Open Issues and Security Challenges of Data Communication Channels in Distributed Internet of Things (IoT): A Survey

Ernest Ezema, Azizol Abdullah and Nor Fazlida Binti Mohd

Published in Volume 3 - Number 1, January 2018

DOI: https://doi.org/10.22632/ccs-2017-252-63

Subject Area : Wireless Communications, Security

PDF      BibTex      Citation

Ernest Ezema, Azizol Abdullah, Nor Fazlida Binti Mohd (2017). Open Issues and Security Challenges of Data Communication Channels in Distributed Internet of Things (IoT): A Survey. Circulation in Computer Science, 3, 1 (January 2018), 22-32. https://doi.org/10.22632/ccs-2017-252-63

     Cover      Share
     Promote

Abstract

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.

Keywords: Internet of Things (IoT), IoT Security, Distributed IoT, Industrial Revolution 4.0, Data, Communication Channels

References

  1. L. Atzori, A. Iera, G. Morabito, The internet of things: a survey,Comput. Netw. 54 (15) (2010) 2787–2805.
  2. D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac, Survey internet of things: vision, applications and research challenges, Ad Hoc Netw.10 (7) (2012) 1497–1516.
  3. M. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. Grieco, G. Boggia, M. Dohler, Standardized protocol stack for the internet of (important) things, IEEE Commun. Surv. Tutorials 15 (3) (2013)1389–1406.
  4. B. Emmerson, M2M: the internet of 50 billion devices, Huawei Win–Win Mag. J. (4) (2010) 19–22.
  5. D. Boswarthick, O. Elloumi, O. Hersent, M2M Communications: A Systems Approach, first ed., Wiley Publishing, 2012.
  6. O. Hersent, D. Boswarthick, O. Elloumi, The Internet of Things: Key Applications and Protocols, second ed., Wiley Publishing, 2012.
  7. L.A. Grieco, M.B. Alaya, T. Monteil, K.K. Drira, Architecting information centric ETSI-M2M systems, in: IEEE PerCom, 2014.
  8. R.H. Weber, Internet of things - new security and privacy challenges, Comput. Law Secur. Rev. 26 (1) (2010) 23–30.
  9. H. Feng, W. Fu, Study of recent development about privacy and security of the internet of things, in: 2010 International Conference on Web Information Systems and Mining (WISM), Sanya, 2010, pp.91–95.
  10. R. Roman, J. Zhou, J. Lopez, On the features and challenges of security and privacy in distributed internet of things, Comput.Networks 57 (10) (2013) 2266–2279.
  11. J. Anderson, L. Rainie, The Internet of Things will Thrive by 2025,PewResearch Internet Project, May 2014. .
  12. S. Bandyopadhyay, M. Sengupta, S. Maiti, S. Dutta, A survey of middleware for internet of things, in: Third International Conferences, WiMo 2011 and CoNeCo 2011, Ankara, Turkey,2011, pp. 288–296.
  13. M.A. Chaqfeh, N. Mohamed, Challenges in middleware solutions for the internet of things, in: 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, 2012,pp. 21–26.
  14. S. Babar, A. Stango, N. Prasad, J. Sen, R. Prasad, Proposed embedded security framework for internet of things (iot), in: 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, Chennai, India, 2011,pp. 1 – 5.
  15. M.C. Domingo, An overview of the internet of underwater things, J. Network Comput. Appl. 35 (6) (2012) 1879–1890.
  16. J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of Things (IoT): a vision, architectural elements, and future directions, Future Gener. Comput. Syst. 29 (7) (2013) 1645–1660.
  17. Z. Yan, P. Zhang, A.V. Vasilakos, A survey on trust management for internet of things, J. Network Comput. Appl. 42 (0) (2014) 120–134.
  18. Y. Zhao, Research on data security technology in internet of things,in: 2013 2nd International Conference on Mechatronics and Control Engineering, ICMCE 2013, Dalian, China, 2013, pp. 1752–1755.
  19. T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, G. Carle, Dtls based security and two- way authentication for the internet of things, AdHoc Netw. 11 (8) (2013) 2710–2723.
  20. R. Roman, C. Alcaraz, J. Lopez, N. Sklavos, Key management systems for sensor networks in the context of the internet of things,Comput. Electrical Eng. 37 (2) (2011) 147–159.
  21. W. Du, J. Deng, Y. Han, P. Varshney, J. Katz, A. Khalili, A pairwise key predistribution scheme for wireless sensor networks, ACM Trans.Inf. Syst. Secur. (TISSEC) 8 (2) (2005) 228–258.
  22. D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: CCS ’03 Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA,2003, pp. 52–61.
  23. H. Pranata, R. Athauda, G. Skinner, Securing and governing access in ad-hoc networks of internet of things, in: Proceedings of the IASTED International Conference on Engineering and Applied Science, EAS 2012, Colombo, Sri Lanka, 2012, pp. 84–90.
  24. A. Cavoukian, Privacy by Design. . . Take the Challenge, Information and Privacy Commissioner of Ontario, Canada, 2009.
  25. P. Mahalle, S. Babar, N.R. Prasad, R. Prasad, Identity management framework towards Internet of Things (IoT): roadmap and key challenges, in: N. Meghanathan, S. Boumerdassi, N. Chaki, D. Nagamalai (Eds.), Recent Trends in Network Security and Applications, Communications in Computer and Information Science, vol. 89, Springer, Berlin Heidelberg, 2010, pp. 430–439.
  26. H. Hartenstein, K. Laberteaux, A tutorial survey on vehicular ad hoc networks, IEEE Communications Magazine 46 (6) (2008) 164–171.
  27. E. Ilie-Zudor, Z. Kemeny, F. van Blommestein, L. Monostori, A. van der Meulen, A survey of applications and requirements of unique identification systems and RFID techniques, Computers in Industry 62 (3) (2011) 227–252.
  28. J. Takalo-Mattila, J. Kiljander, M. Etelapera, J.-P. Soininen, Ubiquitous computing by utilizing semantic interoperability with item-level object identification, in: Second International ICST Conference on Mobile Networks and Management (MONAMI’10), Santander, Spain,2010, pp. 198–209.
  29. T. Bauge (Ed.), D3.5 – Global and Pluggable Sensor and Actuator Networking Framework, SENSEI Project, 2011. .
  30. H. Akram, M. Hoffmann, Supports for identity management in ambient environments – the hydra approach, in: 3rd International Conference on Systems and Networks Communications (ICSNC’08), Sliema, Malta, 2008, pp. 371–377.
  31. D. Guinard, M. Fischer, V. Trifa, Sharing using social networks in a composable web of things, in: 1st International Workshop on the Web of Things (WoT’10), Mannheim, Germany, 2010, pp. 702–707.
  32. S.G. Weber, L.A. Martucci, S. Ries, M. Mühlhäuser, Towards trustworthy identity and access management for the future internet, in: 4th International Workshop on Trustworthy Internet of People, Things & Services (Trustworthy IoPTS’10), 2010.
  33. A. Sarma, J.a. Girão, Identities in the future internet of things, Wireless Personal Communications 49 (3) (2009) 353–363.
  34. Z. Wei, C. Meinel, Implement role based access control with attribute certificates, in: 6th International Conference on Advanced Communication Technology (ICACT’04), Phoenix Park, Korea, 2004, pp. 536–540.
  35. G. Bai, L. Yan, L. Gu, Y. Guo, X. Chen, Context-aware usage control for web of things, Security and Communication Networks (in press). http://dx.doi.org/10.1002/sec.424/abstract.
  36. M. Brachmann, S.L. Keoh, O.G. Morchon, S.S. Kumar, End-to-end transport security in the IP-based internet of things, in: 21st International Conference on Computer Communications and Networks (ICCCN’12), Munich, Germany, 2012, pp. 1–5.
  37. Mocana – NanoDTLS. (accessed 11.12).
  38. S. Raza, S. Duquennoy, J. Hglund, U. Roedig, T. Voigt, Secure communication for the internet of things – a comparison of linklayer security and IPsec for 6LoWPAN,
  39. Haddara, M., & Elragal, A. (2015). The Readiness of ERP Systems for the Factory of the Future. Procedia Computer Science, 64, 721-728.
  40. Weyer, S., Schmitt, M., Ohmer, M., & Gorecky, D. (2015). Towards Industry 4.0-Standardization as the crucial challenge for highly modular, multi-vendor production systems. IFAC-Papers on Line, 48(3), 579- 584.
  41. I. Verbauwhede, J. Fan, Light-weight public key implementations for constrained devices, in: Workshop on Cryptography for the Internet of Things, Antwerp, Belgium, 2012.
  42. K. Beznosov, P. Inglesant, J. Lobo, R. Reeder, M. Zurko, Panel: usability meets access control: challenges and research opportunities, in: 14th ACM Symposium on Access Control Models and Technologies (SACMAT’09), Stresa, Italy, 2009.
  43. C.C. Aggarwal, P.S. Yu, A general survey of privacy-preserving data mining models and algorithms, in: Privacy-Preserving Data Mining, Advances in Database Systems, vol. 34, Springer, US, 2008, pp. 11–52.
  44. Y. Shen, S. Pearson, Privacy Enhancing Technologies: A Review, Tech. rep., HP Laboratories, 2011.
  45. V. Oleshchuk, Internet of things and privacy preserving technologies, in: 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace &Electronic Systems Technology (WirelessVITAE’09), Aalborg, Denmark, 2009, pp. 336–340.
  46. Aitor Gómez-GoiriDiego,López-de-Ipiña. A Triple Space-Based Semantic Distributed Middleware for Internet of Things ICWE 2010. LNCS, vol. 6385, pp 447-458 Springer, (2010)

Submit paper

Paper submission by August 25, 2018

Submit Now