Security Requirement to Protect 5G enabled IOT middleware:
Inorder to protect the IOT middleware from aforementioned attacks, some of the security requirements which needs to be considered are [1,2,3]:
1) Access Control- This technique is used to allow on genuine and users that are authorized access to the network resources. Since IOT is becoming ubiquitous , privacy is of foremost important and the sensitive information should be disclosed only to authentic users.
2) Confidentiality- Cryptography techniques can be used to meet this aim, Multiple symmetric and asymmetric techniques can be used and their implementation depends on the individual device capabilities as the IOT device operate in an environment where resources are not in
…show more content…
7) Integrity- This is used to ensure that the data transmitted between the IOT devices has not been tinkered with by any unauthorized nodes either due to accident or due to some malicious intent. This can be ensured using MAC ie message authentication codes and employing a single hash function, which again depends on the device capabilities.
References
1) Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw.20(8), 2481–2501 (2014). doi:10.1007/s11276-014-0761-7
2) Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw.76, 146–164 (2015). doi:10.1016/j.comnet.2014.11. 008. http://www.sciencedirect.com/science/article/pii/S1389128614003971
3) Rodriguez, J.: Fundamentals of 5G Mobile Networks. Wiley, Hoboken (2015)
The security issues have driven the VIRTUS Middleware [12], an IoT middleware relying on the open eXtensible Messaging and Presence Protocol (XMPP), to provide a reliable and secure communication channel for distributed applications in 5G networks, which is protected with both authentication (through TLS protocol) and encryption (SASL protocol) mechanisms. OneM2M [32] proposes a global service layer platform for M2M communications. It aims at unifying the Global M2M Community, by enabling the interoperability of different M2M systems, across multiple networks and topologies on top of IP. The
This paper gives a clear understanding on the current state of art on the IoT. The primary idea of the IoT concept is the pervasive existence around us of a wide range of things such as Radio-Frequency Identification (RFID) tags, actuators, sensors, mobile phones, etc. These are able to communicate with each other and collaborate with their neighbors to reach collective goals through distinctive addressing scheme.
While IoT devices holds much promise, there are still many security issues that need to be addressed. These security issues can have a significant impact on everyday life, such as causing damage, disruption to business operations, and in some cases even loss of life. Having all your devices interconnected using IoT such as lighting, thermostats, doors, and elevators, seems convenient but in fact this poses a great security risk. If these risks are exploited it could disrupt power or lighting which could lead to a loss of life if it were something like a hospital. Addressing these security risks will lead to more efficient and safer to use IoT devices but companies will have to identify them in their devices first (Tankard, 2015).
The purpose of this study will be to develop adequate security strategies and best practices as a guide to add to the knowledge base of current literature on IoT devices. The current research literature on the internet of things indicates that the number of attacks against IoT devices are on the rise. The number of potential attackers is growing at an alarming rate because of the number of IoT devices that are joined to network every day (Abomhara and Kien, 2015). Tools are available to those same potential attackers are much more sophisticated that they have ever been. (p. 66). This study will provide valuable information to IT leaders, service providers, vendors and IoT manufactures.
When computer security experts discuss their trade, the term “air-gapped computer” may crop up. To be “air-gapped” is to be not connected to any network in any way, thereby preventing remote access. With ordinary computing devices such as laptops and smartphones, this is a viable, easily usable, and powerful option. Conversely, and by design, Internet of Things devices operate only when communicating with the Internet, and, as such, this common dependence is their most critical weakness. Because constant connectivity has such severe consequences, especially when considering essential utilities, the U.S. Department of Homeland Security considers “IoT security … [to be] a matter of homeland security.” In the Department’s “Strategic Principles for Securing the Internet of Things (IoT),” six best practices are suggested for all producers: Incorporate Security at the Design Phase, Advance Security Updates and Vulnerability Management, Build on Proven Security Practices, Prioritize Security Measures According to Potential Impact, Promote Transparency across IoT, and Connect Carefully and Deliberately. While these procedures would certainly help alleviate the negative impact the IoT is likely to have, capitalism’s frantic speed makes it unlikely. Because of strict deadlines, many technology devices suffer from
Internet of Things is a new technology that delivers communication among billions of smart devices via the Internet such as a smart car, vending machine, smart house, health system and business system, et cetera. Nearly 50 billion devices and sensors will be connected to the Internet by 2020 and most of them will perform their duties without having security. In addition, the critical missions of a massive interconnected device are security and interoperability. Hackers will use more complex tools and techniques to breach the network system. Hence, companies should establish strong security countermeasures and the best approach to provide better security by deploying a multilayer approach which is called Defense in Depth. Defense in Depth
