Gulzar 2019
Gulzar 2019
Gulzar 2019
Taxonomy
Maria Gulzar, Ghulam Abbas
Faculty of Computer Sciences and Egineering,
GIK Institute of Engineering Sciences and Technology,
Topi 23640, Pakistan.
{u2016212; abbasg}@giki.edu.pk
Abstract—The Internet of Things (IoT) regulates millions of customer facing and strategizes increased productivity both
terabytes of data for everyday commercial, industrial, in terms of economy and the environment [8]. Cisco predicts
technical and personal usage. Considered as the greatest a total of 50 billion connected things and 200 billion
technological revolution, all IoT-based transformations are intermittent subsystems by 2020. Gartner believes IoT has
now occurring to increase productivity and create a the potential to generate a total revenue of EUR 714 billion
coordinated world across business and technologies. However, [4, 5], while Mckinsey predicts IoT’s influence to range up
the exchange, storage, processing and transfer of tremendous to $6.2 trillion by 2025, considering its impact upon
amounts of sensitive information has also given rise to severe enterprise, infrastructure, tech industry and ‘smart’ devices
security and privacy concerns that compromise the efficiency
[5]. IoT’s innovative hyper-operability cycle has pushed
and usability of IoT. It has become a challenge for users to
organizations to shift to its services in order to survive in
depend on such a vulnerable technology, where the IoT
security risks outweigh its benefits. Several defense techniques, today’s competitive market. IoT encompasses the world of
algorithms and solution models have been proposed and information technology and every single entity that is a party
implemented to counter these attacks. However, there are to it.
limitations involved as robust incursions make these solutions However, with a universal use of a pervasive network
obsolete. It is vital to have an overview of the research done like IoT, the risks have grown exponentially with the
and find loopholes to fill in the security gaps to ensure a safe
opportunities. In such intensive, fast-paced and ubiquitous
IoT ecosystem. Realizing the need of enhanced problem-solving
socio-technical environments, there have been many
strategies, this paper provides a systematic review of the
existing strategies for IoT security and privacy, and provides
incidents where security and privacy of IoT and its users
an analytical approach in identifying the concerns and have been compromised, resulting in the leakage of sensitive
solutions. It discusses IoT architecture, classifies the various information and hacker intrusions. Having differently
domains of security and privacy and presents a taxonomy and characterized software and hardware with varying memory
a comparative analysis to outline the security goals, threats and size, bandwidth and processing power [5], it is inefficient to
attacks, and solutions proposed in recent years (2015-2018). have one synchronous system to ensure a secure IoT
Our research methodology comprises of thorough qualitative network. What we need is end-to-end data protection [9]
analyses and a literature review to help evaluate the questions throughout the IoT architecture and application terminals [8].
asked in this survey. We also highlight the limitations of the According to [8], a model’s principal security is not robust
previous studies and the open issues. Our survey results focus until its lowest level of defense is comprehensive. It has
on the problems that require further attention to improve the become vital for IoT to have revised security mechanisms in
IoT progression. order to sustain itself in this fast-moving world and provide
reliable products and service to all its users.
Keywords—Internet of Things, architecture, security, privacy
This paper is a systematic timeline assessment of security
I. INTRODUCTION advancements in IoT. We present a state-of-the-art
classification of the IoT security into various domains like
The Internet of Things (IoT) is a state-of-the-art privacy, authorization, confidentiality, integrity, data
technology that aims to connect people to people (P2P), availability and authentication, followed by brief overview of
people to machine (P2M) and machine to machine (M2M) IoT architecture. A survey and comparative analysis has been
through an all-connected, heterogeneous platform for devices conducted to review the IoT security issues encountered,
and systems [1]. What initiated as a mere futuristic theory by challenges already addressed, existing solution models and
Kevin Ashton in 1999 [2], IoT has now become a finally the limitations aroused. We have also devised and
phenomenon that has raised questions for improvement even proposed a taxonomy of the IoT structure in terms of
in Moore’s and Metcalfe’s laws, and has enabled devices, architecture, technologies, security domains and concerns.
people and technologies to interact with each other and
regulate millions of terabytes of data for everyday The remainder of the paper is organized as follows. IoT
commercial, industrial, technical and personal usage [3]. IoT security classification is presented in Section II, followed by
has transformed every domain of our lives through IoT architecture in Section III. We then present our proposed
healthcare (recording patients and surgical records [6]), taxonomy of the IoT structure in terms of technologies,
transportation (routing optimization, connected roads and security domains and architecture in Section IV. Finally, in
traffic monitoring [7]), personal and social usage (smart Section IV, a thorough comparative analysis of research
home appliances, autonomous vehicles [8]), agriculture from 2015 till 2018 has been conducted to review the
(animal identification [2]), and lastly environment (building security threats, solutions proposed and implemented along
‘smart’, energy efficient cities and infrastructure). IoT has with any limitations highlighted. Section V presents open
been the most influential in the enterprise industry as it issues and future trends and Section VI concludes the paper.
manipulates goods trafficking, maximizes efficiency in
2
Fig. 1. Proposed taxonomy of IoT security
Lastly, the application layer (combined with the specific resource unavailable to the authorized user through
middleware layer), where almost 75% of all attacks occur [3] unnecessary data traffic [1].
and a mixture of connectivity and people, is the one that
provides all these features as services to the people to fulfill The application layer comprises of authorization and QoS as
their socio-technical and industrial requirements, including its security goals. This structure can be prone to spear-
service management techniques from large-scale enterprises phishing, sniffing and DoS attacks. Spear-Phishing attack
to local businesses in development of better marketing and causes an authentic user to open emails that can allow
connectivity tools and customer-customization abilities. Our sensitive information to be leaked to the intruder [1].
proposed taxonomy is presented in Fig. 1 that outlines the Sniffing can corrupt an entire network by polluting the
complete structure of the IoT architecture from its layers and application through sniffers [1].
levels to its various technologies and security goals, followed
by the security threats at each level. IV. REVIEW OF EXISTING SECURITY APPROACHES
It is important to note that the security classifications This section discusses the eminent existing IoT security
addressed in Table 1 are categorized into a combination of solution models, frameworks and techniques to meet the
the IoT architectural and technological layers. At the security goals discussed in the previous section and provide
information layer, without respecting the need for user and immunization from malicious attacks and enhanced
data privacy and authorization, the IoT network can face networking operability. Our survey comprises of 8 different
security concerns such as jamming, eavesdropping and research papers from 2015-2018 to assess IoT progression
spoofing. All these attacks either block the signal from over the years, along with any limitations that have been
transmitting/receiving, can cause looping and allow found in these solutions.
unauthorized intruders to catch the data or generate false Cirani et al. [19] seeing privacy, trust and (CIA)
error messages that can alter the routing targets [24]. Confidentiality, Integrity and Availability as the main
CIA has been identified as the main security goals of the security goals, proposed an OAuth security framework on
connectivity layer that can protect the IoT ecosystem from top of the transport layer that could provide outsourced
Sybil, Sinkhole and Denial-of-Service (DoS) attacks. Sybil authorization and immunization to Smart Objects from any
attacks can occur by creating multiple nodes through a single externalities. Their model was based upon the REST
identity that can steal information thorugh fake usability. (Representational State Transfer) web architecture and
According to the 2012 statistics, 76 million users on involved the integration of OAS with HTTPS/CoAP based
Facebook and 20 million users on Twitter were identified as API services to make the final product called the IoT-OAS.
masked Sybil identities [24]. Sinkhole, termed as the most This could potentially aid in dynamic configurability and a
disruptive attack, attracts unnecessary traffic to a single sink detailed energy consumption evaluation through PowerTrace
by falsifying the shortest routing information to all other that would enable the Smart devices to focus on their logical
transmitter nodes [25]. Finally, DoS attacks make the functionalities rather than security protocols, especially in
3
resource constrained environments. This model is not solution, SDIoT, where the whole network was divided into
considered as a security solution, rather a way to build an three layers (hardware, middleware/control and application
authorization layer to manage the IoT service providers. or DaaS). The data could be packaged relative to their IP
addresses and sent in an organized form to their operations.
However, the limitations of this framework were ASDSec-C would then coordinate with the Authentication
complications on the client and user end in terms of Database to point out any vulnerabilities through flag
permission access and computational-heavy processing that outputs. Finally routing algorithm were deployed to ensure
resulted in increased energy consumption under the OAuth secure path designation.
implementation in devices. Another problem was the
inability of the Smart Objects to tackle the DoS attacks in Fernandes et al. [21] in 2016 devised a paper that
cases of large traffic where IoT-OAS was configured. addressed the main security issues as not the authorization
protocols, but privacy violation and data leakage through app
Another paper of 2015 [20], authored by Jararweh et al. functionalities after they had been granted access to sensitive
addressed various solutions proposed previously and information. They introduced FlowFence, a system that
concluded how no prior research had been presented to solve enables specified flow patterns between authorized sources
the issue of security in IoT using SDNs (Software Defined and sinks, to make sure data theft in smartphones and devices
Networks). The authors introduced a system architecture
does not occur. The model used was Opacified Computation
with sandboxes, tags and taint labels through which apps more efficiently had block chain been deployed in the US
could only acquire access to data through functions they DNS server. One limitation we found was the one point of
process with an integration of trusted APIs. Three IoT failure that could occur when a clock would be required for
frameworks were tested upon for inclusion of FlowFence: time stamping.
Samsung SmartHome, Google Fit and Android Sensor APIs
using the hub platform instead of Cloud, due to its reliability This paper, authored by Folly [3] focused on introducing
and widespread usability. This architecture measured a semantic analysis using a graph theoretic approach that
security, operability and E2E latency and highlighted a included the usage of data mining and machine learning
thorough mechanism to ensure data safety in app usage. techniques. It discussed the need to eliminate excessive
human interference and non-cooperative methods involved in
However, as addressed by the paper as well, there were a traffic blockage. In their model, they proposed using graph
few limitations in this model like Overtainting and Flow theory in a centralized solution to first deploy 100-1000 IoT
Prompts that could be accessed and manipulated by all users devices to gather data and then launch random threats and
without administrators that would delegate access grants attacks into them. Their graph model would then be able to
instead. analyze and asses threat detection techniques to predict
anomalies in real-time. However, a major limitation in this
In 2016, Rahman et al. [16] introduced a complete model was that there was no candidate to have this
security framework conversion to a secure IoT Cloud experiment testes and thus the credibility of this paper was
ecosystem. Secure web interface, security configuration and somewhat questionable.
physical device protection were added to the already existing
security goals. It focused on providing transmission Stergiou et al. [23] in 2018 authored a paper that also
encryption, physical security of devices in highlighted the possibility of a decentralized public ledger
telecommunication towers and adequate security through Block-chain that could ensure immunization during
configurability to the networks for autonomous online financials, transactions and businesses through
modifications of protocols. cryptographic hashing, digital signatures and permanent
storage of data records. This would eliminate any possibility
Although the paper did not classify security threats, their of data manipulation and ensure data integrity,
model addressed methods like data encapsulation and authentication, privacy and transparency without a
encryption from eavesdropping and secure storage. An active centralized authorization, instead a consensus algorithm
Base Station would also help host coded Sensor nodes for based on proof-of-work and mutual trust. This model could
encrypted communication through private M2M gateways. A have impactful results concerning IoV (Internet of Vehicles),
Secure Software Development Life Cycle (SSDLC) IoMT (Internet of Medical Things) and IoHT (Internet of
inclusion for efficient and protected cloud computing would Health Things). However, this trending technology still has
ensure a successful conversion to IoT Cloud ecosystem as a wide array of unknown applications that may exceed the
well. However, frequent assessment checks of big data and scope of user operability and cause inappropriate resource
networks were necessary to ensure safety from new threats allocation. Hence, further research and exploration into this
and quality security. model is required.
By 2017, the paper by Kshetri [15] identifies the By the end of 2018, a common increase in the shift from
dependency on Cloud platforms as a huge vulnerability due Cloud platforms has been seen by Sarker et al. [22].
to its centralized data transmission and processing. It Addressing the problems of extensive reliance of IoT on
introduces the use of Block chain as an effective technology Cloud Computing networks, huge amounts of GHGs
using decentralization and Access Management Systems for (Greenhouse gases) like CO2 emissions from Cloud Data
the protection of digital rights as data would be accessed Centers, this paper proposed a Fog Computing prototype,
only by the parties involved in the transaction. Private block based on Edge Computing, that can act as a substitute of the
chains with stored cryptographic hashes would also allow Cloud in low-latency and real-time applications. This would
permanent records of device configurations that would only
ensure QoS, tenant privacy, fault-tolerance and prevention of
allow data transfer after authorization from the message’s data blockage due to high traffic. They introduce the
originator. This paper claims to have handled the Dyn crisis
4
deployment of computational processing and data storage V. OPEN ISSUES AND DESIGN GUIDELINES
capabilities through TNs (terminal nodes) forming (VCs) Although the past decade has proven to be the focus on
Virtual Clusters to create (EPVN) Egde Private Virtual IoT progression, as of 2018, each IoT device on average still
Networks at all architectural levels to avoid core Cloud has 25 loopholes that can cause data leakage and other
frameworks dependency. With FIs (Fog Instances), decisions vulnerabilities. As these devices increase in number, all
to redirect data requests to the Cloud can be processed. DCNs encounter a heavy network traffic that can disrupt
However a few limitations were observed and also talked QoS and cause service latency in all real-time applications.
about in this paper. Firstly, for heavy processing and large Attacks such as Denial-of-Service, malicious, Sybil and
amounts of semi- or permanent data storage, FC would be Sinkhole are only some of the many threats that still need
inefficient and thus a redirection to the core Clod platform better detection and handling techniques to create a secure
will be required as this model does not serve as the Cloud heterogeneous IoT ecosystem. Our analysis shows that the
replacement. Also, where data analytics is required, a preference of using Blockchain methods instead of
collection from distributed DCs to the core DC is required centralized cloud solutions might be commonly agreed upon
through GIS techniques which can be time consuming. in the future due to a safer approach towards data security
threats.
A methodological approach of highlighting the security
goals, attacks, security models and limitations has been
adopted, as summarized in Table II.
Inefficient in heavy
QoS, tenant Data blockage due computational processing,
Sarkar et al. Fog-computing: edge-computing to
privacy, fault to high traffic, core time consuming in
[22]/2018 substitute for Cloud dependency
tolerance Cloud dependency redirection to the DC core
during data analytics
Extensive research required
Stergiou et Integrity, privacy, Data manipulation, Block-chain: Decentralized public ledger to analyze cope of this
al. transparency, inappropriate with cryptography hashing, digital signatures technology and efficient
[23]/2018 authentication resource allocation and consensus algorithms usability
5
A control set-up for physical devices configuration with [4] K. Karimi and G. Atkinson, “What the Internet of Things (IoT) Needs
trace-back methods can track any traffic or attacks while to Become a Reality,” p. 16.
respecting both anonymity and authorization access. After [5] H. Wang, Z. Zhang, and T. Taleb, “Editorial: Special Issue on
Security and Privacy of IoT,” World Wide Web, vol. 21, no. 1, pp. 1–
thorough research, it is imperative to devise a technique that 6, Jan. 2018.
not only has an E2E security checks at all architectural levels [6] C. Hu, J. Zhang, and Q. Wen, “An identity-based personal location
but also autonomous, tamper-proof environments that system with protected privacy in IOT,” pp. 192–195, Oct. 2011.
include fault-tolerant networks to detect and handle new [7] S. Kraijak and P. Tuwanut, “A survey on IoT architectures, protocols,
attacks as well. A call to action is necessary on part of larger applications, security, privacy, real-world implementation and future
organizations that deal with these kinds of issues on a daily trends”, In Proc. IEEE WiCoM 2015, 21-5 Sep., Shanghai, China
basis; Apple and Microsoft have launched initiatives to [8] A. Riahi Sfar, E. Natalizio, Y. Challal, and Z. Chtourou, “A roadmap
introduce cryptography and emailing privacy for its users, for security challenges in the Internet of Things,” Digital
which will gain trust of the people and aid in IoT Communications and Networks, vol. 4, no. 2, pp. 118–137, Apr.
2018.
advancements. In this section, some future points for
[9] M. U. Farooq, M. Waseem, A. Khairi, and S. Mazhar, “A Critical
consideration are: Analysis on the Security Concerns of Internet of Things (IoT),”
International Journal of Computer Applications, vol. 111, no. 7, pp.
• The development of zero-human interference 1–6, Feb. 2015.
methods that can streamline the security processes of
[10] D. Prince, “Cybersecurity: The Security and Protection Challenges of
authorization and authentication. Our Digital World,” Computer, vol. 51, no. 4, pp. 16–19, Apr. 2018.
• Supporting technologies and solutions that aid the [11] E. Bertino and N. Islam, “Botnets and internet of things security,”
Computer, no. 2, pp. 76–79, 2017.
IoT vision through user-friendly, more secure and
[12] T. Xu, J. B. Wendt, and M. Potkonjak, “Security of IoT Systems:
economical services provided for the users. Design Challenges and Opportunities,” in Proceedings of the 2014
IEEE/ACM International Conference on Computer-Aided Design,
• Tackling not just the issue of security, but also Piscataway, NJ, USA, 2014, pp. 417–423.
keeping in mind the environmental threats, costs per
[13] M. Abomhara and G. M. Koien, “Security and privacy in the Internet
user, ease of scalability and service latency in IoT of Things: Current status and open issues,”, in Proc. IEEE PRISMS
networks. 2014, 11-14 May, Aalborg, Denmark, pp. 1–8.
[14] S. A. Kumar, T. Vealey, and H. Srivastava, “Security in Internet of
VI. CONCLUSION Things: Challenges, Solutions and Future Directions,” in Proc. IEEE
HICSS 2016, 5-6 Jan., HI, USA, pp. 5772–5781.
In this paper, we have discussed IoT architecture, [15] N. Kshetri, “Can Blockchain Strengthen the Internet of Things?,” IT
security and its extended classifications along with a survey Professional, vol. 19, no. 4, pp. 68–72, 2017.
that highlights research conducted from 2015-2018 on the [16] A. F. A. Rahman, M. Daud, and M. Z. Mohamad, “Securing Sensor to
security goals, issues and solution models proposed and Cloud Ecosystem Using Internet of Things (IoT) Security
implemented. Finally, any limitations found were also Framework,” in Proc. International Conference on Internet of Things
and Cloud Computing, NY, USA, pp. 1-5.
analyzed along with open issues and future trends. It is true
[17] O. Said and M. Masud, “Towards Internet of Things: Survey and
that sound security solutions are not attained easily but a Future Vision,” International Journal of Computer Networks, vol. 5,
thorough analysis of security threats from design level to no. 1, pp. 1-17, 2013.
implementation to create a safe IoT architecture in [18] I. Lee and K. Lee, “The Internet of Things (IoT): Applications,
accordance with the pre-existing security framework can investments, and challenges for enterprises,” Business Horizons, vol.
help make IoT the most trusted technology yet. 58, no. 4, pp. 431–440, Jul. 2015.
[19] S. Cirani, M. Picone, P. Gonizzi, L. Veltri, and G. Ferrari, “IOT-
Future models should not only tackle the issues of data OAS: An oauth-based authorization service architecture for secure
security and privacy in IoT frameworks but also high power- services in IoT scenarios,” IEEE Sensors Journal, vol. 15, no. 2, pp.
consumption, service latency, data decentralization and huge 1224–1234, 2015.
financial expenditures. Many have now targeted increased [20] Y. Jararweh, M. Al-Ayyoub, E. Benkhelifa, M. Vouk, and A. Rindos,
emission of greenhouse gases (GHGs) through DCs and “SDIoT: a software defined based internet of things framework,”
Journal of Ambient Intelligence and Humanized Computing, vol. 6,
pressed the need to plan smarter solutions covering all these no. 4, pp. 453–461, 2015.
areas for a progressive IoT future. Deployment of secure,
[21] E. Fernandes, J. Paupore, A. Rahmati, D. Simionato, M. Conti, and A.
cost-effective and energy aware embedded systems from Prakash, “FlowFence: Practical Data Protection for Emerging IoT
home appliances to businesses and organizations have Application Frameworks.,” in USENIX Security Symposium, 2016,
become not just a technical issue but a social need in this day pp. 531–548.
and age. [22] S. Sarkar, S. Chatterjee, and S. Misra, “Assessment of the Suitability
of Fog Computing in the Context of Internet of Things,” IEEE
Transactions on Cloud Computing, vol. 6, no. 1, pp. 46–59, 2018.
REFERENCES [23] D. Puthal, N. Malik, S. P. Mohanty, E. Kougianos, and C. Yang, “The
[1] R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of blockchain as a decentralized security framework,” IEEE Consum.
things (IoT) security: Current status, challenges and prospective Electron. Mag., vol. 7, no. 2, pp. 18–21, 2018.
measures,” in 2015 10th International Conference for Internet [24] M. Nawir, A. Amir, N. Yaakob, and O. B. Lynn, “Internet of Things
Technology and Secured Transactions (ICITST), 2015, pp. 336–341. (IoT): Taxonomy of security attacks,” in Electronic Design (ICED),
[2] P. Corcoran, “The Internet of Things: why now, and what’s next?.”, 2016 3rd International Conference on, 2016, pp. 321–326.
IEEE Consumer Electronics Magazine, vol. 5, no.1, pp. 63-68, Jan. [25] C. Cervantes, D. Poplade, M. Nogueira, and A. Santos, “Detection of
2016. sinkhole attacks for supporting secure routing on 6LoWPAN for
[3] F. Folly, “Graph-theoretic approach for security of Internet of Internet of Things,” in 2015 IFIP/IEEE International Symposium on
Things,” in 2017 International Rural and Elderly Health Informatics Integrated Network Management (IM), Ottawa, ON, Canada, 2015,
Conference (IREHI), Lome, 2017, pp. 1–11. pp. 606–611.