Analysis on functionalities and security features of Internet of Things related protocols

被引:10
|
作者
Rizzardi, Alessandra [1 ]
Sicari, Sabrina [1 ]
Coen-Porisini, Alberto [1 ]
机构
[1] Univ Insubria, Dipartimento Sci Teor & Applicate, Via Rossi 9, I-21100 Varese, Italy
关键词
Internet of things; Communication protocols; Security; Authentication; Confidentiality; Integrity; Authorization; MUTUAL AUTHENTICATION PROTOCOL; ACCESS-CONTROL; LIGHTWEIGHT; IOT; BLOCKCHAIN; TAXONOMY; SCHEME;
D O I
10.1007/s11276-022-02999-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) paradigm is characterized by the adoption of different protocols and standards to enable communications among heterogeneous and, often, resource-constrained devices. The risk of violation is high due to the wireless nature of the communication protocols usually involved in the IoT environments (e.g., e-health, smart agriculture, industry 4.0, military scenarios). For such a reason, proper security countermeasures must be undertaken, in order to prevent and react to malicious attacks, which could hinder the data reliability. In particular, the following requirements should be addressed: authentication, confidentiality, integrity, and authorization. This paper aims at investigating such security features, which are often combined with native functionalities, in the most known IoT-related protocols: MQTT, CoAP, LoRaWAN, AMQP, RFID, ZigBee, and Sigfox. The advantages and weaknesses of each one will be revealed, in order to point out open issues and best practices in the design of efficient and robust IoT network infrastructure.
引用
收藏
页码:2857 / 2887
页数:31
相关论文
共 50 条
  • [1] Analysis on functionalities and security features of Internet of Things related protocols
    Alessandra Rizzardi
    Sabrina Sicari
    Alberto Coen-Porisini
    Wireless Networks, 2022, 28 : 2857 - 2887
  • [2] Taxonomy and analysis of security protocols for Internet of Things
    Das, Ashok Kumar
    Zeadally, Sherali
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 110 - 125
  • [3] Review of Internet of Things security protocols - A Bibliometric Analysis
    Mwansa, Gardner
    Mabanza, Ntima
    2023 25TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, ICACT, 2023, : 394 - 400
  • [4] Lightweight Security Protocols for the Internet of Things
    Wu, Xin-Wen
    Yang, En-Hui
    Wang, Junhu
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [5] Security Protocols for Internet of Things: A Survey
    Deshmukh, Snehal
    Sonavane, S. S.
    2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 71 - 74
  • [6] In-depth energy analysis of security algorithms and protocols for the Internet of Things
    Winderickx, Jori
    Braeken, An
    Singelee, Dave
    Mentens, Nele
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (02) : 137 - 149
  • [7] In-depth energy analysis of security algorithms and protocols for the Internet of Things
    Jori Winderickx
    An Braeken
    Dave Singelée
    Nele Mentens
    Journal of Cryptographic Engineering, 2022, 12 : 137 - 149
  • [8] Security in the Internet of Things: A Survey on Application Layer Protocols
    Nastase, Lavinia
    2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 659 - 666
  • [9] Internet of Things: Existing Protocols and Technological Challenges in Security
    Sardeshmukh, Harshal
    Ambawade, Dayanand
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [10] A Security Evaluation of Popular Internet of Things Protocols for Manufacturers
    Celebucki, Daniel
    Lin, Maj Alan
    Graham, Scott
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,