Analysis on functionalities and security features of Internet of Things related protocols

被引:10
|
作者
Rizzardi, Alessandra [1 ]
Sicari, Sabrina [1 ]
Coen-Porisini, Alberto [1 ]
机构
[1] Univ Insubria, Dipartimento Sci Teor & Applicate, Via Rossi 9, I-21100 Varese, Italy
关键词
Internet of things; Communication protocols; Security; Authentication; Confidentiality; Integrity; Authorization; MUTUAL AUTHENTICATION PROTOCOL; ACCESS-CONTROL; LIGHTWEIGHT; IOT; BLOCKCHAIN; TAXONOMY; SCHEME;
D O I
10.1007/s11276-022-02999-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) paradigm is characterized by the adoption of different protocols and standards to enable communications among heterogeneous and, often, resource-constrained devices. The risk of violation is high due to the wireless nature of the communication protocols usually involved in the IoT environments (e.g., e-health, smart agriculture, industry 4.0, military scenarios). For such a reason, proper security countermeasures must be undertaken, in order to prevent and react to malicious attacks, which could hinder the data reliability. In particular, the following requirements should be addressed: authentication, confidentiality, integrity, and authorization. This paper aims at investigating such security features, which are often combined with native functionalities, in the most known IoT-related protocols: MQTT, CoAP, LoRaWAN, AMQP, RFID, ZigBee, and Sigfox. The advantages and weaknesses of each one will be revealed, in order to point out open issues and best practices in the design of efficient and robust IoT network infrastructure.
引用
收藏
页码:2857 / 2887
页数:31
相关论文
共 50 条
  • [41] Security for the internet of things: a survey of existing mechanisms, protocols and open research issues
    Gormus, Sedat
    Aydin, Hakan
    Ulutas, Guzin
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2018, 33 (04): : 1247 - 1272
  • [42] Security in the internet of things
    Aigner M.
    Cryptology and Information Security Series, 2010, 4 : 109 - 124
  • [43] Artificial Intelligence-Based Security Protocols to Resist Attacks in Internet of Things
    Khilar, Rashmita
    Mariyappan, K.
    Christo, Mary Subaja
    Amutharaj, J.
    Anitha, T.
    Rajendran, T.
    Batu, Areda
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [44] Internet of things security
    Dazine, Jihad
    Maizate, Abderrahim
    Hassouni, Larbi
    2018 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT, OPERATIONS AND DECISIONS (ICTMOD), 2018, : 137 - 141
  • [45] Internet of Things Security
    Chahid, Yassine
    Benabdellah, Mohamed
    Azizi, Abdelmalek
    2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [46] Internet of things security
    Baskaran S.B.M.
    Journal of ICT Standardization, 2019, 7 (01): : 21 - 39
  • [47] Internet of Things (IoT) Security Requirements: Issues Related to Sensors
    Alqarni, Hussain
    Alnahari, Wael
    Quasim, Mohammad Tabrez
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 29 - 34
  • [48] Scalability Analysis of Medium Access Control Protocols for Internet of Things
    Ahmed, Nurzaman
    Rahman, Hafizur
    Hussain, Md. Iftekhar
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 601 - 611
  • [49] Power Consumption Analysis of Application Layer Protocols for the Internet of Things
    Velinov, Aleksandar
    Mileva, Aleksandra
    ICT INNOVATIONS 2016: COGNITIVE FUNCTIONS AND NEXT GENERATION ICT SYSTEMS, 2018, 665 : 193 - 202
  • [50] Simulation and Analysis of Authentication Protocols for Mobile Internet of Things (MIoT)
    Kumar, Adarsh
    Gopal, Krishna
    Aggarwal, Alok
    2014 INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2014, : 423 - 428