Skip to main content

Advertisement

Log in

Security Standards and Measures for Massive IoT in the 5G Era

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

With the development of 5G technology, Internet of Things (IoT) is proliferating and deeply integrated with our daily lives and industry productions. IoT applications in the 5G era generate massive connections, and this would bring about many security issues. In this paper, we first analyze security risks for massive IoT in the 5G era, then summarize related security policies and standards. Furthermore, we propose security requirements and measures for various layers, including sensor control equipment and IoT card, IoT network and transmission exchange, IoT business application and service, and IoT security management and operation. Next, we introduce the case of the cyber security monitoring platform, explain the security technology based on edge computing, and point out the related standards. Finally, we put forward suggestions on IoT security technology and standardization work, so as to promote the secure development of IoT in the 5G era.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Schulz P, Matthe M, Klessig H (2017) Latency critical IoT applications in 5G: perspective on the Design of Radio Interface and Network Architecture. IEEE Commun Mag 55(2):70–78

    Article  Google Scholar 

  2. Qiu Q, Du XT, Yu SQ et al (2020) Research on IoT security technology and standardization in the 5G era. International conference on security and privacy in new computing environments, pp. 77–90

  3. Ahmad I, Kumar T, Liyanage M et al (2018) Overview of 5G security challenges and solutions. IEEE Commun Std Mag 2(1):36–43

    Article  Google Scholar 

  4. Ahmad I, Kumar T, Liyanage M et al (2017) 5G security: analysis of threats and solutions. In: IEEE conference on standards for communications and networking (CSCN). IEEE Press

  5. Huang Q, Yang C (2011) A lightweight RFID authenticate protocol based on smart SIM card. In: Proceedings of the 1st international conference on logistics, informatics and service science, pp 647–650. IEEE Press

  6. He R, Zhao G, Chang C et al (2009) A PK-SIM card based end-to-end security framework for SMS. Comput Std Interfaces 31(4):629–641

    Article  Google Scholar 

  7. Liu SL, Qiu Q, Zhao B et al (2020) 5G-based IoT security technology. In: Proceedings of 5G network innovation seminar, pp 119–123

  8. TC 260 (2019) Communication security standards working group. White paper on Internet of Things security standardization

  9. Neisse R, Steri G, Baldini G (2014) Enforcement of security policy rules for the Internet of Things. In: The 3rd international workshop on internet of things communications and technologies (IoT-CT), IEEE Press

  10. Ministry of industry and information technology: accelerate the development of 5G and Internet of Things related industries, http://www.sohu.com/a/339209778_166680

  11. Cao J, Yu P, Ma M et al (2019) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6(2):1561–1575

    Article  Google Scholar 

  12. Popovski P, Trillingsgaard KF, Simeone O et al (2018) 5G wireless network slicing for eMBB, URLLC, and mMTC: a communication-theoretic view. IEEE Access 6:55765–55779

    Article  Google Scholar 

  13. Bockelmann C, Pratas NK, Wunder G et al (2018) Towards massive connectivity support for scalable mMTC communications in 5G networks. IEEE Access 6:28969–28992

    Article  Google Scholar 

  14. Chakrapani A (2017) Efficient resource scheduling for eMTC/NB-IoT communications in LTE Rel. 13. In: IEEE conference on standards for communications and networking (CSCN), pp 66–71. IEEE Press

  15. ISO/IEC (2012) ISO/IEC 29192 Information Technology - Security Techniques - Lightweight Cryptography

  16. ISO/IEC (2018) ISO/IEC 30141 Information Technology - Internet of Things Reference Architecture

  17. Kafle V, Fukushima Y, Harai H (2016) Internet of Things standardization in ITU and prospective networking technologies. IEEE Commun Mag 54(9):43–49

    Article  Google Scholar 

  18. ETSI (2019) ETSI releases first globally applicable standard for consumer IoT security. China Standardization

  19. Sheng Z, Yang S, Yu Y et al (2016) A survey on the IETF protocol suite for the Internet of Things: standards, challenges, and opportunities. IEEE Wirel Commun 20(6):91–98

    Article  Google Scholar 

  20. GB/T (2018) GB/T 37044-2018. Information Security Technology- Security Reference Model and Generic Requirements for Internet of Things

  21. GB/T (2019) GB/T 22239–2019. Information Security Technology - Baseline for Classified Protection of Cybersecurity

  22. YD/T (2012) YD/T 2437-2012. General Framework and Technical Requirements of IoT (Internet of Things)

  23. YD/T (2018) YD/T 3331-2018. General Requirement for Cellular Narrowband Radio Access for Internet of Things (NB-IoT)

  24. Lu H, Chen D, Fan B, Wang Y, Wu Y (2018) Standardization progress and case analysis of edge computing. J Comput Res Dev 55(3):487–511

    Google Scholar 

  25. ISO/IEC (2018) ISO/IEC 30141:2018. Internet of Things (IoT) - Reference Architecture

  26. Wang D, Wang P, Wang C (2019) Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs. ACM Trans Cyber-Phys Syst. https://doi.org/10.1145/3325130(2019)

    Article  Google Scholar 

  27. Wang C, Wang D, Tu Y, Xu G, Wang H (2020) Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans Depend Secure Comput. https://doi.org/10.1109/TDSC.2020.2974220

    Article  Google Scholar 

  28. Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inf 14(9):4081–4092

    Article  Google Scholar 

  29. Xi Z, Qixuan Z (2018) Hierarchical caching for statistical QoS guaranteed multimedia transmissions over 5G edge computing mobile wireless networks. IEEE Wirel Commun 25(3):12–20

    Article  Google Scholar 

  30. Li F, Chen J, Wang Z (2019) Wireless map reduce distributed computing. IEEE Trans Inf Theory 65(10):6101–6114

    Article  MATH  Google Scholar 

  31. Cordelli E, Pennazza G, Sabatini M et al (2018) An open-source smart sensor architecture for edge computing in IoT applications

  32. Burg A, Chattopadhyay A, Lam K (2018) Wireless communication and security issues for cyber-physical systems and the Internet-of-Things. Proc IEEE 106(1):38–60

    Article  Google Scholar 

  33. Granjal J, Monteiro E, Silva J (2015) Security for the Internet of Things: A survey of existing protocols and open research issues IEEE Communications Surveys & Tutorials. IEEE Press

    Google Scholar 

  34. Alnoman A, Sharma SK, Ejaz W et al (2019) Emerging edge computing technologies for distributed IoT systems. IEEE Netw 99:1–8

    Google Scholar 

  35. Cai H, Xu L, Xu B et al (2014) IoT-Based configurable information service platform for product lifecycle management. IEEE Trans Ind Inf 10(2):1558–1567

    Article  Google Scholar 

  36. Zhang K, Ni J, Yang K et al (2017) Security and privacy in smart city applications: challenges and solutions. IEEE Commun Mag 55(1):122–129

    Article  Google Scholar 

  37. Song Y, Yau S, Yu R et al (2017) An approach to QoS-based task distribution in edge computing networks for IoT applications. In: IEEE international conference on edge computing. IEEE

  38. Li J, Yu F, Deng G et al (2017) Industrial Internet: A Survey on the enabling technologies, applications, and challenges. IEEE Communications Surveys & Tutorials. IEEE Press

    Google Scholar 

  39. Joy J, Gerla M (2017) Internet of vehicles and autonomous connected car - privacy and security issues. In: International conference on computer communication & networks. IEEE Press

  40. Li H, Ota K, Dong M (2018) Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE Netw 32(1):96–101

    Article  Google Scholar 

  41. Gusev M, Dustdar S (2018) Going back to the roots—the evolution of edge computing. An IoT perspective. IEEE Internet Comput 22(2):5–15

    Article  Google Scholar 

  42. Qiu T, Lu Y, Xia F et al (2016) ERGID: an efficient routing protocol for emergency response Internet of Things. J Netw Comput Appl 72:104

    Article  Google Scholar 

  43. Rongrong X, Xiaochun Y, Zhiyu H (2019) Framework for risk assessment in cyber situational awareness. IET Inf Secur 13(2):149–156

    Article  Google Scholar 

  44. Norrman K, Dubrova E (2016) Protecting IMSI and user privacy in 5G networks. In: EAI international conference on mobile multimedia communications. ICST

  45. Li S, Xu L, Zhao S (2018) 5G internet of things: a survey. J Ind Inf Integr 10:1–9

    Google Scholar 

  46. Singh S, Sharma PK, Moon SY et al (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Hum Comput 4:1–18

    Google Scholar 

  47. Alizadeh M, Hassan WH, Zamani M et al (2013) Implementation and evaluation of lightweight encryption algorithms suitable for RFID. J Next Gen Inf Technol 4:65

    Google Scholar 

  48. An-Ping L, Ji-Min Y, Feng LI et al (2014) A comparative study of several lightweight encryption algorithms. Mod Electron Tech

  49. Wang D, Wang P (2018) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Depend Secure Comput 15(4):708–722

    Google Scholar 

  50. Sivanathan A, Gharakheili H, Sivaraman V (2020) Managing IoT cyber-security using programmable telemetry and machine learning. IEEE Trans Netw Serv Manage 17(1):60–74

    Article  Google Scholar 

  51. Bertino E (2020) IoT security a comprehensive life cycle framework. In: 2019 IEEE 5th international conference on collaboration and internet computing (CIC)

  52. Rathore M, Ahmad A, Paul A et al (2016) Real-time medical emergency response system: exploiting IoT and big data for public health. J Med Syst 40(12):283

    Article  Google Scholar 

  53. Roman R, Lopez J, Mambo M (2018) Mobile edge computing, Fog et al. A survey and analysis of security threats and challenges. Fut Gen Comput Syst 78(2):680-698.

    Article  Google Scholar 

  54. Pahl C, Ioini NE, Helmer S (2018) A decision framework for blockchain platforms for IoT and edge computing. In: International confernce on internet of things, big data & security

  55. Li R, Zhou Z, Chen X et al (2019) Resource price-aware offloading for edge-cloud collaboration: a two-timescale online control approach. IEEE Trans Cloud Comput 99:1–1

    Article  Google Scholar 

  56. Han Q, Yang S, Ren X et al (2020) Online learning for edge-cloud collaborative learning on heterogeneous edges with resource constraints. IEEE Commun Mag 58(5):49–55

    Article  Google Scholar 

Download references

Acknowledgements

The authors thank the anonymous reviewers for their invaluable comments. Ding Wang is the corresponding author. This paper was presented in part at the Proceeding of 3rd EAI International Conference on Security and Privacy in New Computing Environments (SPNCE 2020). This work is in part supported by Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ding Wang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qiu, Q., Wang, D., Du, X. et al. Security Standards and Measures for Massive IoT in the 5G Era. Mobile Netw Appl 27, 392–403 (2022). https://doi.org/10.1007/s11036-021-01841-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-021-01841-2

Keywords

Navigation