A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
Abstract
:1. Introduction
- IoT devices have low-powered CPUs, and most are battery powered. The cryptographic algorithms used in conventional security methods may not be executable on IoT devices, as these devices operate at a slower clock speed.
- IoT devices have less memory and storage compared to conventional digital devices, such as smartphones and laptops. The security protocols used by conventional devices may not consider memory limitations in their design, so IoT devices may not have enough space in the RAM to load and execute the conventional security methods after loading embedded software, such as operating systems, services, and applications.
- IoT devices communicate over low-data-rate radio interfaces. Conventional security methods may not be optimized for these lossy and low-powered communication links. An IoT device may not respond to a real-time request if it spends most of its assigned time slots for serving a request on exchanging security messages.
- IoT devices use lightweight operating systems, such as Contiki [32] and RIoT [33], due to their resource-constrained natures. As such, the protocol stack of IoT operating systems requires a resource-efficient version of contemporary security modules, such as IPsec [34] and DTLS [35], to run on IoT devices.
- IoT software has to be updated regularly to mitigate potential security vulnerabilities. However, the real-time and lightweight operating systems that run on IoT devices may not have the capability to receive and integrate new codes or libraries to keep the system software updated.
- IoT networks are expected to experience abrupt changes in network topologies because mobile IoT devices may join a network without prior configuration or leave the network abruptly. The sudden changes in the network topologies may affect various performances of the existing security methods, such as re-distribution of shared credentials in the pre-shared key-based authentication methods. As a result, conventional security schemes may not be suitable for mobile IoT-based systems.
- A wide range of wireless protocols are used for communications in the IoT systems, which include WiFi [36], ZigBee [37], Z-Wave [38], and NFC [39]. A smart device can use proprietary networking protocols for device-to-device communications and standard protocols for Internet communications. The conventional security methods may not be comprehensive enough for the entire set of properties of each communication protocol.
1.1. Existing Surveys and Our Contributions
- We provide a comprehensive analysis of various security threats and vulnerabilities in IoT. Different from the existing surveys, this article identifies various attack surfaces and categorically discusses the associated vulnerabilities. We formulate an attack tree to classify the attacks in terms of their severity level and present a detailed attack taxonomy that encompasses a wide spectrum of how devices, hosts, access levels, locations, and strategies, among others, play a role in initiating respective attacks.
- From a systems design perspective, we introduce the concept of a security landscape that can reflect multi-modal complexity based on applications, services, devices, and connectivity associated with an IoT system of interest. Then, we examine properties required for various security schemes, including access level and functional security requirements.
- With the aim of mitigating various threats, we classify the existing security solutions into three categories (end device security, communication security, and service security) and thoroughly discuss each of them. Subsequently, this article presents several comparative analyses of the proposed security schemes.
- We find that the existing research primarily addresses the information- and access-level security properties. However, the time has come to pay attention to the resource efficiency and functional robustness of the security schemes. Accordingly, we identify open research problems and provide guidelines for future research directions.
- It is common that smart devices, applications, and communications become a subject, object, or tool related to IoT crimes, and appropriate investigations should, therefore, be conducted to execute a cyber-forensic process and determine the facts behind attacks. With this perspective and in the context of an IoT-based system that might consists of billions of smart devices, we propose a Blockchain-based forensic framework. The framework can potentially assist a forensics investigator in defining evidence, developing scalable storage mechanisms to log a large amount of evidence, and generating secure provenance of the evidence.
1.2. Organization
2. Background
2.1. IoT Networks
2.2. IoT Device
2.3. IoT Service
2.4. Coordinator
2.5. Gateway
2.6. Controller
3. Security Vulnerabilites
3.1. Attack Surfaces
3.2. Surface-Associated Vulnerabilities
3.2.1. End Device Vulnerability
3.2.2. Communication Vulnerability
3.2.3. Service Vulnerability
4. Attack Taxonomy
4.1. Attacks Based on Adversary Location
4.2. Attacks Based on Device Property
4.3. Attacks Based on Information Damage Level
4.4. Host-Based Attacks
4.5. Severity of IoT Attacks
- High-Severity Attack: High-severity attacks can completely compromise an IoT system. Attacks of this category result in the loss of data confidentiality and integrity and unauthorized access to IoT networks and devices. The attacks that fall under this category are host compromise, man-in-the-middle, and replay attacks, because a successful attack allows an adversary to obtain credentials used for authentication and encryption as well as to perform actions without authentication.
- Moderate-Severity Attack: An IoT system may be partially compromised by moderate-severity attacks. Attacks of this category have high impacts on the availability of services provided by smart devices. However, attackers may not have access to sensor information, devices, or networks. Attacks that may result in resource exhaustion can be considered moderate-severity attacks. Therefore, high-end, external, message modification, and fabrication attacks are included in this class.
- Low-Severity Attack: In-device and in-transit information is not compromised by a low-severity attack. Moreover, a successful low-severity attack does not result in unauthorized access to networks and devices. Additionally, the availability of IoT services is not affected by low-severity attacks. As such, low-end, internal, and interruption attacks are included in this class.
4.6. Summary and Insight
5. Security Requirements
5.1. Access-Level Security Requirements
5.2. Information Security Requirements
5.3. Functional Security Requirements
5.4. Summary and Insight
6. Security Solutions
6.1. End Device Security
6.1.1. Secure Execution Environment
6.1.2. Secure Bootstrap
6.1.3. Secure Storage
6.1.4. Secure Debug Interface
6.2. Communication Security
6.2.1. Cryptosystems
6.2.2. End-to-End Network Security
- The time to set up a session key increases significantly because the Initiator and Responder have to exchange a considerable number of messages with the proxy nodes.
- The proposed scheme assumes that the Initiator is resource constrained. Therefore, the proxy nodes compute the Initiator’s DH public key and session key. However, the Responder can also be resource constrained and can delegate DH public and session key computation tasks to the proxy nodes. As a result, the collaborative scheme will contribute more to the communication overheads for exchanging protocol messages and will increase the key establishment time.
- If a single proxy fails to compute its part of the DH key correctly the D-HIP returns to the states where it selects proxy nodes and distributes blocks of its secret key. A malicious proxy can exploit this property to perform DoS attacks. The malicious proxy can avoid DH key computation and provide a false DH key to the Initiator. Hence, the malicious proxy can force the Initiator to perform proxy node selection and key distribution repeatedly.
6.2.3. End-to-End Transport Security
6.3. Service Security
6.3.1. Access-Control Models
6.3.2. Access-Control Architectures
6.3.3. Role-Based Access Control
6.3.4. Capability-Based Access Control
6.3.5. Analysis and Comparison
6.4. Summary and Insight
7. Research Directions
7.1. Secure Service Discovery
7.2. Identity Privacy
7.3. Data Privacy
7.4. Application Data Security
7.5. Software Update
- Smart devices can be configured such that they are only accessible from the local network. A user has to be co-located with a device in the same network to get access to it through the Gateway. In such scenarios, security updates cannot be applied directly as the devices are not connected to the Internet.
- There may have a significant communication overhead for delivering software updates over the lossy and limited-bandwidth networks, such as 6LoWPAN [68] and Zigbee [69]. Software updates need to be sent in multiple fragments. Some of the fragments may need to be retransmitted because of the lossy networks. However, the networking protocols 6LoWPAN and Zigbee do not provide a mechanism for retransmitting the missing fragments. An entire message has to be retransmitted when one or more fragments are lost.
- Devices may not have enough memory to store software updates for verifying the authenticity and integrity of the updates.
- Simultaneous software updates may need to be applied to the devices of an IoT system to maintain interoperability between these devices.
7.6. On-Device Credential Security
7.7. Memory-Aware Security Solutions
7.8. Network Anomaly Detection
7.9. IoT Forensics
- Media forensics must have physical access to the storage of a digital device. It may not be possible to retrieve logs stored in the memory of a medical sensor, which is required to remain online and implanted in a patient’s body.
- Cloud forensics analyze logs of the cloud services that run on the cloud servers. The cloud logs may not be used as evidence for investigating incidents that occur in the edge networks where IoT services run on smart devices and are accessed locally.
- Network forensics may not be suitable for analyzing incidents in the smart systems where devices are mobile and network topologies change over the time, such as ad hoc networks.
