Secure IoT: An Improbable Reality

Nayana Mannilthodi, Jinesh M. Kannimoola

Abstract

Internet of Things(IoT) has been the buzzword for the past decade. Apart from its hype over opportunities, the security implications of IoT are unsolvable with current technologies. There is a wide range of security challenges in each layer of IoT conceptual model. We discuss the security challenges caused by the complex structures and integration of different techniques from diverse domains. By analysing attacks at the various layers we argue that the current standards are not enough to provide a secure framework for IoT. The economical and practical reasons make it impossible to puzzle out the various security challenges in IoT stack. From this perspective, we should think twice before connecting a device to the network of things.

References

  1. Ashton, K. (2009). That internet of things thing. RFiD Journal, 22:97-114.
  2. Barcena, M. B. and Wueest, C. (2015). Insecurity in the internet of things. Security Response, Symantec.
  3. Burmester, M. and De Medeiros, B. (2007). Rfid security: attacks, countermeasures and challenges. In The RFID Journal.
  4. CISCO (2013). Securing the internet of things: A proposed framework. http://www.cisco.com/c/en/us/about/securitycenter/secure-iot-proposed-framework.html.
  5. Derbez, P. and Fouque, P.-A. (2013). Exhausting demirciselc¸uk meet-in-the-middle attacks against reducedround aes. In International Workshop on Fast Software Encryption, pages 541-560. Springer.
  6. Drozhzhin, A. (2015). Internet of crappy things. https://kas.pr/at2F.
  7. Farooq, M., Waseem, M., Khairi, A., and Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (iot). International Journal of Computer.
  8. Gartner, I. (2014). Gartner says 4.9 billion connected ”things” will be in use in 2015. http://www.gartner.com/newsroom/id/2905717.
  9. Group, I. W. (2016). Future-proofing the connected world: 13 steps to developing secure iot products.
  10. Hancke, G. et al. (2008). Eavesdropping attacks on highfrequency rfid tokens. In 4th Workshop on RFID Security (RFIDSec), pages 100-113.
  11. Hancke, G. P. (2005). A practical relay attack on iso 14443 proximity cards. Technical report, University of Cambridge Computer Laboratory, 59:382-385.
  12. HP (2014). Hpe fortify and the internet of things. http://go.saas.hpe.com/fod/internet-of-things.
  13. Insider, B. (2016). The master key to understanding the iot revolution. http://read.bi/29mOi16.
  14. Kibirige, G. W. and Sanga, C. (2015). A survey on detection of sinkhole attack in wireless sensor network. arXiv preprint arXiv:1505.01941.
  15. Kurakova, T. (2013). Overview of internet of things. Proceedings of the Internet of things and its enablers (INTHITEN), pages 82-94.
  16. Lee, J., Kapitanova, K., and Son, S. H. (2010). The price of security in wireless sensor networks. In Computer Networks. Elsevier.
  17. Li, L. (2012). Study on security architecture in the internet of things. In Measurement, Information and Control (MIC), 2012 Int. Conference on, volume 1, pages 374- 377. IEEE.
  18. Luhach, A. K. et al. (2016). Analysis of lightweight cryptographic solutions for internet of things. Indian Journal of Science and Technology, 9.
  19. Messai, M.-L. (2014). Classification of attacks in wireless sensor networks. arXiv preprint arXiv:1406.4516.
  20. Miller, C. and Valasek, C. (2015). Remote exploitation of an unaltered passenger vehicle. Black Hat USA.
  21. Mitrokotsa, A., Rieback, M. R., and Tanenbaum, A. S. (2010). Classifying rfid attacks and defenses. Information Systems Frontiers, 12(5):491-505.
  22. Ning, H., Liu, H., et al. (2012). Cyber-physical-social based security architecture for future internet of things. Advances in Internet of Things.
  23. Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L., and Chen, H. (2014). Uninvited connections: a study of vulnerable devices on the internet of things (iot). In JISIC, 2014, pages 232-235. IEEE.
  24. Pirretti, M., Z. S. V. N. M. P. K. M. B. R. (2006). The sleep deprivation attack in sensor networks: Analysis and methods of defense. International Journal of Distributed Sensor Networks, 2.
  25. PubNub (2015). A new approach to iot security.
  26. Rose, K., Eldridge, S., and Chapin, L. (2015). The internet of things: An overview. The Internet Society (ISOC), pages 1-50.
  27. Sabanal, P. (2016). Thingbots: The future of botnets in the internet of things. RSA Conference.
  28. Sathyadevan, S., Achuthan, K., and Poroor, J. (2014). Architectural recommendations in building a network based secure, scalable and interoperable internet of things middleware. In Advances in Intelligent Systems and Computing, volume 327, pages 429-439. Springer.
  29. Sathyadevan, S., Kalarickal, B., and Jinesh, M. K. (2015). Security, trust and implementation limitations of prominent iot platforms. In Advances in Intelligent Systems and Computing, volume 328, pages 85-95. Springer.
  30. Schulman, J. (2016). Why we will never secure the internet of things. buildingacareerinsecurity.com.
  31. Spring, T. (2016). Iot insecurity pinpointing the problems.
  32. Storey, A. (2014). There's nothing smartabout insecure connected devices. Network Security, pages 9-12.
  33. Suo, H., Wan, J., Zou, C., and Liu, J. (2012). Security in the internet of things: a review. In Computer Science and Electronics Engineering (ICCSEE), Int. Conference on, volume 3, pages 648-651. IEEE.
  34. Uttarkar, M. R. and Kulkarni, R. (2014). Internet of things: Architecture and security. International Journal of Computer Application, pages 12-19.
  35. Zunnurhain, K. (2016). Vulnerabilities with internet of things. In Proceedings of the Int. Conference on SAM, page 83.
Download


Paper Citation


in Harvard Style

Mannilthodi N. and M. Kannimoola J. (2017). Secure IoT: An Improbable Reality . In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS, ISBN 978-989-758-245-5, pages 338-343. DOI: 10.5220/0006352903380343


in Bibtex Style

@conference{iotbds17,
author={Nayana Mannilthodi and Jinesh M. Kannimoola},
title={Secure IoT: An Improbable Reality},
booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,},
year={2017},
pages={338-343},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006352903380343},
isbn={978-989-758-245-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,
TI - Secure IoT: An Improbable Reality
SN - 978-989-758-245-5
AU - Mannilthodi N.
AU - M. Kannimoola J.
PY - 2017
SP - 338
EP - 343
DO - 10.5220/0006352903380343