Visible to the public Internet of Things Security Problems

SoS Newsletter- Advanced Book Block

 

 
SoS Logo

Internet of Things Security Problems

 

The term Internet of Things (IoT) refers to advanced connectivity of the Internet with devices, systems and services that include both machine-to-machine communications (M2M) and a variety of protocols, domains and applications.  Since the concept incorporates literally billions of devices, the security implications are huge.  The articles presented here identify and discuss broad security problems that the IoT engenders.  


 

Stankovic, J.A., "Research Directions for the Internet of Things," Internet of Things Journal, IEEE, vol.1, no.1, pp.3,  9, Feb. 2014. doi: 10.1109/JIOT.2014.2312291 Many technical communities are vigorously pursuing research topics that contribute to the Internet of Things (IoT). Nowadays, as sensing, actuation, communication, and control become even more sophisticated and ubiquitous, there is a significant overlap in these communities, sometimes from slightly different perspectives. More cooperation between communities is encouraged. To provide a basis for discussing open research problems in IoT, a vision for how IoT could change the world in the distant future is first presented. Then, eight key research topics are enumerated and research problems within these topics are discussed.
Keywords: Internet; Internet of Things; Internet of Things; IoT; Actuators; Internet of Things; Mobile computing; Network security; Privacy; Real-time systems; Research and development; Wireless sensor networks; Cyber physical systems; Internet of Things (IoT);mobile computing; pervasive computing; wireless sensor networks (ID#: 15-4709)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6774858&isnumber=6810798

 

Zhang Li-ming; Liu Bao-cheng; Tang Qing-hua; Wu Li-ping, "The Development And Technological Research Of Intelligent Electrical Building," Electricity Distribution (CICED), 2014 China International Conference on, pp.88,92, 23-26 Sept. 2014. doi: 10.1109/CICED.2014.6991669 With the popularization of Internet of things technology and the rise of the smart grid concept, a lot of theoretical research and practical exploration have been carried out on intelligent electrical construction at home and abroad. Intelligent building is an important outcome of the application of computer technology in information age, and it is an important part of power segment of smart grid. Through the perfect combination of modern high-tech and building, intelligent building creates a comfortable, safe, economic, efficient, convenient and sustainable development of work and living environment for the user, provides intelligent and interactive electricity services, supplies a convenient management means for managers, reduces the energy consumption and the cost of management for the operators, provides the material basis for the modern property management. At the same time, the development of `three networks convergence' of the State Council is of great significance for promoting the growth of information and cultural industry, improving the level of national economy and social information, contenting people's diversified demand of production and life service, boosting domestic consumption, forming new economic point of growth. This paper explains the basic concepts of intelligent building, describes the significance and development goals of intelligent electricity building construction firstly, then analyzes the current situation of intelligent electricity building, points out the existing problems at present, and discusses the key technology of intelligent building. Finally this paper looks into the distance of the development trend for intelligent building, the developing direction of intelligent building is clear and definite. The basic requirement of intelligent building is intelligent and automated office equipment, high performance communication system, flexible architecture, and automated construction management service. The composition of the basis- technical of intelligent building is illustrated in this paper, and it mainly contains modern building technology, modern computer technology, modern communication technology and modern control technology. The equipment and cable security of weak current system for intelligent building must rely on electrical technology. Modern construction technology is a series of theory, technology and behavior norms which is born and developed in the modern construction practice. The core of modern computer technology is distributed computer network technology in parallel. Modern communication technology is the rapid transmission of data, voice, video through wireless and wired communication technology. Modern control technology is mainly about the distribution type of monitoring system. Through research and analysis, this paper thinks that the structure of intelligent building system will be changed by the progress of information technology, and it is need to reconsider and adjust the function, role and service mode of intelligent building system. The simulation technology of intelligent building will change to digital technology, its transmission system will change from proprietary network to IP network. So the system integration is higher, the appearance is more beautiful, the operation is more convenient. Through the establishment of advanced technology, scientific management and integrated highly intelligent management system, intelligent building not only save the consumption of energy source, reduces the waste of resources, cuts down the daily operating costs, but also provides safety, comfortable, fast, efficient high-quality service, good work and living environment for human beings.
Keywords: building management systems; intelligent structures; office automation; research and development management; automated construction management service; automated office equipment; cost of management; distributed computer network technology; electricity services; energy consumption; flexible architecture; high performance communication system; information technology; intelligent electrical building; intelligent electrical construction; living environment; modern building technology; modern communication technology; modern computer technology; modern control technology;smart grid; sustainable development; work environment; Abstracts; Artificial intelligence; Buildings; Communities; Fires; Lighting; Smart grids; Smart grid; building automation; intelligent electrical building; technological research (ID#: 15-5358)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6991669&isnumber=6991649

