IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques
Abstract
:1. Introduction
2. IoT Security Challenges
2.1. Security Model for IoT, Standards and Protocols
2.2. Physical Attacks
- Node Tampering—to perform this attack, the attackers must have physical access to the IoT device. Their goal is to obtain sensitive information such as the encryption key used to communicate with other nodes. According to the authors [18], it is possible to characterize these attacks as invasive and noninvasive. An invasive attack requires expensive equipment because the attacker tries to obtain the contents of the processor’s memory by directly observing the semiconductor chip. Noninvasive methods consist of gaining access to the bus, which can be used to access the microprocessor’s memory. The JTAG bus is very often harnessed for these purposes. In this way, it is possible to cause great damage, because it is possible, e.g., overwrite the bootloader of the processor with its bootloader and activate reads and writes operations in memory at the request of the attacker. According to [19], it is possible to protect against this attack relatively easily, by detecting an intrusion into the device box. Mechanical switches or additional sensors can be used to detect fluctuations in the supply voltage. A problem with using this countermeasure can be a frequent false alarm.
- RF interference—interferences are caused by transmitting several devices at the same time on the same frequency. An attacker does not have to transmit any data; it is enough to transmit noise on the carrier or subcarrier frequency of a given communication channel. The goal of this attack is to achieve denial of service.
- Node Jamming—this attack is mainly known from Wireless Sensor Networks (WSN). In WSN, the communication between nodes is essential; therefore, rapid attack detection is highly desirable. To successfully execute the attack, the attacker needs to have a high understanding of the communication protocol. Publication [20] describes this attack in detail. The authors of the article also suggest various countermeasures, e.g., channel hopping, frequency hopping, and spread-spectrum modulation. It is also possible to use software solutions related to the modification of the communication protocol. By adjusting the routing, it is possible to avoid jammed areas. JAM (jammed-area mapping protocol), SAD-SJ (self-adaptive and decentralized MAC-layer), or JAM-BUSTER protocols are suitable.
- Malicious Node Injection—an attacker tries to cause a collision in the network. It is a coordinated attack of several malicious nodes. To perform the attack, the attacker must have certain data of the node to be attacked (e.g., encryption key). The attack consists of two phases. In the first phase, a copy of the node whose data have been compromised is created. This first malicious node has the properties of a legitimate node, but of course, it has other features that make it malicious. The compromised node is isolated from the network (removed or depleted its power). The malicious node creates its copy and attacks another suitable node in a coordinated way. When a legitimate node is requested (either directly or only to forward a message), these two malicious nodes create a collision. The victim never receives or forwards the message, and the other legitimate nodes mark it as malicious or defective. As a result, this node is excluded from the network. It is assumed that the network has certain protection elements to detect malfunctioning nodes. This attack can effectively bypass these bases of protection. A countermeasure could be the MOVE protocol developed by the authors of [21]. It works on the principle of monitoring the transmission of packets in nodes, taking into account the mobility of nodes in the network.
- Physical Damage—this is an attack causing a denial of service. It is necessary to equip IoT devices with quality boxes with simultaneous detection of such an attack in the form of an antitamper technique to mitigate it [19].
- Sleep Deprivation Attack—the IoT device is mostly battery powered and therefore has a limited life. For this reason, IoT devices have implemented sleep modes with varying degrees of energy savings. The purpose of this attack is to prevent IoT devices from going into sleep mode. In this way, the devices run out of power very quickly and switch off permanently. There are several ways to perform this attack. The first way is the so-called barrage attack. In this scenario, the attacker constantly bombs the victim with legitimate requests and thus does not allow it to activate the sleeping mode. This method is simple to implement but can also be easily detected. The second method is based on querying the node in a more sophisticated way. Ultimately, the attack also prevents the IoT device from going to sleep, but it takes longer to drain the battery entirely compared to the previous case. One suitable approach against the sleep deprivation attack is the solution proposed by the authors in [22]. The solution is based on reducing the chance for an attacker to become the central node of the cluster (cluster heads).
- Malicious Code Injection—is a dangerous attack that, if the attacker succeeds, can cause extensive damage. An example is the Stuxnet worm, which has spread to PLC devices controlling various industrial processes. Another type of attack can take control of a large number of IoT devices and launch a large-scale distributed denial of service (DDoS) on the IT infrastructure. An example is the Mirai malware [23]. The attack aims to get full control over the IoT device. An attacker can, for example, steal confidential data from the device or force the victim to carry out the attacker’s commands and thus take part in other malicious activities. The attacker exploits the weaknesses of the IoT devices. The most attractive IoT devices for an attacker are those devices that have relatively large computing power and have an operating system, e.g., various IP cameras, routers, or popular hardware platforms such as Raspberry Pi, BeagleBone, or ESP32. Authors in [24] also found a vulnerability in a less powerful platform, Arduino Yún. The main idea of the attack is the so-called memory corruption, specifically buffer overflows and control flow hijacking. A known protection against such attacks is address space layout randomization (ASLR). For low-power IoT devices, implementing memory randomization can be challenging. The author of the publication [25] managed to implement such protection using external FLASH memory and an additional ATmega processor. Such solutions are possible on less powerful devices but always at the expense of energy consumption and solution price.
2.3. Network Attacks
- Traffic Analysis Attacks—a prerequisite for the realization of this attack is the possibility of interception of communication between the IoT gateway and users who communicate with the gateway via the Internet. Passive eavesdropping allows an attacker to find out the type of IoT devices and the activity of IoT devices connected to the gateway. Communication can also be encrypted. It does not matter for this attack whether the communication is encrypted or not. Traffic analysis provided data that are needed for other dangerous attacks, e.g., Malicious Code Injection. According to [26], there is no perfect protection against this attack, but it is possible to mitigate this attack. The authors in [27] describe a traffic morphing technique that masks real traffic using dummy traffic. This method can significantly reduce the success of the machine learning technique, which is used for analyzing obtained traffic data.
- Sinkhole Attack—the basic idea of the attack is to compromise the data communication of nearby nodes around the malicious node. There are two main types of countermeasures. The first way is to implement an intrusion detection system such as [28,29]. In general, the disadvantage of these systems is the accuracy and thus the relatively high frequency of false alarms. Another option is proper key management [30], in which the identity of each node is secured using an identity-based encryption algorithm.
- Man-in-the-Middle Attacks—this attack is similar to malicious node injection. In a passive attack, the attacker eavesdrops the communication. If the attack is active, the attacker takes control of the communication. They can delay packets, drop packets, or alter their content. The difference is that the attacker does not have to be part of the network because the whole attack takes place exclusively through a given network communication protocol of the sensor network. The most common protection against MITM is a quality intrusion detection system (IDS). In this solution, a compromise is sought between low latency, high detection rate, low CPU load, and the resulting low power consumption of the algorithm. IDS is usually deployed on hierarchically higher and more powerful devices such as gateways for Fog or Edge devices. Publications [31,32] resolve the problematic properties of IDS on these IoT devices.
- Denial of Service—a more accurate description of the attack is given in the publication [21]. An attacker exploits the TCP-based protocol by sending a disproportionate amount of data requests to the victim’s device. In this way, all the free resources of the IoT device are gradually occupied. The IoT device thus does not respond to legitimate data requests and ceases to fulfill its function. According to [33], there are three levels of defense against DoS: attack detection, attack mitigation, and attack prevention. Several approaches are known. These are the various classification algorithms, machine learning algorithms, honeypot, IDS, mutual authentication schemes, and many more. To mitigate the DoS attack, a newly developed IOTA protocol may also be used [34]. IOTA protocol was originally developed to verify IOTA cryptocurrency transactions, and it is designed specifically for IoT.
- Sybil Attack—in this attack, the adversary has several identities in the network. They can either create or steal identities. The adversary can then reduce network performance and cause DoS. If data are sent unencrypted, the attacker can steal it and misuse it for other purposes. They can also forward altered data and significantly disrupt the functionality of the proposed system. Protection against this attack is user authentication, encryption of communication, and an efficient Sybil’s node detection algorithm [35,36].
2.4. Software Attacks
- Phishing Attacks—most IoT solutions use websites to control IoT devices, collect data, or visualize them. In this attack, the intruder tries to obtain sensitive data from users, such as the name and password. The intruder uses an email with a link to a fake website to lure private user data. The counterfeit website looks similar to the original, so the user submits his login details freely. Suitable antiphishing software [37,38] is a good countermeasure. It can detect suspicious emails and also has a database of suspected websites.
- Virus, Worm, Trojan horse, Spyware, and Adware—the attacker tries to cause damage to the victim through the attacker’s malicious code. Typically, an attacker exploits the vulnerabilities of the IoT device and takes control of it. They can then use the device for another type of attack (e.g., phishing, DDoS, and cyber spying) and spread the malware to other devices. More powerful IoT devices can have a full operating system loaded. Attackers often exploit unsecured default settings (e.g., open service ports, a default admin password, etc.). The diversity of operating systems, communication protocols, and installed software is constantly creating new security threats. As the number of IoT devices connected to the network grows, the risk of malware infection specifically directed against IoT devices and their infrastructure increases [9,39]. A specific problem is ransomware, where IoT is an ideal target for attackers [40]. This is growing more serious as the quality of ransomware implementations has improved in recent years [41]. According to publication [17], there are several countermeasures. Depending on the IoT architecture and capabilities, it is advisable to have a strong antivirus system, use a firewall, or use a honeypot to detect dangerous software signatures. Note that these countermeasures are typically applied on devices with full OS support, and parts of IoT infrastructure, such as servers, gateways, edge devices, or cloud infrastructure.
- Malicious Scripts—an attacker can run a malicious script through a website visited on the Internet and gain control over devices in the entire LAN network of the victim [42]. An attacker could gain access to devices that are hidden behind NATs. The suggested countermeasures from [42] are based on the correct configuration of the webserver.
- Denial of Service—it is also possible to attack the application layer of the IoT device. This attack is primarily an attack on a web server that usually has some more powerful IoT devices. An attacker could also target a web server (or cloud) to which IoT devices send messages.
2.5. Encryption Attacks
- Side-channel Attacks—a measure of power consumption of the device during cryptographic operations associated with the private key is the most common way to gain a secret parameter. Simple power analysis or differential power analysis is an example of such attacks. There are other techniques: for example, measuring the EM spectrum emitted by the device; acoustic attacks, where the sound generated by the various components of the IoT device is measured; and time attacks, where the time duration of running program is measured at specially selected values on the input. A more detailed description of previous attacks and countermeasures can be found in publications [43,44,45].
- Man-in-the-Middle Attacks—an attacker eavesdrops on a user’s communication by exchanging the public key. The attacker is in the function of an intermediary. They can inadvertently throw their public key and can read and modify encrypted messages between users [46].
2.6. How to Improve Security
- Identity Privacy: the mobile IoT user’s real identity should be well protected from the public; on the other hand, when some dispute occurs in emergency cases, it can also be effectively traced by the authority.
- Location Privacy: If the adversary knows that the target node with pseudonym PID occasionally visits n locations, sets of nodes’ real identities passing by these n locations can be observed. The intersection would reveal the target node’s real identity and its private activities in other regions.
- Node Compromise Attack: the adversary extracts from the resource-constrained IoT devices all the private information including the secret key used to encrypt the packets, the private key to generate signatures, and so on, and then reprograms or replaces the IoT devices with malicious ones under the control of the adversary.
- Layer Removing/Adding Attack: the attack occurs when a group of selfish IoT users removes all the forwarding layers between them to maximize their rewarded credits by reducing the number of intermediate transmitters sharing the reward.
- Forward and Backward Security: due to the mobility and dynamic social group formulation in IoT, newly joined IoT users can only decipher the encrypted messages received after but not before they join and revoked IoT users can only decipher the encrypted messages before but not after leaving the cluster.
- Semitrusted and/or Malicious Cloud Security: for the convergence of the cloud with IoT, the security and privacy requirements for the cloud should be specially considered. For outsourced computation, the following three security targets should be achieved:
- –
- Input privacy: The data owner’s inputs should be well protected even from collusion between the cloud and authorized data receivers.
- –
- Output privacy: The computation result should only be successfully deciphered by authorized data receivers.
- –
- Function privacy: The underlying function must be well protected even from the collusion of the cloud and malicious IoT users.
- Privacy and Legal Compliance Risks: such as identity theft resulting in a privacy breach.
- Common Threats and Vulnerabilities: Common threats to both cloud and traditional computing include eavesdropping, fraud, theft, denial of service, logon, abuse, and network intrusion.
- Dependability
- Trustworthiness
- Resiliency
- Availability and Fail-Safe
- Sensitive Data handling and Input validation
- Code practices and Language Options
- Fine-grained ciphertext access control in cloud-based IoT.
- Besides data confidentiality, location privacy and query privacy for cloud-based IoT users in location-based service (LBS) should also be protected.
- Increasing batches of data to be processed securely.
- Privacy-preserving outsourced data mining in cloud-based IoT.
- Virtualization management.
- Remote Management Vulnerabilities.
- Denial of Service.
3. Cloud and Blockchain in IoT Security
- Solution hosted by IoT owner (or manufacturer). This solution does not scale well and has additional costs associated with maintenance. It is also prone to a single point of failure security problems: any successful attack on the management node can compromise the whole network. We can also use this category for integration platforms such as [56,57].
- Solution hosted in the cloud. There is a large number of examples, surveyed e.g., in [58]. We can include new trends in this, such as serverless computing [59]. Cloud provider provides scalability of the solution and cares for security. Costs of the cloud solution can be lower than maintenance of own servers, depending on the required services and the infrastructure and personnel costs of the IoT solution owner. The security of the solution depends on the quality of the cloud service, and its costs are typically included in the service cost. This requires trust in the cloud provider and does not remove the single point of failure property. However, we can use multiple providers to provide redundancy and attack resiliency (for an increase in operating costs). A recent study focused on security of cloud based solutions is [60].
- Solution based on peer-to-peer decentralized technology, typically a blockchain solution. There are many recent examples, including [61,62,63,64,65,66], and the number of solutions is growing quickly. Decentralization removes the requirement of trusting the cloud provider. Costs of the decentralized solution, however, can be significant, and, depending on the technology chosen, the current transaction fees in a blockchain network. The core question is, does the blockchain-based solution avoid a single point of failure property, and does it provide required scalability?
3.1. Public Blockchains and IoT Security
3.2. Private Blockchains and IoT Security
4. Postquantum Cryptography Applications
4.1. Algorithms Used in IoT Security
- Physical layer—As we see in [88], most of the protocols of physical layer (DASH7, LoRa) use AES-128 for providing confidentiality of the data.
- Data Link layer—the security is provided by IEEE 802.15.4 [89], which specify several cryptographic options, but all are based on AES (AES-32–AES-128)
- Network Layer—IPsec protocol is a requirement for IPv6—allowing for Diffie–Hellman, ECDH, RSA, AES. Another protocol of network layer, 6LoWPAN protocol, only relies on security of transport layer [90].
- Transport Layer—in the transport layer, we can mainly use two types of protocols, TCP or UDP.
- –
- For TCP, security is provided by TLS, which in version 1.3 allows AES and ephemeral Diffie–Hellman.
- –
- UDP is secured by DTLS or QUIC. These protocols allow to use ephemeral Diffie–Hellman for key exchange and AES for data confidentiality.
- Application Layer—CoAP protocol proposes to use DTLS to provide security, and AMQP protocol uses TLS. Therefore, the same algorithms are used as in the transport layer.
4.2. Quantum Algorithms That Threaten Our Cryptography
- Shor’s algorithm is a quantum computer algorithm for finding prime factors of a given number (integer factorization) in polynomial time. This is enough to break modern asymmetric cryptography since it is based on integer factorization or similar problems.
- In 1996, Lov Grover published a database search algorithm. One interesting consequence is that Grover’s algorithm is able to find the n-bit key with time complexity . As Grover’s algorithm can brute force more or less any black-box function, we need to reconsider the security of symmetric cryptography used in IoT.
4.2.1. Vulnerable Public Key Crypto-Algorithms
4.2.2. Vulnerable Symmetric Crypto-Algorithms
4.3. Postquantum Cryptography in IoT
4.3.1. Specifics of IoT Postquantum Security
4.3.2. Data Confidentiality in Postquantum World
4.3.3. Key Establishment in Postquantum World
4.3.4. Quantum-Resistant Lightweight Digital Signatures
4.4. Group Communication Using Limited Devices
5. Evolutionary Techniques for Security
6. Discussion
Author Contributions
Funding
Conflicts of Interest
References
- Hatton, M. The IoT in 2030: 24 Billion Connected Things Generating $1.5 Trillion. Iotbusinessnews. 2020. Available online: https://iotbusinessnews.com/2020/05/20/03177-the-iot-in-2030-24-billion-connected-things-generating-1-5-trillion (accessed on 17 August 2021).
- Zhou, J.; Cao, Z.; Dong, X.; Lin, X. TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 2398–2406. [Google Scholar] [CrossRef]
- Cook, A.; Robinson, M.; Ferrag, M.A.; Maglaras, L.A.; He, Y.; Jones, K.; Janicke, H. Internet of Cloud: Security and Privacy Issues. In Cloud Computing for Optimization: Foundations, Applications, and Challenges; Springer International Publishing: Cham, Switzerland, 2018; pp. 271–301. [Google Scholar] [CrossRef] [Green Version]
- Díaz, M.; Martín, C.; Rubio, B. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl. 2016, 67, 99–117. [Google Scholar] [CrossRef]
- Stergiou, C.; Psannis, K.E.; Kim, B.G.; Gupta, B. Secure integration of IoT and Cloud Computing. Future Gener. Comput. Syst. 2018, 78, 964–975. [Google Scholar] [CrossRef]
- Rouse, M. IoT Security (Internet of Things Security). IoT Agenda. 2015. Available online: https://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security (accessed on 1 July 2021).
- Van Oorschot, P.C. Computer Security and the Internet: Tools and Jewels; Springer Nature Switzerland AG: Cham, Switzerland, 2020. [Google Scholar]
- Yugha, R.; Chithra, S. A survey on technologies and security protocols: Reference for future generation IoT. J. Netw. Comput. Appl. 2020, 169, 102763. [Google Scholar] [CrossRef]
- Mrabet, H.; Belguith, S.; Alhomoud, A.; Jemai, A. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors 2020, 20, 3625. [Google Scholar] [CrossRef] [PubMed]
- Ammar, M.; Russello, G.; Crispo, B. Internet of Things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl. 2018, 38, 8–27. [Google Scholar] [CrossRef] [Green Version]
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutorials 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Xu, L.D.; He, W.; Li, S. Internet of Things in Industries: A Survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [Google Scholar] [CrossRef]
- Hammoudeh, M.; Epiphaniou, G.; Belguith, S.; Unal, D.; Adebisi, B.; Baker, T.; Kayes, A.S.M.; Watters, P. A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases. IEEE Sens. J. 2021, 21, 15753–15761. [Google Scholar] [CrossRef]
- Suo, H.; Wan, J.; Zou, C.; Liu, J. Security in the Internet of Things: A Review. In Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China, 23–25 March 2012; Volume 3, pp. 648–651. [Google Scholar]
- Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020, 10, 4102. [Google Scholar] [CrossRef]
- Litoussi, M.; Kannouf, N.; El Makkaoui, K.; Ezzati, A.; Fartitchou, M. IoT security: Challenges and countermeasures. Procedia Comput. Sci. 2020, 177, 503–508. [Google Scholar] [CrossRef]
- Deogirikar, J.; Vidhate, A. Security attacks in IoT: A survey. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10–11 February 2017; pp. 32–37. [Google Scholar] [CrossRef]
- Znaidi, W.; Minier, M.; Babau, J.P. An Ontology for Attacks in Wireless Sensor Networks; Technical Report; INRIA: Rocquencourt, France, 2008. [Google Scholar]
- Elngar, A.; Bhatt, S. IoT-based Efficient Tamper Detection Mechanism for Healthcare Application. Int. J. Netw. Secur. 2018, 20, 74–80. [Google Scholar] [CrossRef]
- Kirti, S.; Bhatt, S. Jamming Attack—A Survey. Int. J. Recent Res. Asp. 2018, 5, 74–80. [Google Scholar]
- Mohapatra, H.; Rath, S.; Panda, S.; Kumar, R. Handling of Man-In-The-Middle Attack in WSN Through Intrusion Detection System. Int. J. 2020, 8, 1503–1510. [Google Scholar] [CrossRef]
- Pirretti, M.; Zhu, S.; Narayanan, V.; McDaniel, P.; Kandemir, M.; Brooks, R. The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. Int. J. Distrib. Sens. Netw. 2006, 2, 267–287. [Google Scholar] [CrossRef]
- Sinanović, H.; Mrdovic, S. Analysis of Mirai malicious software. In Proceedings of the 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 21–23 September 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Pastrana, S.; Canseco, J.R.; Calleja, A. ArduWorm: A functional malware targeting arduino devices. In Actas de Jornadas Nacionales de Investigación en Ciberseguridad; Universidad de Granada: Granada, Spain, 2016. [Google Scholar]
- Habibi, J.; Gupta, A.; Carlsony, S.; Panicker, A.; Bertino, E. MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles. In Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems, Columbus, OH, USA, 29 June–2 July 2015; pp. 642–652. [Google Scholar] [CrossRef]
- Dyer, K.P.; Coull, S.E.; Ristenpart, T.; Shrimpton, T. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 20–23 May 2012; pp. 332–346. [Google Scholar] [CrossRef] [Green Version]
- Hafeez, I.; Antikainen, M.; Tarkoma, S. Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing. In Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kyoto, Japan, 11–15 March 2019; pp. 196–201. [Google Scholar] [CrossRef]
- Stephen, R.; Arockiam, L. An Enhanced Technique to Detect Sinkhole Attack in Internet of Things. Int. J. Eng. Res. Technol. 2018, 5, 1–4. [Google Scholar]
- Cervantes, C.; Poplade, D.; Nogueira, M.; Santos, A. Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada, 11–15 May 2015; pp. 606–611. [Google Scholar] [CrossRef]
- Yuan, E.; Wang, L. A key management scheme realising location privacy protection for heterogeneous wireless sensor networks. Int. J. Sens.Netw. 2020, 32, 34–41. [Google Scholar] [CrossRef]
- Owusu Agyemang, J.; Jerry, K.; Acquah, I. Lightweight Man-In-The-Middle (MITM) Detection and Defense Algorithm for WiFi-Enabled Internet of Things (IoT) Gateways. Inf. Secur. Comput. Fraud. 2019, 7, 1–6. [Google Scholar] [CrossRef]
- Aliyu, F.; Sheltami, T.; Shakshuki, E.M. A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing. Procedia Comput. Sci. 2018, 141, 24–31. [Google Scholar] [CrossRef]
- Salim, M.M.; Rathore, S.; Park, J.H. Distributed denial of service attacks and its defenses in IoT: A survey. J. Supercomput. 2020, 76, 5320–5363. [Google Scholar] [CrossRef]
- Attias, V.; Vigneri, L.; Dimitrov, V. Preventing Denial of Service Attacks in IoT Networks through Verifiable Delay Functions. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Pu, C. Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses. IEEE Internet Things J. 2020, 7, 4937–4949. [Google Scholar] [CrossRef]
- Vaishnavi, S.; Sethukarasi, T. SybilWatch: A novel approach to detect Sybil attack in IoT based smart health care. J. Ambient Intell. Humaniz. Comput. 2021, 12, 6199–6213. [Google Scholar] [CrossRef]
- Lam, T.; Kettani, H. PhAttApp: A Phishing Attack Detection Application. In Proceedings of the Proceedings of the 2019 3rd International Conference on Information System and Data Mining, Chiang Mai, Thailand, 26–30 July 2019; pp. 154–158. [Google Scholar] [CrossRef]
- Rahim, R.; Murugan, S.; Mostafa, R.; Anil, K.; Dubey, D.A.; Rajan, R.; Kulkarni, V.; Dhanalakshmi, K. Detecting the Phishing Attack Using Collaborative Approach and Secure Login through Dynamic Virtual Passwords. Webology 2020, 17, 524–535. [Google Scholar] [CrossRef]
- Hwang, S.Y.; Kim, J.N. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools. Sensors 2021, 21, 6983. [Google Scholar] [CrossRef]
- Szücs, V.; Arányi, G.; Dávid, Á. Introduction of the ARDS—Anti-Ransomware Defense System Model—Based on the Systematic Review of Worldwide Ransomware Attacks. Appl. Sci. 2021, 11, 6070. [Google Scholar] [CrossRef]
- Ploszek, R.; Švec, P.; Debnár, P. Analysis of encryption schemes in modern ransomware. Rad Hrvat. Akad. Znan. Umjet. Mat. Znan. 2021, 546=25, 1–13. [Google Scholar] [CrossRef]
- Acar, G.; Huang, D.; Li, F.; Narayanan, A.; Feamster, N. Web-based Attacks to Discover and Control Local IoT Devices. In Proceedings of the Workshop on IoT Security and Privacy; Association for Computing Machinery: New York, NY, USA, 2018; pp. 29–35. [Google Scholar] [CrossRef]
- Sayakkara, A.; Le-Khac, N.A.; Scanlon, M. A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics. Digit. Investig. 2019, 29, 43–54. [Google Scholar] [CrossRef] [Green Version]
- Devi, M.; Majumder, A. Side-Channel Attack in Internet of Things: A Survey. In Applications of Internet of Things; Mandal, J.K., Mukhopadhyay, S., Roy, A., Eds.; Springer: Singapore, 2021; pp. 213–222. [Google Scholar] [CrossRef]
- Prouff, E.; Rivain, M. Masking against Side-Channel Attacks: A Formal Security Proof. In Advances in Cryptology—EUROCRYPT 2013; Johansson, T., Nguyen, P.Q., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 142–159. [Google Scholar] [CrossRef] [Green Version]
- Cekerevac, Z.; Dvorak, Z.; Prigoda, L.; Čekerevac, P. Internet of things and the man-in-the-middle attacks—Security and economic risks. MEST J. 2017, 5, 15–25. [Google Scholar] [CrossRef]
- Zhou, J.; Cao, Z.; Dong, X.; Vasilakos, A.V. Security and Privacy for Cloud-Based IoT: Challenges. IEEE Commun. Mag. 2017, 55, 26–33. [Google Scholar] [CrossRef]
- Grošek, O.; Hromada, V.; Horák, P. A Cipher Based on Prefix Codes. Sensors 2021, 21, 6236. [Google Scholar] [CrossRef] [PubMed]
- Deshpande, V.M.; Nair, M.K.; Bihani, A. Optimization of Security as an Enabler for Cloud Services and Applications. In Cloud Computing for Optimization: Foundations, Applications, and Challenges; Springer International Publishing: Cham, Switzerland, 2018; pp. 235–270. [Google Scholar] [CrossRef]
- Choi, C.; Choi, J. Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service. IEEE Access 2019, 7, 110510–110517. [Google Scholar] [CrossRef]
- Liang, L. Electric Security Data Integration Framework based on Ontology Reasoning. Procedia Comput. Sci. 2018, 139, 583–587. [Google Scholar] [CrossRef]
- Košťál, K.; Helebrandt, P.; Belluš, M.; Ries, M.; Kotuliak, I. Management and Monitoring of IoT Devices Using Blockchain. Sensors 2019, 19, 856. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Panarello, A.; Tapas, N.; Merlino, G.; Longo, F.; Puliafito, A. Blockchain and IoT Integration: A Systematic Survey. Sensors 2018, 18, 2575. [Google Scholar] [CrossRef] [Green Version]
- Memon, R.; Li, J.; Ahmed, J.; Nazeer, I.; Mangrio, M.I.; Ali, K. Cloud-based vs. Blockchain-based IoT: A comparative survey and way forward. Front. Inf. Technol. Electron. Eng. 2020, 21, 563–587. [Google Scholar] [CrossRef]
- Patel, K.K.; Patel, S.M.; Salazar, C. Internet of things-IOT: Definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 2016, 6, 6122–6131. [Google Scholar]
- Heimgaertner, F.; Hettich, S.; Kohlbacher, O.; Menth, M. Scaling home automation to public buildings: A distributed multiuser setup for OpenHAB 2. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland, 6–9 June 2017; pp. 1–6. [Google Scholar]
- Gyory, N.; Chuah, M. IoTOne: Integrated platform for heterogeneous IoT devices. In Proceedings of the 2017 International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, CA, USA, 26–29 January 2017; pp. 783–787. [Google Scholar]
- Ray, P.P. A survey of IoT cloud platforms. Future Comput. Inform. J. 2016, 1, 35–46. [Google Scholar] [CrossRef]
- Kjorveziroski, V.; Filiposka, S.; Trajkovik, V. IoT Serverless Computing at the Edge: A Systematic Mapping Review. Computers 2021, 10, 130. [Google Scholar] [CrossRef]
- Chen, F.; Luo, D.; Xiang, T.; Chen, P.; Fan, J.; Truong, H.L. IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications. ACM Comput. Surv. (CSUR) 2021, 54, 1–36. [Google Scholar]
- Tapas, N.; Merlino, G.; Longo, F. Blockchain-Based IoT-Cloud Authorization and Delegation. In Proceedings of the 2018 IEEE International Conference on Smart Computing (SMARTCOMP), Taormina, Italy, 18–20 June 2018; pp. 411–416. [Google Scholar] [CrossRef]
- Palaiokrassas, G.; Skoufis, P.; Voutyras, O.; Kawasaki, T.; Gallissot, M.; Azzabi, R.; Tsuge, A.; Litke, A.; Okoshi, T.; Nakazawa, J.; et al. Combining Blockchains, Smart Contracts, and Complex Sensors Management Platform for Hyper-Connected SmartCities: An IoT Data Marketplace Use Case. Computers 2021, 10, 133. [Google Scholar] [CrossRef]
- Ajayi, O.J.; Rafferty, J.; Santos, J.; Garcia-Constantino, M.; Cui, Z. BECA: A Blockchain-Based Edge Computing Architecture for Internet of Things Systems. IoT 2021, 2, 610–632. [Google Scholar] [CrossRef]
- Wu, C.H.; Tsang, Y.P.; Lee, C.K.M.; Ching, W.K. A Blockchain-IoT Platform for the Smart Pallet Pooling Management. Sensors 2021, 21, 6310. [Google Scholar] [CrossRef] [PubMed]
- Cho, S.; Khan, M.; Pyeon, J.; Park, C. Blockchain-Based Network Concept Model for Reliable and Accessible Fine Dust Management System at Construction Sites. Appl. Sci. 2021, 11, 8686. [Google Scholar] [CrossRef]
- Meng, Y.; Li, J. Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography. Sensors 2021, 21, 6084. [Google Scholar] [CrossRef] [PubMed]
- Wang, Z.; Jin, H.; Dai, W.; Choo, K.K.R.; Zou, D. Ethereum smart contract security research: Survey and future research opportunities. Front. Comput. Sci. 2021, 15, 152802. [Google Scholar] [CrossRef]
- Imteaj, A.; Amini, M.H.; Pardalos, P.M. Introduction to Blockchain Technology. In Foundations of Blockchain; Springer: Berlin/Heidelberg, Germany, 2021; pp. 3–13. [Google Scholar]
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 21260, 1–9. [Google Scholar]
- Gaži, P.; Kiayias, A.; Zindros, D. Proof-of-stake sidechains. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; pp. 139–156. [Google Scholar]
- Bentov, I.; Lee, C.; Mizrahi, A.; Rosenfeld, M. Proof of activity: Extending bitcoin’s proof of work via proof of stake [extended abstract] y. ACM Sigmetrics Perform. Eval. Rev. 2014, 42, 34–37. [Google Scholar] [CrossRef]
- Xue, J.; Xu, C.; Zhang, Y. Private blockchain-based secure access control for smart home systems. KSII Trans. Internet Inf. Syst. (TIIS) 2018, 12, 6057–6078. [Google Scholar]
- Lin, I.C.; Liao, T.C. A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 2017, 19, 653–659. [Google Scholar]
- Johar, S.; Ahmad, N.; Asher, W.; Cruickshank, H.; Durrani, A. Research and Applied Perspective to Blockchain Technology: A Comprehensive Survey. Appl. Sci. 2021, 11, 6252. [Google Scholar] [CrossRef]
- Yeoh, P. Regulatory issues in blockchain technology. J. Financ. Regul. Compliance 2017, 25, 196–208. [Google Scholar] [CrossRef]
- Halpin, H.; Piekarska, M. Introduction to Security and Privacy on the Blockchain. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Paris, France, 26–28 April 2017; pp. 1–3. [Google Scholar]
- Mirkin, M.; Ji, Y.; Pang, J.; Klages-Mundt, A.; Eyal, I.; Juels, A. BDoS: Blockchain denial-of-service. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, 9–13 November 2020; pp. 601–619. [Google Scholar]
- Carvalho, K.; Granjal, J. Security and Privacy for Mobile IoT Applications Using Blockchain. Sensors 2021, 21, 5931. [Google Scholar] [CrossRef]
- Ren, Y.; Zhu, F.; Sharma, P.K.; Wang, T.; Wang, J.; Alfarraj, O.; Tolba, A. Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things. Sensors 2020, 20, 207. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Yang, J.; Onik, M.M.H.; Lee, N.Y.; Ahmed, M.; Kim, C.S. Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making. Appl. Sci. 2019, 9, 1370. [Google Scholar] [CrossRef] [Green Version]
- Ozyilmaz, K.R.; Yurdakul, A. Designing a Blockchain-based IoT with Ethereum, swarm, and LoRa: The software solution to create high availability with minimal security risks. IEEE Consum. Electron. Mag. 2019, 8, 28–34. [Google Scholar] [CrossRef] [Green Version]
- Lombardi, F.; Aniello, L.; De Angelis, S.; Margheri, A.; Sassone, V. A blockchain-based infrastructure for reliable and cost-effective IoT-aided smart grids. In Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT-2018, London, UK, 28–29 March 2018; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
- Kvarda, L.; Hnyk, P.; Vojtech, L.; Neruda, M. Software implementation of secure firmware update in IoT concept. Adv. Electr. Electron. Eng. 2017, 15, 626–632. [Google Scholar] [CrossRef]
- Li, H.; Lu, R.; Zhou, L.; Yang, B.; Shen, X. An efficient merkle-tree-based authentication scheme for smart grid. IEEE Syst. J. 2013, 8, 655–663. [Google Scholar] [CrossRef]
- Lockl, J.; Schlatt, V.; Schweizer, A.; Urbach, N.; Harth, N. Toward trust in Internet of Things ecosystems: Design principles for blockchain-based IoT applications. IEEE Trans. Eng. Manag. 2020, 67, 1256–1270. [Google Scholar] [CrossRef]
- Arute, F.; Arya, K.; Babbush, R.; Bacon, D.; Bardin, J.C.; Barends, R.; Biswas, R.; Boixo, S.; Brandao, F.G.S.L.; Buell, D.A.; et al. Quantum supremacy using a programmable superconducting processor. Nature 2019, 574, 505–510. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Jayapal, C.; Sultana, P.; Saroja, M.N.; Senthil, J. Security Protocols for IoT. In Ubiquitous Computing and Computing Security of IoT; Springer: Berlin/Heidelberg, Germany, 2019; pp. 1–28. [Google Scholar] [CrossRef]
- Chacko, S.; Job, M.D. Security mechanisms and Vulnerabilities in LPWAN. IOP Conf. Ser. Mater. Sci. Eng. 2018, 396, 012027. [Google Scholar] [CrossRef]
- Sastry, N.; Wagner, D. Security Considerations for IEEE 802.15.4 Networks. In Proceedings of the 3rd ACM Workshop on Wireless Security; ACM WiSe: New York, NY, USA, 2004; Volume 2004. [Google Scholar]
- Narayanan, R.; Jayashree, S.; Philips, N.D.; Saranya, A.M.; Prathiba, S.B.; Raja, G. TLS Cipher Suite: Secure Communication of 6LoWPAN Devices. In Proceedings of the 2019 11th International Conference on Advanced Computing (ICoAC), Chennai, India, 18–20 December 2019; pp. 197–203. [Google Scholar] [CrossRef]
- Ekerå, M.; Håstad, J. Quantum Algorithms for Computing Short Discrete Logarithms and Factoring RSA Integers. In Post-Quantum Cryptography; Lange, T., Takagi, T., Eds.; Springer International Publishing: Cham, Switzerland, 2017; pp. 347–363. [Google Scholar]
- Proos, J.; Zalka, C. Shor’s Discrete Logarithm Quantum Algorithm for Elliptic Curves. Quantum Info. Comput. 2003, 3, 317–344. [Google Scholar]
- Singh, S.; Sharma, P.K.; Moon, S.Y.; Park, J.H. Advanced Lightweight Encryption Algorithms for IoT Devices: Survey, Challenges and Solutions; Springer: Berlin Heidelberg, Germany, 2017; Available online: https://link.springer.com/article/10.1007/s12652-017-0494-4 (accessed on 30 September 2021).
- Li, Y.; Zhang, P.; Huang, R. Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid. IEEE Access 2019, 7, 36285–36293. [Google Scholar] [CrossRef]
- Beaulieu, R.; Shors, D.; Smith, J.; Treatman-Clark, S.; Weeks, B.; Wingers, L. The SIMON and SPECK Families of Lightweight Block Ciphers. Cryptology ePrint Archive, Report 2013/404. 2013. Available online: https://eprint.iacr.org/2013/404 (accessed on 15 September 2021).
- Jang, K.; Choi, S.; Kwon, H.; Seo, H. Grover on SPECK: Quantum Resource Estimates. Cryptology ePrint Archive, Report 2020/640. 2020. Available online: https://eprint.iacr.org/2020/640 (accessed on 10 September 2021).
- Augot, D.; Batina, L.; Bernstein, D.J.; Bos, J.; Buchmann, J.; Castryck, W.; Dunkelman, O.; Güneysu, T.; Gueron, S.; Hülsing, A.; et al. Initial Recommendations of Long-Term Securepost-Quantum Systems. 2015. Available online: http://pqcrypto.eu.org/docs/initial-recommendations.pdf (accessed on 30 August 2021).
- Chou, T.; Cid, C.; UiB, S.; Gilcher, J.; Lange, T.; Maram, V.; Misoczki, R.; Niederhagen, R.; Paterson, K.G.; Persichetti, E.; et al. Classic McEliece: Conservative Code-Based Cryptography 10 October 2020. 2020. Available online: https://classic.mceliece.org/nist/mceliece-20201010.pdf (accessed on 24 August 2021).
- McEliece, R.J. A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 1978, 42, 114–116. [Google Scholar]
- Repka, M.; Zajac, P. Overview of the McEliece cryptosystem and its security. Tatra Mt. Math. Publ. 2014, 60, 57–83. [Google Scholar] [CrossRef] [Green Version]
- Zajac, P. Hybrid encryption from McEliece cryptosystem with pseudo-random error vector. Fundam. Inform. 2019, 169, 345–360. [Google Scholar] [CrossRef]
- Chen, C.; Danba, O.; Hoffstein, J.; Hulsing, A.; Rijneveld, J.; Schanck, J.M.; Schwabe, P.; Whyte, W.; Zhang, Z. NTRU: Algorithm Specifications and Supporting Documentation (2019). Available online: https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions (accessed on 25 August 2021).
- Avanzi, R.; Bos, J.; Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schanck, J.M.; Schwabe, P.; Seiler, G.; Stehlé, D. CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round 2017, 2, 4. [Google Scholar]
- Vercauteren, I.F. SABER: Mod-LWR Based KEM (Round 2 Submission). Available online: https://www.esat.kuleuven.be/cosic/publications/article-3055.pdf (accessed on 20 August 2021).
- Basu, K.; Soni, D.; Nabeel, M.; Karri, R. NIST Post-Quantum Cryptography-A Hardware Evaluation Study. IACR Cryptol. EPrint Arch. 2019, 2019, 47. [Google Scholar]
- Cheng, H.; Dinu, D.; Großschädl, J.; Rønne, P.B.; Ryan, P.Y.A. A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things. In Information Security Theory and Practice; Laurent, M., Giannetsos, T., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 103–119. [Google Scholar]
- Saarinen, M.J.O. Ring-LWE ciphertext compression and error correction: Tools for lightweight post-quantum cryptography. In Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, New York, NY, USA, 2 April 2017; pp. 15–22. [Google Scholar]
- NIST. Post-Quantum Cryptography. Round 1 Submissions. 2018. Available online: https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions (accessed on 19 August 2021).
- Soni, D.; Basu, K.; Nabeel, M.; Aaraj, N.; Manzano, M.; Karri, R. CRYSTALS-Dilithium. In Hardware Architectures for Post-Quantum Digital Signature Schemes; Springer: Berlin/Heidelberg, Germany, 2021; pp. 13–30. [Google Scholar]
- Fouque, P.A.; Hoffstein, J.; Kirchner, P.; Lyubashevsky, V.; Pornin, T.; Prest, T.; Ricosset, T.; Seiler, G.; Whyte, W.; Zhang, Z. Falcon: Fast-Fourier lattice-based compact signatures over NTRU. Submiss. Nist’s-Post-Quantum Cryptogr. Stand. Process. 2018, 36, 1–75. [Google Scholar]
- Ding, J.; Schmidt, D. Rainbow, a new multivariable polynomial signature scheme. In International Conference on Applied Cryptography and Network Security; Springer: Berlin/Heidelberg, Germany, 2005; pp. 164–175. [Google Scholar]
- Roma, C.; Tai, C.E.A.; Hasan, M.A. Energy Consumption of Round 2 submissions for NIST PQC Standards. In Proceedings of the Second PQC Standardization Conference, Oakland, CA, USA, 22–25 August 2019. [Google Scholar]
- Colombo, C.; Vasco, M.I.G.; Steinwandt, R.; Zajac, P. Secure communication in the quantum era:(group) key establishment. In Advanced Technologies for Security Applications; Springer: Berlin/Heidelberg, Germany, 2020; pp. 65–74. [Google Scholar]
- Zhang, Y.; Li, P.; Wang, X. Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network. IEEE Access 2019, 7, 31711–31722. [Google Scholar] [CrossRef]
- Alqahtani, M.; Mathkour, H.; Ben Ismail, M.M. IoT Botnet Attack Detection Based on Optimized Extreme Gradient Boosting and Feature Selection. Sensors 2020, 20, 6336. [Google Scholar] [CrossRef]
- Davahli, A.; Shamsi, M.; Abaei, G. Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. J. Ambient Intell. Humaniz. Comput. 2020, 11, 5581–5609. [Google Scholar] [CrossRef]
- Khan, M.S.; Gul, N.; Kim, J.; Qureshi, I.M.; Kim, S.M. A Genetic Algorithm-Based Soft Decision Fusion Scheme in Cognitive IoT Networks with Malicious Users. Wirel. Commun. Mob. Comput. 2020, 2020, 2509081. [Google Scholar] [CrossRef] [Green Version]
- Kotenko, I.; Saenko, I. An Approach to Aggregation of Security Events in Internet-of-Things Networks Based on Genetic Optimization. In Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France, 18–21 July 2016; pp. 657–664. [Google Scholar] [CrossRef]
- Mrugala, K.; Tuptuk, N.; Hailes, S. Evolving attackers against wireless sensor networks using genetic programming. IET Wirel. Sens. Syst. 2017, 7, 113–122. [Google Scholar] [CrossRef] [Green Version]
- Liu, X.; Du, X.; Zhang, X.; Zhu, Q.; Wang, H.; Guizani, M. Adversarial Samples on Android Malware Detection Systems for IoT Systems. Sensors 2019, 19, 974. [Google Scholar] [CrossRef] [Green Version]
- Liu, X.; Zhang, X.; Guizani, N.; Lu, J.; Zhu, Q.; Du, X. TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems. Sensors 2018, 18, 2630. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Zhu, X.; Li, Q.; Chen, Z.; Zhang, G.; Shan, P. Research on Security Detection Technology for Internet of Things Terminal Based on Firmware Code Genes. IEEE Access 2020, 8, 150226–150241. [Google Scholar] [CrossRef]
- Malhotra, P.; Singh, Y.; Anand, P.; Bangotra, D.K.; Singh, P.K.; Hong, W.C. Internet of Things: Evolution, Concerns and Security Challenges. Sensors 2021, 21, 1809. [Google Scholar] [CrossRef] [PubMed]
- Du, R.; Magnússon, S.; Fischione, C. The Internet of Things As a Deep Neural Network. IEEE Commun. Mag. 2020, 58, 20–25. [Google Scholar] [CrossRef]
- Lin, T. Deep Learning for Iot. In Proceedings of the 2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, 6–8 November 2020. [Google Scholar]
- Albulayhi, K.; Smadi, A.A.; Sheldon, F.T.; Abercrombie, R.K. Iot Intrusion Detection Taxonomy, Reference Architecture, and Analyses. Sensors 2021, 21, 6432. [Google Scholar] [CrossRef]
- Alsoufi, M.A.; Razak, S.; Siraj, M.M.; Nafea, I.; Ghaleb, F.A.; Saeed, F.; Nasser, M. Anomaly-Based Intrusion Detection Systems in Iot Using Deep Learning: A Systematic Literature Review. Appl. Sci. 2021, 11, 8383. [Google Scholar] [CrossRef]
- Apostol, I.; Preda, M.; Nila, C.; Bica, I. Iot Botnet Anomaly Detection Using Unsupervised Deep Learning. Electronics 2021, 10, 1876. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Shu, L.; Djallel, H.; Choo, K.K.R. Deep Learning-Based Intrusion Detection for Distributed Denial of Service Attack in Agriculture 4.0. Electronics 2021, 10, 1257. [Google Scholar] [CrossRef]
- Ahmad, Z.; Khan, A.S.; Nisar, K.; Haider, I.; Hassan, R.; Haque, M.R.; Tarmizi, S.; Rodrigues, J.J.P.C. Anomaly Detection Using Deep Neural Network for Iot Architecture. Appl. Sci. 2021, 11, 7050. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Balogh, S.; Gallo, O.; Ploszek, R.; Špaček, P.; Zajac, P. IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques. Electronics 2021, 10, 2647. https://doi.org/10.3390/electronics10212647
Balogh S, Gallo O, Ploszek R, Špaček P, Zajac P. IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques. Electronics. 2021; 10(21):2647. https://doi.org/10.3390/electronics10212647
Chicago/Turabian StyleBalogh, Stefan, Ondrej Gallo, Roderik Ploszek, Peter Špaček, and Pavol Zajac. 2021. "IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques" Electronics 10, no. 21: 2647. https://doi.org/10.3390/electronics10212647
APA StyleBalogh, S., Gallo, O., Ploszek, R., Špaček, P., & Zajac, P. (2021). IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques. Electronics, 10(21), 2647. https://doi.org/10.3390/electronics10212647