8. Concluding Remarks
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Hossain, M.; Islam, S.R.; Ali, F.; Kwak, K.S.; Hasan, R. An Internet of Things-based health prescription assistant and its security system design. Future Gener. Comput. Syst. 2018, 82, 422–439. [Google Scholar] [CrossRef]
- Ali, F.; Islam, S.R.; Kwak, D.; Khan, P.; Ullah, N.; Yoo, S.j.; Kwak, K.S. Type-2 fuzzy ontology-aided recommendation systems for IoT-based healthcare. Comput. Commun. 2018, 119, 138–155. [Google Scholar] [CrossRef]
- Islam, S.R.; Uddin, M.N.; Kwak, K.S. The IoT: Exciting possibilities for bettering lives: Special application scenarios. IEEE Consum. Electron. Mag. 2016, 5, 49–57. [Google Scholar] [CrossRef]
- Islam, S.R.; Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K.S. The internet of things for health care: A comprehensive survey. IEEE Access 2015, 3, 678–708. [Google Scholar] [CrossRef]
- O’Neill, M. Insecurity by design: Today’s IoT device security problem. Engineering 2016, 2, 48–49. [Google Scholar] [CrossRef]
- Díaz, M.; Martín, C.; Rubio, B. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl. 2016, 67, 99–117. [Google Scholar] [CrossRef]
- Zhao, M.; Hu, C.; Song, X.; Zhao, C. Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial. J. Netw. Comput. Appl. 2019, 131, 55–65. [Google Scholar] [CrossRef]
- Han, W.; Xue, J.; Wang, Y.; Liu, Z.; Kong, Z. MalInsight: A systematic profiling based malware detection framework. J. Netw. Comput. Appl. 2019, 125, 236–250. [Google Scholar] [CrossRef]
- HP. Internet of Things Research Study. 2014. Available online: https://h41382.www4.hpe.com/gfs-shared/downloads-352.pdf (accessed on 22 January 2024).
- Kirsten, S. Cross Site Scripting (XSS). Available online: https://owasp.org/www-community/attacks/xss/ (accessed on 22 January 2024).
- Proofpoint. Proofpoint Uncovers IoT Cyberattack. 2014. Available online: https://www.proofpoint.com/us/proofpoint-uncovers-internet-things-iot-cyberattack (accessed on 22 January 2024).
- Security, K. Mirai IoT Botnet. 2016. Available online: https://krebsonsecurity.com/2017/12/mirai-iot-botnet-co-authors-plead-guilty/ (accessed on 22 January 2024).
- Reading, D. Air Force Researchers Plant Rootkit In A PLC. 2014. Available online: http://www.darkreading.com/attacks-breaches/air-force-researchers-plant-rootkit-in-a-plc/d/d-id/1141218? (accessed on 22 January 2024).
- Times, N. Stuxnet Computer Worm. 2011. Available online: http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html (accessed on 22 January 2024).
- TechCrunch. BrickerBot: A Vigilante Worm That Destroys Insecure IoT Devices. 2017. Available online: https://techcrunch.com/2017/04/25/brickerbot-is-a-vigilante-worm-that-destroys-insecure-iot-devices/#:~:text=BrickerBot%20finds%20these%20devices%20and,by%20formatting%20the%20internal%20memory (accessed on 22 January 2024).
- ZDNet. Finns Chilling as DDoS Knocks Out Building Control System. 2016. Available online: https://www.theregister.co.uk/2016/11/09/finns_chilling_as_ddos_knocks_out_building_control_system/ (accessed on 22 January 2024).
- Labs, I. Car Hacking. 2014. Available online: http://blog.ioactive.com/2014/04/car-hacking-2-content.html (accessed on 8 August 2018).
- Tech, C. Hacking the Drug Pump. 2015. Available online: http://money.cnn.com/2015/06/10/technology/drug-pump-hack/ (accessed on 22 January 2024).
- Rapid7. Hacking IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities. 2016. Available online: https://information.rapid7.com/iot-baby-monitor-research.html (accessed on 22 January 2024).
- Cerrudo, C. Hacking US Traffic Control System. 2014. Available online: https://ioactive.com/hacking-us-and-uk-australia-france-etc/ (accessed on 22 January 2024).
- Oren, Y.; Keromytis, A.D. From the aether to the ethernet attacking the Internet using broadcast digital Television. In Proceedings of the USENIX Security, San Diego, CA, USA, 20–22 August 2014. [Google Scholar]
- Hoque, M.A.; Hossain, M.; Noor, S.; Islam, S.R.; Hasan, R. IoTaaS: Drone-based Internet of Things as a service framework for smart cities. IEEE Internet Things J. 2021, 9, 12425–12439. [Google Scholar] [CrossRef]
- Zolertia. Z1 Mote IoT Device. 2016. Available online: http:///zolertia.sourceforge.net/ (accessed on 22 January 2024).
- SkyMote. T-Mote Sky Iot Device. 2016. Available online: http://wirelesssensornetworks.weebly.com/1/post/2013/08/tmote-sky.html (accessed on 22 January 2024).
- Opal. Opal Sensor Node. 2016. Available online: http://www.net.in.tun.de/en/sandbox/wireless-sensor-networks/ (accessed on 12 August 2021).
- Mote, O. Open Hardware for the Internet of Things. 2016. Available online: http://openmote.com/product/openmote-b-platinum-kit/ (accessed on 12 August 2021).
- Libelium. Waspmote: The Sensor Device for Internet of Things Developers. 2016. Available online: http://www.libelium.com/products/waspmote/ (accessed on 22 January 2024).
- Arduino. Arduino Uno: An IoT Development Board. 2017. Available online: https://store.arduino.cc/usa/arduino-uno-rev3 (accessed on 22 January 2024).
- Arm-Mbed. Mbed: A Development Board for Rapid Prototyping of IoT Applications. 2017. Available online: https://os.mbed.com/platforms/mbed-LPC1768/ (accessed on 22 January 2024).
- Weptech. A 6LoWPan Border Router. 2017. Available online: https://www.ti.com/document-viewer/lit/html/SSZTBO7 (accessed on 22 January 2024).
- Weinzierl. KNS Stacks: A Development Board for KNX Applications. 2017. Available online: https://www.weinzierl.de/index.php/en/all-knx/knx-stacks-en/development-hardware-en (accessed on 22 January 2024).
- Contiki. Contiki OS: An Open Source Operating System for the Internet of Things. 2016. Available online: http://www.contiki-os.org/ (accessed on 22 January 2024).
- RIoT. RIOT: A Small Operating System for Resouce Constrained Systems. 2017. Available online: https://riot-os.org/ (accessed on 22 January 2024).
- Kent, S.; Seo, K. Security Architecture for the Internet Protocol. RFC IETF. 2005. Available online: https://www.rfc-editor.org/rfc/rfc4301 (accessed on 22 January 2024).
- Rescorla, E.; Modadugu, N. Datagram Transport Layer Security. RFC IETF. 2006. Available online: https://www.rfc-editor.org/rfc/rfc4347.html (accessed on 22 January 2024).
- Zhou, Z.; Wu, C.; Yang, Z.; Liu, Y. Sensorless sensing with WiFi. Tsinghua Sci. Technol. 2015, 20, 1–6. [Google Scholar] [CrossRef]
- Wang, C.; Jiang, T.; Zhang, Q. ZigBee® Network Protocols and Applications; Auerbach Publications: Boca Raton, FL, USA, 2016. [Google Scholar]
- Yassein, M.B.; Mardini, W.; Khalil, A. Smart homes automation using Z-wave protocol. In Proceedings of the International Conference on Engineering & MIS (ICEMIS), Agadir, Morocco, 22–24 September 2016. [Google Scholar]
- Vagdevi, P.; Nagaraj, D.; Prasad, G.V. Home: IOT based home automation using NFC. In Proceedings of the International Conference on IoT in Social, Mobile, Analytics and Cloud, Palladam, India, 10–11 February 2017. [Google Scholar]
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- Pattar, S.; Buyya, R.; Venugopal, K.; Iyengar, S.; Patnaik, L. Searching for the IoT Resources: Fundamentals, Requirements, Comprehensive Review and Future Directions. IEEE Commun. Surv. Tutor. 2018. [Google Scholar] [CrossRef]
- Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
- Tian, H.; Nan, F.; Chang, C.C.; Huang, Y.; Lu, J.; Du, Y. Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J. Netw. Comput. Appl. 2019, 127, 59–69. [Google Scholar] [CrossRef]
- Zhang, Y.; Deng, R.H.; Han, G.; Zheng, D. Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things. J. Netw. Comput. Appl. 2018, 123, 89–100. [Google Scholar] [CrossRef]
- Barki, A.; Bouabdallah, A.; Gharout, S.; Traoré, J. M2M security: Challenges and solutions. IEEE Commun. Surv. Tutor. 2016, 18, 1241–1254. [Google Scholar] [CrossRef]
- Ni, J.; Zhang, K.; Lin, X.; Shen, X.S. Securing fog computing for internet of things applications: Challenges and solutions. IEEE Commun. Surv. Tutor. 2017, 20, 601–628. [Google Scholar] [CrossRef]
- Stellios, I.; Kotzanikolaou, P.; Psarakis, M.; Alcaraz, C.; Lopez, J. A Survey of IoT-enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services. IEEE Commun. Surv. Tutor. 2018. [Google Scholar] [CrossRef]
- Benkhelifa, E.; Welsh, T.; Hamouda, W. A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Towards Universal and Resilient Systems. IEEE Commun. Surv. Tutor. 2018, 20, 3496–3509. [Google Scholar] [CrossRef]
- Mohanta, B.K.; Jena, D.; Satapathy, U.; Patnaik, S. Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet Things 2020, 11, 100227. [Google Scholar] [CrossRef]
- Al-Garadi, M.A.; Mohamed, A.; Al-Ali, A.K.; Du, X.; Ali, I.; Guizani, M. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. IEEE Commun. Surv. Tutor. 2020, 22, 1646–1685. [Google Scholar] [CrossRef]
- Stoyanova, M.; Nikoloudakis, Y.; Panagiotakis, S.; Pallis, E.; Markakis, E.K. A survey on the internet of things (IoT) forensics: Challenges, approaches, and open issues. IEEE Commun. Surv. Tutor. 2020, 22, 1191–1221. [Google Scholar] [CrossRef]
- Lounis, K.; Zulkernine, M. Attacks and defenses in short-range wireless technologies for IoT. IEEE Access 2020, 8, 88892–88932. [Google Scholar] [CrossRef]
- Sharma, V.; You, I.; Andersson, K.; Palmieri, F.; Rehmani, M.H.; Lim, J. Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey. IEEE Access 2020, 8, 167123–167163. [Google Scholar] [CrossRef]
- Sha, K.; Yang, T.A.; Wei, W.; Davari, S. A survey of edge computing-based designs for iot security. Digit. Commun. Netw. 2020, 6, 195–202. [Google Scholar] [CrossRef]
- Tahsien, S.M.; Karimipour, H.; Spachos, P. Machine learning based solutions for security of Internet of Things (IoT): A survey. J. Netw. Comput. Appl. 2020, 161, 102630. [Google Scholar] [CrossRef]
- Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
- Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; Ghani, N. Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun. Surv. Tutor. 2019, 21, 2702–2733. [Google Scholar] [CrossRef]
- Mrabet, H.; Belguith, S.; Alhomoud, A.; Jemai, A. A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors 2020, 20, 3625. [Google Scholar] [CrossRef]
- Ahmed, A.; Abdullah, S.; Bukhsh, M.; Ahmad, I.; Mushtaq, Z. An energy-efficient data aggregation mechanism for IoT secured by blockchain. IEEE Access 2022, 10, 11404–11419. [Google Scholar] [CrossRef]
- Hewa, T.; Braeken, A.; Liyanage, M.; Ylianttila, M. Fog computing and blockchain-based security service architecture for 5G industrial IoT-enabled cloud manufacturing. IEEE Trans. Ind. Inform. 2022, 18, 7174–7185. [Google Scholar] [CrossRef]
- Javanmardi, S.; Shojafar, M.; Mohammadi, R.; Persico, V.; Pescapè, A. S-FoS: A secure workflow scheduling approach for performance optimization in SDN-based IoT-Fog networks. J. Inf. Secur. Appl. 2023, 72, 103404. [Google Scholar] [CrossRef]
- Javanmardi, S.; Shojafar, M.; Mohammadi, R.; Nazari, A.; Persico, V.; Pescapè, A. FUPE: A security driven task scheduling approach for SDN-based IoT–Fog networks. J. Inf. Secur. Appl. 2021, 60, 102853. [Google Scholar] [CrossRef]
- Javanmardi, S.; Shojafar, M.; Mohammadi, R.; Alazab, M.; Caruso, A.M. An SDN perspective IoT-Fog security: A survey. Comput. Netw. 2023, 229, 109732. [Google Scholar] [CrossRef]
- Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 2019, 6, 8182–8201. [Google Scholar] [CrossRef]
- Desai, P.; Sheth, A.; Anantharam, P. Semantic gateway as a service architecture for IoT interoperability. In Proceedings of the 2015 IEEE International Conference on Mobile Services, New York, NY, USA, 27 June–2 July 2015. [Google Scholar]
- Datta, S.K.; Bonnet, C.; Nikaein, N. An IoT gateway centric architecture to provide novel m2m services. In Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Republic of Korea, 6–8 March 2014. [Google Scholar]
- 6LoWPAN. IPv6 over Low-Power Wireless Personal Area Networks. RFC4919. 2016. Available online: https://www.rfc-editor.org/rfc/rfc4919 (accessed on 22 January 2024).
- ZigBee. ZigBee Specification. 2015. Available online: https://zigbeealliance.org/wp-content/uploads/2019/11/docs-05-3474-21-0csg-zigbee-specification.pdf (accessed on 22 January 2024).
- Lin, Z.M.; Chang, C.H.; Chou, N.K.; Lin, Y.H. Bluetooth Low Energy (BLE) based blood pressure monitoring system. In Proceedings of the International Conference on Intelligent Green Building and Smart Grid (IGBSG), Taipei, Taiwan, 23–25 April 2014. [Google Scholar]
- Shelby, Z.; Hartke, K.; Bormann, C. The Constrained Application Protocol (CoAP). RFC IETF. 2014. Available online: https://www.rfc-editor.org/rfc/rfc7252 (accessed on 22 January 2024).
- Gaddour, O.; Koubâa, A. RPL in a nutshell: A survey. Comput. Netw. 2012, 56, 3163–3178. [Google Scholar] [CrossRef]
- Verma, A.; Bhardwaj, N. A review on routing information protocol (RIP) and open shortest path first (OSPF) routing protocol. Int. J. Future Gener. Commun. Netw. 2016, 9, 161–170. [Google Scholar] [CrossRef]
- Covington, M.; Carskadden, R. Threat implications of the Internet of Things. In Proceedings of the IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013. [Google Scholar]
- Gruschka, N.; Jensen, M. Attack surfaces: A taxonomy for attacks on cloud service. In Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing, Miami, FL, USA, 5–10 July 2010. [Google Scholar]
- OWASP. Open Web Application Security Project for Internet of Things. 2015. Available online: https://owasp.org/www-project-internet-of-things/ (accessed on 22 January 2024).
- Lake, D.; Milito, R.; Morrow, M.; Vargheese, R. Internet of Things: Architectural Framework for eHealth Security. J. ICT Stand. 2014, 1, 301–328. [Google Scholar] [CrossRef]
- Sanchez, J.L.C.; Bernabe, J.B.; Skarmeta, A.F. Towards privacy preserving data provenance for the Internet of Things. In Proceedings of the 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018. [Google Scholar]
- Medwed, M. Iot security challenges and ways forward. In International Workshop on Trustworthy Embedded Devices; ACM: New York, NY, USA, 2016; p. 55. [Google Scholar]
- Boulogeorgos, A.A.A.; Diamantoulakis, P.D.; Karagiannidis, G.K. Low power wide area networks (lpwans) for internet of things (iot) applications: Research challenges and future trends. arXiv 2016, arXiv:1611.07449. [Google Scholar]
- Rathi, N.; Ghosh, S.; Iyengar, A.; Naeimi, H. Data privacy in non-volatile cache: Challenges, attack models and solutions. In Proceedings of the 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Macao, China, 25–28 January 2016. [Google Scholar]
- Kubler, S.; Främling, K.; Buda, A. A standardized approach to deal with firewall and mobility policies in the IoT. Pervasive Mob. Comput. 2015, 20, 100–114. [Google Scholar] [CrossRef]
- Qian, L.; Zhu, Z.; Hu, J.; Liu, S. Research of SQL injection attack and prevention technology. In Proceedings of the Detection and Information Fusion (ICEDIF), 2015 International Conference on Estimation, Harbin, China, 10–11 January 2015. [Google Scholar]
- Aggarwal, S.; Houshmand, S.; Weir, M. New Technologies in Password Cracking Techniques. In Cyber Security: Power and Technology; Spronger: Berlin/Heidelberg, Germany, 2018; pp. 179–198. [Google Scholar]
- Gupta, B.; Gupta, S.; Gangwar, S.; Kumar, M.; Meena, P. Cross-site scripting (XSS) abuse and defense: Exploitation on several testing bed environments and its defense. J. Inf. Priv. Secur. 2015, 11, 118–136. [Google Scholar] [CrossRef]
- Neamtiu, I.; Dumitraş, T. Cloud software upgrades: Challenges and opportunities. In Proceedings of the International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), Williamsburg, VA, USA, 26 September 2011. [Google Scholar]
- Stevens, M.; Bursztein, E.; Karpman, P.; Albertini, A.; Markov, Y.; Bianco, A.P.; Baisse, C.; SHA1 Collision. Cryptology ePrint Archive, Paper 2017/190. Available online: https://eprint.iacr.org/2017/190 (accessed on 22 January 2024).
- Yuan, M.; Li, Y.; Li, Z. Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces. In Proceedings of the International Conference on Information and Communications Security, Beijing, China, 6–8 December 2017. [Google Scholar]
- Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.; Halderman, J.A.; Invernizzi, L.; Kallitsis, M.; et al. Understanding the mirai botnet. In Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, USA, 16–18 August 2017; pp. 1093–1110. [Google Scholar]
- Ko, J.; Jeong, J.; Park, J.; Jun, J.A.; Gnawali, O.; Paek, J. DualMOP-RPL: Supporting multiple modes of downward routing in a single RPL network. ACM Trans. Sens. Netw. 2015, 11, 39. [Google Scholar] [CrossRef]
- Open Web Application Security Project (OWASP). The Heartbleed Bug. Available online: https://owasp.org/www-community/vulnerabilities/Heartbleed_Bug (accessed on 22 January 2024).
- Palacharla, S.; Chandan, M.; GnanaSuryaTeja, K.; Varshitha, G. Wormhole Attack: A Major Security Concern in Internet of Things (Iot). Int. J. Eng. Technol. 2018, 7, 147–150. [Google Scholar] [CrossRef]
- Liu, Y.; Ma, M.; Liu, X.; Xiong, N.; Liu, A.; Zhu, Y. Design and Analysis of Probing Route to Defense Sink-hole Attacks for Internet of Things Security. IEEE Trans. Netw. Sci. Eng. 2018, 7, 356–372. [Google Scholar] [CrossRef]
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and other botnets. Computer 2017, 50, 80–84. [Google Scholar] [CrossRef]
- Alberca, C.; Pastrana, S.; Suarez-Tangil, G.; Palmieri, P. Security analysis and exploitation of arduino devices in the internet of things. In Proceedings of the ACM International Conference on Computing Frontiers, Como, Italy, 16–19 May 2016. [Google Scholar]
- Pongle, P.; Chavan, G. A survey: Attacks on RPL and 6LoWPAN in IoT. In Proceedings of the Pervasive Computing (ICPC), 2015 International Conference on Pervasive Computing (ICPC), Pune, India, 8–10 January 2015. [Google Scholar]
- Salameh, H.B.; Almajali, S.; Ayyash, M.; Elgala, H. Securing delay-sensitive cognitive radio IoT communications under reactive jamming attacks: Spectrum assignment perspective. In Proceedings of the 2018 Fifth International Conference on Software Defined Systems (SDS), Barcelona, Spain, 23–26 April 2018. [Google Scholar]
- Chiew, K.L.; Yong, K.S.C.; Tan, C.L. A survey of phishing attacks: Their types, vectors and technical approaches. Expert Syst. Appl. 2018, 106, 1–20. [Google Scholar] [CrossRef]
- Lyon, G. Nmap: A Network Mapper. Available online: https://nmap.org/#:~:text=Nmap%20(%22Network%20Mapper%22),monitoring%20host%20or%20service%20uptime (accessed on 22 January 2024).
- Krupp, J.; Backes, M.; Rossow, C. Identifying the scan and attack infrastructures behind amplification DDoS attacks. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016. [Google Scholar]
- THC-Hydra. Hydra: A Password Guessing Tool. Available online: https://github.com/vanhauser-thc/thc-hydra (accessed on 22 January 2024).
- Chen, C.K.; Zhang, Z.K.; Lee, S.H.; Shieh, S. Penetration testing in the iot age. Computer 2018, 51, 82–85. [Google Scholar] [CrossRef]
- Visoottiviseth, V.; Akarasiriwong, P.; Chaiyasart, S.; Chotivatunyu, S. PENTOS: Penetration testing tool for Internet of Thing devices. In Proceedings of the TENCON 2017—2017 IEEE Region 10 Conference, Penang, Malaysia, 5–8 November 2017. [Google Scholar]
- Chothia, T.; de Ruiter, J. Learning from others mistakes: Penetration testing iot devices in the classroom. In Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), Austin, TX, USA, 9 August 2016. [Google Scholar]
- Forbes. Roundup of Internet of Things Forecasts. 2017. Available online: https://goo.gl/iVf5uz (accessed on 22 January 2024).
- Hu, W.; Tan, H.; Corke, P.; Shih, W.C.; Jha, S. Toward trusted wireless sensor networks. ACM Trans. Sens. Netw. 2010, 7, 1–25. [Google Scholar] [CrossRef]
- Smith, S.W.; Weingart, S. Building a high-performance, programmable secure coprocessor. Comput. Netw. 1999, 31, 831–860. [Google Scholar] [CrossRef]
- Costan, V.; Lebedev, I.; Devadas, S. Secure processors part I: Background, taxonomy for secure enclaves and Intel SGX architecture. Found. Trends® Electron. Des. Autom. 2017, 11, 1–248. [Google Scholar] [CrossRef]
- Pinto, S.; Gomes, T.; Pereira, J.; Cabral, J.; Tavares, A. IIoTEED: An enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput. 2017, 21, 40–47. [Google Scholar] [CrossRef]
- Hadi, N.; Jim, R. Employ a Secure Flavor of Linux. 2007. Available online: https://www.embedded.com/employ-a-secure-flavor-of-linux/ (accessed on 22 January 2024).
- Hennessy, A.; Zheng, Y.; Bhunia, S. JTAG-based robust PCB authentication for protection against counterfeiting attacks. In Proceedings of the 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Macao, China, 25–28 January 2016. [Google Scholar]
- Das, A.; Da Rolt, J.; Ghosh, S.; Seys, S.; Dupuis, S.; Di Natale, G.; Flottes, M.L.; Rouzeyre, B.; Verbauwhede, I. Secure JTAG implementation using schnorr protocol. J. Electron. Test. 2013, 29, 193–209. [Google Scholar] [CrossRef]
- Rosenfeld, K.; Karri, R. Attacks and Defenses for JTAG. Des. Test Comput. 2010. [Google Scholar] [CrossRef]
- Zhao, L.; Misoczki, R.; Ghosh, S.; Sastry, M.R. Root of Trust (Rot) Application for Internet of Things (IoT) Devices. U.S. Patent App. 15/278,658, 29 March 2018. [Google Scholar]
- Belenky, Y.; Sumner, R. Prevention of Playback Attacks Using OTP Memory. U.S. Patent 9,009,492, 19 June 2015. [Google Scholar]
- Fifield, J.A.; Pomichter, G.P., Jr.; Zimmerman, J.S. Protection of One-Time Programmable (OTP) Memory. U.S. Patent 8,990,478, 8 May 2015. [Google Scholar]
- Moskowitz, R.; Heer, T.; Jokela, P.; Henderson, T. Host Identity Protocol Version 2 (HIPv2). RFC, IETF. 2015. Available online: https://www.rfc-editor.org/rfc/rfc7401.html (accessed on 22 January 2024).
