Skip to main content

Internet of Things Security and Privacy

  • Chapter
  • First Online:
Internet of Things from Hype to Reality

Abstract

This chapter focuses on defining the key IoT security and privacy requirements. A three-domain IoT architecture is considered in the analysis where we analyze the attacks targeting the cloud domain, the fog domain, and the sensing domain. The analysis describes how the different attacks at each domain work and what defensive countermeasures can be applied to prevent, detect, or mitigate those attacks. The chapter ends by providing some future directions for IoT security and privacy that include fog domain security, collaborative defense, lightweight cryptography, lightweight network security protocols, and digital forensics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D. Willis, A. Dasgupta, S. Banerjee, Paradrop: a multi-tenant platform for dynamically installed third party services on home gateways, in SIGCOMM workshop on distributed cloud computing, (ACM, New York, NY, 2014)

    Google Scholar 

  2. W. Xu et al., Jamming sensor networks: attack and defense strategies. Network IEEE 20(3), 41–47 (2006)

    Article  Google Scholar 

  3. W. Ye, J. Heidemann, D. Estrin, Medium access control with coordinated adaptive sleeping for wireless sensor networks. Networking, IEEE/ACM Transactions 12(3), 493–506 (2004)

    Article  Google Scholar 

  4. T. Van Dam, and K. Langendoen, An adaptive energy-efficient MAC protocol for wireless sensor networks. in Proceedings of the 1st international conference on Embedded networked sensor systems, ACM, 2003

    Google Scholar 

  5. K.P. Dyer, et al., Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. in Security and Privacy (SP), 2012 IEEE Symposium, IEEE, 2012

    Google Scholar 

  6. J. Park, et al., An Energy-Efficient Selective Forwarding Attack Detection Scheme Using Lazy Detection in Wireless Sensor Networks. in Ubiquitous Information Technologies and Applications, (Springer, The Netherlands, 2013), pp. 157–164

    Chapter  Google Scholar 

  7. L.K. Bysani, and A.K. Turuk, A survey on selective forwarding attack in wireless sensor networks. in Devices and Communications (ICDeCom), 2011 International Conference, IEEE, 2011

    Google Scholar 

  8. B. Xiao, B. Yu, C. Gao, CHEMAS: Identify suspect nodes in selective forwarding attacks. J. Parallel Distrib. Comput. 67(11), 1218–1230 (2007)

    Article  Google Scholar 

  9. P. Thulasiraman, S. Ramasubramanian, and M. Krunz, Disjoint multipath routing to two distinct drains in a multi-drain sensor network. in INFOCOM 2007. 26th IEEE International Conference on Computer Communications, IEEE, 2007

    Google Scholar 

  10. H.-M. Sun, C.-M. Chen, and Y.-C. Hsiao, An efficient countermeasure to the selective forwarding attack in wireless sensor networks. in TENCON 2007–2007 IEEE Region 10 Conference, IEEE, 2007

    Google Scholar 

  11. A. Grau, Can you trust your fridge? Spectrum, IEEE 52(3), 50–56 (2015)

    Article  Google Scholar 

  12. C. Li, A. Raghunathan, and N. K. Jha, Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. in e-Health Networking Applications and Services (Healthcom), 2011 13th IEEE International Conference, IEEE, 2011

    Google Scholar 

  13. D. Evans, The internet of things how the next evolution of the internet is changing everything. Technical report, CISCO IBSG, 2011

    Google Scholar 

  14. R. Thomas, et al., Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. in Proceedings of the 16th ACM conference on Computer and communications security, ACM, 2009

    Google Scholar 

  15. M. Dabbagh, B. Hamdaoui, M. Guizai and A. Rayes, Release-time aware VM placement. in Globecom Workshops (GC Wkshps), (2014), pp. 122–126

    Google Scholar 

  16. M. Dabbagh, B. Hamdaoui, M. Guizani, A. Rayes, Toward energy-efficient cloud computing: Prediction, consolidation, and overcommitment. Network, IEEE 29(2), 56–61 (2015)

    Article  Google Scholar 

  17. M. Dabbagh, B. Hamdaoui, M. Guizani, A. Rayes, Efficient datacenter resource utilization through cloud resource overcommitment, in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2015, pp. 330–335

    Google Scholar 

  18. R. Boutaba, Q. Zhang, and M. Zhani, Virtual Machine Migration in Cloud Computing Environments: Benefits, Challenges, and Approaches. in Communication Infrastructures for Cloud Computing, ed. by H. Mouftah and B. Kantarci (IGI-Global, Hershey PA, 2013), pp. 383–408

    Google Scholar 

  19. D. Perez-Botero, A Brief Tutorial on Live Virtual Machine Migration from a Security Perspective, University of Princeton, Princeton, 2011

    Google Scholar 

  20. W. Zhang, et al., Performance degradation-aware virtual machine live migration in virtualized servers. in International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), 2012

    Google Scholar 

  21. V. Venkatanathan, T. Ristenpart, and M. Swift, Scheduler-based defenses against cross-VM side-channels. Usenix Security, (2014)

    Google Scholar 

  22. T. Kim, M. Peinado, and G. Mainar-Ruiz, Stealthmem: System-level protection against cache-based side channel attacks in the cloud. in Proceedings of USENIX Conference on Security Symposium, Security’12. USENIX Association, 2012

