End-Node Security

Part of the Internet of Things book series (ITTCC)


This chapter will focus on the security of end nodes. It will present a research perspective on the latest technological developments to secure constraint nodes.


Cybersecurity IoT End nodes EAP PANA IDS SDN 



This chapter includes results shared by the European research project USEIT (Grant Agreement N° 731558), which has received funding from the European Union’s Horizon 2020 Research and Innovation Programme and CHIST-ERA PCIN-2016-10.


  1. 1.
    J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of Things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRefGoogle Scholar
  2. 2.
    O. Garcia-Morchon, S. Kumar, M. Sethi, “State-of-the-art and challenges for the internet of things security.” [Online].
  3. 3.
    H. Tschofenig, Enriching bootstrapping with authorisation information. Internet-draft draft-tschofenig-enroll-bootstrapping-saml-02, internet engineering task force, 2005. Work in ProgressGoogle Scholar
  4. 4.
    J. R. Vollbrecht, B. Aboba, L. J. Blunk, H. Levkowetz, J. Carlson, “Extensible Authentication Protocol (EAP).” [Online].
  5. 5.
    “Zigbee IP and 920IP | Zigbee Alliance”Google Scholar
  6. 6.
    Y. Ohba, B. Patil, D. Forsberg, H. Tschofenig, A.E. Yegin, “Protocol for Carrying Authentication for Network Access (PANA).” [Online].
  7. 7.
    D. Garcia-Carrillo, R. Marin-Lopez, Lightweight CoAP-based bootstrapping service for the internet of things. Sensors 16(3), 358 (2016)CrossRefGoogle Scholar
  8. 8.
    Z. Shelby, K. Hartke, C. Bormann, “The Constrained Application Protocol (CoAP).” [Online].
  9. 9.
    J. Arkko, G. Zorn, V. Fajardo, J. Loughney, “Diameter Base Protocol.” [Online].
  10. 10.
    S. Willens, A.C. Rubens, C. Rigney, W.A. Simpson, “Remote Authentication Dial In User Service (RADIUS).” [Online].
  11. 11.
    F. Bersani, H. Tschofenig, “The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method.” [Online].
  12. 12.
    “The EAP TLS Authentication Protocol.” [Online].
  13. 13.
    A. D. <>, “The Network Access Identifier.” [Online].
  14. 14.
    B. Aboba, H. Levkowetz, D. Simon, P. Eronen, “Extensible Authentication Protocol (EAP) Key Management Framework.” [Online].
  15. 15.
    IEEE Standard for Low-Rate Wireless Networks, IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011) (2016), pp. 1–709Google Scholar
  16. 16.
    IEEE Recommended Practice for Transport of Key Management Protocol (KMP) Datagrams, IEEE Std 802.15.9-2016 (2016), pp. 1–74Google Scholar
  17. 17.
    P.M. Sanchez, R.M. Lopez, A.F.G. Skarmeta, PANATIKI: a network access control implementation based on PANA for IoT devices. Sensors 13(11), 14888–14917 (2013)CrossRefGoogle Scholar
  18. 18.
    K.M. Sharmilee, R. Mukesh, A. Damodaram, V. Subbiah Bharathi, “Secure WBAN using rule-based IDS with biometrics and MAC authentication,” HealthCom 2008-10th International Conference on e-health Networking (Applications and Services, Singapore, 2008), pp. 102–107Google Scholar
  19. 19.
    M. Gmiden, M.H. Gmiden, H. Trabelsi, “An intrusion detection method for securing in-vehicle CAN bus,” 2016 17th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), Sousse, 2016, pp. 176–180Google Scholar
  20. 20.
    G. Liang, S.R. Weller, J. Zhao, F. Luo, Z.Y. Dong, The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans Power Syst 32(4), 3317–3318 (2017)CrossRefGoogle Scholar
  21. 21.
    E. Ronen, A. Shamir, A.O. Weingarten, C. O’Flynn, IoT goes nuclear: creating a ZigBee chain reaction. IEEE Symp. Secur. Privacy 2017, 195–212 (2017)Google Scholar
  22. 22.
    S. Shin, T. Kwon, G.Y. Jo, Y. Park, H. Rhy, An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. IEEE Trans: Indust. Informat. 6(4), 744–757 (2010)Google Scholar
  23. 23.
    R. Roman, J. Zhou, J. Lopez. “Applying intrusion detection systems to wireless sensor networks,” In Proceedings of IEEE Consumer Communications and Networking Conference (CCNC'06), Las Vegas, USA, 2006, pp. 640-644Google Scholar
  24. 24.
    K. Ioannis et al., Toward intrusion detection in sensor networks (13th European Wireless Conference, Paris, 2007)Google Scholar
  25. 25.
    M. Bahria, A. Olivereau, A. Boudguiga, A hybrid threat detection and security adaptation system for industrial wireless sensor networks, in Self-Organizing Systems, (Springer, Berlin, Heidelberg, 2014), pp. 157–162CrossRefGoogle Scholar
  26. 26.
    C.V. Zhou, C. Leckie, S. Karunasekera, A survey of coordinated attacks and collaborative intrusion detection. Comput. Secur. 29(1), 124–140 (2010)CrossRefGoogle Scholar
  27. 27.
    C. Xenakis, C. Panos, I. Stavrakakis, A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Comput. Secur. 30(1), 63–80 (2011)CrossRefGoogle Scholar
  28. 28.
    S. Raza, L. Wallgren, T. Voigt, SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661–2674 (2013)CrossRefGoogle Scholar
  29. 29.
    P. Kasinathan, C. Pastrone, M.A. Spirito, M. Vinkovits, Denial-of-Service detection in 6LoWPAN based internet of things. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference (IEEE, New York, 2013), pp. 600–607Google Scholar
  30. 30.
    C. Liu, J. Yang, Y. Zhang, R. Chen, J. Zeng, Research on immunity-based intrusion detection technology for the Internet of Things. In Natural Computation (ICNC), 2011 Seventh International Conference, vol 1 (IEEE, New York, 2011), pp. 212–216Google Scholar
  31. 31.
    C. Jun, C. Chi, Design of complex event-processing IDS in internet of things. In Measuring Technology and Mechatronics Automation (ICMTMA), 2014 Sixth International Conference (IEEE, New York, 2014), pp. 226–229Google Scholar
  32. 32.
    A. Gupta, O.J. Pandey, M. Shukla, A. Dadhich, S. Mathur, A. Ingle, “Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks”, 2013 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (IEEE, New York, 2013), pp. 1–7Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.University of MurciaMurciaSpain
  2. 2.CEAGif-sur-YvetteFrance

Personalised recommendations