 

Strobel, D.; Oswald, D.; Richter, B.; Schellenberg, F.; Paar, C., "Microcontrollers as (In)Security Devices for Pervasive Computing Applications," Proceedings of the IEEE, vol.102, no.8, pp.1157,1173, Aug. 2014. doi: 10.1109/JPROC.2014.2325397 Often overlooked, microcontrollers are the central component in embedded systems which drive the evolution toward the Internet of Things (IoT). They are small, easy to handle, low cost, and with myriads of pervasive applications. An increasing number of microcontroller-equipped systems are security and safety critical. In this tutorial, we take a critical look at the security aspects of today's microcontrollers. We demonstrate why the implementation of sensitive applications on a standard microcontroller can lead to severe security problems. To this end, we summarize various threats to microcontroller-based systems, including side-channel analysis and different methods for extracting embedded code. In two case studies, we demonstrate the relevance of these techniques in real-world applications: Both analyzed systems, a widely used digital locking system and the YubiKey 2 onetime password generator, turned out to be susceptible to attacks against the actual implementations, allowing an adversary to extract the cryptographic keys which, in turn, leads to a total collapse of the system security.
Keywords: Internet of Things; cryptography; embedded systems; microcontrollers; ubiquitous computing; Internet of Things; IoT; YubiKey 2 onetime password generator; cryptographic key extraction; digital locking system; embedded code extraction; embedded systems; microcontroller-equipped systems; pervasive computing applications; security devices; side-channel analysis; Algorithm design and analysis; Cryptography; Embedded systems; Field programmable gate arrays; Integrated circuit modeling; Microcontrollers; Pervasive computing; Security; Code extraction; microcontroller; real-world attacks; reverse engineering; side-channel analysis (ID#: 15-4710)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6826474&isnumber=6860340

 

Kai Fan; Chen Liang; Hui Li; Yintang Yang, "LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT," Computer and Information Technology (CIT), 2014 IEEE International Conference on, pp.276, 280, 11-13 Sept. 2014. doi: 10.1109/CIT.2014.80 As one of the core techniques in the Internet of Things (IoT), Radio Frequency Identification (RFID) plays a crucial role in IoT development. Although the low-cost RFID system has wide prospect, it has to face with huge challenges because of potential security risks, privacy problems and efficiency due to its limitations of processing capability, and storage space and power supply in RFID tags. The lightweight RFID mutual authentication protocol is one of the possible solutions in secure authentication of the low-cost RFID system. In this paper, we propose a lightweight RFID mutual authentication protocol with cache in the reader, named LRMAPC, to store the recent visited key of tags in LRMAPC, so that recent visited tags can be authenticated directly in the reader. The LRMAPC can greatly reduce the computational and transmission cost. Especially, it can reduce computational costs greatly when a large number of tags want to be authenticated. We prove the correctness of LRMAPC using GNY Logic. Compared with other existing works, LRMAPC achieves stronger security and higher efficiency.
Keywords: Internet of Things; cache storage; cryptographic protocols; radiofrequency identification; GNY logic; Internet of Things; IoT reader; LRMAPC; lightweight RFID mutual authentication protocol with cache; radio frequency identification; secure authentication; security risks; storage space; Authentication; Databases; Law; Privacy; Protocols; Radiofrequency identification; RFID; authentication; efficiency; security (ID#: 15-4711)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6984666&isnumber=6984594

 

Kwantae Cho; Byung-Gil Lee; Dong Hoon Lee, "Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks," Dependable and Secure Computing, IEEE Transactions on, vol. 11, no.5, pp.454, 466, Sept.-Oct. 2014. doi: 10.1109/TDSC.2013.41 The forthcoming internet of things - an intelligent collaboration of resource-limited devices such as wireless sensor nodes that are embedded in the daily lives of users - poses new challenges to security and end-user privacy. One of the most challenging problems is the thwarting of replica attacks. Once a sensor node is physically captured, it can be reprogrammed and replicated into a large number of replicas, which may maliciously occupy the network. Thus far, various schemes have been proposed to detect replicas; however, most of them require expensive hardware such as a global positioning system. In general, the ideal price for a sensor node is as low as one dollar, and thus, it is equipped with limited resources; hence, it is not practical to employ additional devices. In this paper, we propose a low-priced and efficient solution for replica detection in static wireless sensor networks. Although the proposed solution does not need any additional hardware, it exhibits similar or better performance, as compared to existing schemes. Through simulation experiments, we show that the proposed solution provides comparable performance in terms of the replica detection ratio and the time required to detect replicas. Furthermore, we show that the proposed solution saves more energy than existing schemes in most of our simulations.
Keywords: Internet of Things; data privacy; power aware computing; ubiquitous computing; wireless sensor networks; Internet of things; end-user privacy; energy-efficient replica detection; expensive hardware; global positioning system; low-priced solution; replica attacks; replica detection ratio; resource-limited devices; static wireless sensor networks; wireless sensor nodes; Base stations; Educational institutions; Global Positioning System; Hardware; Internet; Security; Wireless sensor networks; Security and protection; authentication; network protocols; ubiquitous computing (ID#: 15-4712)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6616549&isnumber=6893064

 

Licai Liu; Lihua Yin; Yunchuan Guo; Bingxing Fang, "EAC: A Framework of Authentication Property for the IOTs," Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2014 International Conference on, pp.102,105, 13-15 Oct. 2014. doi: 10.1109/CyberC.2014.25 Authentication is a slick and important security property and its proposed formal definitions are not widely agreed upon. Moreover, these definitions cannot faithfully express the requirements of diverse security and privacy in the Internet of Things (IOTs). To solve these problems, we proposed a framework of authentication, which including three forms of authentication -- entity authentication, action authentication and claim authentication -- and formalized each definition by using CSP for IOTs in this paper. We show that the framework can easily express different security requirements of IOTs and verify authentication of protocols.
Keywords: Internet; Internet of Things; communicating sequential processes; message authentication; protocols; CSP; EAC; IOT; Internet of Things; action authentication; authentication property; claim authentication; entity authentication; formal definition; protocol authentication; security property; security requirement; Algebra; Authentication; Conferences; Internet of Things; Privacy; Protocols; Authentication Property; Communicating Sequential Processes; Internet of Things; Security Property; Trace Model (ID#: 15-4713)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6984288&isnumber=6984259

 

Yanbing Liu; Qin Wu, "A Lightweight Anomaly Mining Algorithm in the Internet of Things," Software Engineering and Service Science (ICSESS), 2014 5th IEEE International Conference on, pp.1142,1145, 27-29 June 2014. doi: 10.1109/ICSESS.2014.6933768 The security of Internet of Things (IoT) has already become a thorny problem because of opening deployment and limited resources. Thus, as the essential part of intrusion detection anomaly mining gets more and more attention. However, complexity of algorithm is the vital issue due to the specialty of IoT. Meanwhile, traditional methods with Euclidean distance may cause misjudgment at some extent. So this paper proposes a lightweight anomaly mining algorithm which employ Jaccard coefficient firstly as the judging criterion instead of Euclidean distance. The experiment verifies the availability of proposed algorithm.
Keywords: Internet of Things; data mining; security of data; Euclidean distance; Internet of Things; IoT security; Jaccard coefficient; intrusion detection; judging criterion; lightweight anomaly mining algorithm; Complexity theory; Euclidean distance; Internet of Things; Sensors; Vectors; Wireless communication; Wireless sensor networks; Internet of things; anomaly mining; Intrusion detection (ID#: 15-4714)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6933768&isnumber=6933501

 

Guozi Sun; Siqi Huang; Wan Bao; Yitao Yang; Zhiwei Wang, "A Privacy Protection Policy Combined With Privacy Homomorphism in the Internet of Things," Computer Communication and Networks (ICCCN), 2014 23rd International Conference on, pp.1,6, 4-7 Aug. 2014. doi: 10.1109/ICCCN.2014.6911856 Recently, IOT (Internet of Things) develops very rapidly. However, the personal privacy protection is one of directly important factors that impact the large-scale applications of IOT. To solve this problem, this paper proposes a privacy protection policy based on privacy homomorphism. It can protect the security of personal information well by processing the needs of users without acquiring of plaintext. In another aspect, it also greatly improves the performance of the original multiplication homomorphism algorithm.
Keywords: Internet; Internet of Things; data privacy; IOT; Internet of Things; multiplication homomorphism algorithm; personal information; personal privacy protection; plaintext; privacy homomorphism; privacy protection policy; Algorithm design and analysis; Encryption; Internet of Things; Privacy; IOT; homomorphism; personal privacy; security (ID#: 15-4715)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6911856&isnumber=6911704

 

Fan Zhang; Dojen, R., "EWAIP: An empirical Wireless Sensor Network applications implementation platform," Future Generation Communication Technology (FGCT), 2014 Third International Conference on, pp.72,77, 13-15 Aug. 2014. doi: 10.1109/FGCT.2014.6933226 Internet of Things (IOT) is experiencing a super-fast growing phase. Wireless Sensor Networks (WSN), as the “five sense organs” and teleneuron of IOT, is developing fast along. Owing to the application-oriented characteristics of WSN, WSN applications may differ enormously in implementation methods. The WSN developers may have to rewrite the code for each and every application. Along with the increasing demand to WSN applications, WSN developers may have heavier tasks of programming for these applications. Thanks to TinyOS and NesC, an operating system and programming language designed especially for WSN, raises the WSN application's programming to a higher level. Large number of supported sensor hardware plus system provided and user-de-fined libraries eases WSN application programmers' jobs. How-ever, the massive amount of nodes' communication and networking, and security protection slows down the development pace. A unified and empirical WSN application implementation platform is one of the available solutions to the problem. This paper introduces an empirical WSN application implementation platform, which avails the WSN developers build an application with unified code template and network packet generation and processing strategies.
Keywords: Internet of Things; digital libraries; telecommunication computing; wireless sensor networks; EWAIP; IOT; Internet of Things; NesC operating system; TinyOS operating system; WSN application; application programming; application-oriented characteristics; empirical wireless sensor network application implementation platform; five sense organs; network packet generation; programming language; security protection; teleneuron; unified code template; user-defined libraries; Encryption; Hardware; Libraries; Radio transceivers; Software; Wireless sensor networks; Empirical Implementation Platform; Wireless Sensor Networks (ID#: 15-4716)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6933226&isnumber=6933219

 

Stojmenovic, Ivan, "Fog computing: A Cloud To The Ground Support For Smart Things And Machine-To-Machine Networks," Telecommunication Networks and Applications Conference (ATNAC), 2014 Australasian, pp.117,122, 26-28 Nov. 2014. doi: 10.1109/ATNAC.2014.7020884 Cloud services to smart things face latency and intermittent connectivity issues. Fog devices are positioned between cloud and smart devices. Their high speed Internet connection to the cloud, and physical proximity to users, enable real time applications and location based services, and mobility support. Cisco promoted fog computing concept in the areas of smart grid, connected vehicles and wireless sensor and actuator networks. This survey article expands this concept to the decentralized smart building control, recognizes cloudlets as special case of fog computing, and relates it to the software defined networks (SDN) scenarios. Our literature review identifies a handful number of articles. Cooperative data scheduling and adaptive traffic light problems in SDN based vehicular networks, and demand response management in macro station and micro-grid based smart grids are discussed. Security, privacy and trust issues, control information overhead and network control policies do not seem to be studied so far within the fog computing concept.
Keywords: Actuators; Cloud computing; Mobile communication; Optimal scheduling; Smart grids; Vehicles; Wireless communication; Fog computing; Machine-to-machine networks (ID#: 15-4717)

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7020884&isnumber=7020854

 

Hwajeong Seo; Jongseok Choi; Hyunjin Kim; Taehwan Park; Howon Kim, "Pseudo Random Number Generator And Hash Function For Embedded Microprocessors," Internet of Things (WF-IoT), 2014 IEEE World Forum on, pp.37,40, 6-8 March 2014. doi: 10.1109/WF-IoT.2014.6803113 Embedded microprocessors are commonly used for future technologies such as Internet of Things(IoT), RFID and Wireless Sensor Networks(WSN). However, the microprocessors have limited computing power and storages so straight-forward implementation of traditional services on resource constrained devices is not recommenced. To overcome this problem, lightweight implementation techniques should be concerned for practical implementations. Among various requirements, security applications should be conducted on microprocessors for secure and robust service environments. In this paper, we presented a light weight implementation techniques for efficient Pseudo Random Number Generator(PRNG) and Hash function. To reduce memory consumption and accelerate performance, we adopted AES accelerator based implementation. This technique is firstly introduced in INDOCRYPT'12, whose idea exploits peripheral devices for efficient hash computations. With this technique, we presented block cipher based light-weight pseudo random number generator and simple hash function on embedded microprocessors.
Keywords: cryptography; embedded systems; microprocessor chips; random number generation; AES accelerator;INDOCRYPT'12;PRNG;block cipher based lightweight pseudo random number generator; embedded microprocessors; future technologies; hash computations; hash function; lightweight implementation techniques; peripheral devices; resource constrained devices; robust service environments; secure service environments ;security applications; straight-forward implementation; Ciphers; Clocks; Encryption; Generators; Microprocessors (ID#: 15-4718)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6803113&isnumber=6803102

 

