1.
Introduction ^
We are currently witnessing the evolution and proliferation of a pervasive paradigm called «The internet of things». IoT as it is often referred to, is comprised of several technologies, including the traditional internet, radio frequency identification (RFID) systems, wireless sensor networks (WSNs), machine-to-machine platforms, big data, cloud services, and smart applications, among other things. It is estimated, that over fifty billion devices will be connected to the internet by the year 2020 [1].
The reader should realize that IoT is such a complex paradigm that stakeholders need to address several issues associated with it, among which are Security, Privacy, Scalability, Standardization, and so on. In addition to the existing conventional attacks such as man-in-the-middle attack, denial of service attack, identity theft, IP spoofing, among other things, we may witness a new wave of attacks such as hackers controlling and or destroying/damaging IoT objects in homes, hospitals, airports, among other environments. Other attacks similar to conventional attacks such as worms' propagation in the IoT, virus attacks etc. could be devastating. Generally, the threats in the IoT network are similar to those of the traditional network. However, the wider impact can be very different.
This paper reviews important security and privacy issues discussed in the literature. The rest of the paper is organized as follows. Section 2 gives a background concept of internet of things. Section 3 discusses the main security and privacy issues surrounding key components of IoT including RFID systems, Sensor nodes, and consumer devices. Section 4 discusses the security and privacy issues of the two main architectures of IoT; Centralized versus Distributed approaches. Section 5 discusses Network layer security issues in IoT. Section 6 briefly discusses Application Layer Security Issues. Section 7 discusses some views of the main IoT stakeholders with regards to the security challenges that lie ahead. Section 8 concludes the paper.
2.
Background ^
3.1.
Vulnerabilities in IoT Devices ^
Insufficient Authentication and Authorization. The research study also reveals that 80% of the tested IoT devices do not have strong password requirements, with most allowing weak passwords such as «1234». With issues like this, it is obvious that an attacker can take advantage of such vulnerability to gain access to the device in question.
Insecure Software and Firmware. Sixty percent of the devices tested do not use encryption when downloading software updates. The research claims to have demonstrated the interception of some of the downloads, extracted, and mounted as file system in Linux where the software can be viewed or modified. This development is really worrying as billions of devices are poised to be part of the IoT.
3.2.
RFID and WSN Security ^
Although a wide range of devices, networks and service technologies will make up the IoT, RFID is seen as key among the technologies that will make IoT a reality [8–12]. As billions of physical objects are poised to connect to the internet in the IoT paradigm, they also aim to communicate with one another. Consequently, data and information representation, storage, organization, and transmission will be extremely challenging [13]. As challenging as data and information handling will be in IoT, the security will be at least as complicated.
On the other hand, WSNs are active, and since communication is peer to peer, WSNs do not need the presence of a reader. A WSN is comprised of sensing nodes and usually a node referred to as a Sink, which receives data from the other nodes' activities. WSNs are mostly based on IEEE 802.15 standard which is designed for low constraint devices in a Wireless Personal Area Network (WPAN). WSNs are currently used in several applications, such as healthcare, smart environment, smart building, and military applications among other things. Using WSNs in collaboration with RFID systems in an IoT will help in facilitating more efficient communication and tracking of objects. Several proprietary and non-proprietary technologies are currently used for WSNs, such as ZigBee, Z-Wave, and Wavenis, among others. Details of these technologies are beyond the scope of this paper. However, the interested reader can find more details about these technologies in [15–19]
Privacy Issues and the Concept of Anonymity. As certain tags carry personal information such as financial, medical and other sensitive information, the possibility of covert tracking and inventorying of tags by unauthorized readers that are within range is very real. Information transmitted form authorized readers to the tag can be eavesdropped within a relatively long distance of hundreds of meters. Therefore, user centric support such as allowing IoT users to retain their anonymity is very important. However, the majority of users are not experts and as such they do not really understand how to make the necessary user centric configurations. Effective implementation of privacy by design principles was addressed in [20]. Privacy by design emphasize the need to embed privacy right from the beginning, during the architecture, design and construction of processes, because of the possibility of powerful analytics to make it possible to re-identify individuals (after de-identifying them) over huge dataset.
Authors of [21] use Daidalo’s virtual identity concept [22] to propose an identity-based personal location system with protected privacy in the IoT. The model is designed to protect users' location and information from unauthorized other users. The model uses multiple unassociated unique virtual identities (VID) for a user for different roles. Each VID is used in different services in order to conceal the location identity of the user who may be a patient. The system is comprised of Registration management authority (RMA) which is a trusted entity that registers and provides users with VIDs, a system which authenticates users based on their VIDs, a Policy system which stores and updates relevant policies to ensure user anonymity, and a client system which keeps copies of user VIDs on the user’s mobile device for the purpose of communication with the server. The system authenticates users using their VIDs. The policy system further ensures that no two VIDs (for different roles) belonging to a single user can ever be linked to one another thereby preserving the privacy of such a user. While this is a good privacy model, however, it may be less useful in accident emergency situations at least in the developed world, since there is a more efficient way of handling accident emergency situations. Similar approaches can be seen in [23–24].
4.1.
Centralized IoT ^
4.2.
Distributed IoT ^
A distributed system is a collection of independent computers that appears to its users as a single coherent system [25]. Similarly, in a distributed IoT, several entities which make up the IoT appear to their users as one single entity. Communications can go both ways, and unlike in a centralized IoT architecture, entities can actually receive data from other entities (located in different context) and execute them. The intelligence is shifted to the edge network. This means, that objects can acquire, process data, and make decisions as needed. A daunting task ahead, imagine the volume of data, that will be flowing within a distributed IoT, where entities have to interpret the data and make important decisions. Issues ranging from the role of middleware (an integral part of traditional distributed systems) in a distributed IoT, to impact of hardware and software failures, and communication channels, are well beyond the scope of this paper. However, the interested reader can refer to [26–28] for more understanding on the challenges that lie ahead in a distributed IoT.
As billions of things in multiple contexts are poised to connect to the IoT and to one another, it is crucial that authentication and authorization of these connecting objects and entities are as effective as that of the traditional networks. We need to preserve the integrity and confidentiality of the huge volume of data, that would be flowing. It is challenging to implement proper authentication and authorization mechanisms necessary for the security and privacy of the entities and the data being exchanged between these heterogeneous objects and entities [29].
4.3.
Security and Privacy issues ^
A more promising approach is Capability Role Based Access Control (CapBAC) which is devised according to the capability based authorization model [31]. In this approach, a capability, which is basically an authorization token, is used to uniquely refer to an object or entity along with the entity’s specific access rights. So any process that needs to interact with an object has to acquire the capability token associated with the object. And the most interesting part of this approach is that, it is the object owner that grants and ascertains its authorization capability to the service provider, unlike in a traditional access control system where the reverse is the case.
Although the five main IoT messaging protocols (MQTT, XMPP, DDS, COAP and AMQP) have recently been standardized, a few of the several different implementations of each have been standardized. For example, MQTT (Message Queue Telemetry Transport) is a lightweight simple messaging protocol designed for constrained objects and networks with significant overhead [33], has only version 3.1.1 of its implementations standardized. Besides, IoT needs many more protocols apart from these five [34–35], and the process of standardization can take several years. What we are more concerned here, is how secure are these communication protocols? The design principle of these protocols is more of performance and reliability with little or no emphasis on security. MQTT is intended to be light and simple and was not designed to handle a strong authentication process, making it insecure by itself.
Privacy Safeguards and Trust. We pointed out in the Authentication and Authorization section above, the importance of having the acquisition and processing of sensitive data (such as health data) owned and controlled by the relevant users/patients themselves. It is crucial to make sure that patients (owners of the health devices) are involved in every stage of this process such that no tokens are issued without the explicit approval of the patient. We believe a mechanism like this one will not only protect user’s privacy but ensure trust among the IoT actors. In order to achieve trust between entities, entities need to authenticate each other as proposed in [38].
5.
IoT Network Security ^
Because of the passive nature of IoT, authentication mechanisms using centralized architectures are only useful in a centralized IoT where a central entity (such as an application based on a cloud service) stores, processes and manages information. This scenario is not the case in a distributed IoT as data providers (e.g. sensors, RFID tags etc.) can acquire and process data and information from different entities. The best solution would be to embed strong cryptographic encryption and access control at the object level. Again, the computational and power limitations of these objects leave the field for research wide open.
6.
IoT Applications Security ^
7.
Views of IoT stakeholders ^
8.
Conclusion ^
9.
References ^
[1] Sundmaeker, Harald/Guillemin, Patrick/Friess, Peter/Woelfflé, Sylvie, Vision and challenges for realising the Internet of Things. CERP-IoT, European Commission-Information Society and Media, Brussels 2010, p. 3.
[2] Floerkemeier, Christian/Langheinrich, Marc/Fleish, Elgar/Mattern, Friedmann/Sarma, Sanjay E. (Eds.), The Internet of Things: First International Conference, IoT 2008, Zurich, Switzerland, March 26–28, 2008, Proceedings. Vol. 4952. Springer Science & Business Media, Berlin, Heidelberg 2008.
[3] ABI research, More Than 30 Billion Devices Will Wirelessly Connect to the Internet of Everything in 2020. ABI research news, https://www.abiresearch.com/press/more-than-30-billion-devices-will-wirelessly-conne/ (last accessed on 3 February 2016) 2013.
[4] Kushalnagar, Nandakishore/Montenegro, Gabriel/Christian, Schumacher, IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals. RFC4919, IETF Trust 2007.
[5] Holler, Jan/Tsiatsis, Vlasios/Mulligan, Catherine/Avesand, Stefan/Karnouskos, Stamatis/Boyle, David, From Machine-to-machine to the Internet of Things: Introduction to a New Age of Intelligence. Academic Press, Massachusette 2014, pp. 30–32.
[6] Clearfield, Chris, Why The FTC Can’t Regulate The Internet Of Things, Forbes/Tech, http://www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/#4665bb7853ae (last accessed on 3 February 2016) 2013.
[7] HP. Fortify on Demand. Internet of Things Research Study, HP Report, http://www8.hp.com/h20195/V2/GetPDF.aspx/4AA5-4759ENW.pdf (last accessed on 17 January 2016) 2014.
[8] Presser, Mirko/Gluhak, Alexander, The Internet of Things: Connecting the Real World with the Digital World. EURESCOM mess@ ge – The Magazine for Telecom Insiders 2, 2009.
[9] Zorzi, Michele/Gluhak, Alexander/Lange, Sebastian/Bassi, Alessandro, From today’s intranet of things to a future internet of things: a wireless-and mobility-related view. Wireless Communications, IEEE 17, no. 6, 2010, pp. 44–51.
[10] Welbourne, Evan/Battle, Leilani/Cole, Gregory/Gould, Kyle/Rector, Kyle/Raymer, Samuel/Balazinska, Magdalena/Borriello, Gaetano, Building the internet of things using RFID: the RFID ecosystem experience. Internet Computing, IEEE 13, no. 3, 2009, pp. 48–55.
[11] Khoo, Benjamin. RFID as an enabler of the internet of things: issues of security and privacy. Internet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing. IEEE, 2011, pp. 709–712.
[12] Trotter, Matthew, RFID Makes Internet of Things Come to Life, machine design, http://machinedesign.com/iot/rfid-makes-internet-things-come-life (accessed on 21 September 2015), 2014.
[13] Katasonov, Artem/Kaykova, Olena/Khriyenko, Oleksiy/Nikitin, Sergiy/Terziyan, Vagan, Smart Semantic Middleware for the Internet of Things. ICINCO-ICSO 8, 2008, pp. 169–178.
[14] Juels, Ari, RFID security and privacy: A research survey. Selected Areas in Communications, IEEE Journal on 24.2, 2006, pp. 381–394.
[15] Mainetti, Luca/Patrono, Luigi/Vilei, Antonio, Evolution of wireless sensor networks towards the internet of things: A survey. Software, Telecommunications and Computer Networks (SoftCOM), 2011 19th International Conference on. IEEE, 2011, pp. 1–6.
[16] Yick, Jennifer/Mukherjee, Biswanath/Ghosal, Dipak, Wireless sensor network survey. Computer networks 52.12 (2008), pp. 2292–2330.
[17] Gomez, Carles/Paradells, Josep, Wireless home automation networks: A survey of architectures and technologies. IEEE Communications Magazine 48.6 (2010), pp. 92–101.
[18] Baronti, Paolo/Pillai, Prashant/Chook, Vince/Chessa, Stefano/Gotta, Alberto/Hu, Y. Fun, Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and ZigBee standards. Computer communications 30, no. 7 (2007), pp. 1655–1695.
[19] Lee, Jin-Shyan/Su, Yu-Wei/Shen, Chung-Chou, A comparative study of wireless protocols: Bluetooth, UWB, ZigBee, and Wi-Fi. Industrial Electronics Society, 2007. IECON 2007. 33rd Annual Conference of the IEEE. IEEE, 2007.
[20] Cavoukian, Ann/Jonas, Jeff, Privacy by design in the age of big data, Information and Privacy Commissioner of Ontario, Canada, 2012.
[21] Hu, Chunye/Zhang, Jie/Wen, Qiaoyan An identity-based personal location system with protected privacy in IoT. Broadband Network and Multimedia Technology (IC-BNMT), 2011 4th IEEE International Conference on. IEEE, 2011.
[22] Daidalos’ Projects, http://www.ist-daidalos.org/daten/publications/EU-leaflet/EU-project_Daidalos_II_Summary.pdf (last accessed on 28 November 2015).
[23] Sarma, Amardeo C./Girão, João, Identities in the future internet of things. Wireless personal communications 49.3 (2009), pp. 353–363.
[24] Sarma, Amardeo/Matos, Alfredo/Girão, João/Aguiar, Rui, Virtual identity framework for telecom infrastructures. Wireless Personal Communications 45, no. 4 (2008), pp. 521–543.
[25] Tanenbaum, Andrew S./Van Steen, Maarten, Distributed systems, Prentice-Hall, Upper Saddle River, NJ 2007.
[26] Masri, Wassim/Mammeri, Zoubir, Middleware for wireless sensor networks: A comparative analysis. Network and Parallel Computing Workshops, 2007. NPC Workshops. IFIP International Conference on. IEEE, 2007, pp. 349–356.
[27] Ibrahim, Noha, Orthogonal classification of middleware technologies. Mobile Ubiquitous Computing, Systems, Services and Technologies, 2009. UBICOMM’09. Third International Conference on. IEEE, 2009, pp. 46–51
[28] Charles, John, Middleware moves to the forefront. Computer 5, 1999, pp. 17–19.
[29] Uckelmann, Dieter/Harrison, Mark/Michahelles, Florian, Architecting the internet of things. Springer Science & Business Media, Berlin Heidelberg 2011, pp. 1–24.
[30] OpenID, OpenID Connect, http://openid.net/connect/ (last accessed on 5 December 2015).
[31] Gusmeroli, Sergio/Piccione, Salvatore/Rotondi, Domenico, A capability-based security approach to manage access control in the internet of things. Mathematical and Computer Modelling 58.5 (2013): 1189–1205.
[32] Wrote an e-mail to Zigbee support team at help@zigbee.org and got this reply answered by their certificate and technology team on 23 November 2015.
[33] MQTT, http://mqtt.org/faq (last accessed on 2 December 2015).
[34] Wu, Miao/Lu, Ting-lie/Ling, Fei-Yang/Sun, Ling/Du, Hui-Ying, Research on the architecture of Internet of things. Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, vol. 5, pp. V5-484. IEEE, 2010.
[35] Schneider, Stan, Understanding the Protocols Behind the Internet of Things, http://electronicdesign.com/iot/understanding-protocols-behind-internet-things (last accessed on 2 February 2016) 2013.
[36] DDS, Why Choose DDS, http://portals.omg.org/dds/why-choose-dds/ (last accessed on 7 December 2015).
[37] Boutin, Chad, NIST Selects Winner Of Secure Hash Algorithm (SHA-3) Competetion, http://www.nist.gov/itl/csd/sha-100212.cfm (last accessed on 7 December 2015), 2012.
[38] Mahalle, Parikshit/Babar, Sachin/Prasad, Neeli/Prasad, Ramjee, Identity management framework towards internet of things (IoT): Roadmap and key challenges. Recent Trends in Network Security and Applications, pp. 430–439. Springer Berlin Heidelberg, 2010.
[39] Atzori, Luigi/Iera, Antonio/Morabito, Giacomo, The internet of things: A survey. Computer networks 54.15 (2010): 2787–2805.
[40] SANS Institute, InfoSec Reading Room, Securing the Internet of Things Survey, http://www.sans.org/reading-room/whitepapers/analyst/securing-internet-things-survey-34785 (last accessed on 27 April 2015).