- Saied, Y.B.; Olivereau, A. D-HIP: A distributed key exchange scheme for HIP-based Internet of Things. In Proceedings of the WoWMoM, New York, NY, USA, 24–25 October 2012. [Google Scholar]
- Ben Saied, Y.; Olivereau, A. HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things. In Proceedings of the CNS, Hammamet, Tunisia, 29 March–1 April 2012. [Google Scholar]
- Hummen, R.; Hiller, J.; Henze, M.; Wehrle, K. Slimfit—A HIP DEX compression layer for the IP-based Internet of Things. In Proceedings of the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France, 7–9 October 2013. [Google Scholar]
- Hummen, R.; Moskowitz, R. HIP Diet EXchange (DEX). RFC, IETF. 2014. Available online: http://www.watersprings.org/pub/id/draft-ietf-hip-dex-18.html (accessed on 22 January 2024).
- Garcia-Morchon, O.; Keoh, S.L.; Kumar, S.; Moreno-Sanchez, P.; Vidal-Meca, F.; Ziegeldorf, J.H. Securing the IP-based internet of things with HIP and DTLS. In Proceedings of the WiSec: Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest Hungary, 17–19 April 2013. [Google Scholar]
- Blundo, C.; De Santis, A.; Herzberg, A.; Kutten, S.; Vaccaro, U.; Yung, M. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology–CRYPTO. Available online: https://link.springer.com/chapter/10.1007/3-540-48071-4_33 (accessed on 22 January 2024).
- Chen, L. Recommendation for Key Derivation Using Pseudorandom Functions; NIST Special Publication: Gaithersburg, MD, USA, 2008. Available online: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-108.pdf (accessed on 22 January 2024).
- Alexander, R.; Tsao, T. Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Nethods for Generic LLN Environments. RFC, IETF 2012. Available online: https://www.ietf.org/archive/id/draft-alexander-roll-mikey-lln-key-mgmt-02.html (accessed on 22 January 2024).
- Heer, T. LHIP: Lightweight Authentication Extension for HIP. RFC, IETF 2007. Available online: https://datatracker.ietf.org/doc/draft-heer-hip-lhip/ (accessed on 22 January 2024).
- Hossain, M.; Hasan, R. P-hip: A lightweight and privacy-aware host identity protocol for internet of things. IEEE Internet Things J. 2020, 8, 555–571. [Google Scholar] [CrossRef]
- Kothmayr, T.; Schmitt, C.; Hu, W.; Brunig, M.; Carle, G. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In Proceedings of the 37th Annual IEEE Conference on Local Computer Networks-Workshops, Clearwater, FL, USA, 22–25 October 2012. [Google Scholar]
- Eronen, P.; Tschofenig, H. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). RFC, IETF. 2005. Available online: https://www.rfc-editor.org/rfc/rfc4279.html (accessed on 22 January 2024).
- Hui, J.; Thubert, P. Compression Format for IPv6 Datagrams over IEEE 802.15. 4-Based Networks. IETF, RFC. 2011. Available online: https://www.rfc-editor.org/rfc/rfc6282 (accessed on 22 January 2024).
- Park, J.; Kang, N. Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake. In Proceedings of the 2014 International Conference on Information and Communication Technology Convergence (ICTC), Busan, Republic of Korea, 22–24 October 2014. [Google Scholar]
- Hummen, R.; Ziegeldorf, J.H.; Shafagh, H.; Raza, S.; Wehrle, K. Towards viable certificate-based authentication for the Internet of Things. In Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, Budapest, Hungary, 19 April 2013. [Google Scholar]
- Hummen, R.; Shafagh, H.; Gilger, J. Extended DTLS Session Resumption for Constrained Network Environments. RFC, IETF. 2013. Available online: https://datatracker.ietf.org/doc/html/draft-hummen-dtls-extended-session-resumption-01 (accessed on 22 January 2024).
- Liu, J.; Xiao, Y.; Chen, C.P. Authentication and access control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012. [Google Scholar]
- Zhang, G.; Tian, J. An extended role based access control model for the Internet of Things. In Proceedings of the 2010 International Conference on Information, Networking and Automation (ICINA), Kunming, China, 18–19 October 2010. [Google Scholar]
- Gusmeroli, S.; Piccione, S.; Rotondi, D. A capability-based security approach to manage access control in the Internet of Things. Math. Comput. Model. 2013, 58, 1189–1205. [Google Scholar] [CrossRef]
- Seitz, L.; Selander, G.; Gehrmann, C. Authorization framework for the Internet-of-Things. In Proceedings of the 2013 IEEE 14th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Madrid, Spain, 4–7 June 2013. [Google Scholar]
- Pereira, P.P.; Eliasson, J.; Delsing, J. An authentication and access control framework for CoAP-based Internet of Things. In Proceedings of the IECON 2014—40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, 29 October–1 November 2014. [Google Scholar]
- Hernández-Ramos, J.L.; Jara, A.J.; Marın, L.; Skarmeta, A.F. Distributed capability-based access control for the Internet of Things. J. Internet Serv. Inf. Secur. 2013, 3, 1–16. [Google Scholar]
- Mahalle, P.N.; Anggorojati, B.; Prasad, N.R.; Prasad, R. Identity authentication and capability based access control (IACAC) for the Internet of Things. J. Cyber Secur. Mobil. 2013, 1, 309–348. [Google Scholar] [CrossRef]
- Hummen, R.; Shafagh, H.; Raza, S.; Voig, T.; Wehrle, K. Delegation-based authentication and authorization for the IP-based Internet of Things. In Proceedings of the 2014 Eleventh Annual IEEE International Conference on Sensing, Communication and Networking (SECON), Singapore, 30 June–3 July 2014. [Google Scholar]
- Anggorojati, B.; Mahalle, P.N.; Prasad, N.R.; Prasad, R. Capability-based access control delegation model on the federated IoT network. In Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, Taipei, Taiwan, 24–27 September 2012. [Google Scholar]
- Cirani, S.; Picone, M.; Gonizzi, P.; Veltri, L.; Ferrari, G. IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios. J. Sens. 2015, 15, 1224–1234. [Google Scholar] [CrossRef]
- Gerdes, S.; Bergmann, O.; Bormann, C. Delegated CoAP Authentication and Authorization Framework (DCAF). ETF Internet Draft. 2014. Available online: https://datatracker.ietf.org/doc/draft-gerdes-core-dcaf-authorize/01/ (accessed on 22 January 2024).