The Internet of Things offers many opportunities for businesses to enhance the efficiency of their services and products, find new streams of revenue, slash their operating costs and complete their digital transformation. However, as the number of connected devices increases, unprepared organizations may find themselves overwhelmed by the need to step up their cybersecurity game and become more proactive when it comes to protecting their data and systems. Companies manufacturing smart devices are blazing new trails in the technology world, and as is true for all innovative technology, there are still many things that have yet to be
Internet of Things is a new technology that delivers communication among billions of smart devices via the Internet such as a smart car, vending machine, smart house, health system and business system, et cetera. Nearly 50 billion devices and sensors will be connected to the Internet by 2020 and most of them will perform their duties without having security. In addition, the critical missions of a massive interconnected device are security and interoperability. Hackers will use more complex tools and techniques to breach the network system. Hence, companies should establish strong security countermeasures and the best approach to provide better security by deploying a multilayer approach, which is called defense in depth. Defense in depth
Privacy and the IoT: Navigating Policy Issues - Opening Remarks of FTC Chairwoman Edith Ramirez[10], “Today, I would like to focus on three key challenges that, in my view, the IoT poses to consumer privacy: (1) ubiquitous data collection; (2) the potential for unexpected uses of consumer data that could have adverse consequences; and (3) heightened security risks. These risks to privacy and security undermine consumer trust. And that trust is as important to the widespread consumer adoption of new IoT products and services as a network connection is to the functionality of an IoT device. I believe there are three key steps that companies should take to enhance consumer privacy and security and thereby build consumer trust in IoT devices: (1) adopting “security by design”; (2) engaging in data minimization; and (3) increasing transparency and providing consumers with notice and choice for unexpected data uses. I believe these steps will be key to successful IoT business models and to the protection of consumer information.” This project wants to achieve just the same goal as intended in both of the base papers combined
In this essay I will argue that the Internet of Things (IoT) will be the downfall of our privacy. Internet of things is the anticipated future! A future where everyone has dozens of very small, very low-power devices with CPUs, sensors and radios. This leaves room for a lot of interesting work to be done, but nobody seems to have asked the question "Do we really want an Internet of
Abstract—Due to the vulnerable nature of the Internet of Things (IOT) the security and privacy are those important issues for the IOT which attracted lots of focus in recent years. The lack of efficient and lightweight authentication method in IOT can make it a delicious vulnerable victim for several impersonate-based attacks. This paper proposes a new authentication mechanism for IOT called Certificate-based Identity Resolution (CIR) which tries to protect IOT terminal nodes from attacks by applying a lightweight identity resolution method and using a Local Certificate Generator in order to simplify the node authentication process.
Security and convenience are often the two determining factors that people consider when buying new technology. This type of technology includes devices like smart watches, networked home security systems, smart cars, and remote controlled thermostats. All of these devices have known security flaws and consequences, yet people still continue to buy and use them. These groups of technology and many similar to them are often referred to as the “Internet of Things” or IoT for short. This phrase describes how all of these gadgets and software are interconnected with one another. The problem lies in what consequences ensue from this interconnection. Through the internet, these devices are connected and communicating with one another, constantly and without any warning. What this means is that all of these devices, when active, are always monitoring, tracking, and submitting data about us and our environment. Why do people continue to use devices which are a part of the “Internet of Things”, if it is known that they are often hacker prone, insecure, and handle some of the most sensitive personal information we have?
IoT encompasses different devices which connect to the internet and talk to each other. “By 2020, the Internet of Everything expected to connect 50 Billion”. IoT leads to a multitude of things(devices) sharing data over the internet, which would definitely contain a lot of private information. Thus, information security on the shared data is of utmost importance. Security and privacy related issues are bound to explode if not addressed succinctly.
Internet of Things (IoT): With many more devices in use in the enterprise, many of which IT may not be aware of, there are many security vulnerabilities that are added to
Abstract—the internet of things is the interconnection of computing devices by means of internet, which has implanted in small gadgets in order to send and receive the data. Nowadays IOT has becoming basic research subject because it arranges distinctive sensors and objects to communicate particularly with each other without human mediation. IOT security is the region where the connected devices and network protected without vulnerability and viruses. In this report, we discuss about IOT devices will now alternatively stored in cloud, but the hackers are leaking the data from cloud to overcome this problem we have BitBox device which backup the data from IOT devices and using some of the authentication methods. Moreover, the other
The concept of the internet of things abbreviated as IoT was introduced as early as the late 90’s by Kevin Ashton, the Executive Director of Auto-ID Labs and a professor at Massachusetts Institute of Technology. Now, “the Internet of things is already a disruptive technology capable of determining fundamental changes that are happening in everyday life, and it is considered the fourth industrial revolution.” (Hucanu) The Internet of Things (IoT)