Schukat, M.; Flood, P., "Zero-knowledge Proofs in M2M Communication," Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014), 25th IET, pp.269, 273, 26-27 June 2013. doi: 10.1049/cp.2014.0697 The advent of the IoT with an estimated 50 billion internet enabled devices by the year 2020 raises questions about the suitability and scalability of existing mechanisms to provide privacy, data integrity and end-entity authentication between communicating peers. In this paper we present a new protocol that combines zero-knowledge proofs and key exchange mechanisms to provide secure and authenticated communication in static M2M networks, therefore addressing all the above problems. The protocol is suitable for devices with limited computational resources and can be deployed in wireless sensor networks. While the protocol requires an a-priori knowledge about the network setup and structure, it guarantees perfect forward secrecy.
Keywords: Internet of Things; computer network security; cryptographic protocols; wireless sensor networks; Internet enabled devices; Internet of Things;IoT;M2M communication; data integrity; data privacy; end-entity authentication; key exchange mechanisms; machine-to-machine communication; perfect forward secrecy; static M2M networks; wireless sensor networks; zero-knowledge proofs; Diffle Heilman key exchange; GMW protocol; Zero knowledge proof (ID#: 15-4719)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6912768&isnumber=6912720

 

Fysarakis, K.; Papaefstathiou, I.; Rantos, K.; Manifavas, C.; Sultatos, O., "Policy-Based Access Control For DPWS-Enabled Ubiquitous Devices," Emerging Technology and Factory Automation (ETFA), 2014 IEEE, pp.1,8, 16-19 Sept. 2014. doi: 10.1109/ETFA.2014.7005233 As computing becomes ubiquitous, researchers and engineers aim to exploit the potential of the pervasive systems in order to introduce new types of services and address inveterate and emerging problems. This process will, eventually, lead us to the era of urban computing and the Internet of Things; the ultimate goal being to improve our quality of life. But these concepts typically require direct and constant interaction of computing systems with the physical world in order to be realized, which inevitably leads to the introduction of a range of safety and privacy issues that must be addressed. One such important aspect is the fine-grained control of access to the resources of these pervasive embedded systems, in a secure and scalable manner. This paper presents an implementation of such a secure policy-based access control scheme, focusing on the use of well-established, standardized technologies and considering the potential resource-constraints of the target heterogeneous embedded devices. The proposed framework adopts a DPWS-compliant approach for smart devices and introduces XACML-based access control mechanisms. The proof-of-concept implementation is presented in detail, along with a performance evaluation on typical embedded platforms.
Keywords: Internet of Things; Web services; XML; authorisation; data privacy; embedded systems; DPWS-enabled ubiquitous devices; Devices Profile for Web Services; Internet of Things; XACML-based access control mechanisms; heterogeneous embedded devices; pervasive embedded systems; policy-based access control; privacy issues; resource-constraints; safety issues; smart devices; urban computing; Authorization; Computer architecture; Internet of Things; Performance evaluation; Web services; DPWS; XACML; access control; authorization; security; ubiquitous computing (ID#: 15-4720)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7005233&isnumber=7005023

 

Xiaoying Zhang; Hong Chen; Ke Wang; Hui Peng; Yongjian Fan; Deying Li, "Rotation-Based Privacy-Preserving Data Aggregation In Wireless Sensor Networks," Communications (ICC), 2014 IEEE International Conference on,, pp.4184,4189, 10-14 June 2014. doi: 10.1109/ICC.2014.6883977 Wireless Sensor Network is an important part of the Internet of Things. Data privacy preservation in wireless sensor networks is extremely urgent and challenging. To address this problem, we propose in this paper a privacy-preserving data aggregation protocol in wireless sensor networks. Compared to the previous research, our protocol protects the actual data from other nodes based on a rotation scheme while reducing communication overhead dramatically. The protocol achieves accurate aggregation results. Finally, theoretical analysis and simulation results confirm the high privacy and efficiency of our proposal.
Keywords: Internet of Things; cryptographic protocols; data protection; telecommunication security; wireless sensor networks; Internet of Things; communication overhead reduction; data protection; rotation-based privacy-preserving data aggregation protocol; wireless sensor networks; Data privacy; Educational institutions; Merging; Privacy; Protocols; Silicon; Wireless sensor networks (ID#: 15-4721)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6883977&isnumber=6883277

 

Diogo, P.; Reis, L.P.; Vasco Lopes, N., "Internet of Things: A System's Architecture Proposal," Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on, pp. 1, 6, 18-21 June 2014. doi: 10.1109/CISTI.2014.6877072 Internet of Things (IoT) is seen as the future of Internet. We will step out from typical current communication paradigm, to a much wider spectrum, where normal “things” will talk to each other, independent of human interaction. Emphasizing its importance in health industry, it can save lives and improve the ageing and disabled population's quality of living. It is not just things connected to the Internet - it is intelligent systems that we will be able to build on top of IoT that will introduce us to a better quality of life. However, IoT is facing a major problem: fragmentation and interoperability problems. If we want things to communicate with each other, intelligently and autonomously, then the new future Internet must be structured to allow such thing. The industry must adopt current standards and provide interoperability among other systems and developers must be aware of this issue too. Every new device should be IoT proof for future integration in IoT. In this article, there is a focus on these health-related use cases where they are detailed and explained how IoT could be deployed to aid in specific cases. The second part of the article takes the current IoT problem and tackles its issues, presenting a communication paradigm and proposes a new IoT system's architecture.
Keywords: Internet of Things; health care; medical information systems; open systems; Internet of Things; IoT system architecture; ageing population quality of living improvement; communication paradigm; disabled population quality of living improvement; fragmentation problem; health industry; intelligent systems; interoperability problem; quality of life; Internet of Things; Logic gates; Security; Telecommunication standards; Web services; Internet of Things; M2M; architecture; communication; e-health; fragmentation; interoperability (ID#: 15-4722)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6877072&isnumber=6876860

 

Miloslavskaya, N.; Senatorov, M.; Tolstoy, A.; Zapechnikov, S., "Information Security Maintenance Issues for Big Security-Related Data," Future Internet of Things and Cloud (FiCloud), 2014 International Conference on, pp.361,366, 27-29 Aug. 2014. doi: 10.1109/FiCloud.2014.64 The need to protect big data, particularly those relating to information security (IS) maintenance (ISM) of an enterprise's IT infrastructure, is shown. A worldwide experience of addressing big data ISM issues is briefly summarized and a big data protection problem statement is formulated. An infrastructure for big data ISM is proposed. New applications areas for big data IT after addressing ISM issues are listed in conclusion.
Keywords: Big Data; security of data; ISM; IT infrastructure; big data protection problem statement; big security-related data; information security maintenance; information security maintenance issues; Arrays; Big data; Data models; Data visualization; Distributed databases; Real-time systems ;Security; big data; data visualization; information security; secure infrastructure; security-related data (ID#: 15-4723)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6984220&isnumber=6984143

 

van Thuan, Do; Butkus, Pranas; van Thanh, Do, "A User Centric Identity Management for Internet of Things," IT Convergence and Security (ICITCS), 2014 International Conference on, pp.1,4, 28-30 Oct. 2014. doi: 10.1109/ICITCS.2014.7021724 In the future Internet of Things, it is envisioned that things are collaborating to serve people. Unfortunately, this vision could not be realised without relations between things and people. To solve the problem this paper proposes a user centric identity management system that incorporates user identity, device identity and the relations between them. The proposed IDM system is user centric and allows device authentication and authorization based on the user identity. A typical compelling use case of the proposed solution is also given.
Keywords: Authentication; Identity management systems; Internet of Things; Medical services; Mobile handsets (ID#: 15-4724)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7021724&isnumber=7021698

 

The Development Trend And Future of IOTs in China," Communications, China, vol.11, no.9, pp.1, 5, Sept. 2014. doi: 10.1109/CC.2014.6969706 In recent years, in spite of the rapid growth of the IOTs in technical research and development, standard development, industrial fostering and industrial applications, there are deep-seated problems which have been restraining the development of IOTs. The Chinese government is strengthening the guidance of the development of the IoTs, constantly optimizing the environment for the development of IOTs, so as to promote the orderly and healthy development of the Internet of Things in China.
Keywords: Internet of Things; government policies; research and development management; Chinese government; IOT; Internet of Things; industrial applications; industrial fostering; standard development; technical research and development; Computer security ;Internet; Internet of things; Mobile communication; Monitoring; Radiofrequency identification; Research and development (ID#: 15-4725)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6969706&isnumber=6969702

 

Razouk, W., "Zigbee Security within the Framework of IoT," Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on, pp.265,265, 17-19 Nov. 2014. doi: 10.1109/SOCA.2014.57 The latest version of ZigBee offers improvement over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist as the enhanced protocol still has many security weaknesses. In this presentation we highlight relevant security concerns related to the latest ZigBee security features, then we propose countermeasure mechanisms to address some of these weaknesses. We also propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution improves security and decreases considerably the likelihood of successful attacks. Lastly we discuss the security and performance related to the proposed scheme.
Keywords: Internet of Things; Zigbee; computer network security; wireless sensor networks; Internet of things; IoT framework; ZigBee enabled wireless sensor networks; ZigBee security features; enhanced protocol; power consumption; Communication system security; IEEE 802.15 Standards; Protocols; Security; Wireless communication; Wireless sensor networks; Zigbee; Internet of Things; Security; Wireless sensor networks; ZigBee (ID#: 15-4726)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6978620&isnumber=6978154

 

