Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective

被引:26
|
作者
Rondon, Luis Puche [1 ]
Babun, Leonardo [1 ]
Aris, Ahmet [1 ]
Akkaya, Kemal [1 ]
Uluagac, A. Selcuk [1 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Cyber Phys Syst Secur Lab, Miami, FL 33199 USA
关键词
Enterprise IoT systems; E-IoT; Smart home; Smart offices; Protocols; Security; BACnet; CLOUD COMPUTING SECURITY; THE-MIDDLE ATTACKS; JAMMING ATTACKS; WIRELESS; CHALLENGES; ISSUES; COUNTERMEASURES; AUTHENTICATION; NETWORKS; PRIVACY;
D O I
10.1016/j.adhoc.2021.102728
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As technology becomes more widely available, millions of users worldwide have installed some form of smart device in their homes or workplaces. These devices are often off-the-shelf commodity systems, such as Google Home or Samsung SmartThings, that are installed by end-users looking to automate a small deployment. In contrast to these "plug-and-play"systems, purpose-built Enterprise Internet-of-Things (E-IoT) systems such as Crestron, Control4, RTI, Savant offer a smart solution for more sophisticated applications (e.g., complete lighting control, A/V management, security). In contrast to commodity systems, E-IoT systems are usually closed source, costly, require certified installers, and are overall more robust for their use cases. Due to this, E-IoT systems are often found in expensive smart homes, government and academic conference rooms, yachts, and smart private offices. However, while there has been plenty of research on the topic of commodity systems, no current study exists that provides a complete picture of E-IoT systems, their components, and relevant threats. As such, lack of knowledge of E-IoT system threats, coupled with the cost of E-IoT systems has led many to assume that E-IoT systems are secure. To address this research gap, raise awareness on E-IoT security, and motivate further research, this work emphasizes E-IoT system components, E-IoT vulnerabilities, solutions, and their security implications. In order to systematically analyze the security of E-IoT systems, we divide EIoT systems into four layers: E-IoT Devices Layer, Communications Layer, Monitoring and Applications Layer, and Business Layer. We survey attacks and defense mechanisms, considering the E-IoT components at each layer and the associated threats. In addition, we present key observations in state-of-the-art E-IoT security and provide a list of open research problems that need further research.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Internet of Things (IoT) Security
    Kulkarni, Shivaji
    Durg, Shrihari
    Iyer, Nalini
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 821 - 824
  • [22] Security in the Internet of Things (IoT)
    Ahmed, Israr
    Saleel, A. P.
    Beheshti, Babak
    Khan, Zahoor Ali
    Ahmad, Imtiaz
    [J]. 2017 FOURTH HCT INFORMATION TECHNOLOGY TRENDS (ITT), 2017, : 84 - 90
  • [23] A Security Perspective on Battery Systems of the Internet of Things
    Anthony Bahadir Lopez
    Korosh Vatanparvar
    Atul Prasad Deb Nath
    Shuo Yang
    Swarup Bhunia
    Mohammad Abdullah Al Faruque
    [J]. Journal of Hardware and Systems Security, 2017, 1 (2) : 188 - 199
  • [24] Access control in Internet-of-Things: A survey
    Ravidas, Sowmya
    Lekidis, Alexios
    Paci, Federica
    Zannone, Nicola
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 144 : 79 - 101
  • [25] Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems
    Ferdowsi, Aidin
    Saad, Walid
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (02) : 1371 - 1387
  • [26] Towards an Importance of Security for Cyber-Physical Systems/Internet-of-Things
    Rehman, Shafiq Ur
    Ceglia, Manuel
    Siddiqui, Sidra
    Gruhn, Volker
    [J]. PROCEEDINGS OF 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND INFORMATION ENGINEERING (ICSIE 2019), 2019, : 151 - 155
  • [27] Enterprise Security for the Internet of Things (IoT): Lightweight Bootstrapping with EAP-NOOB
    Peltonen, Aleksi
    Ingles, Eduardo
    Latvala, Sampsa
    Garcia-Carrillo, Dan
    Sethi, Mohit
    Aura, Tuomas
    [J]. SENSORS, 2020, 20 (21) : 1 - 23
  • [28] Learning Internet-of-Things Security "Hands-On"
    Kolias, Constantinos
    Stavrou, Angelos
    Voas, Jeffrey
    Bojanova, Irena
    Kuhn, Richard
    [J]. IEEE SECURITY & PRIVACY, 2016, 14 (01) : 37 - 46
  • [29] Evaluation of a Hybrid Architecture for Security in Internet-of-Things
    Vulpe, Alexandru
    Arseni, Stefan-Ciprian
    Fratu, Octavian
    Halunga, Simona
    [J]. 2018 21ST INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2018, : 516 - 520
  • [30] Blockchain-based security aspects in heterogeneous Internet-of-Things networks: A survey
    Pohrmen, Fabiola Hazel
    Das, Rohit Kumar
    Saha, Goutam
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (10):