Skip to main content

Security Stipulations on IoT Networks

  • Chapter
  • First Online:
Cognitive Computing for Big Data Systems Over IoT

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 14 ))

Abstract

Cyber physical systems consists a crowd of computing nodes and the material processes associated with it. The objects correlated with these embedded things may embrace of a central processor, sensor and actuator units annotated around various communication devices. These device capabilities with least human intercession are proficient to seize data from various environments that requires “smartness” and hence IoT can be briefed as Smart devices centre. As massive numbers of devices are coupled with IoT, there exists a colossal take up on the protocol standards wide with various communication capabilities. This is in regard of assuring the security standard diffusion between the objects of data transfer and the terminal it reaches to. The heterogeneity between these objects and application platforms is an encumbrance to the developers for implementing the architecture for particular services. Cloud platforms rescue the situation by storing, computing and visualizing data before transforming them into meaningful information. Botnets or Zombie army is a malware that takes control of a computer in which the attacker can squeeze into the network raising threat to the authenticity of devices and access to networks. Phishing and Spamming attacks are causing a severity to networks through insecure connections. The security facet of IoT has to be redefined in terms of confidentiality so that the end user is guaranteed with secure data and data integrity can be retained. Various technologies lay around Transport layer Security (TLS) that helps the network to maintain its privacy. This chapter first discusses the Constrained Application Protocol (COAP) associated with 6LoWPAN network. A 6LoWPAN network is a cluster of LoWPAN networks which comprises of low cost and low power devices. These networks are bearing passive and active attacks that affect the network’s confidentiality causing its performance malfunction. In passive attacks, the attacker is abiding to spy on network and steal the confidential information. Denial of Service attacks make obscure scene to network causing performance degradation to the network; active attack is a label in the case. Next focus is to discuss on the protocol stack that congregate the standardized notations of the ISO/OSI and TCP/IP stacks. The stack is being dealt in industrial applications and then turn into de-facto standard that saturates the existing IoT growth on wireless nodes. Next we confer about the IPv6 Routing Protocol (RPL) for Low-Power and Lossy Networks. It consists of constrained nodes with low processing power which are typically unstable with low packet delivery rates. They are mainly battery controlled devices consuming less memory and energy; their traffic patterns are generally multipoint or multipoint-to-point and hence requires compromises with thousand of interconnected nodes. It integrates the method of multipoint-to-point traffic from devices inside the LLN towards a central control point and the point-to-multipoint traffic from the central control point to the devices inside the LLN. Following this, Time-based secure key generation approach that convolutes the local key generation at the both transmission ends is discussed. A time stamp is put up on the local transmitter. The validity of the secure keys is limited to a time interval and the reply attacks comprised on valid messages are removed. The key generation process is a procedure performed separately by both communication objects. Finally, the chapter perceive with Cognitive Security in IoT devices in which the arena uses authentication through well defined user properties and patterns. Cognitive solutions in wireless security become concrete, since conventional static security is meant with lack of privacy. The user is able to learn continuously from the network and machine learning approaches can be incessantly applied with the stipulated security problems. The mediators in the capillary network can monitor the parameters related with Cognitive security standard and raise the security with time based solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naito, K.: A survey on the internet-of-things: standards, challenges and future prospects. J. Inf. Process. 25, 23–31 (2017)

    Google Scholar 

  2. Chen, P.-Y., Chen, K.-C.: Optimal control of epidemic information dissemination in mobile ad hoc networks. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–5, Dec 2011

    Google Scholar 

  3. U.S. Department of Homeland Security: Strategic principles for securing the Internet of Things (IoT). Homeland Security, Nov (2015)

    Google Scholar 

  4. Eom, B., Lee, C., Yoon, C., Lee, H., Ryu, W.: A platform as a service for smart home. Int. J. Future Comput. Commun. 2(3), 253–257 (2013)

    Google Scholar 

  5. Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., Sun, X.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5) (2015)

    Google Scholar 

  6. Al Ameen, M., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. (2010)

    Google Scholar 

  7. Yu, F., Chang, C.-C., Shu, J., Ahmad, I., Zhang, J., de Fuentes, J.M.: Recent advances in security and privacy for wireless sensor networks. J. Sens. 2017 (2016)

    Google Scholar 

  8. Winkler, T., Rinner, B.: Security and privacy protection in visual sensor networks: a survey. ACM Comput. Surv. (CSUR) Surveys Homepage archive 47(1) (2014)

    Google Scholar 

  9. Kausar, F.: Key management in wireless sensor networks: secure and efficient key generation, distribution and revoking in heterogeneous sensor networks (2012). ISBN:3659249955 9783659249952

    Google Scholar 

  10. Venkatasubramanian, K., Banerjee, A., Gupta, S.: PSKA: usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010)

    Article  Google Scholar 

  11. Cazorla, M., Marquet, K., Minier, M.: Survey and benchmark of lightweight block ciphers for wireless sensor networks. In: International Conference on Security and Cryptography (SECRYPT) (2013)

    Google Scholar 

  12. IBM Corporation: Message queue telemetry transport (MQTT), June 2014

    Google Scholar 

  13. Vinoski, S.: Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87–89 (2006)

    Article  Google Scholar 

  14. Vilajosana, X., Tuset-Peiro, P., Vazquez-Gallego, F., Alonso-Zarate, J., Alonso, L.: Standardized low-power wireless communication technologies for distributed sensing applications. Sensors (2014)

    Google Scholar 

  15. Palattella, M.R., Accettura, N., Vilajosana, X., Watteyne, T., Grieco, L.A., Boggia, G., Dohler, M.: Standardized protocol stack for the Internet of (important) Things. IEEE Commun. Surv. Tutor. 15(3), 1389–1406 (2013)

    Article  Google Scholar 

  16. Youssef, T.A., Elsayedm, A.T., Mohammed, O.A.: Data distribution service-based interoperability framework for smart grid test bed infrastructure. Energies (2016), Dec 2015

    Google Scholar 

  17. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., McCann, J., Leung, K.: A survey on the IETF protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wirel. Commun. 20(6), 91–98 (2013)

    Article  Google Scholar 

  18. Chen, P.-Y., Hero, A.O.: Assessing and safeguarding network resilience to nodal attacks. IEEE Commun. Mag. 52(11), 138–143 (2014)

    Article  Google Scholar 

  19. Iyer, S., Killingback, T., Sundaram, B., Wang, Z.: Attack robustness and centrality of complex networks, Apr 2013

    Google Scholar 

  20. Chen, P.-Y., Cheng, S.-M., Chen, K.-C.: Smart attacks in smart grid communication networks. IEEE Commun. Mag. 50(8), 24–29 (2012)

    Article  Google Scholar 

  21. Chen, P.-Y., Cheng, S.-M., Chen, K.-C.: Information fusion to defend intentional attack in internet of things. IEEE IoT J. 1(4), 337–348 (2014)

    MathSciNet  Google Scholar 

  22. Buscarino, A., Gambuzza, L.V., Porfiri, M., Fortuna, L., Frasca, M.: Robustness to noise in synchronization of complex networks. Nature (2013)

    Google Scholar 

  23. Chen, P.-Y., Hero, A.O.: Node removal vulnerability of the largest component of a network. In: Proceedings of IEEE GlobalSIP (2013)

    Google Scholar 

  24. Chen, P.-Y., Chen, K.-C.: Information epidemics in complex networks with opportunistic links and dynamic topology. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–6, Dec 2010

    Google Scholar 

  25. Chen, P.-Y., Lin, H.-F., Hsu, K.-H., Cheng, S.-M.: Modeling dynamics of malware with incubation period from the view of individual. In: 79th IEEE Vehicular Technology Conference (VTC Spring), pp. 1–5, May 2014

    Google Scholar 

  26. Sarkar, C., Nambi, S.N.A.U., Prasad, R.V., Rahim, A., Neisse, R., Baldini, G.: DIAT: a scalable distributed architecture for IoT. IEEE Internet Things J. 2, 230–239 (2015)

    Google Scholar 

  27. Vijayalakshmi, A.V., Arockiam, L.: A study on security issues and challenges in IoT. Int. J. Eng. Sci. Manage. Res. (2016)

    Google Scholar 

  28. Shelby, Z., Hartke, K., Bormann, C., Frank, B.: Constrained application protocol (CoAP). In: IETF draft, January 2012

    Google Scholar 

  29. Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta, A.F.: DCapBAC: embedding authorization logic into smart things through ECC optimizations. Int. J. Comput. Math. 1–22 (2014)

    Google Scholar 

  30. Dennis, J.B., Van Horn, E.C.: Programming semantics for multiprogrammed computations. Commun. ACM 9(3), 143–155 (1966)

    Article  MATH  Google Scholar 

  31. Crockford, D., RFC 7159: The JavaScript Object Notation (JSON) Data Interchange Format, IETF RFC 7159, March 2014. http://www.ietf.org/rfc/rfc7159.txt

  32. Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (COAP). IETF RFC 7252, 10 (2014)

    Google Scholar 

  33. Rissanen, E.: Extensible access control markup language (XACML) version 3.0 oasis standard (2012)

    Google Scholar 

  34. Choi, S.I., Koh, S.-J.: Use of proxy mobile IPv6 for mobility management in CoAP-Based internet-of-things networks. IEEE Commun. Lett. (2016)

    Google Scholar 

  35. Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., Alexander, R.: RPL: IPv6 routing protocol for low power and lossy networks. Request for Comments (RFC): 6550, March 2012

    Google Scholar 

  36. Weber, R.H.: Internet of things: new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)

    Article  Google Scholar 

  37. Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: Proceedings of International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648–651, March 2012

    Google Scholar 

  38. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements and future direction. Future Gener. Comput. Syst. 29, 1645–1660 (2013)

    Article  Google Scholar 

  39. Alabaa, F.A., Othmana, M., Hashema, I.A.T., Alotaibi, F.: internet of things security: a survey, vol. 88, pp. 10–28, June 2017

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumod Sundar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sundar, S., Sumathy, S. (2018). Security Stipulations on IoT Networks. In: Sangaiah, A., Thangavelu, A., Meenakshi Sundaram, V. (eds) Cognitive Computing for Big Data Systems Over IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 14 . Springer, Cham. https://doi.org/10.1007/978-3-319-70688-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70688-7_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70687-0

  • Online ISBN: 978-3-319-70688-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics