You are on page 1of 10

This article has been accepted for publication in a future issue of this journal, but has not been

fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2694844, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 1

A Survey on Security and Privacy Issues in


Internet-of-Things
Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li∗ , and Hongbin Zhao

Abstract—Internet of Things (IoT) are everywhere in our daily


life. They are used in our homes, in hospitals, deployed outside to
control and report the changes in environment, prevent fires, and
many more beneficial functionality. However, all those benefits
can come of huge risks of privacy loss and security issues. To Environmental
Smart Home
Wearable
secure the IoT devices, many research works have been conducted Monitoring
to countermeasure those problems and find a better way to
eliminate those risks, or at least minimize their effects on the
user’s privacy and security requirements. The survey consists of
four segments. The first segment will explore the most relevant
limitations of IoT devices and their solutions. The second one will Smart Grid Medical & Healthcare
present the classification of IoT attacks. The next segment will
focus on the mechanisms and architectures for authentication
and access control. The last segment will analyze the security
issues in different layers.
Connected Vehicle
Index Terms—Internet of Things; Security; Privacy; Survey Industrial Automation

Smart City

I. I NTRODUCTION
Fig. 1. Internet-of-Things Applications
NTERNET OF THINGS (IoT) is a collection of “things”
I embedded with electronics, software, sensors, actuators,
and connected via the Internet to collect and exchange data
IoT botnet. According to Proofpoint, more than 25 percent
of the botnet was made up of devices other than computers,
with each other. The IoT devices are equipped with sensors including smart TVs, baby monitors and other household
and processing power that enable them to be deployed in many appliances. Recently, Dyn, a Manchester, New Hampshire-
environments. Figure 1 presents a variety of common IoT based provider of domain name services, experienced service
applications, including smart home, smart city, smart grids, outages as a result of what appeared to be well coordinated
medical and healthcare equipment, connected vehicles, etc. attack [4]. On October 21st, 2016, many websites including:
The fast growth of the number of IoT devices utilized is Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, SoundCloud
predicted to reach 41 billion in 2020 with an $8.9 trillion and The New York Times, were reported inaccessible by users
market [1] as stated in the 2013 report of the International caused by a distributed denial of service attack (DDoS) attack
Data Corporation (IDC). The difference between IoT and the using a network of consumer devices from the Internet of
traditional Internet is the absence of Human role. The IoT Things (IoT).
devices can create information about individual’s behaviors, Security and privacy remain huge issues for IoT devices,
analyze it, and take action [2]. Services provided by IoT which introduce a whole new degree of online privacy con-
applications offer a great benefit for human’s life, but they cerns for consumers. That’s because these devices not only
can come with a huge price considering the person’s privacy collect personal information like users’ names and telephone
and security protection. numbers, but can also monitor user activities (e.g., when users
Because the IoT manufacturers failed to implement a robust are in their houses and what they had for lunch). Following the
security system in the devices, security experts have warned never-ending string of disclosures about major data breaches,
the potential risk of large numbers of unsecured devices con- consumers are wary of placing too much personal data in
necting to the Internet [3]. In December of 2013, a researcher public or private clouds, with good reason [5].
at Proofpoint, an enterprise security firm, discovered the first There are many published surveys on IoT security issues and
This work is supported by National Natural Science Foundation of China challenges. Granjal et al. [6] analyzed existing solutions for
(Grant Nos. 61502116). the IoT standardized communication protocols (PHY, MAC,
∗ means the corresponding author
Network, Application) and cross-layer mechanisms whenever
Yuchen Yang, Guisheng Yin, Lijie Li, and Hongbin Zhao are with the
College of Computer Science and Technology, Harbin Engineering Uni- applicable. Sicari et al. [7] presented research challenges and
versity, Harbin, China, 150001, email: yangyuchen521_1979@aliyun.com, the current solutions in the field of IoT security focusing on the
{yinguisheng, lilijie}@hrbeu.edu.cn, z-hb@vip.sina.com. main security issues which were identified in seven categories:
Longfei Wu is with the Department of Computer and Informa-
tion Sciences, Temple University, Philadelphia, PA, USA, 19123, email: authentication, access control, confidentiality, privacy, trust,
longfei.wu@temple.edu. secure middleware, mobile security, and policy enforcement.

2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2694844, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 2

They raised some open issues, and suggesting some hints for Shafagh et al. [10] proposed an Encrypted Query Processing
future research. Roman et al. [8] focused on the analysis of algorithm for IoT. The approach allows to securely store
the centralized and distributed approaches. They introduced encrypted IoT information on the cloud, and supports efficient
an attacker model that was applied to both centralized and database query processing over encrypted data. Specifically,
distributed IoT architectures, and studied the main challenges they utilize alternative lightweight cryptographic algorithms
and promising solutions in the design and deployment of the that replace additive homomorphic encryption and order-
security mechanisms. preserving encryption with Elliptic Curve ElGamal and muta-
In this survey paper, we explore the IoT security and privacy ble order preserving encoding algorithms, where they made
issues in four aspects. The first part presents the most relevant some changes to suit the computation limitations of IoT
limitations of IoT devices and their solutions. The second part devices. The system scheme replaces the web application
discusses the classification of existing IoT attacks. Then, we communication with an End-to-End system that stores en-
explore the IoT authentication and access control schemes crypted data from personal devices on Cloud database, and
and architectures proposed in recent literature. Finally, we data encryption/decryption is performed at the client-side. The
analyze the security issues and mechanisms in the perception keying material will only reside in the personal device, and
layer, network layer, transport layer, and application layer, the need of a trusted proxy which has access to all the secret
respectively. keys is eliminated. The system architecture includes three main
parties: IoT devices, users, and the Cloud. The application data
II. I OT D EVICE L IMITATIONS can be stored in the Cloud by directly uploading it by the smart
Why is it difficult to secure and apply security features device or via a gateway like a wearable device. The paper
to IoT as those used in traditional Internet? Trappe et al. addressed only some encryption schemes that support the most
[9] presented the issue of IoT constraints, and their effects used queries in IoT data processing. However, the design can
on using current cryptographic tools as the ones utilized in be extended to cover more schemes. The experiment results
traditional Internet. The two main limitations are the battery showed an improvement in the time performance compared to
capacity and computing power. existing schemes.
Kotamsetty et al. [11] proposed an approach to reduce
A. Battery Life Extension latency for IoT when performing query processing over en-
crypted data by applying latency hiding technique, which
Because some IoT devices are deployed in environments consists of breaking down the query results of large size
where charging is not available, they only have a limited en- into small sized data sets. This allows computational work
ergy to execute the designed functionality and heavy security to be performed on a set of data while fetching the remaining
instructions can drain the devices’ resources. Three possible encrypted information. To decide the appropriate data size to
approaches can be used to mitigate this issue. The first is to be requested in each iteration in order to minimize the latency,
use the minimum security requirements on the device, which the study proposed an algorithm that starts with an initial data
is not recommended especially when dealing with sensitive size and adoptively adjust the size to minimize the gap between
data. The second approach is to increase the battery capacity. computation and communication latencies in each iteration.
However, most IoT devices are designed to be lightweight and The algorithm has two variants: the first starts with a size that
in small size. There is no extra room for a larger battery. The is a fraction of the large query size. In the second variant, the
final approach is to harvest energy from natural resources (e.g., starting size is fixed. The experiment results demonstrated that
light, heat, vibration, wind), but this type of approach would the proposed approach outperforms existing solutions in terms
require an upgrade to the hardware and significantly increase of latency for queries with larger data size.
the monetary cost. Salami et al. [12] proposed a lightweight encryption scheme
for smart homes based on stateful Identity-based Encryption,
B. Lightweight Computation in which the public keys are merely identity strings without
The paper [9] mentioned that conventional cryptography the need for a digital certificate. This method is known as
cannot work on IoT systems, since the devices have limited Phong, Matsuka and Ogata (PMO)’s stateful IBE scheme. It
memory space which can’t handle the computing and storage is the combination of IBE and stateful Diffie-Hellman (DH)
requirements of advanced cryptography algorithms. To support encryption scheme. To add more efficiency to the proposed
security mechanisms for the constrained devices, the authors scheme and reduce the communication cost, the research study
suggested reusing existing functions. An example is to use divides the encryption process into key encryption and data
physical layer authentication by applying signal processing at encryption, with the focus on the second one, because the
the receiver side to verify whether a transmission came from size of ciphertexts produced by key encryption is larger than
the expected transmitter in the expected location. Alternatively, the one resulted from the data encryption. This division led
a specific analog characteristics of a transmitter can be used to to two-sub algorithms: KEYEncrypt and DATAEncrypt. The
effectively encode analog information. These analog nuances first is for encrypting a session key, and the second is for data
can’t be predicted or controlled in manufacturing, and can encryption. The resulted ciphertext from the sub algorithms
serve as a unique key. This way of authentication has little is transmitted separately in a way that data ciphertexts are
or no energy overhead because it takes advantage of radio transmitted many times without attaching the key ciphertext.
signals. The evaluation results showed that the proposed scheme is

2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2694844, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 3

secure against plaintext attacks. Also, the performance anal- IV. I OT AUTHENTICATION AND ACCESS C ONTROL
ysis showed that it outperforms the regular IBE scheme in
A. IoT Authentication Scheme
terms of speeding up the encryption operations, and reducing
approximately one-third of communication overhead. Salman et al. [15] proposed a new IoT heterogeneous
identity-based authentication scheme by applying the concept
III. C LASSIFICATIONS ON I OT ATTACKS of Software Defined Networking (SDN) on IoT devices. SDN
Previous survey works have conducted comprehensive stud- can be deployed using fog-distributed nodes. Each set of
ies on IoT security. They have provided insightful classifica- devices is communicating with a gateway that can support au-
tions of IoT attacks and solutions. thentication for the things. These gateways are also connected
Andrea et al. [13] come up with a new classification of to a central controller which has access to the central data.
IoT devices attacks presented in four distinct types: physical, The authentication process has to go through the gateway and
network, software, and encryption attacks. Each one covers a then the controller in order to give access to the things. The
layer of the IoT structure (physical, network, and application), message flow between the three levels: things, gateway, and
in addition to the IoT protocols for data encryption. The physi- the controller, happens in three phases. The first phase consists
cal attack is performed when the attacker is in a close distance of obtaining an authentication certificate for the gateway from
of the device. The network attacks consist of manipulating the a controller. Phase two consists of things registration to the
IoT network system to cause damage. The software attacks gateway. The final phase is the authentication request which
happen when the IoT applications present some security is sent from the IoT device to the gateway. The experimental
vulnerabilities that allow the attacker to seize the opportunity evaluation shows that the proposed scheme is immune to mas-
and harm the system. Encryption attacks consist of breaking querade attack, man-in-the-middle attack, and replay attack.
the system encryption. This kind of attacks can be done by side Porambage et al. [16] proposed and designed a pervasive
channel, cryptanalysis, and man-in-the-middle attacks. They authentication protocol and a key establishment scheme for
also presented a multi-layered security approaches to address the resource constrained wireless sensor networks (WSNs) in
the IoT structure layers and encryption system vulnerabilities distributed IoT application, called PAuthKey. The proposed
and security issues. Based on the study, to countermeasure PAuthKey protocol comprises two phases: registration phase
the security problems at the physical layer, the device has for obtaining cryptographic credentials to the edge devices
to use secure booting by applying a cryptographic hash and end users; authentication phase for authentication and
algorithms and digital signature to verify its authentication key establishment in mutual communication. With PAuthKey
and the integrity of the software. Also, a new device must protocol, end-users can authenticate themselves to the sensor
authenticate itself to the network before any transmission or nodes directly and acquire sensed data and services. The
reception of data. In addition to that, a device should carry protocol supports the distributed IoT applications, since the
an error detection system, and all of its information has to be certificates are lightweight and can be handled by the high
encrypted to maintain data integrity and confidentiality. At the resource constrained devices, irrespective of their originality.
network layer, authentication mechanisms and point-to-point Ho et al. [17] studied the security vulnerabilities of smart
encryption can be used to ensure data privacy and rooting locks by observing five types of locks: August, Danalock,
security. The application layer can also provide security by Kevo, Okidokeys, and Lockitron. The paper focused on the
means of authentication, encryption, and integrity verification, consequence of the door’s automatic unlocking system. Some
which allows only the authorized users to access data through locks have the capability to unlock the door if the owner
control lists and firewalls, in addition to the use of anti-virus is located in a certain distance from the door. This feature
software. allows to open the door even if the owner doesn’t have the
Ronen et al. [14] introduced a new taxonomy classification intent for the action to occur, especially when the person is
for IoT attacks based on how the attacker features deviates inside the home. This can create an insecure feeling for the
from the legitimate IoT devices. The categories are presented resident and allows the attacker to seize the opportunity and
in: ignoring, reducing, misusing, and extending the system enter the home when the owner is around without his/her
functionality. The study focused on the functionality extension permission. To countermeasure this vulnerability, the study
attacks on smart lights. The paper presented two attacks: the proposed a touch-based intent communication solution that
first one consisted of creating a covert channel to capture prevents locks to unlock the door without the owner intent
confidential information from an organization building that to do it. In this solution, the authorized user has to wear a
implemented smart lights which are connected to the internal special wearable device that communicate with the lock via
sensitive network. The work is done by using an optical an ear bone conduction microphone. A hand-held vibrator
receiver that could read the data from a distance of over 100 is used to transmit the intent signal. The wearable device
meters by measuring the exact duration and frequency of the will detect the vibration and send an unlock command. The
small changes in the lights intensity. The second attack showed results showed that the system unlocks only when it detects
that an attacker can use those lights to create strobes in the the person’s action, and it didn’t react to the vibration caused
sensitive light frequencies, which can lead to a risk of epileptic by any of daily activities such as computer tone and phone
seizures. The experiments showed that it is necessary to focus vibration; however, the solution presented some limitations
on security issues during the different phases of designing, like the addition of hardware to the smart lock, and the
implementing and integrating of the IoT devices. wearable device to be able to transmit the vibrations. Also,

2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2694844, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 4

the vibration sensor may not detect the intent action if the trol model called SmartOrBAC that extends the OrBAC
wearable device is loosen, or the user is touching the door (Organization-based Access Control) model to fit the IoT
with the hand which is not wearing the device. network requirements by including collaboration-related and
Sharaf et al. [18] proposed a new approach for authentica- context aware concepts, and dividing the IoT network structure
tion process using the device’s unique fingerprint. According into four abstraction layers: constrained, less constrained, or-
to the study, each device has a unique fingerprint which ganization layer, and collaboration layer across domain access
consists of multiple features such as location, physical state control, with a central authorization engine for each separate
of object, or transmitter state. A group of IoT objects may group of components within a specific layer. The constrained
have different types of fingerprinting features. For that reason, layer, as its name says, contains devices with constrained
conventional device fingerprinting techniques can’t be used capabilities. A less constrained device is associated to a group
for the IoT object’s authentication. The paper proposed the of the first layer components to take in charge the intensive
use of transfer learning, to authenticate devices that have computation tasks within the same security domain. This
different feature spaces. To apply the new idea, the research central element of the less constrained layer is referred as
study followed two-fold approach. First, it verifies if the Client Authorization Engine (CAE), on the client side, and
message is sent by a single object. Then, it validates the Resource Authorization Engine (RAE), on the source side.
legitimacy of the sending device. To realize the first phase, the The Organization layer specifies the security access policies
paper adopted the Infinite Gaussian Mixture Mode (IGMM) for each group of the client and the resource organization.
as a generative model assuming that the fingerprints for each It also structures them into different security domains. The
object follow a multivariate Gaussian distribution. The second fourth layer comes to enhance the OrBAC access model with
phase was done by comparing the clustering results from the the addition of collaboration related concepts. This added layer
IGMM with the expected cluster shape for the device. This is responsible for establishing agreements and rules cross the
was done by applying Bhattacharyya distance. However, the domain access control. The evaluation of the presented model
environment can cause changes in some devices’ fingerprint showed that it is less complex that the capabilities based
features. To solve this issue, the study applied transfer learning models. It also ameliorates the security policy management
techniques to differentiate between normal changes due to cost, and reduces the risks of errors.
the environment effects, from the malicious changes produced
by attackers. This is done under two assumptions. The first
is that the changes can affect more than an object at the B. IoT Authentication Architecture
same time, and the second is that an attacker cannot target Lessa et al. [21] proposed an architecture for secure com-
all objects affected by the environment. The test results of munication between constrained IoT devices using Datagram
the proposed authentication approach showed an increase Transport Layer Security (DTLS) based on certificates with
in the authentication performance compared to conventional mutual authentication. The communication is done by intro-
authentication techniques. ducing a new device called IoT Security Provider (IoTSSP),
Zhang et al. [19] proposed an algorithm to defend against which is responsible for managing and analyzing the devices’
DDoS attacks by considering a network composed of four certificates along with authentication and session establish-
groups of nodes: working node, monitoring node, legitimate ment between the devices. The infrastructure could be com-
user node, and the attacker node. The algorithm proposed posed by one or more IoTSSPs. Each one is responsible for a
consists of addressing each node’s DDoS security issues in set of constrained devices. Optional Handshaking Delegation,
the network. The working nodes are considered as the devices and Transfer of Session are the two new main mechanisms
that collect information and execute simple tasks. They have that are introduced in the study. The first mechanism con-
memory computation, storage, and energy limitations. To sists of delegating the handshaking process to the IoTSSP
countermeasure the DDoS attack, the working node has to upon the reception of a client request for authentication to
differentiate between malicious requests and legitimate ones. communicate with a constrained device. The Handshaking
A sender that sends the same content messages will be flagged Execution Module (HEM) in IPv6 over low power wireless
and saved in a list of served requests to check for further personal area networks border router (6LBR) redirect the
attacker requests. The list has to be of small size due to message to the IoTSSP, which replies to the Internet device
the devices’ space constraint. A legitimate user node has to to verify its request. It then communicates the message to the
send request with lower frequency and reasonable content. A constrained device and check for its availability. This process
monitoring node is included in the scheme for future work also prevents DoS attacks. After the authentication process is
implementation. The node will be responsible for storing finished, the second mechanism will take place by using a
the old records of attackers in order to prevent the working DTLS extension called Session Transfer Ticket that transfer a
nodes from serving the malicious attacks. In the proposed secure communication session to the constrained device, which
algorithm, an attacker’s request has only one chance to be will receive all the parameters of the active session defined in
served. After the second attempt, the attacker is put in the the IoTSSP.
attacking list, and its packets will be dropped. The study The proposed solution in [22] is based on a lightweight
simulation results showed that the algorithm is effective for key agreement protocol, the Identity Based Encryption (IBE),
detecting and preventing DDoS. and Pseudonym Based Encryption (PBE) to ensure anonymity,
Bouij et al. [20] proposed an authorization access con- data secrecy, and trust between IoT or WSN nodes in the

2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2694844, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 5

network. Their architecture consists of a Base Station BS, a


Application Layer
sink node SN, and a set of nodes N. the BS contains the PKG
Smart home, Health system, etc.
server where the nodes’ IDs are stored. Their solution requires
that all the messages to be transmitted to the SN which then Transport Layer
send them to their final destination, and each transmission is TLS, DTLS, etc.
acknowledged by an ACK message. The encrypted data will
incur a Message Authentication Code function before sending Network Layer
the message. Also, in order to obscure a sent message with 6LoWPAN, IPSec, etc.
an ACK message, the study proposed that both messages will
have the same length. Another requirement is that a shared
Perception Layer
WSN, IMD, RFID, GPS, etc.
session key should be established between N node and SN,
and between SN and BS. Each node N should use a virtual
Fig. 2. IoT layered analysis
ID and apply PBC technique. Four phases need to be followed
to establish the proposed system model. The first step is
channels established by means of DTLS for key exchange,
the network setup, which is also divided in three steps to
and provided a mechanism to protect from replay attacks by
setup the system’s security parameters. These steps consists of
coupling with the constrained application protocol (CoAP)
configuring the PKG in the BS node, and the SN and N nodes
application protocol. OSCAR intrinsically supports caching
parameters. The second phase highlights the mechanisms that
and multicast, and does not affect the radio duty-cycling
ensures both SN and N nodes are legitimate devices in the
operation of constrained objects. The experimental evaluation
network. The third and fourth phase is the establishment of
shows that OSCAR can achive significant energy savings at
session keys between N node and SN, and between SN and
constrained servers and reasonable delays.
BS. The proposed solution was shown to be resistant to most
Cirani et al. [26] proposed an architecture IoT-OAS target-
known attacks in the WSN and IoT. The results also showed an
ing HTTP/CoAP services to provide an authorization frame-
improvement in security and privacy preservative performance.
work, which can be integrated by invoking an external oauth-
Yoshigoe et al. [23] proposed a way to hide real network
based authorization service (OAS). The IoT-OAS architecture
traffic with synthetic packet-injection framework, thus making
is meant to be flexible, highly configurable, and easy to
traffic analysis difficult for hackers. The framework consists
integrate with existing services. By delegating the authoriza-
of a Synthetic Packet Engine (SPE) that generates and inject
tion functionality, IoT-OAS achieves benefits including lower
additional packets to the network whenever needed. These
processing load with respect to solutions (where access control
false packets mimic the behavior of real actions, like opening
is implemented on the smart object), fine-grained (remote) cus-
a door, which is followed by the action of locking the door
tomization of access policies, and higher scalability (without
after a few seconds. The SPE can be incorporated with the use
the need to operate directly on the device).
of a VPN, which can encrypt the data and hide the packets
sequence number that can distinguish between real traffic and V. I OT S ECURITY AT D IFFERENT L AYERS
the injected ones. The SPE can also be integrated as a part of
both the client and the server process. This combination can Applying existing Internet standards to smart devices can
be applied to application that does require immediate response simplify the integration of the envisioned scenarios in the IoT
from the server, which is not supported when using the SPE contexts. However, the security mechanisms in conventional
with the VPN. Internet protocols need to be modified or extended to support
The Object Security Approaches (i.e. placing security within the IoT applications. In this section, we discuss the security
the application payload) have also been considered as a viable problems and existing solutions in different layers of IoT
option to provide fine grained access control with an assertion systems (Figure 2).
based authorization framework. Seitz et al. [24] addressed the
authorization and access control issues in the context of inter- A. IoT Perception Layer Security
connected systems consisting of resource constrained devices IoT system is designed to collect and exchange data from
not directly operated by humans. This requires the device to the physical world. Hence, the perception layer contains var-
be able to handle connections from other entities, distinguish ious types of collecting and controlling modules, such as the
between requests from different entities, and enforce respective temperature sensors, sound sensors, vibration sensors, pressure
fine-grained authorization decisions. In the proposed autho- sensors, etc. The perception layer can be further divided
rization framework, the decisions are based on local data and into two parts: perception node (sensors or controllers, etc.),
device’s local conditions, which adds significant flexibility to perception network that communicates with transportation
the access control models that can be supported. network [27]. Perception node is used for data acquisition
To address the limitations of existing connection-oriented and data control, perception network sends collected data to
security architecture in terms of the scale and resulting latency the gateway or sends control instruction to the controller.
on small constrained IoT devices, Vucinic et al. [25] proposed Perception layer technologies include wireless sensor net-
an object-based security architecture (OSCAR) that leverages works (WSNs), implantable medical devices (IMDs), Radio-
the security concepts both from content-centric and tradi- Frequency IDentification (RFID), Global Positioning System
tional connection-oriented approaches. They used the secure (GPS), etc.

2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2694844, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 6

One perception layer security issue is the detection of the therapy settings and drain the battery more rapidly. Similarly,
abnormal sensor node. This could happen when the node is eavesdropping attacks and active attacks can also compromise
physically attacked (e.g. destroyed, disabled), or intruded/com- commercial glucose monitoring and insulin delivery system
promised by cyber attacks. These nodes are named as faulty [45]–[47]. After reverse-engineering the communication pro-
nodes in general. In order to ensure the quality of service, it is tocol and packet format, they were able to impersonate the
necessary to be able to detect the faulty nodes and take actions doctor and alter the intended therapy by replaying and inject-
to avoid further degradation of the service. Chen et al. [28] ing messages with a software radio. A security professional
proposed and evaluated a localized fault detection algorithm to Barnaby Jack has also revealed serious security flaws in IMDs,
identify the faulty nodes in WSN. Silva et al. [29] proposed a and demonstrated how an adversary can remotely take full
decentralized intrusion detection system model for the WSN. control of insulin pump, pacemaker and ICD [48]. The IMD
Wang et al. [30] derived the intrusion detection probability in manufacturers should be responsible for the security incidents
both homogeneous and heterogeneous WSN. and vulnerabilities in their products. However, they tend to
Another perception layer security concern is the cryp- be unwilling to include strong security mechanisms into their
tography algorithms and key management mechanism to be products since these changes will result in an additional
used. Public key algorithm has been considered convenient monetary cost and a reduction in service life.
for node authentication. It has larger scalability and can In 2014, an independent security researcher Billy Rios
better secure the entire network without complicated key discovered 100 vulnerabilities in the communications system
management protocol [27]. According to Gaubatz et al. [31], of the PCA 3 Lifecare infusion pump, produced by the medical
three low-power public key encryption algorithms are the device company Hospira (HSP). These vulnerabilities allow
most promising candidates for wireless sensor networks: Ra- a hacker to tap into the pumps and change the original
bin’s Scheme, NtruEncrypt and Elliptic Curve Cryptography. amount of medication set to dispense. Rios notified Hospira,
Key management includes secret key generation, distribution, but the company failed to respond to him. Hospira stayed
storage, updating and destruction. Existing key distribution silent on the issue until another researcher Jeremy Richards
scheme can be divided into four groups: (1) Key broadcast publicly disclosed the threat in April 2015 [49]. Then, the U.S.
distribution [32] [33]; (2) Group key distribution [34] [35]; Food and Drug Administration (FDA) and the Department of
(3) master key pre-distribution; (4) pairwise key distribution Homeland Security (DHS) ’s Industrial Control Systems Cy-
[36] [37]. ber Emergency Response Team sent out advisories notifying
Some IoT users have privacy concerns when submitting hospitals of the danger of Hospira pumps, and encouraging
sensitive data to the collection server. It is very important to the transition to alternative infusion systems [50].
anonymize the data before submission so that the collector Many research efforts have been focused on the access
cannot trace back to the submitter. The anonymous data aggre- control for IMDs [51]–[57] and the mitigation of resource
gation has been studied in many previous works [38]–[42]. A depletion attacks [58], [59].
recent work by Yao et al. [43] proposed an efficient anonymous
data reporting protocol for the participatory sensing in IoT
applications. The protocol consists of a slot reservation stage B. IoT Network Layer Security
and a message submission stage. In the slot reservation stage, a For IoT devices in WSN context, it is desirable to ex-
group of N users assign each other a message slot in a vector as tend IPv6 over Low power Wireless Personal Area Networks
the message submission schedule, each user’s slot is oblivious (6LoWPAN) to enable IPSec communication with IPv6 nodes.
to others and the aggregator. In the message submission stage, This is beneficial because the existing end-points on the
each user transmits an encoded data to the aggregator based Internet do not need to be modified to communicate securely
on the slot information known only to herself, while the with the WSN, and the true end-to-end security is implemented
aggregator cannot link the received data to a specific user. without the need for a trustworthy gateway. Raza et al. [60]
With the proposed data reporting protocol, the link between proposed an End-to-End (E2E) secure communication between
the received data and the contributor is broken, so that user IP enabled sensor networks and the traditional Internet. Their
privacy is protected. extension of LoWPAN supports both IPSec’s Authentication
Implantable medical device (IMD) is a new type of IoT Header (AH) and Encapsulation Security Payload (ESP), so
device that is implanted within human body for diagnostic, that the communication endpoints are able to authenticate,
monitoring, and therapeutic purposes. It is imperative to ensure encrypt and check the integrity of messages using standard-
the security of IMDs since even a small vulnerability can cause ized and established IPv6 mechanisms. They extended their
fatal threat to patient’s life. However, in recent years, several previous work in [61]. They described Encapsulating Security
attacks have been demonstrated to be able to successfully Payload (ESP) for 6LoWPAN/IPSec in detail, and compared
compromise a number of commercial IMD products. the 6LoWPAN/IPSec solution with the commonly employed
Halperin et al. [44] presented the vulnerabilities of a com- 802.15.4 link-layer security. A thorough testbed performance
mercial implantable cardioverter defibrillator (ICD). Equipped evaluation of the 6LoWPAN/IPSec solution and 802.15.4
with an oscilloscope and a software radio, they managed security is built, which reuses the crypto hardware within
to reverse-engineer the ICD’s communications protocol and existing IEEE 802.15.4 transceivers for 6LoWPAN/IPSec.
obtain the personal information of the patient and the ICD. Granjal et al. [6] proposed a new secure inter-connection
Furthermore, they also launched active attacks to change the model and security mechanisms to enable the secure integra-

2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2694844, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 7

tion of IP enabled WSNs with the Internet, and allow for end- to reduce the overheads of the DTLS handshake, based on
to-end security. Their model introduces 6LoWPAN security pre-validation, session resumption, and handshake delegation,
headers to enable end-to-end security between sensor nodes respectively.
and hosts on the Internet, while also providing mechanisms to
selectively control the energy expended with security opera- D. IoT Application Layer Security
tions on the WSN.
IoT has a wide variety of applications, including but not
Jara et al. [62] provided an analysis of the requirements
limited to smart home (e.g., learning thermostat, smart bulb),
and desirable features for the mobility support in the IoT, and
medical and healthcare (e.g., real-time health monitoring sys-
proposed an efficient solution for constrained environments
tem), smart city (e.g., smart lighting, smart parking), energy
based on Mobile IPv6 and IPSec. This work has considered
management (e.g., smart grids, smart metering), environmental
the suitability of Mobile IPv6 and IPSec for constrained
monitoring (e.g., climate monitoring, wildlife tracking), indus-
devices, and analyzed, designed, developed and evaluated a
trial internet, connected vehicle.
lightweight version of Mobile IPv6 and IPSec. The proposed
Most modern IoT devices contain configurable embedded
solution of lightweight Mobile IPv6 with IPSec is aware of
computer systems. Some are even running complex software
the requirements of the IoT and presents the best solution
and resembling general-purpose computers, hence they face
for dynamic ecosystems in terms of efficiency and security
the same security risks as that of general-purpose computers.
adapted to IoT-devices capabilities.
When connected to the Internet, they could get infected by
computer virus like trojan.
C. IoT Transport Layer Security The Internet of Things (IoT) is creating a new environment
Kothmayr et al. [63] presented the first fully implemented where malware can be used to create powerful botnets. Mirai
two-way authentication scheme for the IoT system, based on [68], a newly discovered piece of Linux malware, is being used
existing Internet standards, especially the DTLS protocol. The to rope IoT devices into botnets. Mirai can gain shell access
proposed security scheme is performed during a fully authen- using the default password of the telnet or SSH accounts.
ticated DTLS handshake and based on an exchange of X.509 After it obtains access to the account, it can create delayed
certificates containing RSA keys. It can work over standard processes, delete files, and even install other malware on
communication stacks that offer UDP/IPv6 networking for the system. The infected devices were secretly under Mirai’s
6LoWPANs. control and awaiting orders to strike in the form of a DDoS
Raza et al. [64] proposed 6LoWPAN header compression attack. The vast internet outage in October 2016 was caused
for DTLS. They linked the compressed DTLS with the 6LoW- by the DDoS attack using compromised IoT devices running
PAN standard using standardized mechanisms. The proposed the Mirai malware.
DTLS compression significantly reduces the number of addi- Later, security researchers at MalwareMustDie have dis-
tional security bits. For example, only for the DTLS Record covered another malware family IRCTelnet, also designed to
header that is added in every DTLS packet, the number of infect Linux-based insecure Internet of Things (IoT) devices
additional security bits can be reduced by 62%. In their follow- and turn them into a botnet to carry out massive DDoS
up work [65], an integration of DTLS and CoAP is proposed attacks [69]. Similar to Mirai malware, IRCTelnet also relies
for the IoT, named Lithe. They also proposed a novel DTLS on default hard-coded passwords. It compromises a IoT device
header compression scheme that aims to significantly reduce by brute-forcing its Telnet ports and infecting the device’s
the energy consumption by leveraging the 6LoWPAN stan- operating system. Then, the IoT device becomes a node of
dard. The proposed DTLS header compression scheme does the botnet network, which can be controlled through Internet
not compromise the end-to-end security properties provided by Relay Chat (IRC), an application layer protocol that enables
DTLS, and can considerably reduce the number of transmitted communication in text. The DDoS attacks in IoT and WSN
bytes while maintaining DTLS standard compliance. contexts have been well-studied in [19], [70]–[74].
Brachmann et al. [66] pointed out that security protocols
such as Transport Layer Security (TLS) or DTLS adopted on VI. C ONCLUSION
the Internet does not necessarily mean that the same security In this survey, we have presented the security and privacy
levels can be achieved in Low-power and Lossy Network issues in IoT applications and systems. We presented the
(LLN), which is still vulnerable to resource exhaustion, flood- limitations of IoT devices in battery and computing resources,
ing, replay and amplification attacks, since the 6LoWPAN and discussed possible solutions for battery life extension and
Border Router typically does not perform any authentication. lightweight computing. We also studied existing classification
The authors presented two approaches to mitigate such attacks. approaches for IoT attacks and security mechanisms. Then, we
The first is to map the TLS to DTLS protocol to ensure end- reviewed the recently proposed IoT authentication schemes
to-end security at the application layer. The second approach and architectures. The last part of our work analyzed the
is to use DTLS-DTLS tunnel to protect the LLN. security issues and solutions in four layers, including the
Hummen et al. [67] investigated the use of certificates perception layer, network layer, transport layer, and application
for peer authentication in the Web of Things. Preliminary layer.
overhead estimations are conducted for the certificate-based Overall, the safety of commercial IoT devices today de-
DTLS handshake. The authors proposed three design ideas pends on the technologies, protocols, and security mechanisms