- Moratelli, C.; Johann, S.; Neves, M.; Hessel, F. Embedded virtualization for the design of secure IoT applications. In Proceedings of the 27th International Symposium on Rapid System Prototyping: Shortening the Path from Specification to Prototype, Pittsburgh, PA, USA, 1–7 October 2016. [Google Scholar]
- Lu, W.; Wang, R.; Zeng, C.; Liu, C.; Wang, X. A General Fault Injection Method Based on JTAG. In Proceedings of the 2018 Prognostics and System Health Management Conference (PHM-Chongqing), Chongqing, China, 26–28 October 2018. [Google Scholar]
- Shelby, Z.; Bormann, C. 6LoWPAN: The Wireless Embedded Internet; John Wiley & Sons: Hoboken, NJ, USA, 2011. [Google Scholar]
- Butun, I.; Sankar, R. A brief survey of access control in Wireless Sensor Networks. In Proceedings of the 2011 IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2011. [Google Scholar]
- Wang, H.; Sheng, B.; Tan, C.C.; Li, Q. Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control. In Proceedings of the International Conference on Distributed Computing Systems, Beijing, China, 17–20 June 2008. [Google Scholar]
- NIST. Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018. [Google Scholar]
- Amin, F.; Jahangir, A.; Rasifard, H. Analysis of public-key cryptography for wireless sensor networks security. Int. J. Comput. Inf. Eng. 2008, 2, 1448–1453. [Google Scholar]
- Hu, W.; Corke, P.; Shih, W.C.; Overs, L. Secfleck: A public key technology platform for wireless sensor networks. In Wireless Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2009. [Google Scholar]
- Kocabas, O.; Savas, E.; Großschädl, J. Enhancing an Embedded Processor Core with a Cryptographic Unit for Performance and Security. In Proceedings of the 2008 International Conference on Reconfigurable Computing and FPGAs, Cancun, Mexico, 3–5 December 2008. [Google Scholar]
- Liu, A.; Ning, P. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), St. Louis, MO, USA, 22–24 April 2008. [Google Scholar]
- Guicheng, S.; Zhen, Y. Application of elliptic curve cryptography in node authentication of Internet of Things. In Proceedings of the 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Beijing, China, 16–18 October 2013. [Google Scholar]
- Gupta, V.; Wurm, M.; Zhu, Y.; Millard, M.; Fung, S.; Gura, N.; Eberle, H.; Shantz, S.C. Sizzle: A standards-based end-to-end security architecture for the embedded Internet. Pervasive Mob. Comput. 2005, 1, 425–445. [Google Scholar] [CrossRef]
- Bohan, Z.; Xu, W.; Kaili, Z.; Xueyuan, Z. Encryption Node Design in Internet of Things Based on Fingerprint Features and CC253. In Proceedings of the 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Beijing, China, 20–23 August 2013. [Google Scholar]
- Ravi, S.; Raghunathan, A.; Potlapally, N.; Sankaradass, M. System design methodologies for a wireless security processing platform. In Proceedings of the 39th Annual Design Automation Conference, New Orleans, LA, USA, 10–14 June 2002. [Google Scholar]
- Wander, A.S.; Gura, N.; Eberle, H. Energy Analysis of Public–key Cryptography on Small Wireless Devices. In Proceedings of the 3rd IEEE Intl Conference on Pervasive Computing and Communications, Kauai, HI, USA, 8–12 March 2005. [Google Scholar]
- Kanuparthi, A.; Karri, R.; Addepalli, S. Hardware and embedded security in the context of Internet of Things. In Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles, Berlin, Germany, 4 November 2013. [Google Scholar]
- Levä, T.; Mazhelis, O.; Suomi, H. Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications. Decis. Support Syst. 2014, 63, 23–38. [Google Scholar] [CrossRef]
- Ferraiolo, D.; Cugini, J.; Kuhn, D.R. Role-based access control (RBAC): Features and motivations. In Proceedings of the ACSAC; IEEE, Piscataway, NJ, USA, 11–15 December 1995. [Google Scholar]
- Pesonen, L.I.; Eyers, D.M.; Bacon, J. A capability-based access control architecture for multi-domain publish/subscribe systems. In Proceedings of the International Symposium on Applications and the Internet (SAINT’06), Phoenix, AZ, USA, 23–27 January 2006. [Google Scholar]
- Recordon, D.; Reed, D. OpenID 2.0: A platform for user-centric identity management. In Proceedings of the Second ACM Workshop on Digital Identity Management, Alexandria, VA, USA, 3 November 2006. [Google Scholar]
- Godik, S.; Moses, T.; Anderson, A.; Parducci, B.; Adams, C.; Flinn, D.; Brose, G.; Lockhart, H.; Beznosov, K.; Kudo, M.; et al. Extensible access control markup language (XACMl) version 2.0. Oasis Stand. 2005. Available online: https://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf (accessed on 22 January 2024).
- Crockford, D. The Application/Json Media Type for Javascript Object Notation (JSON). RFC, IETF. 2006. Available online: https://www.rfc-editor.org/rfc/rfc4627.html (accessed on 22 January 2024).
- Zhu, L.; Hartman, S.; Jaganathan, K. The Kerberos Version 5 Generic Security Service Application Program Interface (GSS-API) Mechanism: Version 2. RFC, IETF. 2005. Available online: https://www.rfc-editor.org/rfc/rfc4121 (accessed on 22 January 2024).
- Willens, S.; Rubens, A.C.; Rigney, C.; Simpson, W.A. Remote Authentication Dial in User Service (RADIUS). RFC, NWG. 2000. Available online: https://www.rfc-editor.org/rfc/rfc2865.html (accessed on 22 January 2024).
- Hardt, D. The OAuth 2.0 Authorization Framework. RFC, IETF. 2012. Available online: https://datatracker.ietf.org/doc/html/rfc6749 (accessed on 22 January 2024).
- Kayas, G.; Hossain, M.; Payton, J.; Islam, S.R. SUPnP: Secure Access and Service Registration for UPnP-Enabled Internet of Things. IEEE Internet Things J. 2021, 8, 11561–11580. [Google Scholar] [CrossRef]
- Asghar, M.H.; Negi, A.; Mohammadzadeh, N. Principle application and vision in Internet of Things (IoT). In Proceedings of the International Conference on Computing, Communication & Automation, Greater Noida, India, 15–16 May 2015. [Google Scholar]
- Anderson, C.; Hübener, I.; Seipp, A.K.; Ohly, S.; David, K.; Pejovic, V. A survey of attention management systems in ubiquitous computing environments. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2018, 2, 58. [Google Scholar] [CrossRef]
- Ling, C.H.; Lee, C.C.; Yang, C.C.; Hwang, M.S. A Secure and Efficient One-time Password Authentication Scheme for WSN. Int. J. Netw. Secur. 2017, 19, 177–181. [Google Scholar]
- Chuang, I.H.; Guo, B.J.; Tsai, J.S.; Kuo, Y.H. Multi-graph Zero-knowledge-based authentication system in Internet of Things. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017. [Google Scholar]
- Bernal Bernabe, J.; Hernandez-Ramos, J.L.; Skarmeta Gomez, A.F. Holistic privacy-preserving identity management system for the internet of things. Mob. Inf. Syst. 2017, 2017, 20. [Google Scholar] [CrossRef]
- Ramsdell, B.; Turner, S. Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification. RFC, IETF. 2010. Available online: https://www.rfc-editor.org/rfc/rfc5751.html (accessed on 22 January 2024).
- Baugher, M.; McGrew, D.; Naslund, M.; Carrara, E.; Norrman, K. The Secure Real-Time Transport Protocol (SRTP). RFC, IETF. 2004. Available online: https://www.rfc-editor.org/rfc/rfc3711.html (accessed on 22 January 2024).
- Levis, P.; Madden, S.; Polastre, J.; Szewczyk, R.; Whitehouse, K.; Woo, A.; Gay, D.; Hill, J.; Welsh, M.; Brewer, E.; et al. Tinyos: An operating system for sensor networks. In Ambient Intelligence. Available online: https://www.researchgate.net/publication/228639896_TinyOS_An_Operating_System_for_Sensor_Networks (accessed on 22 January 2024).
- Lu, G.; Nam, Y.J.; Du, D.H. BloomStore: Bloom-filter based memory-efficient key-value store for indexing of data deduplication on flash. In Proceedings of the IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST), Pacific Grove, CA, USA, 16–20 April 2012. [Google Scholar]
- Herder, C.; Ren, L.; van Dijk, M.; Yu, M.D.; Devadas, S. Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions. IEEE Trans. Dependable Secur. Comput. 2017, 14, 65–82. [Google Scholar] [CrossRef]
- Dong, P.; Wang, W.; Shi, X.; Qin, T. Lightweight key management for group communication in body area networks through physical unclonable functions. In Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, Philadelphia, PA, USA, 17–19 July 2017. [Google Scholar]
- Valsesia, D.; Coluccia, G.; Bianchi, T.; Magli, E. User Authentication via PRNU-Based Physical Unclonable Functions. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1941–1956. [Google Scholar] [CrossRef]
- Hossain, M.; Noor, S.; Hasan, R. HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme for Internet of Things. In Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), San Francisco, CA, USA, 6–8 April 2017. [Google Scholar]
- Suárez-Albela, M.; Fernández-Caramés, T.M.; Fraga-Lamas, P.; Castedo, L. A practical performance comparison of ECC and RSA for resource-constrained IoT devices. In Proceedings of the 2018 Global Internet of Things Summit (GIoTS), Bilbao, Spain, 4–7 June 2018. [Google Scholar]
- Kornaros, G. Hardware-assisted machine learning in resource-constrained IoT environments for security: Review and future prospective. IEEE Access 2022, 10, 58603–58622. [Google Scholar] [CrossRef]
- Hossain, M.; Kayas, G.; Karim, Y.; Hasan, R.; Payton, J.; Islam, S.R. CATComp: A Compression-Aware Authorization Protocol for Resource-Efficient Communications in IoT Networks. IEEE Internet Things J. 2021, 9, 1667–1682. [Google Scholar] [CrossRef]
- Chandran, P. Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices. Future Internet 2018, 10, 119. [Google Scholar]
- Khan, M.N.; Rao, A.; Camtepe, S. Lightweight cryptographic protocols for IoT-constrained devices: A survey. IEEE Internet Things J. 2020, 8, 4132–4156. [Google Scholar] [CrossRef]
- Zahed, M.I.A.; Ahmad, I.; Habibi, D.; Phung, Q.V. Green and secure computation offloading for cache-enabled IoT networks. IEEE Access 2020, 8, 63840–63855. [Google Scholar] [CrossRef]
- Chang, C.C.; Lee, W.K.; Liu, Y.; Goi, B.M.; Phan, R.C.W. Signature gateway: Offloading signature generation to IoT gateway accelerated by GPU. IEEE Internet Things J. 2018, 6, 4448–4461. [Google Scholar] [CrossRef]
- El Jaouhari, S.; Bouvet, E. Secure firmware Over-The-Air updates for IoT: Survey, challenges, and discussions. Internet Things 2022, 18, 100508. [Google Scholar] [CrossRef]
- Arakadakis, K.; Charalampidis, P.; Makrogiannakis, A.; Fragkiadakis, A. Firmware over-the-air programming techniques for IoT networks-A survey. ACM Comput. Surv. (Csur) 2021, 54, 1–36. [Google Scholar] [CrossRef]
- Suricata. A High Performance, Open Source Network Analysis and Threat Detection Software. Available online: https://suricata.io/ (accessed on 22 January 2024).
- Beale, J.; Baker, A.R.; Esler, J. Snort: IDS and IPS Toolkit. Available online: https://www.snort.org/ (accessed on 22 January 2024).
- KitPloit. Moloch: An Open Source, Large Scale, Full Packet Capturing, Indexing, and Database System. Available online: https://www.kitploit.com/2018/04/moloch-open-source-large-scale-full.html?m=0 (accessed on 22 January 2024).
- Zawoad, S.; Hasan, R. FAIoT: Towards building a forensics aware eco system for the Internet of Things. In Proceedings of the 2015 IEEE International Conference on Services Computing, New York, NY, USA, 27 June–2 July 2015. [Google Scholar]
- Widup, S. Computer Forensics and Digital Investigation with EnCase Forensic v7; McGraw-Hill Education Group: New York, NY, USA, 2014. [Google Scholar]
- Zawoad, S.; Dutta, A.K.; Hasan, R. Towards building forensics enabled cloud through secure logging-as-a-service. IEEE Trans. Dependable Secur. Comput. 2016, 13, 148–162. [Google Scholar] [CrossRef]
- Khan, S.; Gani, A.; Wahab, A.W.A.; Shiraz, M.; Ahmad, I. Network forensics: Review, taxonomy, and open challenges. J. Netw. Comput. Appl. 2016, 66, 214–235. [Google Scholar] [CrossRef]
- Meffert, C.; Clark, D.; Baggili, I.; Breitinger, F. Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 August–1 September 2017. [Google Scholar]
- Zia, T.; Liu, P.; Han, W. Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT). In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 August–1 September 2017. [Google Scholar]
Target Device | Security Issue | Highlight |
---|---|---|
Multimedia centers and appliances | Insecure Web interface | Compromised devices were used for sending phishing emails, and texts were sent from compromised Blu-ray devices and refrigerators [11]. |
Surveillance camera | Weak credentials | Internet-connected cameras were compromised to create a botnet and perform DDoS attacks on websites [12]. |
Programmable Logic Controller (PLC) | Insecure firmware | Reprogrammed with rootkit [13] |
Insecure operating system | Processed malicious commands [14] | |
Webcams and smart bulbs | Account enumeration | A botnet was formed using a large number of compromised devices [15] |
Thermostat | Lack of access control methods | A thermostat was compromised to shut down the heating of a building [16] |
Vehicle | Insecure Controlled Area Network (CAN) interface | Adversaries took control over radio, dashboard, brake, and acceleration [17] |
Drug pump | Insufficient authentication and authorization | Adversaries changed the dose of the drug pump [18] |
Baby monitor | Insufficient authentication and authorization | An Internet-connected baby monitor allowed unauthorized access to its camera [19] |
Traffic sensors | Insecure firmware | Adversaries sent fake data to traffic control systems [20] |
Smart TV | Insecure communications | Adversaries eavesdropped on broadcast messages [21] |
Device Specification | CPU | Storage | Networking | ||||
---|---|---|---|---|---|---|---|
Arch (Bits) | Clock (MHz) | RAM (KB) | ROM (KB) | Standard | Radio Interface | BW (kbps) | |
Sky-Mote [24] | 16 | 8 | 10 | 48 | 6LoWPAN | IEEE 802.15.4 | 250 |
Z1-Mote [23] | 32 | 32 | 32 | 512 | 6LoWPAN | IEEE 802.15.4 | 250 |
Openmote [26] | 32 | 32 | 32 | 512 | 6LoWPAN | IEEE 802.15.4 | 250 |
Waspmote [27] | 8 | 16 | 8 | 128 | Zigbee | IEEE 802.15.4 | 250 |
Arduino Uno [28] | 8 | 16 | 2 | 32 | 6LoWPAN | IEEE 802.15.4 | 250 |
Mbed [29] | 32 | 96 | 32 | 512 | CAN | CAN Bus | 320 |
Weptech [30] | 32 | 32 | 32 | 512 | 6LoWPAN | IEEE 802.15.4 | 250 |
KNX Stacks [31] | 32 | 32 | 32 | 512 | KNX | KNX Radio | 16.4 |
Aspects | [59] et al. | [50] et al. | [51] et al. | [52] et al. | [53] et al. | [54] et al. | [55] et al. | [56] et al. | [57] et al. | [58] et al. | Our Work | |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Attack Surface & Vulnerability Identification | Device | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✓ |
Cryptography | ✗ | ✗ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ | ✓ | ✓ | ✓ | |
Communication | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✓ | |
Service | ✓ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✓ | ✓ | ✗ | ✓ | |
Attack Taxonomy | Adversary Location | ✗ | ✗ | ✓ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✓ |
Device Property | ✗ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✓ | ✗ | ✓ | ✓ | |
Data Privacy | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | |
Severity | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ | |
Access Control | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ | |
Security | Confidentiality | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ | ✗ | ✓ |
Requirements | Availability | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ |
Protocol Stack-wise Security Solutions | Efficient Cryptography | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ | ✓ |
Device | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
Transport Layer | ✓ | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ | ✓ | |
Network Layer | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✓ | |
Application Layer | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ | ✓ | ✓ | |
Access Level | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ |
Acronyms | Definitions |
---|---|
6LoWPAN | IPv6 over Low-Power Wireless Personal Area Networks |
API | Application Programming Interface |
BLE | Bluetooth Low Energy |
CAN | Controlled Area Network |
CapBAC | Capability-based Access Control |
CoAP | Constrained Application Protocol |
DDOS | Denial of Service |
DH | Diffie Hellman |
DODAG | Destination Oriented Directed Acyclic Graph |
DOS | Denial of Service |
DTLS | Datagram Transport Layer Security |
ECC | Elliptic Curve Cryptography |
ECDH | Elliptic Curve Diffie Hellman |
HIP | Host Identity Protocol |
IDS | Intrusion Detection System |
IoV | Internet of Vehicle |
IPS | Intrusion Prevension System |
IPsec | Internet Protocol Security |
LLN | Low Power and Lossy Netwroks |
M2M | Machine-to-Machine |
MTU | Maximum Transmission Unit |
NFC | Near Field Communication |
RPL | IPv6 Routing Protocol for LLNs |
RSU | Road Side Unit |
SAML | Security Assertion Markup Language |
TLS | Transport Layer Security |
V2V | Vehicle-to-Vehicle |
XACML | eXtensible Access Control Markup Language |
XSS | Cross Site Scripting |
Network | Attack Interface |
---|---|
Constrained Network | Things ⇔ Things Request 4 in Figure 4: a wearable medical sensor interacts with a thermostat to adjust room temperature. |
Things ⇔ Coordinator Zigbee network: the communication interface between Zigbee nodes and Zigbee Access Point as shown in Figure 3 | |
Things ⇔ Controller Request 2 in Figure 4: a user controls home appliances using a smartphone | |
Public Network | Things ⇔ Cloud Service Request 3 in Figure 4: the interfaces between IoT nodes and Gateway as well as between Gateway and Cloud |
Cloud Service ⇔ Controller Request 1 in Figure 4: a physician monitors a patient’s medical devices remotely | |
Cloud Service ⇔ Cloud Service Interfaces between a medical service managed by hospitals and medical data analysis service maintained third-party providers |
Aspects | Threats | Mitigation | Schemes |
---|---|---|---|
Device Security | Software Compromise | Secure Execution | [106,107,108,109] |
Secure Bootstrap | [110] | ||
Hardware Compromise | Secure Debug | [111,112,113] | |
Secure Storage | [114,115,116] | ||
Network Layer Security | Identity Impersonation | Authentication and Encryption Using Host Identity Protocol (HIP) | Base Exchange [117] |
Distributed [118] | |||
Tiny Exchange [119] | |||
Information Disclosure | Diet Exchange [120,121] | ||
Slimfit [120] | |||
Pre-Shared Key [122,123,124,125] | |||
Lightweight [126,127] | |||
Transport layer Security | Identity Impersonation | Authentication and Encryption Using DTLS | Certificate-based [128] |
DTLS-PSK [122,125,129] | |||
Information Disclosure | Modified [130] | ||
Delegated [131,132,133] | |||
Application Layer Security | Unauthorized Access | Role-based Access Control (RBAC) | Centralized [134] |
Context-aware [135] | |||
Capability- based Access Control (CapBAC) | Centralized [136,137,138] | ||
Distributed [139,140,141] | |||
Context-Aware [142] | |||
OAuth Compliant [143,144] |
Property | Highlights |
---|---|
Memory Requirement (MR) | The total number of bytes required to store public keys (), private keys (), and certificates () in volatile and non-volatile memory. |
Communication Overhead (CO) | The total number of messages () and bytes () exchanged until a session key is negotiated. In addition, the amount of energy () consumed by a radio transceiver for exchanging messages. |
Computation Complexity (CC) | The number of arithmetic operations (), such as addition, subtraction, multiplication, division, and modular exponentiation, required to compute a session key. In addition, the amount of energy () consumed by the CPU for performing cryptographic computations. |
Resilience | The ability to provide services under Denial-of-Service attacks |
Scalability | The ability to accommodate a large number of IoT devices |
Interoperability | The ability to negotiate a cipher suite to establish a secure association with heterogeneous devices |
Property | Constrained/Intranet | Public/Internet | |||
---|---|---|---|---|---|
Things-to-Things | Things-to-Coord. | Coord.-to-Gateway | Gateway-to-Cloud | Cloud-to-Controller/User | |
Data Size | <1 KB | <1 MB | <512 MB | <1GB | <1 GB |
Cryptography | ECC-160/224 | ECC-224/256 | ECC-256/384 RSA-2048/3072 | ECC-384/512 RSA-2048/3072/7680 | ECC-384/512 RSA-2048/3072/7680 |
Key Exchange | ECDH | ECDH | ECDH/DH | ECDH/DH | ECDH/DH |
Enc/Dec | AES-112/128 | AES-128/192 | AES-128/192 | AES-192/256 | AES-192/256 |
Hash | MD5/SHA-1 | SHA-1 | SHA-2/SHA-3 | SHA-2/SHA-3 | SHA-2/SHA-3 |
Signature | ECDSA | ECDSA | ECDSA/DSA/RSA | ECDSA/DSA/RSA | ECDSA/DSA/RSA |
Scheme | Approach | Key Exchange | I | R | S | CO | MR | CC |
---|---|---|---|---|---|---|---|---|
HIP-DEX [121] | Standalone | Elliptic Curve Diffie Hellman | Maxium | |||||
Slimfit [120] | Standalone | Elliptic Curve Diffie Hellman | ★ | ★ | ||||
HIP-PSK [122] | Standalone | Pre-Shared key | ★ | ★ | ★ | ★ | ★ | |
D-HIP [118] | Collaborative | Diffie Hellman | ★ | |||||
HIP-TEX [119] | Collaborative | Public Key | ★ | |||||
LHIP [126] | Standalone | Not Available | Minimum |
DTLS | Security Mode | Property |
---|---|---|
Disabled | No security |
|
Enabled | Pre-shared key |
|
Raw public key |
| |
Certificate-based public key |
|
Scheme | Interoperability | Resilience | Scalability | Communication | Computation | Memory |
---|---|---|---|---|---|---|
Certificate based [128] | ★ | ★ | ★ | |||
DTLS-PSK [122] | ★ | ★ | ||||
Modified DTLS [130] | ★ | |||||
Delegation based [131,132] | ★ | ★ |
Model | Scheme | Approach | I | R | S | CO | CC | MR |
---|---|---|---|---|---|---|---|---|
RBAC | OpenID based [134] | Centralized | ||||||
Context aware [135] | Centralized | |||||||
CapBAC | Cloud PDP [136] | Centralized | ||||||
Embedded PDP [139,140] | Distributed | ★ | ||||||
XACML, SAML based [137] | Centralized | |||||||
Kerberos, RADIUS based [138] | Centralized | |||||||
Proxy Assisted [141] | Distributed | ★ | ★ | |||||
Context-aware [142] | Centralized | |||||||
OAuth based [143,144] | Centralized | ★ |
Research Domain | Research Questions | Directions |
---|---|---|
Service Discovery | How can service impersonation be identified? | Capability-based service advertisement and discovery (Section 7.1) |
How can malicious service discovery requests be identified? | ||
Identity Privacy | How can movement profiling for mobile IoT devices be prevented? | Use of unique device identifiers from locations-to-locations and sessions-to-sessions (Section 7.2) A transparency layer can be implemented that will allow users to know who has access to their data and will enable users to determine who can have access to their data (Section 7.3) |
How can communication relations be prevented? How can users control access to their sensor data used by third-party services? | ||
Data Privacy | How can privacy be preserved for sensor data shared with third-party services for providing personalized services? | |
How long will the data remain shared? | ||
Application Data Security | How can security at the application layer be applied? | Application messages can be encrypted to ensure the confidentiality of exchange messages, while the headers of the application layer protocol should be left unencrypted for protocol translation (Section 7.4) |
How can the confidentiality of application data be ensured during protocol translation? | ||
Can existing application layer security schemes be modified for resource-limited IoT devices? | ||
Software Update | How can software updates be applied to multiple devices simultaneously that are located in the edge or distributed networks? | Resource-efficient software update method that has low computation overheads on IoT device for verifying software authenticity as well as fewer communication overheads for delivering patches over lossy networks (Section 7.5) |
How can smart devices be enabled to verify integrity and authenticity of software updates? | ||
How can IoT operating systems be enabled to receive new software updates? | ||
Credential Security | How can credentials stored on device memory be protected from memory probing? | Security schemes can be designed based on Physically Uncloneable Functions to ensure the security of the credentials embedded with smart devices (Section 7.6) |
How can confidentiality of credentials stored on device memory be ensured? | ||
Network Security | How can anomalies on IoT networks be detected? | Machine-learning-based models to identify new threats and attacks (Section 7.8) |
How can the knowledge base remain updated for identifying new or unseen network attacks? | ||
How can the optimum level of control and monitoring on packets be achieved? | ||
Digital Forensics | How can evidence collection be enabled in the IoT environment? | A Blockchain-based distributed and decentralized network to maintain a chain of custody of the evidence and avoid single points of failures on storage media (Section 7.9) |
How can secure provenance of the evidence be maintained? | ||
How can verification of authenticity and integrity of evidence during an investigation be enabled? |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hossain, M.; Kayas, G.; Hasan, R.; Skjellum, A.; Noor, S.; Islam, S.M.R. A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. Future Internet 2024, 16, 40. https://doi.org/10.3390/fi16020040
Hossain M, Kayas G, Hasan R, Skjellum A, Noor S, Islam SMR. A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. Future Internet. 2024; 16(2):40. https://doi.org/10.3390/fi16020040
Chicago/Turabian StyleHossain, Mahmud, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor, and S. M. Riazul Islam. 2024. "A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives" Future Internet 16, no. 2: 40. https://doi.org/10.3390/fi16020040
APA StyleHossain, M., Kayas, G., Hasan, R., Skjellum, A., Noor, S., & Islam, S. M. R. (2024). A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. Future Internet, 16(2), 40. https://doi.org/10.3390/fi16020040