Internet of Things Security
DOI:
https://doi.org/10.13052/jicts2245-800X.712Keywords:
Internet of Things, Network security threat, Communication security, LTE, 5G, SENSEAbstract
The emergence of the Internet of Things (IoT) with its sprawling set of technologies and use cases paves way for diversified and new service providers to develop a plethora of connected products and services for a go-ahead business and enrich lives of individuals. As the new service providers may be unaware of the threats their services face and the emerging categories of first time connected devices, IoT services, use cases and the network types comes along with a new threat landscape there is a huge possibility for even a Zero-day exploits. The provision of wide area connectivity to an ever-widening variety of IoT services will increase the whole ecosystem’s exposure to fraud and attack. As the security issues are a significant inhibitor to the deployment of many new IoT services and attackers are showing ever greater interest in this area, this research article presents an overview of the threat vectors to the IoT ecosystem and the expected security features with Security-as-a-Network Service (SENSE) and other solutions that need to be in place to thwart the evolving security threats.
Downloads
References
The National Security Agency’s review of emerging technologies “The NextWave”, https://www.nsa.gov/Portals/70/documents/resources/ everyone/digital-media-center/publications/the-next-wave/TNW-21-2. pdf, Last accessed: 07 Jan 2019.
GSMA, “Remote Provisioning Architecture for Embedded UICC”, https://www.gsma.com/newsroom/wp-content/uploads/SGP.02 v3.2 up dated.pdf, Last accessed: 07 Jan 2019.
GSMA Whitepaper, “3GPP Low Power Wide Area Technologies”, https://www.gsma.com/iot/wp-content/uploads/2016/10/3GPP-Low-Po wer-Wide-Area-Technologies-GSMA-White-Paper. pdf, Last accessed: 07 Jan 2019.
Migrating an Internet of Things (IoT) Sensor Design to LoRaWAN, https://info.semtech.com/migrating sensor design white paper down load, Last accessed: 07 Jan 2019.
GSMA, “IoT Security Guidelines for Network Operators”, https://www. gsma. com/iot/iot-security-guidelines-for-network-operators/, Last acces sed: 07 Jan 2019.
GSMA, “IoT Security Guidelines for Endpoint Ecosystems”,https://www. gsma. com/iot/iot-security-guidelines-for-endpoint-ecosystem/, Last accessed: 07 Jan 2019.
GSMA, “IoT Security Guidelines for IoT Service Ecosystems”, https://www.gsma. com/iot/iot-security-guidelines-for-iot-service-eco system/, Last accessed: 07 Jan 2019.
3GPP TS 23.122, “Non-Access-Stratum (NAS) functions related to Mobile Station (MS) in idle mode”.
3GPP TR 33.861, “Study on evolution of Cellular IoT security for the 5G System”.
3GPPTS 33.401, “3GPP System Architecture Evolution (SAE); Security architecture”.
3GPP TS 33.501, “Security architecture and procedures for 5G system”.
ENISA, “Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures”, November 2017, https://publications. europa.eu/en/publication-detail/-/publication/c37f81 96-d96f-11e7-a506-01aa75ed71a1, Last accessed: 07 Jan 2019.
William M.S. Stout and Vincent E. Urias (Sandia National Laboratories), “Challenges to Securing the Internet of Things”, 2016 IEEE International Carnahan Conference on Security Technology (ICCST).
NIST – Industrial Internet Consortium, “Industrial Internet of Things Security Framework”, https://www.iiconsortium.org/IISF.htm, Last accessed: 07 Jan 2019.
3GPP TS 33.220, “Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)”.
ONEM2M TS-0003-V3.8.0, “Security Solutions”, April 2018.
O. Garcia-Morchon (Philips IP&S), S. Kumar (Philips Research), M. Sethi (Ericsson), “State-of-the-Art and Challenges for the Internet of Things Security”, Network Working Group, Dec 2018, https://tools.ietf.org/id/draft-irtf-t2trg-iot-seccons-13.html, Last accessed: 07 Jan 2019.
C. Kaufman (Microsoft), P. Hoffman (VPN Consortium), Y. Nir (Check Point), P. Eronen (Independent), T. Kivinen (INSIDE Secure), RFC7296, “Internet Key Exchange Protocol Version 2”, 2014.
E. Rescorla (Mozilla), RFC8446, “The Transport Layer Security (TLS) Protocol Version 1.3”, 2018.
E. Rescorla (RTFM Inc.), N. Modadugu (Google Inc.), RFC6347, “Datagram Transport Layer Security Version 1.2”, 2012.
R. Moskowitz, Ed. (HTT Consulting), T. Heer (Hirschmann Automation and Control), P. Jokela (Ericsson), T. Henderson (University of Washington), RFC7401, “Host Identity Protocol Version 2 (HIPv2)”, 2015.
D. Forsberg (Nokia), Y. Ohba, Ed. (Toshiba), B. Patil & H. Tschofenig (Nokia Siemens Networks), A. Yegin (Samsung), RFC5191, “Protocol for Carrying Authentication for Network Access (PANA)”, 2008.
C. Neuman (USC-ISI), T. Yu, S. Hartman & K. Raeburn (MIT), RFC4120, “The Kerberos Network Authentication Service (V5)”, 2005.
A. Melnikov, Ed. (Isode Limited), K. Zeilenga, Ed. (OpenLDAP Foundation), RFC4422, “Simple Authentication and Security Layer (SASL)”, 2006.