Hwajeong Seo; Jongseok Choi; Hyunjin Kim; Taehwan Park; Howon Kim, "Short Paper: Surveillance System With Light Sensor," Internet of Things (WF-IoT), 2014 IEEE World Forum on, pp.165,166, 6-8 March 2014. doi: 10.1109/WF-IoT.2014.6803141 Traditional surveillance system is enabled by closed-circuit television(CCTV) monitoring each district in real time. However, this approach should install expensive CCTV to every destination and collected images or videos should go through complex post-processing to get useful and meaningful information. Furthermore nowadays CCTV violates people's private life, which is crucial problem in modern society. If our goal is secure and robust street, more simple and cheap approaches could be favorable. In this paper, we present a novel surveillance system using light sensor which is commonly available in embedded processors or modern smart-phones. On the contrast to the traditional method, light sensor is cheap module and easy to install and process the information. After processing, we can determine the secure or insecure places with derived information. For practical evaluation, we made micro testbed in our campus. First we collected light information from several locations in different time domains. And then secure or insecure places are determined in each time domain. We defined bright and dark places as secure and insecure places, respectively. The evaluation shows that our approach is unprecedented ultra light-weight approach and cost effective method to improve security in our society.
Keywords: closed circuit television; intelligent sensors; optical sensors; smart phones; video surveillance; CCTV; closed-circuit television; embedded processors; light sensor; smart-phones; surveillance system; Educational institutions; Lighting; Roads; Servers; Surveillance; Time-domain analysis; Wireless networks (ID#: 15-4727)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6803141&isnumber=6803102

 

Yang Li; Nakasone, T.; Ohta, K.; Sakiyama, K., "Privacy-mode Switching: Toward Flexible Privacy Protection for RFID tags in Internet of Things," Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th, pp.519,520, 10-13 Jan. 2014. doi: 10.1109/CCNC.2014.6940531 The privacy problem becomes the biggest obstacle when applying the RFID technology to personal customers usage in Internet of Things. Privacy protection is in the cost of computational overhead and feasibility loss, and necessary for privacy-sensitive usages. We propose a RFID system in which the privacy protection can be turned on or off by validate authorities. The privacy-mode switching increases diversity of RFID usage, enables RFID recycles, and has limited hardware overhead for RFID tags. Based on a symmetric-key crypto-based mutual authentication protocol called OMHSO, we describe a construction of a RFID system with flexible privacy-mode switching.
Keywords: Internet of Things; computer network security; cryptographic protocols; data protection; radiofrequency identification; Internet of Things; OMHSO; RFID tags; computational overhead; feasibility loss; flexible privacy protection; hardware overhead; personal customers usage; privacy-mode switching; privacy-sensitive usages; symmetric-key crypto-based mutual authentication protocol; Cryptography; Privacy; Protocols; RFID tags; Servers; Switches (ID#: 15-4728)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6940531&isnumber=6866537

 

Rghioui, A.; Bouchkaren, S.; Khannous, A.; Bouhorma, M., "Securing Private Wireless Sensors In A Shared Environment In The Internet Of Things Context," Security Days (JNS4), Proceedings of the 4th Edition of National, pp.1,6, 12-13 May 2014. doi: 10.1109/JNS4.2014.6850126 To lead to the Smart Cities, we should have the possibility of obtaining information from different places and objects anytime and anywhere, in order to collect sufficient data to anticipate problems and take a good decisions. This will promote to an effective and autonomous organization by creating interacted and communicated objects around the city. So, we need to install various and specific IP-based wireless sensors everywhere to collect data remotely and in a real time. The idea of mixing sensors belonging to organizations from different specialties in the same places will involve several experts and encourages competition. But on the other side, it will open the door to new security threats and issues, also this will impose new management problems like how to limit the access to each organization to its sensors. In this paper, we study the security of a set of IP-based wireless sensors, which belongs to different organizations, and form a local network. We propose a model to ensure exchanged information confidentiality and manage the sensors accessibility, while considering the wireless sensors constrained characteristics.
Keywords: {Internet of Things; telecommunication security; wireless sensor networks; IP-based wireless sensors; Internet of Things context; communicated objects; exchanged information confidentiality; interacted objects; local network; management problems; private wireless sensors; shared environment; smart cities;Cryptography;Erbium;Nickel;Organizations;Sensors;Wireless sensor networks;6LoWPAN;IEEE 802.15.4;Internet of Things; IoT; Network Security; Smart City; WSN (ID#: 15-4729)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6850126&isnumber=6847906

 

