “Securing the IP-based [84] G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, “Transmission of
Internet of Things with DTLS,” WiSec’, Apr. 2013 [Online]. Available: IPv6 Packets Over IEEE 802.15.4 Networks,” RFC 4944, 2007, [Online].
https://www.researchgate.net/profile/Sandeep_Kumar95/publication/2622107 Available: https://www.rfc-editor.org/rfc/pdfrfc/rfc4944.txt.pdf.
19_Securing_the_IP-based_internet_of_things_with_HIP_and_ DTLS/ links/ [85] J. Hui and P. Thubert, “Compression Format for IPv6 Datagrams Over
561e22a808aef097132b3120/Securing-the-IP-based-internet-of-things-with- IEEE 802.15.4-Based Networks,” RFC 6282, 2011, [Online]. Available:
HIP-and-DTLS.pdf. https://www.rfc-editor.org/rfc/pdfrfc/rfc6282.txt.pdf.
[63] R. Hummen, J. Hiller, M. Henze, and K. Wehrle, “Slimfit—A HIP DEX [86] T. Winter, et al., “RPL: IPv6 Routing Protocol for Low-Power and Lossy
Compression Layer for the IP-based Internet of Things,” In Proc. IEEE 9th Int. Networks,” RFC 6550, 2012, [Online]. Available: https://www.rfc-
Conf. WiMob, 2013, pp. 259–266. editor.org/rfc/pdfrfc/rfc6550.txt.pdf.
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2018.2869847, IEEE Internet of
Things Journal
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 13
[87] C. Bormann, A. Castellani, and Z. Shelby, “CoAP: An application protocol Yang Lu (M’18) received his B.S. degree from Jilin University,
for billions of tiny internet nodes,” IEEE Internet Comput., vol. 1, no. 2, pp.
China, in 2004 and the M.S. degree from the University of
62–67, Mar./Apr. 2012.
[88] R. Sandhu, E. J. Coyne, H. L. Feinstein, and C.E. Youman, “Role-based Manchester, UK, in 2006. He is currently pursuing his Ph.D.
access control models,” IEEE Computer, vol. 29, no. 2, pp. 38–47, 1996. degree in ICT (Information and Communication Technology)
[89] S. Papadopoulos, Y. Yang, and D. Papadias, “CADS: Continuous in USA. He is a member of IEEE. He has published research
Authentication on Data Streams,” In Proc. of the 33rd international conference
papers in refereed journals published by major publishers such
on Very large data bases, VLDB Endowment, 2007, pp. 135–146.
[90] R. V. Nehme, E. A. Rundensteiner, and E. Bertino, “A security punctuation as Elsevier, Taylor and Francis, and World Scientific.
framework for enforcing access control on streaming data,” in ICDE, 2008
[91] M. Bagaa et al., “SEDAN: Secure and Efficient Protocol for Data Li Da Xu (M’86–SM’11-F’16) received B.S. degree in
Aggregation in Wireless Sensor Networks,” In Proc. of IEEE LCN. IEEE, 2007,
information science and engineering from the University of
pp. 1053–1060.
[92] L. Hu and D. Evans, “Secure Aggregation for Wireless Networks,” In Science and Technology of China, in 1978, M.S. degree in
Proc. Symposium Applications Internet Workshops, 2003, pp. 384–391. information science and engineering from the University of
[93] T. Mielikainen, “Privacy Problems with Anonymized Transaction Science and Technology of China, in 1981, and Ph.D. degree in
Databases,” In International Conference on Discovery Science, Springer,
systems science and engineering from Portland State
Berlin, Heidelberg, 2004, pp. 219-229.
[94] A. Narayanan and V. Shmatikov, “Obfuscated Databases and Group University, USA, in 1986.
privacy,” In CCS’05: Proc. of the 12th ACM conference on Computer and He is an IEEE Fellow, academician of the European Academy
communications security, 2005, pp. 102–111. of Sciences, and academician of the Russian Academy of
[95] A. van Lamsweerde, “Goal-Oriented Requirements Engineering: A
Engineering (formerly USSR Academy of Engineering). Dr. Xu
Guided Tour,” In Proc. Fifth IEEE Int’l Symp. Requirements Eng., pp. 249-263,
2001. is a 2016 and 2017 Highly Cited Researcher in the field of
[96] H. Mouratidis, P. Giorgini, and G. Manson, “Integrating Security and engineering named by Clarivate Analytics (formerly Thomson
Systems Engineering: Towards the Modelling of Secure Information Systems,” Reuters Intellectual Property & Science).
In Proc. 15th Conf. Advanced Information Systems Eng., pp. 63-78, 2003.
[97] J. Mylopoulos, L. Chung, and B. Nixon, “Representing and using
nonfunctional requirements: a process-oriented approach”, IEEE Trans. on
Software. Engineering, Vol. 18 No. 6, pp. 483-497, Jun. 1992.
[98] A.I. Anton, “Goal Based Requirements Analysis,” In Proc. Second Int’l
Conf. Requirements Eng., ICRE, 1996, pp. 136–144.
[99] C. Kalloniatis, E. Kavakli, and S. Gritzalis, “Addressing privacy
requirements in system design: the pris method,” Requirements Eng., vol. 13,
no. 3, pp. 241–255, 2008.
[100] Y. Chen, H. Chen, A. Gorkhali, Y. Lu, Y. Ma, and L. Li, “Big data
analytics and big data science: a survey,” Journal of Management Analytics,
vol.3, no.1, pp. 1-42, 2016.
[101] I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U.
Khan, “The rise of “big data” on cloud computing: Review and open research
issues,” Information Systems, 47, pp. 98-115, 2015.
[102] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things
(IoT): a vision, architectural elements, and future directions.” Future gener.
Comput. Syst., vol. 29, no. 7, pp. 1645-1660, Sep. 2013.
[103] A. Whitmore, A. Agarwal, and L. D. Xu, “The internet of things—a
survey of topics and trends,” Information Systems Frontiers, vol.17, no.2,
pp.261-274, 2015.
[104] M. R. Palattella et al., “Internet of things in the 5G era: Enablers,
architecture, and business models,” IEEE J. Sel. Areas Commun., vol. 34, no.
3, pp. 510–527, Mar. 2016.
[105] W. H. Chin, F. Zhong, and R. Haines, “Emerging technologies and
research challenges for 5G wireless networks,” IEEE Wireless Commun., vol.
21, no. 2, pp. 106–112, Apr. 2014.
[106] X. Duan and X. Wang, “Authentication handover and privacy protection
in 5G hetnets using software-defined networking,” IEEE Commun. Mag., vol.
53, no. 4, pp. 28–35, Sep. 2015.
[107] F. Al-Turjman, E. Ever, and H. Zahmatkesh, “Small cells in the
forthcoming 5g/iot: traffic modelling and deployment overview”, IEEE
Communications Surveys and Tutorials, 2018. DOI.
10.1109/COMST.2018.2864779.
[108] F. Al-Turjman and S. Alturjman, "Context-sensitive access in industrial
internet of things (iiot) healthcare applications”, IEEE Trans. Ind. Informat.,
2018. DOI. 10.1109/TII.2018.2808190.
[109] L. Li, S. Li, and S. Zhao, “QoS-aware scheduling of services-oriented
internet of things,” IEEE Trans. Ind. Informat., 10(2), pp. 1497-1505, 2014.
[110] Y. Lu, “Blockchain: a survey on functions, applications and open issues,”
J. Ind. Inform. Manag., 2018, online published,
doi.org/10.1142/S242486221850015X.
[111] Y. Lu, “Blockchain and the related issues: a review of current research
topics,” Journal of Management Analytics, 2018, online published,
doi.org/10.1080/23270012.2018.1516523.
2327-4662 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.