2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2694844, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 8

implemented by each individual manufacturer. Based on the [18] Y. Sharaf-Dabbagh and W. Saad, “On the authentication of devices in
specific case, all IoT devices could be vulnerable to certain the internet of things,” in 2016 IEEE 17th International Symposium on A
World of Wireless, Mobile and Multimedia Networks (WoWMoM), June
types of attacks. This indicates the urgent needs of developing 2016, pp. 1–3.
general security policy and standards for IoT products. IoT [19] C. Zhang and R. Green, “Communication security in internet of thing:
manufacturing industry has to work closely with the supervi- Preventive measure and avoid ddos attack over iot network,” in Pro-
ceedings of the 18th Symposium on Communications & Networking,
sory agencies, such as FSA and DHS, and the standardization ser. CNS ’15. San Diego, CA, USA: Society for Computer Simulation
organizations to tackle newly emerged threats as well as to International, 2015, pp. 8–15.
develop strong and robust security standards for IoT devices [20] I. B. Pasquier, A. A. Ouahman, A. A. E. Kalam, and M. O. de Montfort,
“Smartorbac security and privacy in the internet of things,” in 2015
and systems. IEEE/ACS 12th International Conference of Computer Systems and
Applications (AICCSA), Nov 2015, pp. 1–8.
[21] G. L. dos Santos, V. T. Guimaraes, G. da Cunha Rodrigues, L. Z.
R EFERENCES Granville, and L. M. R. Tarouco, “A dtls-based security architecture
for the internet of things,” in 2015 IEEE Symposium on Computers and
[1] IoT Analytics, “Why the internet of things is called internet of things:
Communication (ISCC), July 2015, pp. 809–815.
Definition, history, disambiguation,” https://iot-analytics.com/internet-
[22] S. Jebri, M. Abid, and A. Bouallegue, “An efficient scheme for anony-
of-things-definition/, 2014.
mous communication in iot,” in 2015 11th International Conference on
[2] Irfan Saif and Sean Peasley and Arun Perinkolam, “Safeguard-
Information Assurance and Security (IAS), Dec 2015, pp. 7–12.
ing the internet of things: Being secure, vigilant, and resilient
in the connected age,” https://dupress.deloitte.com/dup-us-en/deloitte- [23] K. Yoshigoe, W. Dai, M. Abramson, and A. Jacobs, “Overcoming
review/issue-17/internet-of-things-data-security-and-privacy.html, 2015. invasion of privacy in smart home environment with synthetic packet
injection,” in 2015 TRON Symposium (TRONSHOW), Dec 2014, pp. 1–
[3] Margaret Rouse, “Iot security (internet of things security),” [8]
7.
http://internetofthingsagenda.techtarget.com/definition/IoT-security-
Internet-of-Things-security, 2013. [24] L. Seitz, G. Selander, and C. Gehrmann, “Authorization framework for
[4] Brian Lam and Cynthia Larose, “How did the internet the internet-of-things,” in 2013 IEEE 14th International Symposium on
of things allow the latest attack on the internet?” "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM),
https://www.privacyandsecuritymatters.com/2016/10/how-did-the- June 2013, pp. 1–6.
internet-of-things-allow-the-latest-attack-on-the-internet/, 2016. [25] M. Vucinic, B. Tourancheau, F. Rousseau, A. Duda, L. Damon, and
[5] Talkin Cloud, “Iot past and present: The history of iot, and where R. Guizzetti, “Oscar: Object security architecture for the internet of
it’s headed today,” http://talkincloud.com/cloud-computing/iot-past-and- things,” in Proceeding of IEEE International Symposium on a World of
present-history-iot-and-where-its-headed-today?page=2, 2016. Wireless, Mobile and Multimedia Networks 2014, June 2014, pp. 1–10.
[6] J. Granjal, E. Monteiro, and J. S. Silva, “A secure interconnection model [26] S. Cirani, M. Picone, P. Gonizzi, L. Veltri, and G. Ferrari, “Iot-oas: An
for ipv6 enabled wireless sensor networks,” in 2010 IFIP Wireless Days, oauth-based authorization service architecture for secure services in iot
Oct 2010, pp. 1–6. scenarios,” IEEE Sensors Journal, vol. 15, no. 2, pp. 1224–1234, Feb
[7] S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, “Security, 2015.
privacy and trust in internet of things: The road ahead,” Computer [27] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of
Networks, vol. 76, pp. 146 – 164, 2015. the internet of things: perspectives and ch enges,” Wireless Networks,
[8] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges vol. 20, no. 8, pp. 2481–2501, 2014.
of security and privacy in distributed internet of things,” Computer [28] J. Chen, S. Kher, and A. Somani, “Distributed fault detection of
Networks, vol. 57, no. 10, pp. 2266 – 2279, 2013, towards a Science of wireless sensor networks,” in Proceedings of the 2006 Workshop on
Cyber SecuritySecurity and Identity Architecture for the Future Internet. Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks,
[9] W. Trappe, R. Howard, and R. S. Moore, “Low-energy security: Limits ser. DIWANS ’06, 2006, pp. 65–72.
and opportunities in the internet of things,” IEEE Security Privacy, [29] A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro,
vol. 13, no. 1, pp. 14–21, Jan 2015. L. B. Ruiz, and H. C. Wong, “Decentralized intrusion detection in
[10] H. Shafagh, A. Hithnawi, A. Droescher, S. Duquennoy, and W. Hu, wireless sensor networks,” in Proceedings of the 1st ACM International
“Poster: Towards encrypted query processing for the internet of things,” Workshop on Quality of Service &Amp; Security in Wireless and Mobile
in Proceedings of the 21st Annual International Conference on Mobile Networks, ser. Q2SWinet ’05, 2005, pp. 16–23.
Computing and Networking, ser. MobiCom ’15. New York, NY, USA: [30] Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal, “Intrusion
ACM, 2015, pp. 251–253. detection in homogeneous and heterogeneous wireless sensor networks,”
[11] R. Kotamsetty and M. Govindarasu, “Adaptive latency-aware query IEEE Transactions on Mobile Computing, vol. 7, no. 6, pp. 698–711,
processing on encrypted data for the internet of things,” in 2016 25th June 2008.
International Conference on Computer Communication and Networks [31] G. Gaubatz, J. P. Kaps, E. Ozturk, and B. Sunar, “State of the art in
(ICCCN), Aug 2016, pp. 1–7. ultra-low power public key cryptography for wireless sensor networks,”
[12] S. A. Salami, J. Baek, K. Salah, and E. Damiani, “Lightweight en- in Third IEEE International Conference on Pervasive Computing and
cryption for smart home,” in 2016 11th International Conference on Communications Workshops, March 2005, pp. 146–150.
Availability, Reliability and Security (ARES), Aug 2016, pp. 382–388. [32] S. C. H. Huang and D.-Z. Du, “New constructions on broadcast
[13] I. Andrea, C. Chrysostomou, and G. Hadjichristofi, “Internet of things: encryption key pre-distribution schemes,” in Proceedings IEEE 24th
Security vulnerabilities and challenges,” in 2015 IEEE Symposium on Annual Joint Conference of the IEEE Computer and Communications
Computers and Communication (ISCC), July 2015, pp. 180–187. Societies., vol. 1, March 2005, pp. 515–523 vol. 1.
[14] E. Ronen and A. Shamir, “Extended functionality attacks on iot devices: [33] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes
The case of smart lights,” in 2016 IEEE European Symposium on for sensor networks,” in 2003 Symposium on Security and Privacy,
Security and Privacy (EuroS&P), March 2016, pp. 3–12. 2003., May 2003, pp. 197–213.
[15] O. Salman, S. Abdallah, I. H. Elhajj, A. Chehab, and A. Kayssi, [34] “A delay-tolerant framework for integrated rsns in iot,” Computer
“Identity-based authentication scheme for the internet of things,” in 2016 Communications, vol. 36, no. 9, pp. 998 – 1010, 2013.
IEEE Symposium on Computers and Communication (ISCC), June 2016, [35] H. Liu, M. Bolic, A. Nayak, and I. Stojmenovic, “Taxonomy and
pp. 1109–1111. challenges of the integration of rfid and wireless sensor networks,” IEEE
[16] P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, Network, vol. 22, no. 6, pp. 26–35, November 2008.
“Pauthkey: A pervasive authentication protocol and key establishment [36] H. Chan and A. Perrig, “Pike: peer intermediaries for key establishment
scheme for wireless sensor networks in distributed iot applications,” in in sensor networks,” in Proceedings IEEE 24th Annual Joint Conference
International Journal of Distributed Sensor Networks, 2014. of the IEEE Computer and Communications Societies., vol. 1, March
[17] G. Ho, D. Leung, P. Mishra, A. Hosseini, D. Song, and D. Wagner, 2005, pp. 524–535 vol. 1.
“Smart locks: Lessons for securing commodity internet of things de- [37] L. Eschenauer and V. D. Gligor, “A key-management scheme for
vices,” in Proceedings of the 11th ACM on Asia Conference on Computer distributed sensor networks,” in Proceedings of the 9th ACM Conference
and Communications Security, ser. ASIA CCS ’16. New York, NY, on Computer and Communications Security, ser. CCS ’02, 2002, pp. 41–
USA: ACM, 2016, pp. 461–472. 47.

2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2694844, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 9

[38] H. Corrigan and B. Ford, “Dissent: Accountable anonymous group [65] S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, “Lithe:
messaging,” in Proc. of ACM CCS, 2010. Lightweight secure coap for the internet of things,” IEEE Sensors
[39] D. Wolinsky, H. Corrigan, B. Ford, and A. Johnson, “Dissent in numbers: Journal, vol. 13, no. 10, pp. 3711–3720, Oct 2013.
Making strong anonymity scale,” in Proc. of USENIX OSDI, 2012. [66] M. Brachmann, S. L. Keoh, O. G. Morchon, and S. S. Kumar, “End-to-
[40] H. Corrigan, D. I. Wolinsky, and B. Ford, “Proactively accountable end transport security in the ip-based internet of things,” in 2012 21st
anonymous messaging in verdict,” in Proc. of USENIX Security, 2013. International Conference on Computer Communications and Networks
[41] H. Corrigan, D. Boneh, and D. Mazieres, “Riposte: An anonymous (ICCCN), July 2012, pp. 1–5.
messaging system handling millions of users,” in Proc. of IEEE S&P, [67] R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle,
2015. “Towards viable certificate-based authentication for the internet of
[42] X. Zhao, L. Li, G. Xue, and G. Silva, “Efficient anonymous message things,” in Proceedings of the 2Nd ACM Workshop on Hot Topics on
submission,” in Proc. of IEEE INFOCOM, March 2012. Wireless Network Security and Privacy, ser. HotWiSec ’13, 2013, pp.
[43] Y. Yao, L. T. Yang, and N. N. Xiong, “Anonymity-based privacy- 37–42.
preserving data reporting for participatory sensing,” IEEE Internet of [68] Wikipedia, “Mirai,” https://en.wikipedia.org/wiki/Mirai_(malware),
Things Journal, Oct 2015. 2016.
[44] D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, [69] Swati Khandelwal, “New iot botnet malware discovered; infecting
W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, “Pacemakers and more devices worldwide,” http://thehackernews.com/2016/10/linux-irc-
implantable cardiac defibrillators: Software radio attacks and zero-power iot-botnet.html, 2016.
defenses,” in IEEE S&P, 2008. [70] Z. A. Baig, M. Baqer, and A. I. Khan, “A pattern recognition scheme for
[45] C. Li, A. Raghunathan, and N. K. Jha, “Hijacking an insulin pump: distributed denial of service (ddos) attacks in wireless sensor networks,”
Security attacks and defenses for a diabetes therapy system,” in IEEE in 18th International Conference on Pattern Recognition (ICPR’06),
HealthCom, 2011. vol. 3, 2006, pp. 1050–1054.
[46] J. Radcliffe, “Hacking medical devices for fun and insulin: Breaking the [71] X. Du, M. Guizani, Y. Xiao, and H. H. Chen, “Defending dos attacks
human scada system,” in Black Hat USA, 2011. on broadcast authentication in wireless sensor networks,” in 2008 IEEE
[47] E. Marin, D. Singelée, B. Yang, I. Verbauwhede, and B. Preneel, “On International Conference on Communications, May 2008, pp. 1653–
the feasibility of cryptography for a wireless insulin pump system,” in 1657.
Proceedings of the Sixth ACM Conference on Data and Application [72] K. Gill and S. H. Yang, “A scheme for preventing denial of service
Security and Privacy, ser. CODASPY ’16, 2016, pp. 113–120. attacks on wireless sensor networks,” in 2009 35th Annual Conference
[48] Barnaby Jack, “Implantable medical devices: Hacking humans,” of IEEE Industrial Electronics, Nov 2009, pp. 2603–2609.
https://en.wikipedia.org/wiki/Barnaby_Jack#cite_note-medcity-11, [73] R. Nanda and P. V. Krishna, “Mitigating denial of service attacks in
2015. hierarchical wireless sensor networks,” Network Security, vol. 2011,
[49] David Goldman, “A hacker can give you a fatal overdose,” no. 10, pp. 14 – 18, 2011.
http://money.cnn.com/2015/06/10/technology/drug-pump-hack/, 2013. [74] K. Sonar and H. Upadhyay, An Approach to Secure Internet of Things
Against DDoS. Singapore: Springer Singapore, 2016, pp. 367–376.
[50] FDA, “Two safety communications on the cybersecurity
vulnerabilities of two hospira infusion pump systems,”
http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/default.htm,
2015.
[51] K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun,
“Proximity-based access control for implantable medical devices,” in
ACM CCS, 2009.
[52] X. Hei and X. Du, “Biometric-based two-level secure access control for
implantable medical devices during emergencies,” in IEEE INFOCOM,
2011.
Yuchen Yang received the B.S. degree in computer
[53] F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, “Imdguard: Securing
software theory from Harbin Engineering university,
implantable medical devices with the external wearable guardian,” in
Harbin, China, in 2011. He is currently pursuing the
IEEE INFOCOM, 2011.
Ph.D. degree in computer application technology at
[54] M. Rostami, A. Juels, and F. Koushanfar, “Heart-to-heart (h2h): authen-
Harbin Engineering University, Harbin, China. He
tication for implanted medical devices,” in ACM CCS, 2013.
worked in E-government modeling and simulation
[55] X. Hei, X. Du, S. Lin, and I. Lee, “Pipac: Patient infusion pattern National Engineering Laboratory since 2009. His
based access control scheme for wireless insulin pump system,” in IEEE research interests include E-government modeling
INFOCOM, 2013. and simulation, organization and management in big
[56] X. Hei, X. Du, and S. Lin, “Poster: Near field communication based data.
access control for wireless medical devices,” in ACM MobiHoc, 2014.
[57] G. Zheng, G. Fang, M. A. Orgun, and R. Shankaran, “A non-key based
security scheme supporting emergency treatment of wireless implants,”
in IEEE ICC, 2014.
[58] X. Hei, X. Du, J. Wu, and F. Hu, “Defending resource depletion attacks
on implantable medical devices,” in IEEE GLOBECOM, 2010.
[59] J. Liu, M. A. Ameen, and K. S. Kwak, “Secure wake-up scheme for
wbans,” IEICE Transactions on Communications, vol. 93-B, no. 4, 2010.
[60] S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig,
“Securing communication in 6lowpan with compressed ipsec,” in 2011
International Conference on Distributed Computing in Sensor Systems Longfei Wu is a Ph.D. candidate in the Department
and Workshops (DCOSS), June 2011, pp. 1–8. of Computer and Information Sciences at Temple
[61] S. Raza, S. Duquennoy, J. Hoglund, U. Roedig, and T. Voigt, “Secure University under the supervision of Dr. Xiaojiang
communication for the internet of thingsâĂŤa comparison of link-layer Du. He received his B.E. degree in communication
security and ipsec for 6lowpan,” Security and Communication Networks, engineering from Beijing University of Posts and
vol. 7, no. 12, 2014. Telecommunications, Beijing, China, in 2012. His
[62] A. J. Jara, D. Fernandez, P. Lopez, M. A. Zamora, and A. F. Skarmeta, research interests are the security and privacy issues
“Lightweight mipv6 with ipsec support,” in Mobile Information Systems, of modern computing systems and devices, including
2014. mobile devices, medical devices, Internet-of-Things.
[63] T. Kothmayr, C. Schmitt, W. Hu, M. Bryunig, and G. Carle, “Dtls based
security and two-way authentication for the internet of things,” Ad Hoc
Netw., vol. 11, no. 8, pp. 2710–2723, Nov. 2013.
[64] S. Raza, D. Trabalza, and T. Voigt, “6lowpan compressed dtls for coap,”
in 2012 IEEE 8th International Conference on Distributed Computing
in Sensor Systems, May 2012, pp. 287–289.

2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2694844, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 10

Guisheng Yin born in 1964, China, Professor and


PhD supervisor in the Harbin Engineering Univer-
sity, senior member of China Computer Federation.
His main research interests include Data Mining,
Computational Intelligence, and Information Secu-
rity.

Lijie Li received her MS in 2006 from the College


of Computer Science and Technology, Harbin Engi-
neering UniversityïijŇChina and received her PhD
degree in 2012 from the College of Automation,
Harbin Engineering UniversityïijŇChina. Currently,
she is a lecturer in the College of Computer Sci-
ence and Technology, Harbin Engineering Univer-
sity, China. Her research interests include Privacy
Protection, Social Network and Pattern Recognition.

Hongbin Zhao is a post doctor in the College of


Computer Science and Technology, Harbin Engi-
neering University. He received his Ph.D. in Au-
tomation from Harbin Institute University, Harbin,
China. His research interests include data security
and privacy, mobile computing, distributed and net-
worked systems. He has more than 10 publications
as edited books and proceedings, invited book chap-
ters, and technical papers in refereed journals and
conferences.

2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

You might also like