Abstract
Cyber physical systems consists a crowd of computing nodes and the material processes associated with it. The objects correlated with these embedded things may embrace of a central processor, sensor and actuator units annotated around various communication devices. These device capabilities with least human intercession are proficient to seize data from various environments that requires “smartness” and hence IoT can be briefed as Smart devices centre. As massive numbers of devices are coupled with IoT, there exists a colossal take up on the protocol standards wide with various communication capabilities. This is in regard of assuring the security standard diffusion between the objects of data transfer and the terminal it reaches to. The heterogeneity between these objects and application platforms is an encumbrance to the developers for implementing the architecture for particular services. Cloud platforms rescue the situation by storing, computing and visualizing data before transforming them into meaningful information. Botnets or Zombie army is a malware that takes control of a computer in which the attacker can squeeze into the network raising threat to the authenticity of devices and access to networks. Phishing and Spamming attacks are causing a severity to networks through insecure connections. The security facet of IoT has to be redefined in terms of confidentiality so that the end user is guaranteed with secure data and data integrity can be retained. Various technologies lay around Transport layer Security (TLS) that helps the network to maintain its privacy. This chapter first discusses the Constrained Application Protocol (COAP) associated with 6LoWPAN network. A 6LoWPAN network is a cluster of LoWPAN networks which comprises of low cost and low power devices. These networks are bearing passive and active attacks that affect the network’s confidentiality causing its performance malfunction. In passive attacks, the attacker is abiding to spy on network and steal the confidential information. Denial of Service attacks make obscure scene to network causing performance degradation to the network; active attack is a label in the case. Next focus is to discuss on the protocol stack that congregate the standardized notations of the ISO/OSI and TCP/IP stacks. The stack is being dealt in industrial applications and then turn into de-facto standard that saturates the existing IoT growth on wireless nodes. Next we confer about the IPv6 Routing Protocol (RPL) for Low-Power and Lossy Networks. It consists of constrained nodes with low processing power which are typically unstable with low packet delivery rates. They are mainly battery controlled devices consuming less memory and energy; their traffic patterns are generally multipoint or multipoint-to-point and hence requires compromises with thousand of interconnected nodes. It integrates the method of multipoint-to-point traffic from devices inside the LLN towards a central control point and the point-to-multipoint traffic from the central control point to the devices inside the LLN. Following this, Time-based secure key generation approach that convolutes the local key generation at the both transmission ends is discussed. A time stamp is put up on the local transmitter. The validity of the secure keys is limited to a time interval and the reply attacks comprised on valid messages are removed. The key generation process is a procedure performed separately by both communication objects. Finally, the chapter perceive with Cognitive Security in IoT devices in which the arena uses authentication through well defined user properties and patterns. Cognitive solutions in wireless security become concrete, since conventional static security is meant with lack of privacy. The user is able to learn continuously from the network and machine learning approaches can be incessantly applied with the stipulated security problems. The mediators in the capillary network can monitor the parameters related with Cognitive security standard and raise the security with time based solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naito, K.: A survey on the internet-of-things: standards, challenges and future prospects. J. Inf. Process. 25, 23–31 (2017)
Chen, P.-Y., Chen, K.-C.: Optimal control of epidemic information dissemination in mobile ad hoc networks. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–5, Dec 2011
U.S. Department of Homeland Security: Strategic principles for securing the Internet of Things (IoT). Homeland Security, Nov (2015)
Eom, B., Lee, C., Yoon, C., Lee, H., Ryu, W.: A platform as a service for smart home. Int. J. Future Comput. Commun. 2(3), 253–257 (2013)
Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., Sun, X.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5) (2015)
Al Ameen, M., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. (2010)
Yu, F., Chang, C.-C., Shu, J., Ahmad, I., Zhang, J., de Fuentes, J.M.: Recent advances in security and privacy for wireless sensor networks. J. Sens. 2017 (2016)
Winkler, T., Rinner, B.: Security and privacy protection in visual sensor networks: a survey. ACM Comput. Surv. (CSUR) Surveys Homepage archive 47(1) (2014)
Kausar, F.: Key management in wireless sensor networks: secure and efficient key generation, distribution and revoking in heterogeneous sensor networks (2012). ISBN:3659249955 9783659249952
Venkatasubramanian, K., Banerjee, A., Gupta, S.: PSKA: usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010)
Cazorla, M., Marquet, K., Minier, M.: Survey and benchmark of lightweight block ciphers for wireless sensor networks. In: International Conference on Security and Cryptography (SECRYPT) (2013)
IBM Corporation: Message queue telemetry transport (MQTT), June 2014
Vinoski, S.: Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87–89 (2006)
Vilajosana, X., Tuset-Peiro, P., Vazquez-Gallego, F., Alonso-Zarate, J., Alonso, L.: Standardized low-power wireless communication technologies for distributed sensing applications. Sensors (2014)
Palattella, M.R., Accettura, N., Vilajosana, X., Watteyne, T., Grieco, L.A., Boggia, G., Dohler, M.: Standardized protocol stack for the Internet of (important) Things. IEEE Commun. Surv. Tutor. 15(3), 1389–1406 (2013)
Youssef, T.A., Elsayedm, A.T., Mohammed, O.A.: Data distribution service-based interoperability framework for smart grid test bed infrastructure. Energies (2016), Dec 2015
Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., McCann, J., Leung, K.: A survey on the IETF protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wirel. Commun. 20(6), 91–98 (2013)
Chen, P.-Y., Hero, A.O.: Assessing and safeguarding network resilience to nodal attacks. IEEE Commun. Mag. 52(11), 138–143 (2014)
Iyer, S., Killingback, T., Sundaram, B., Wang, Z.: Attack robustness and centrality of complex networks, Apr 2013
Chen, P.-Y., Cheng, S.-M., Chen, K.-C.: Smart attacks in smart grid communication networks. IEEE Commun. Mag. 50(8), 24–29 (2012)
Chen, P.-Y., Cheng, S.-M., Chen, K.-C.: Information fusion to defend intentional attack in internet of things. IEEE IoT J. 1(4), 337–348 (2014)
Buscarino, A., Gambuzza, L.V., Porfiri, M., Fortuna, L., Frasca, M.: Robustness to noise in synchronization of complex networks. Nature (2013)
Chen, P.-Y., Hero, A.O.: Node removal vulnerability of the largest component of a network. In: Proceedings of IEEE GlobalSIP (2013)
Chen, P.-Y., Chen, K.-C.: Information epidemics in complex networks with opportunistic links and dynamic topology. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), pp. 1–6, Dec 2010
Chen, P.-Y., Lin, H.-F., Hsu, K.-H., Cheng, S.-M.: Modeling dynamics of malware with incubation period from the view of individual. In: 79th IEEE Vehicular Technology Conference (VTC Spring), pp. 1–5, May 2014
Sarkar, C., Nambi, S.N.A.U., Prasad, R.V., Rahim, A., Neisse, R., Baldini, G.: DIAT: a scalable distributed architecture for IoT. IEEE Internet Things J. 2, 230–239 (2015)
Vijayalakshmi, A.V., Arockiam, L.: A study on security issues and challenges in IoT. Int. J. Eng. Sci. Manage. Res. (2016)
Shelby, Z., Hartke, K., Bormann, C., Frank, B.: Constrained application protocol (CoAP). In: IETF draft, January 2012
Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta, A.F.: DCapBAC: embedding authorization logic into smart things through ECC optimizations. Int. J. Comput. Math. 1–22 (2014)
Dennis, J.B., Van Horn, E.C.: Programming semantics for multiprogrammed computations. Commun. ACM 9(3), 143–155 (1966)
Crockford, D., RFC 7159: The JavaScript Object Notation (JSON) Data Interchange Format, IETF RFC 7159, March 2014. http://www.ietf.org/rfc/rfc7159.txt
Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (COAP). IETF RFC 7252, 10 (2014)
Rissanen, E.: Extensible access control markup language (XACML) version 3.0 oasis standard (2012)
Choi, S.I., Koh, S.-J.: Use of proxy mobile IPv6 for mobility management in CoAP-Based internet-of-things networks. IEEE Commun. Lett. (2016)
Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., Alexander, R.: RPL: IPv6 routing protocol for low power and lossy networks. Request for Comments (RFC): 6550, March 2012
Weber, R.H.: Internet of things: new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)
Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: Proceedings of International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648–651, March 2012
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements and future direction. Future Gener. Comput. Syst. 29, 1645–1660 (2013)
Alabaa, F.A., Othmana, M., Hashema, I.A.T., Alotaibi, F.: internet of things security: a survey, vol. 88, pp. 10–28, June 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Sundar, S., Sumathy, S. (2018). Security Stipulations on IoT Networks. In: Sangaiah, A., Thangavelu, A., Meenakshi Sundaram, V. (eds) Cognitive Computing for Big Data Systems Over IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 14 . Springer, Cham. https://doi.org/10.1007/978-3-319-70688-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-70688-7_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70687-0
Online ISBN: 978-3-319-70688-7
eBook Packages: EngineeringEngineering (R0)