Abstract
A comprehensive analysis has been carried out in this paper for security issues and uncertainties for the most common IoT protocols. It discusses the possible security risks and attacks outlined in protocol specifications and categorize them in detail. To provide a valuable perspective into the materialization of and effect of safety risks, these challenges were mostly analyzed in a selective manner, which consists of the assessment of various threats and vulnerabilities [1]. This paper further explores and addresses the steps and methodologies implemented in the literature to increase protection and to minimize the risks involved.
Moreover, this paper analyzes different procedures to assess whether they are susceptible to attack against confidentiality and integrity. Furthermore, the other protocols studied, apart from TLS and DTLS protocols that are not generic security procedures. With spreading of M2M communication there are many standardized communication protocol for IOT applications, the performance of these protocols can vary greatly even under the same operating conditions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur Appl. 38, 8–27 (2018)
Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)
Kumar, N.M., Mallick, P.K.: The Internet of Things: insights into the building blocks, component interactions, and architecture layers. Proc. Comput. Sci. 1(132), 109–117 (2018)
Mrabet, H., Belguith, S., Alhomoud, A., Jemai, A.: A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors 20(13), 3625 (2020)
Das, A.K., Zeadally, S., He, D.: Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 89, 110–125 (2018)
Sequeiros, J.B., Chimuco, F.T., Samaila, M.G., Freire, M.M., Inácio, P.R.: Attack and system modeling applied to IoT, cloud, and mobile ecosystems: embedding security by design. ACM Comput. Surv. (CSUR) 53(2), 1–32 (2020)
McManus, J.: Security by design: teaching secure software design and development techniques. J. Comput. Sci. Coll. 33(3), 75–82 (2018)
Wu, X.W., Yang, E.H., Wang, J.: Lightweight security protocols for the Internet of Things. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–7 (2017)
Silva, B.N., Khan, M., Han, K.: Internet of things: A comprehensive review of enabling technologies, architecture, and challenges. IETE Tech. Rev. 35(2), 205–220 (2018)
Dhanvijay, M.M., Patil, S.C.: Internet of Things: a survey of enabling technologies in healthcare and its applications. Comput. Netw. 22(153), 113–131 (2019)
Sankar, S., Srinivasan, P.: Internet of things (IoT): a survey on empowering technologies, research opportunities and applications. Int. J. Pharm. Technol. 8(4), 26117–26141 (2016)
Ojo, M.O., Giordano, S., Procissi, G., Seitanidis, I.N.: A review of low-end, middle-end, and high-end IoT devices. IEEE Access 9(6), 70528–70554 (2018)
Hassan, A.M., Awad, A.I.: Urban transition in the era of the internet of things: social implications and privacy challenges. IEEE Access 18(6), 36428–36440 (2018)
Samaila, M.G., Neto, M., Fernandes, D.A., Freire, M.M., Inácio, P.R.: Challenges of securing Internet of Things devices: a survey. Secur. Priv. 1(2), e20 (2018)
Siddiqui, T., Alazzawi, S.S.B., Khan, N.A: Generalization of IoT applications: systematic review. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. IJSRCSEIT 3(5), 688–694 (2018). ISSN 2456-3307, (Impact Factor 6.135) UGC Journal No: 64718
Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the internet of things: a standardization perspective. IEEE Internet Things J. 1(3), 265–275 (2014)
Siddiqui, T., Alazzawi, S.S.B.: Comparative analysis of Internet of Things (IoT) security models. In: Luhach, A.K., Jat, D.S., Bin Ghazali, K.H., Gao, X.-Z., Lingras, P. (eds.) ICAICR 2020. CCIS, vol. 1394, pp. 186–196. Springer, Singapore (2021). https://doi.org/10.1007/978-981-16-3653-0_15
Dey, S., Al-Qaheri, H., Sanyal. S.: Embedding secret data in HTML web page. arXiv preprint arXiv:1004.0459 (2010)
Caviglione, L., Merlo, A., Migliardi, M.: Covert channels in IoT deployments through data hiding techniques. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 559–563 (2018)
Lin, Y.H., Hsia, C.H., Chen, B.Y., Chen, Y.Y.: Visual IoT security: data hiding in AMBTC images using block-wise embedding strategy. Sensors 19(9), 1974 (2019)
Sridhar, S., Smys, S.: Intelligent security framework for IoT devices cryptography based end-to-end security architecture. In: 2017 International Conference on Inventive Systems and Control (ICISC), pp. 1–5 (2017)
Cabrera, C., Palade, A., Clarke, S.: An evaluation of service discovery protocols in the internet of things. In: Proceedings of the Symposium on Applied Computing, pp. 469–476 (2017)
Dizdarević, J., Carpio, F., Jukan, A., Masip, X.: A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration. ACM Comput. Surv. 51, 116 (2019)
Naik N.: Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP. In: 2017 IEEE International Systems Engineering Symposium (ISSE), pp. 1–7 (2017)
Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., Alonso-Zarate, J.: A survey on application layer protocols for the internet of things. Trans. IoT Cloud Comput. 3(1), 11–17 (2015)
Seggelmann, R., Tuexen, M., Williams, M.: Transport layer security (TLS) and datagram transport layer security (DTLS) heartbeat extension. Request for Comments (RFC) 6520, 1721–2070 (2012)
Sheffer, Y., Holz, R., Saint-Andre, P.: Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS). Internet Engineering Task Force Request for Comments: 7457 (2015)
Siddiqui, T., Alazzawi, S.S.B.: Security of Internet of Things. Int. J. Appl. Sci. - Res. Rev. 5(2:8), 1–4. https://doi.org/10.21767/2394-9988.100073. ISSN 2394-9988
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Alazzawi, S.S.B., Siddiqui, T. (2021). Comparative Analysis of Security Protocols in IoT. In: Bhattacharya, M., Kharb, L., Chahal, D. (eds) Information, Communication and Computing Technology. ICICCT 2021. Communications in Computer and Information Science, vol 1417. Springer, Cham. https://doi.org/10.1007/978-3-030-88378-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-88378-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-88377-5
Online ISBN: 978-3-030-88378-2
eBook Packages: Computer ScienceComputer Science (R0)