Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security of the Internet of Things: perspectives and challenges

Similar presentations


Presentation on theme: "Security of the Internet of Things: perspectives and challenges"— Presentation transcript:

1 Security of the Internet of Things: perspectives and challenges
Qi Jing, Athanasio V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu Wireless Networks (2014)

2 Contents Introduction Security architecture of IoT
Security issues analysis of IoT Security issues comparison between IoT and traditional network Open security issues of IoT

3 Introduction Internet of Things (IoT) is widely applied to social life applications - smart grid, intelligent transportation, smart security, and smart home If it cannot ensure the security of personal privacy, private information may be leaked In this paper, they focused on security problems

4 Security architecture of IoT

5 Security issues analysis of IoT
Perception layer - RFID - WSN - RSN Transportation layer - access network - core network - local area network Application layer - application support layer - IoT application

6 Perception layer Perception node - sensors or controllers
Perception network - communicates with transportation network Security issues - RFID - WSN - RSN

7 RFID security Issue: uniform coding - currently there is no uniform international encoding standard for RFID tag Solution: uniform encoding - UID (Universal Identification) by Japan - EPC (Electronic Product Code) by European

8 RFID security Issue: conflict collision - tags’ collision - readers’ collision [32] Solution: - anti-collision algorithm for tags’ collision - scope-based and physical-based schemes for readers’ collision [33, 34] Tags’ collision: a large number of labels are in the reader’s working scope, and the reader cannot access to data correctly Readers’ collision: the working scope of reader overlaps Currently, tag anti-collision algorithm has been studied adequately, but research for reader anti-collision algorithm is not enough

9 RFID security Issue: RFID privacy protection - RFID has limited resources, thus it requires light-weight solutions for data privacy and location privacy Solution: - physical-based schemes [36-40] - password-based schemes [41-45] - compromising solution Physical-based: deactivation kill command, block tags, clip tags, pseudonyms tags, Faraday nets, signal interference, and antenna energy analysis Password-based: hash locks, random hash lock, hash chain, anonymous ID, re-encryption Compromising solution: store less important information in RFID tag, and store important information in the up level service

10 RFID security Issue: trust management - trust management exists not only just between the readers and RFID tags, but also between the readers and the base stations Complexity of security and limited resources of RFID tags would be the focus of ongoing research

11 WSN security Issue: cryptographic algorithms - data security with limited computing power and storage space Solution: - symmetric encryption: confidentiality problem of key and inconvenient digital signatures and message authentication [50] - public-key encryption: Rabin’s scheme, NtruEncrypt, and Elliptic Curve Cryptography Because resources of sensor nodes are limited, asymmetric encryption algorithm is difficult to be applied to WSN Symmetric encryption algorithm is widely used in WSN because of its simple calculation and small amount of calculation but it has problems of~

12 WSN security Issue: key management - key distribution, including the distribution of the public key and the secret key, is to ensure key to be transported and distributed securely to legitimate users Key distribution schemes - key broadcast distribution [56-60] - group key distribution [61-63] - distribution of node master key - distribution of the key shared between nodes [64-68]

13 WSN security Issue: secure routing protocol - attacks towards routing protocol will lead directly to the collapse of the network - traditional network routing protocols cannot be applied in wireless sensor network Secure routing protocols designed specifically for wireless sensor network [75] Since the limitation of power, computing ability and storage capacity

14 WSN security Issue: trust management - limited resources, easy capture of nodes, and unique communication mode - need to introduce trust management mechanism to ensure the security of WSN Particularly necessaries - update of trust - cooperation of all nodes - tradeoff between limited resources and network security

15 RSN security Issue: heterogeneous integration technology - RSN (RFID sensor network) can solve the problem caused by heterogeneous data Solution: unified data encoding standard and item information exchange protocol for RFID and WSNs

16 RSN security Four common integration methods [84]
Tag integrated with sensor node, tag integrated with wireless sensor node, readers integrated with wireless sensor node, and the wireless device, combination of RFID and sensor node

17 Transportation layer Transportation layer mainly provides ubiquitous access environment for perception layer Transportation layer - access network - core network - local area network

18 Access network WiFi security issues: phishing site [88, 89], access attacks, malicious AP, and DDos/Dos attack Solution: access control and network encryption technologies - WPA, encryption, and authentication technology

19 Access network Ad hoc security issues and solutions - illegal node access security >> authorization and authentication - data security >> authentication and key management mechanism [87] - network routing security (DDos/Dos) >> encryption mechanisms

20 Access network 3G network security issues: user information leakage, data incompleteness, unlawful attacks, etc Solution: key management mechanism, data origin authentication, and data encryption - but the current security mechanisms are still in the research stage [95-99]

21 Core network Issue: large number of nodes to access the Internet
Solution: 6LowPAN technology [ ] - use IPv6 to provide IP in sensor network - low power consumption for heterogeneous integration - characteristics: >> PHY and MAC layer: IEEE >> transportation layer: IPv6 protocol Adaptation layer is an intermediate layer between IPv6 network and IEEE MAC layer

22 LAN Issue: data leakage and server’s independent protection security
Solution: - main strategy >> network access control - others >> denial of malicious code, closing or deleting unnecessary system services, and constantly updating the operating system patches

23 Application layer Application support layer - issue: insecure data, service interruption, and attack issue - solution: data isolation/recovery, supervision capability: enhance management

24 Application layer IoT application - issue: application layer security is application related, so its security issues cannot be solved in other IoT layers - examples >> intelligent transportation >> smart home Access control, user authorization, privacy protection, platform monitoring, etc

25 IoT vs. traditional network
Composition RFID and WSN nodes PC, servers, smart phones Resource Limited Rich Connection Slow, less secure wireless media Fast, more secure wire or wireless Operating system No Window, Unix-like Data formats Heterogeneous data formats Same

26 Open security issues of IoT
Overall security architecture for the entire IoT system - abstract security architecture Lightweight security solutions - limited resources of IoT Efficient solutions for massive heterogeneous data - idea from big data


Download ppt "Security of the Internet of Things: perspectives and challenges"

Similar presentations


Ads by Google