Skip to main content

Comparative Analysis of Security Protocols in IoT

  • Conference paper
  • First Online:
Information, Communication and Computing Technology (ICICCT 2021)

Abstract

A comprehensive analysis has been carried out in this paper for security issues and uncertainties for the most common IoT protocols. It discusses the possible security risks and attacks outlined in protocol specifications and categorize them in detail. To provide a valuable perspective into the materialization of and effect of safety risks, these challenges were mostly analyzed in a selective manner, which consists of the assessment of various threats and vulnerabilities [1]. This paper further explores and addresses the steps and methodologies implemented in the literature to increase protection and to minimize the risks involved.

Moreover, this paper analyzes different procedures to assess whether they are susceptible to attack against confidentiality and integrity. Furthermore, the other protocols studied, apart from TLS and DTLS protocols that are not generic security procedures. With spreading of M2M communication there are many standardized communication protocol for IOT applications, the performance of these protocols can vary greatly even under the same operating conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur Appl. 38, 8–27 (2018)

    Google Scholar 

  2. Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)

    Article  Google Scholar 

  3. Kumar, N.M., Mallick, P.K.: The Internet of Things: insights into the building blocks, component interactions, and architecture layers. Proc. Comput. Sci. 1(132), 109–117 (2018)

    Article  Google Scholar 

  4. Mrabet, H., Belguith, S., Alhomoud, A., Jemai, A.: A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors 20(13), 3625 (2020)

    Article  Google Scholar 

  5. Das, A.K., Zeadally, S., He, D.: Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 89, 110–125 (2018)

    Article  Google Scholar 

  6. Sequeiros, J.B., Chimuco, F.T., Samaila, M.G., Freire, M.M., Inácio, P.R.: Attack and system modeling applied to IoT, cloud, and mobile ecosystems: embedding security by design. ACM Comput. Surv. (CSUR) 53(2), 1–32 (2020)

    Article  Google Scholar 

  7. McManus, J.: Security by design: teaching secure software design and development techniques. J. Comput. Sci. Coll. 33(3), 75–82 (2018)

    Google Scholar 

  8. Wu, X.W., Yang, E.H., Wang, J.: Lightweight security protocols for the Internet of Things. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–7 (2017)

    Google Scholar 

  9. Silva, B.N., Khan, M., Han, K.: Internet of things: A comprehensive review of enabling technologies, architecture, and challenges. IETE Tech. Rev. 35(2), 205–220 (2018)

    Article  Google Scholar 

  10. Dhanvijay, M.M., Patil, S.C.: Internet of Things: a survey of enabling technologies in healthcare and its applications. Comput. Netw. 22(153), 113–131 (2019)

    Article  Google Scholar 

  11. Sankar, S., Srinivasan, P.: Internet of things (IoT): a survey on empowering technologies, research opportunities and applications. Int. J. Pharm. Technol. 8(4), 26117–26141 (2016)

    Google Scholar 

  12. Ojo, M.O., Giordano, S., Procissi, G., Seitanidis, I.N.: A review of low-end, middle-end, and high-end IoT devices. IEEE Access 9(6), 70528–70554 (2018)

    Article  Google Scholar 

  13. Hassan, A.M., Awad, A.I.: Urban transition in the era of the internet of things: social implications and privacy challenges. IEEE Access 18(6), 36428–36440 (2018)

    Article  Google Scholar 

  14. Samaila, M.G., Neto, M., Fernandes, D.A., Freire, M.M., Inácio, P.R.: Challenges of securing Internet of Things devices: a survey. Secur. Priv. 1(2), e20 (2018)

    Article  Google Scholar 

  15. Siddiqui, T., Alazzawi, S.S.B., Khan, N.A: Generalization of IoT applications: systematic review. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. IJSRCSEIT 3(5), 688–694 (2018). ISSN 2456-3307, (Impact Factor 6.135) UGC Journal No: 64718

    Google Scholar 

  16. Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the internet of things: a standardization perspective. IEEE Internet Things J. 1(3), 265–275 (2014)

    Article  Google Scholar 

  17. Siddiqui, T., Alazzawi, S.S.B.: Comparative analysis of Internet of Things (IoT) security models. In: Luhach, A.K., Jat, D.S., Bin Ghazali, K.H., Gao, X.-Z., Lingras, P. (eds.) ICAICR 2020. CCIS, vol. 1394, pp. 186–196. Springer, Singapore (2021). https://doi.org/10.1007/978-981-16-3653-0_15

    Chapter  Google Scholar 

  18. Dey, S., Al-Qaheri, H., Sanyal. S.: Embedding secret data in HTML web page. arXiv preprint arXiv:1004.0459 (2010)

  19. Caviglione, L., Merlo, A., Migliardi, M.: Covert channels in IoT deployments through data hiding techniques. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 559–563 (2018)

    Google Scholar 

  20. Lin, Y.H., Hsia, C.H., Chen, B.Y., Chen, Y.Y.: Visual IoT security: data hiding in AMBTC images using block-wise embedding strategy. Sensors 19(9), 1974 (2019)

    Article  Google Scholar 

  21. Sridhar, S., Smys, S.: Intelligent security framework for IoT devices cryptography based end-to-end security architecture. In: 2017 International Conference on Inventive Systems and Control (ICISC), pp. 1–5 (2017)

    Google Scholar 

  22. Cabrera, C., Palade, A., Clarke, S.: An evaluation of service discovery protocols in the internet of things. In: Proceedings of the Symposium on Applied Computing, pp. 469–476 (2017)

    Google Scholar 

  23. Dizdarević, J., Carpio, F., Jukan, A., Masip, X.: A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration. ACM Comput. Surv. 51, 116 (2019)

    Article  Google Scholar 

  24. Naik N.: Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP. In: 2017 IEEE International Systems Engineering Symposium (ISSE), pp. 1–7 (2017)

    Google Scholar 

  25. Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., Alonso-Zarate, J.: A survey on application layer protocols for the internet of things. Trans. IoT Cloud Comput. 3(1), 11–17 (2015)

    Google Scholar 

  26. Seggelmann, R., Tuexen, M., Williams, M.: Transport layer security (TLS) and datagram transport layer security (DTLS) heartbeat extension. Request for Comments (RFC) 6520, 1721–2070 (2012)

    Google Scholar 

  27. Sheffer, Y., Holz, R., Saint-Andre, P.: Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS). Internet Engineering Task Force Request for Comments: 7457 (2015)

    Google Scholar 

  28. Siddiqui, T., Alazzawi, S.S.B.: Security of Internet of Things. Int. J. Appl. Sci. - Res. Rev. 5(2:8), 1–4. https://doi.org/10.21767/2394-9988.100073. ISSN 2394-9988

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alazzawi, S.S.B., Siddiqui, T. (2021). Comparative Analysis of Security Protocols in IoT. In: Bhattacharya, M., Kharb, L., Chahal, D. (eds) Information, Communication and Computing Technology. ICICCT 2021. Communications in Computer and Information Science, vol 1417. Springer, Cham. https://doi.org/10.1007/978-3-030-88378-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-88378-2_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-88377-5

  • Online ISBN: 978-3-030-88378-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics