Analysis on functionalities and security features of Internet of Things related protocols

被引:10
|
作者
Rizzardi, Alessandra [1 ]
Sicari, Sabrina [1 ]
Coen-Porisini, Alberto [1 ]
机构
[1] Univ Insubria, Dipartimento Sci Teor & Applicate, Via Rossi 9, I-21100 Varese, Italy
关键词
Internet of things; Communication protocols; Security; Authentication; Confidentiality; Integrity; Authorization; MUTUAL AUTHENTICATION PROTOCOL; ACCESS-CONTROL; LIGHTWEIGHT; IOT; BLOCKCHAIN; TAXONOMY; SCHEME;
D O I
10.1007/s11276-022-02999-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) paradigm is characterized by the adoption of different protocols and standards to enable communications among heterogeneous and, often, resource-constrained devices. The risk of violation is high due to the wireless nature of the communication protocols usually involved in the IoT environments (e.g., e-health, smart agriculture, industry 4.0, military scenarios). For such a reason, proper security countermeasures must be undertaken, in order to prevent and react to malicious attacks, which could hinder the data reliability. In particular, the following requirements should be addressed: authentication, confidentiality, integrity, and authorization. This paper aims at investigating such security features, which are often combined with native functionalities, in the most known IoT-related protocols: MQTT, CoAP, LoRaWAN, AMQP, RFID, ZigBee, and Sigfox. The advantages and weaknesses of each one will be revealed, in order to point out open issues and best practices in the design of efficient and robust IoT network infrastructure.
引用
收藏
页码:2857 / 2887
页数:31
相关论文
共 50 条
  • [21] Analysis of Cloud Security and Internet of Things
    Qian, Peng
    Ding, Yaowei
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 513 - 516
  • [22] Analysis of the Security of Internet of Multimedia Things
    Lv, Zhihan
    Qiao, Liang
    Song, Houbing
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 16 (03)
  • [23] Analysis and Design of Security in Internet of Things
    Tian, Cuihua
    Chen, Xuhui
    Guo, Di
    Sun, Jinhua
    Liu, Ling
    Hong, Jiangshui
    2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 678 - 684
  • [24] On the features and challenges of security and privacy in distributed internet of things
    Roman, Rodrigo
    Zhou, Jianying
    Lopez, Javier
    COMPUTER NETWORKS, 2013, 57 (10) : 2266 - 2279
  • [25] Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems
    Helbig, Colton
    Otoum, Safa
    Jararweh, Yaser
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [26] Performance Evaluation of end-to-end security protocols in an Internet of Things
    De Rubertis, Antonio
    Mainetti, Luca
    Mighali, Vincenzo
    Patrono, Luigi
    Sergi, Ilaria
    Stefanizzi, Maria Laura
    Pascali, Stefano
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 94 - 99
  • [27] Tailoring End-to-End IP Security Protocols to the Internet of Things
    Hummen, Rene
    Wirtz, Hanno
    Ziegeldorf, Jan Henrik
    Hiller, Jens
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [28] Internet of Things Protocols Comparison, Architecture, Vulnerabilities and Security: State of the art
    Chahid, Yassine
    Benabdellah, Mohamed
    Azizi, Abdelmalek
    ICCWCS'17: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND WIRELESS COMMUNICATION SYSTEMS, 2017,
  • [29] Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03): : 1294 - 1312
  • [30] Security Level versus Energy Consumption in Wireless Protocols for Internet of Things
    Venckauskas, Algimantas
    Jusas, Nerijus
    Toldinas, Jevgenijus
    Kazanavicius, Egidijus
    INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2014, 2014, 465 : 419 - 429