Moriyama, D., "Provably Secure Two-Round RFID Grouping Proof Protocols," RFID Technology and Applications Conference (RFID-TA), 2014 IEEE, pp.272, 276, 8-9 Sept. 2014. doi: 10.1109/RFID-TA.2014.6934242 A witness to show the coexistence of multiple RFID tags is called grouping-proof and it is useful to handle a lot of commercial products in Internet of Things (IoT). Many of the existing grouping-proof protocols have a common problem that the RFID reader incrementally communicates with the RFID tags in the group and the round complexity is quite high. In this paper, we show that there exists a provably secure RFID grouping-proof protocol which the grouping-proof is generated in the constant round. Especially, we propose two-round RFID grouping-proof protocols secure against the impersonation attack and man-in-the-middle attack, respectively.
Keywords: Internet of Things; cryptographic protocols; radiofrequency identification; telecommunication security; Internet of Things; IoT; RFID grouping proof protocols; RFID reader; RFID tags; impersonation attack; man-in-the-middle attack; Authentication; Cryptography; Protocols; RFID tags; Zinc; RFID; authentication; grouping-proof; provable security (ID#: 15-4730)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6934242&isnumber=6934187

 

Jiye Park; Namhi Kang, "Lightweight Secure Communication For Coap-Enabled Internet Of Things Using Delegated DTLS Handshake," Information and Communication Technology Convergence (ICTC), 2014 International Conference on, pp.28,33, 22-24 Oct. 2014. doi: 10.1109/ICTC.2014.6983078 IETF CoRE working group proposed to use DTLS for supporting secure IoT services. In this paper, we examine problems that can happen when applying the DTLS protocol to IoT networks directly. To solve the problems, we separate the DTLS protocol into two; the handshake phase and the encryption phase. Our approach enhances performance in both device and network by using a way to delegate the DTLS handshake phase. We also present two scenarios (inbound and outbound) based on the properties of Constrained Application Protocol (CoAP) enabled sensors. The proposed scheme supports secure end-to-end communication despite using delegation.
Keywords: Internet of Things; cryptography; telecommunication security; CoAP enabled sensors; CoAP-enabled Internet of Things; DTLS protocol; IETF CoRE working group; IoT networks; constrained application protocol; delegated DTLS handshake; delegation; encryption phase; handshake phase; lightweight secure communication; secure end-to-end communication;Encryption;Internet;Protocols;Sensors;Servers;CoAP Security; DTLS; Delegation; End-to-end Security; Internet of Things (ID#: 15-4731)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6983078&isnumber=6983064

 

Nguyen, T.; Leneutre, J., "Formal Analysis of Secure Device Pairing Protocols," Network Computing and Applications (NCA), 2014 IEEE 13th International Symposium on , vol., no., pp.291,295, 21-23 Aug. 2014. doi: 10.1109/NCA.2014.50 The need to secure communications between personal devices is increasing nowadays, especially in the context of Internet of Things. Authentication between devices which have no prior common knowledge is a challenging problem. One solution consists in using a pre-authenticated auxiliary channel, human assisted or location limited, usually called out-of-band channel. A large number of device pairing protocols using an out-of-band channel were proposed, but they usually suffer from a lack of formal analysis. In this paper, we introduce a formal model, conceived as an extension of Strand Spaces, to analyze such protocols. We use it to analyze a device pairing protocol with unilateral out-of-band channel proposed by Wong & Stajano. This leads us to discover some vulnerabilities in this protocol. We propose a modified version of the protocol together with a correctness proof in our model.
Keywords: {cryptographic protocols; data privacy; telecommunication security; Internet of Things; formal analysis; human assisted channel; location limited channel; pre-authenticated auxiliary channel; secure communication; secure device pairing protocol; strand space extension; unilateral out-of-band channel; Adaptation models; Authentication; Communication system security; DH-HEMTs; Protocols; Wireless communication (ID#: 15-4732)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6924241&isnumber=6924186

 

Stankovic, J.A., "Research Directions for the Internet of Things," Internet of Things Journal, IEEE, vol.1, no.1, pp. 3, 9, Feb. 2014. doi: 10.1109/JIOT.2014.2312291 Many technical communities are vigorously pursuing research topics that contribute to the Internet of Things (IoT). Nowadays, as sensing, actuation, communication, and control become even more sophisticated and ubiquitous, there is a significant overlap in these communities, sometimes from slightly different perspectives. More cooperation between communities is encouraged. To provide a basis for discussing open research problems in IoT, a vision for how IoT could change the world in the distant future is first presented. Then, eight key research topics are enumerated and research problems within these topics are discussed.
Keywords: Internet; Internet of Things; Internet of Things; IoT; Actuators; Internet of Things; Mobile computing; Network security; Privacy; Real-time systems; Research and development; Wireless sensor networks; Cyber physical systems; Internet of Things (IoT); mobile computing; pervasive computing; wireless sensor networks (ID#: 15-4733)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6774858&isnumber=6810798


Note:

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.