    Google Scholar 

  23. H. Raj, R. Nathuji, A. Singh, and P. England, Resource management for isolation enhanced cloud services. in Proceedings of the 2009 ACM workshop on Cloud computing security, ACM, 2009, pp. 77–84

    Google Scholar 

  24. Y. Zhang and M. K. Reiter, Duppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud. in Proceedings of the 2013 ACM SIGSAC Conference on Computer; Communications Security, CCS ‘13. ACM, 2013

    Google Scholar 

  25. P. Li, D. Gao, and M. K. Reiter, Mitigating access driven timing channels in clouds using stop-watch. in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013, pp. 1–12

    Google Scholar 

  26. R. Martin, J. Demme, and S. Sethumadhavan, Timewarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate sidechannel attacks, in Proceedings of the 39th Annual International Symposium on Computer Architecture, 2012

    Google Scholar 

  27. F. Zhou et al., Scheduler vulnerabilities and coordinated attacks in cloud computing. in 10th IEEE International Symposium on Network Computing and Applications (NCA), 2011

    Google Scholar 

  28. K. Panagiotis, and M. Bora, Cloud security tactics: Virtualization and the VMM. in Application of information and communication technologies (AICT), 2012 6th International Conference. IEEE, 2012

    Google Scholar 

  29. F. Zhang et al., CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. in Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, ACM, 2011

    Google Scholar 

  30. T. Taleb, A. Ksentini, Follow me cloud: interworking federated clouds and distributed mobile networks. IEEE Network 27, 12 (2013)

    Article  Google Scholar 

  31. E. Damiani et al., A reputation-based approach for choosing reliable resources in peer-to-peer networks. in Proceedings of the 9th ACM conference on computer and communications security. ACM, 2002

    Google Scholar 

  32. W. Itani et al., Reputation as a Service: A System for Ranking Service Providers in Cloud Systems. in Security, Privacy and Trust in Cloud Systems. (Springer, Berlin Heidelberg, 2014). pp. 375–406

    Chapter  Google Scholar 

  33. J. Sahoo, M. Subasish, and L. Radha, Virtualization: A survey on concepts, taxonomy and associated security issues. in Second International Conference on Computer and Network Technology (ICCNT), 2010

    Google Scholar 

  34. S.Yi, Q. Zhengrui, and L. Qun, Security and privacy issues of fog computing: A survey. in Wireless Algorithms, Systems, and Applications, (Springer International Publishing, 2015), pp. 685–695

    Chapter  Google Scholar 

  35. E. Oriwoh, J. David, E. Gregory, and S. Paul, Internet of things forensics: Challenges and approaches. in 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), IEEE, 2013, pp. 608–615

    Google Scholar 

  36. Z. Brakerski, V. Vinod, Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput. 43(2), 831–871 (2014)

    Article  MathSciNet  Google Scholar 

  37. E. Lauter, Practical applications of homomorphic encryption. in Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, ACM, 2012

    Google Scholar 

  38. C. Hennebert, D. Jessye, Security protocols and privacy issues into 6lowpan stack: A synthesis. Internet of Things Journal IEEE 1(5), 384–398 (2014)

    Article  Google Scholar 

  39. Daily Tech Blogs On Line, http://www.dailytech.com/Five+Charged+in+Largest+Financial+Hacking+Case+in+US+History/article32050.htm

  40. M. Miller, Car hacking’ just got real: In experiment, hackers disable SUV on busy highway (The Washington Post, 2015), online: http://www.washingtonpost.com/news/morning-mix/wp/2015/07/22/car-hacking-just-got-real-hackers-disable-suv-on-busy-highway/

  41. 2015 Data Breach Investigation Report, Verizon Incorporation (2015)

    Google Scholar 

  42. M. Dabbagh et al., Fast dynamic internet mapping. Futur. Gener. Comput. Syst. 39, 55–66 (2014)

    Article  Google Scholar 

  43. Forrester, Security: The Vital Element of the Internet of Things, 2015, online: http://www.cisco.com/web/solutions/trends/iot/vital-element.pdf

  44. F. Adib and D. Katabi, See through walls with WiFi!, vol. 43. (ACM, 2013)

    Google Scholar 

  45. S. Kumar, S. Gil, D. Katabi, and D. Rus, Accurate indoor localization with zero start-up cost, in Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, ACM, 2014, pp. 483–494

    Google Scholar 

  46. G. Wang, Y. Zou, Z. Zhou, K. Wu, and L. Ni, We can hear you with Wi-Fi!, in Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, ACM, 2014, pp. 593–604

    Google Scholar 

  47. Y. Qiao, O. Zhang, W. Zhou, K. Srinivasan, and A. Arora, PhyCloak: Obfuscating sensing from communication signals, in Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2016

    Google Scholar 

  48. T. Yu, et al., Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things, Proceedings of the 14th ACM Workshop on Hot Topics in Networks, 2015

    Google Scholar 

  49. M. Dabbagh, B. Hamdaoui, M. Guizani, A. Rayes, Software-defined networking security: pros and cons. IEEE Commun. Mag. 53, 73 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rayes, A., Salam, S. (2022). Internet of Things Security and Privacy. In: Internet of Things from Hype to Reality. Springer, Cham. https://doi.org/10.1007/978-3-030-90158-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-90158-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-90157-8

  • Online ISBN: 978-3-030-90158-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics