Vous êtes sur la page 1sur 24

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/319527564

The rise of ransomware and emerging security challenges in the Internet of Things

Article  in  Computer Networks · December 2017


DOI: 10.1016/j.comnet.2017.09.003

CITATIONS READS

3 459

7 authors, including:

Ejaz Ahmed Muhammad Imran


Institute of Electrical and Electronics Engineers (IEEE) 143 PUBLICATIONS   710 CITATIONS   
68 PUBLICATIONS   1,209 CITATIONS   
SEE PROFILE
SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Sink Mobility in WSNs View project

Edge Computing and Analytics View project

All content following this page was uploaded by Ibrar Yaqoob on 20 September 2017.

The user has requested enhancement of the downloaded file.


COMPUTER NETWORKS 1

The rise of ransomware and emerging security


challenges in the Internet of Things
Ibrar Yaqoob, Ejaz Ahmed, Member, IEEE, Muhammad Habib
ur Rehman, Abdelmuttlib Ibrahim Abdalla
Ahmed, Mohammed Ali Al-Garadi, Muhammad Imran, Member, IEEE, and
Mohsen Guizani, Fellow, IEEE

Abstract—With the increasing miniaturization of smartphones, computers, and sensors in the Internet of Things (IoT)
paradigm, strengthening the security and preventing ransomware attacks have become key concerns. Traditional security
mechanisms are no longer applicable because of the involvement of resource-constrained devices, which require more
computation power and resources. This paper presents the ransomware attacks and security concerns in IoT. We initially
discuss the rise of ransomware attacks and outline the associated challenges. Then, we investigate, report, and highlight
the state-of-the-art research efforts directed at IoT from a security perspective. A taxonomy is devised by classifying
and categorizing the literature based on important parameters (e.g., threats, requirements, IEEE standards, deployment
level, and technologies). Furthermore, a few credible case studies are outlined to alert people regarding how seriously
IoT devices are vulnerable to threats. We enumerate the requirements that need to be met for securing IoT. Several
indispensable open research challenges (e.g., data integrity, lightweight security mechanisms, lack of security software’s
upgradability and patchability features, physical protection of trillions of devices, privacy, and trust) are identified and
discussed. Several prominent future research directions are provided.

Index Terms—Internet of Things, Security, Authentication, Ransomware, Trust.

1 I NTRODUCTION smart controlling decisions. The proliferation


Immigrating to a promising era of the Internet of miniaturized sensors and connected IoT de-
of Things (IoT), ubiquitously small embedded vices is expected to reach 26 billion by 2020,
devices are implanted with various sensors to most of which are wearable devices [1]. In this
sense data from their surroundings and provide modern era of technology, people have started
to deploy real-world IoT applications, from
• I. Yaqoob, E. Ahmed, and A.I.A. Ahmed are with Centre for connected smart homes [2], connected cars [3],
Mobile Cloud Computing Research, Faculty of Computer Science [4], smart parking [5], and health monitoring
and Information Technology, University of Malaya, Malaysia. (E- [6], [7] to smart utility meters [8], as shown in
mail: {ibraryaqoob@siswa.um.edu.my, ejazahmed@ieee.org, ab-
delmuttlib@siswa.um.edu.my) Figure 1. Although IoT can facilitate different
• M.H. Rehman is with COMSATS Institute of Information aspects of people’s lives, enabling high secu-
Technology, Wah Campus, 47040 Pakistan. (Email: habibcom-
sats@gmail.com)
rity, developing ransomware prevention, and
• M.A. Al-garadi is with the Department of Information establishing solutions are the key remaining
Systems, University of Malaya, Malaysia. (Email: mo- concerns, given that IoT devices hold sensitive
hammedali@siswa.um.edu.my)
• M. Imran is working with the College of Computer and Infor- information [9].
mation Sciences, King Saud University, Saudi Arabia. (Email: A HP study reveals that 70% of IoT devices
dr.m.imran@ieee.org)
• Mohsen Guizani is working with the Department of Electrical
are vulnerable to attacks 1 . Hacking of smart
and Computer Engineering, University of Idaho, USA. (Email:
mguizani@ieee.org)
1. http://www.itpro.co.uk/security/22804/hp-70-of-
internet-of-things-devices-vulnerable-to-attack
COMPUTER NETWORKS 2

Fig. 1: Illustration of IoT Applications

cars is also one of the security threats in IoT specifically focused on emerging threats and
[10]. According to recent market data, the IoT challenges, such as ransomware. In addition,
security market is expected to rise to $28.90 bil- several other important aspects of IoT security,
lion by 2020, which indicates that high-security which are discussed in the current study, have
threats are expected to rise substantially in not been reported.
the foreseeable future 2 . On the other hand, The contributions of this study can be sum-
ransomware continues to experience record marized as follows.
growth in 2017. Therefore, ensuring that each • We initially discuss the rise of ran-
device has the control to maintain data confi- somware attacks and outline the associ-
dentiality and integrity within an organization ated challenges.
is necessary [11]. In addition, investigation of • We investigate, report, and highlight the
IoT security along with data integrity holds state-of-the-art research efforts directed
practical significance in IoT development. Fig- at IoT from the security perspective.
ure 2 illustrates the security threats in IoT. Tra- • We devise a taxonomy of IoT security
ditional security mechanisms will be unable to by classifying and categorizing the liter-
accommodate IoT devices completely because ature.
most of these devices have battery constraints • A few notable reported case studies on
and limited resources; however, these mecha- IoT security are outlined.
nisms require more resources [12]. Therefore, • We enumerate the requirements for se-
the prime focus of this study is on exposing curing IoT.
emerging IoT threats, challenges, and potential • We identify and discuss indispensable
solutions. open challenges in strengthening the se-
In general, IoT security has been widely curity in IoT.
investigated [13]–[22]; however, to the best of • Several prominent future research direc-
our knowledge, none of the existing studies tions are provided.
2. http://formtek.com/blog/internet-of-things-security- These contributions are provided separately
most-early-entry-iot-devices-have-weak-security-at-best/ from Sections 2 to 8; the concluding remarks are
COMPUTER NETWORKS 3

Smart stadium
Smart industries
Smart house
Smart hospital

Smart transportation

Smart school

Smart building
Smart train station

Security threats

Security threats

1 3 4 5

Smart people
Smart car

2
Smart parking system

Smart waste
Smart airport Security threats
management

Fig. 2: Illustration of Security Concerns in an Internet of Things Environment

provided in Section 9. with the devices, ask for a hefty sum as a


ransom, and release data to the user only after
2 R ANSOMWARE successful payment. In case a user does not
pay, ransomware either extends the payment
This section describes the basic working of ran-
periods and ransom amount or deletes the data
somware in an IoT context and discusses their
from the devices [24].
common types. We also discuss some of the
approaches used by ransomware to penetrate Initially, ransomware was named “AIDS”,
in the IoT network and provided some exam- as reported in 1989, when Joseph Popp dis-
ples of IoT-based ransomwares. Finally, some tributed 20,000 infected floppy disk drives to
remedies and challenges are highlighted. the participants of World Health Organizations’
Unlike traditional malware threats, a ran- AIDS conference [25]. AIDS monitored the sys-
somware attack in IoT can be more devastat- tems and counted number of times for which
ing as it may affect an entire landscape of the systems were rebooted. It used to either
security services i.e., confidentiality, integrity, encrypt data files or hide directory folders in
and availability, which may not only result in C drive of infected computers. AIDS used to
financial losses but may also result in an im- silently stay in the systems and get activated
portant information breach [23]. A ransomware after a system reboots for 90 times. AIDS did
may take entire control of data or a system not proliferate at massive scale because of less
and allow limited access for user interaction connectivity of computers and absence of large-
COMPUTER NETWORKS 4

scale exposure with other devices and systems. to legacy computers. Similarly, due to large-
Later, ransomware appeared and infiltrated scale deployment, determining the right owner
computers using different fraudulent, mali- of IoT devices (especially in mobile IoT) is
cious, and fake applications [26]. Such software difficult. In traditional ransomware attacks, an
tricked users by generating false alarms (e.g., attacker can easily launch the attack and enable
falsely reporting that users’ data and system are the user to transfer the money from the same
compromised) and ask for money to recover the system. However, in IoT devices, an attacker
data. may need to launch a ransomware attack from
From 2005 to March 2016, approximately multiple devices due to limitation in interaction
7600 ransomware attacks were reported by In- interfaces. On the other hand, ransomware is a
ternet Crime Complaint Center (IC3). The liter- big attraction for attackers focusing on mission
ature review shows that early attacks were not critical and real-time systems [30]. These type
immensely dangerous because of less connec- of IoT devices and systems include life-support
tivity of computers and difficulties in collection systems, industrial robotics, smart manufactur-
of ransom money from users. However, current ing machinery, smart railway systems, smart
technology trends such as gigantic growth of cars, and smart airplanes.
IoT devices, connectivity of devices and users,
exposure of users’ personal data through social
media, and the prevalence of cryptocurrencies 2.1 Common Types of Ransomware
have enabled hackers to easily infiltrate devices Ransomware are categorized into three basic
and collect ransom money from device owners. types.
Ransomware works differently in display-
based and display-less IoT devices [27], [28]. 2.1.1 Crypto Ransomware
IoT devices generally have minimal-sized dis-
A crypto ransomware works by applying en-
play screens or come without display screens.
cryption and decryption algorithms on device
In the case of former, ransomware attacks work
data. Such ransomware usually works on pub-
in a way similar to that in legacy comput-
lic–private key relationships whereby data are
ers [29]. Hackers first penetrate IoT devices,
encrypted using public keys and the users are
encrypt the data files, ask for a ransom amount,
given back the private keys to decrypt their
and issue the decryption key to unlock the
data. In the case of IoT devices, a crypto ran-
devices in case of successful receipt of ransom
somware is more dangerous when it attacks
money. However, penetrating ransomware in
back-end application servers because IoT de-
IoT devices is challenging because attackers
vices at the forefront do not contain a large
need to determine the right owners of the de-
amount of data.
vices to demand ransom money. In addition,
most IoT devices are controlled/managed by
other devices; hence, the attacker need to find 2.1.2 Locker Ransomware
the controlling device to penetrate and encrypt A locker ransomware works by restricting user
the data. In case of IoT, the successful attacks access to device/system functionalities. In ad-
can take place only if the attacker is fully aware dition, more dangerous Locker ransomware
of topological settings of the IoT network. may alter the functionality of IoT devices to
Considering the history, tiny IoT devices persuade device owners to pay ransom money.
have not been an attractive target of ran- In typical IoT scenarios, restricting user access
somware attacks so far. This is mainly because is subject to disabling user interfaces, inacti-
these devices usually collect data streams from vating onboard sensors, and generating Denial
onboard sensory and non-sensory sources and of Service (DoS) attacks to degrade the device
immediately transfer it to application servers or performance. A locker ransomware can also
cloud data centers. Therefore, gaining control alter the operating behavior of IoT devices and
over IoT data has less attraction as compared locks the device until the device owner pays
COMPUTER NETWORKS 5

the ransom. For example, controlling the ther- in response of phishing email, the entire IoT
mostat in an industrial production unit may network is compromised. The botnet could
increase the energy consumption, thus causing also become a vehicle for self-propagating ran-
monetary loss. Locker ransomware attacks are somware, which may cause flooding and DoS
usually launched at the front-end IoT devices. attacks within an IoT network [32]. When a
device/network security is compromised, the
2.1.3 Hybrid Ransomware related information of the device/data could be
Hybrid ransomware attacks that enable encryp- sold to other ransomware attackers and botnet
tion and locking mechanisms are more danger- operators. Therefore, compromised data and
ous because the device data and functionality devices remain under constant threat even after
could be compromised. A hybrid ransomware removing the ransomware from the networks.
attack could become more vicious because it
can target front-end and back-end IoT devices 2.2.3 Social Engineering
and systems. Although technically, launching Ransomware using social engineering tactics
hybrid ransomware attacks are difficult due is an easy tool to trap users whereby attack-
to device heterogeneity, ownership, and mul- ers portray themselves as legal authorities and
tilayer deployment of IoT systems, such attacks collect user information to penetrate user sys-
could easily paralyze an entire IoT network, tems. However, IoT devices usually do not pro-
including front-end devices and back-end ap- vide direct interaction with external users. Ran-
plication servers. somware attacks in this case could be launched
by external users by presenting themselves as
2.2 Ransomware Penetration Methods legitimate users/devices within the IoT net-
work.
In the case of IoT devices, ransomware may
penetrate in multiple ways. 2.2.4 Ransomware-as-a-Service
2.2.1 Content Delivery Network (CDN) and Given that IoT devices heavily depend on ap-
Malvertisement plications services and cloud data centers, at-
tackers can intercept device–cloud traffic and
Massive distribution of ransomware can take inject ransomware. At the device end, the ran-
place if the malware is embedded in multi- somware may appear as a subscribed service.
media and Internet traffic [31]. Attackers can However, when the IoT device uses the infected
intercept CDN traffic in the back-end edge net- services, the entire IoT network is under threat.
works and at the front-end IoT devices. The
ransomware can hold the CDN traffic using
back-end cache servers and onboard memory 2.3 Current Ransomware
of IoT devices. Attackers can also trap IoT Given that IoT devices and systems are a rel-
device users through malvertisement, wherein atively new research field, only a few ran-
the advertised material through CDN seems somware attacks have been reported in the
legitimate but contains malware, which users literature. Table 1 presents a comprehensive
erroneously install on their devices and com- list of notable ransomware attacks. Few IoT-
promise data/device security. related ransomware attacks are presented and
discussed below.
2.2.2 Botnets and Downloaders
Ransomware can also be penetrated using bot- 2.3.1 Thermostat Hacking
nets that silently roam inside IoT networks. Tierney and Munro hacked a thermostat device
Attackers may use phishing emails, in which to prove that IoT devices could be hacked for
users are asked to download the attached files ransom. The researchers had no malicious in-
or click on certain links. Once a botnet gets tent but wanted to show that such an attack is
activated in result of user or device activity possible. The idea behind their research was to
COMPUTER NETWORKS 6

TABLE 1: Popular Ransomware Attacks


Ransomware Year Type Target Devices and Systems
AIDS Trojan 1989 Locker Ransomware Floppy Diskettes, Computers
Archievus 2005 Crypto Ransomware Computers
Gpcode.AK 2008 Crypto Ransomware Computers
Unnamed Trojan 2011 Locker Ransomware Computers, Operating Systems
Reveton 2012 Social Engineering Computers, Mobile Devices
CryptoLocker 2013 Crypto Ransomware Computers, Mobile Devices
CryptoDefense 2014 Crypto Ransomware Computers, Mobile Devices,
Wearable Devices
CryptoWall 2014 Crypto Ransomware Computers
Sypeng 2014 Social Engineering Android Mobile Devices
Koler 2014 Locker Ransomware Android Mobile Devices
CTB-Locker 2014 Hybrid Ransomware Computers
SimplLocker 2014 Crypto Ransomware Mobile Devices
LockerPin 2015 Locker Ransomware Mobile Devices
TeslaCrypt 2015 Crypto Ransomware Data Encryption on Disk
Chimera 2015 Malvetisement Data Encryption on Disk
LowLevel04 2015 Crypto Ransomware Remote Desktop Computers
7ev3n 2016 Crypto Ransomware Data Encryption on Disk
Ransomware32 2016 Locker Ransomware Computers
SamSam (SAMAS) 2016 Crypto Ransomware Computers
Locky 2016 Downloader Computers
Petya 2016 Locker Ransomware Windows Computers
KeRanger 2016 Crypto Ransomware Mac Computers
Jigsaw 2016 Crypto Ransomware Windows Computers
Maktub 2016 Crypto Ransomware Data Encryption on Disk
Cryptxxx 2016 Crypto Ransomware Windows Operating System
PowerWare 2016 Locker Ransomware Windows Operating System
ZCryptor 2016 Crypto Ransomware Data Encryption on Disk
GoldenEye 2016 Locker Ransomware Windows Operating System
Crysis 2016 Crypto Ransomware Data Encryption on Disk
zCrypt 2016 Cryto Ransomware Data Encryption on Disk
WannaCry/WannaDecryptor 2017 Cryptoware Data Encryption on Disk

highlight the importance of IoT device security and locks the display screen. The ransomware
to create awareness against malicious attacks. was bundled in a fake movie screening applica-
The ransomware was downloaded by exploit- tion, and then activated when the user installed
ing an undisclosed bug in an IoT application, the application in a smart TV. It not only locks
which was then revealed to a thermostat ven- the screen but also disables the factory reset op-
dor to fix for future devices. The hacked ther- tion. Flocker was originally developed in 2015
mostat device was running on Linux OS and by security researchers of Trend Micro. Attack-
included a large display screen and external SD ers are still re-engineering the application and
memory card for data storage. The researchers penetrating in different devices by social engi-
found that the thermostat device was not check- neering, spamming, downloading, and clicking
ing and verifying the files that were being exe- on malicious links. Flocker asks $500 USD with
cuted, thus creating an opportunity to execute a strict deadline of three days.
the ransomware and control device operations.
2.3.3 Android Simplocker
Tierney and Munro argued that, similar to this
experiment, other IoT devices in smart home Cybersecurity researchers at Symantec per-
settings could be hacked for ransom. formed an experiment in which Android Sim-
plocker ransomware is repackaged in an An-
droid wear project. Given that the wearable
2.3.2 Flocker devices need to be paired with Android smart-
Frantic Locker (i.e., Flocker) is a locker ran- phones, the ransomware penetrated in the de-
somware that penetrates in smart TV systems vices when the Android wear application was
COMPUTER NETWORKS 7

installed in the device and the smartphones. device firmware. Another mitigation could be
Researchers demonstrated that Android Sim- the deployment of layered defense strategies
plocker can lock the display of Android wear- whereby ransomware must be scanned at mul-
able devices. They suggested that in case of a tiple layers (i.e., IoT device, edge/application
ransomware attack, the wearable device must servers, and cloud data centers) [33], [34].
be rebooted before the ransomware reboots the
device. Otherwise, factory reset is needed to
remove the ransomware from the wearable de- 2.5 Remedies (solutions)
vice. Despite deploying highly sophisticated secu-
rity mechanisms, attackers can find a way to
2.3.4 Smart Bulb penetrate systems. When the device/network
Nassi, Shamir, and Elovici presented a proof-of- is compromised, cybersecurity teams must in-
concept ransomware to infiltrate business orga- stantly take the following measures.
nizations using IoT devices and office equip-
ment [24]. The ransomware was injected in • The incidence response teams must
the organization’s network using light that was be immediately engaged to reduce the
transmitted into a flatbed scanner. The scan- damage and stop further propagation
ner was exploited as a gateway to establish of ransomware inside IoT networks.
a covert channel for ransomware attack. The These teams must immediately notify
ransomware attack worked in three steps. First, device users/owners and switch-off the
a laser device was placed in a clear line-of- infected devices. In addition, a backup
sight with the scanner. Second, the attackers device should be turned-on to run the
used a drone device to launch the attack using network smoothly.
an onboard laser device in the proximity of • In most cases, device owners cannot af-
the targeted scanner. Third, the internal smart ford hiring a large team of security pro-
bulb was hacked using an Android device from fessionals. In this case, users must be
a nearby car. The proof-of-concept application trained on how to respond initially in
shows that ransomware attack could become case of a ransomware attack. In addi-
vicious and silently control the entire IoT net- tion, device users must install and up-
work in the organizations. date reliable security scanning software
Ransomware attacks on IoT devices and sys- to improve the overall security of an IoT
tems are still not prevailing because research network.
on IoT devices and systems is slowly taking • Data from IoT devices/networks must
pace. Considering the initial experimental stud- be continuously backup in the back-end
ies and recent attacks, such as WannaCry and servers. A backup of application and
Petya, IoT devices and systems must be care- device configuration files should also be
fully designed to mitigate ransomware-related prepared to restore the devices safely
risks. from a previous restore points. In this
case, if the IoT data and device config-
uration files are stored in a reliable back-
2.4 Mitigation end data storage, users do not need to
Ransomware attacks could be mitigated by pay ransom for data recovery.
adopting multiple strategies. Given that ran- • Depending upon the value of data to
somware attacks differ in nature, therefore, a users and devices, and critical level of
dedicated team of cybersecurity professionals IoT applications, the ransom amount
should be hired to perform in-depth forensic must be paid sometimes.
analysis and scan the entire network traffic • Device/network owners may negotiate
periodically. In addition, device users must be with attackers for partial data release by
trained to restart, switch-off, and upgrade the paying a minimum amount of money.
COMPUTER NETWORKS 8

However, this situation may occur only For example, the authors in [39] proposed
rarely. a secure Message Queue Telemetry Trans-
port (MQTT) mechanism called AUPS (Au-
thenticated Publish Subscribe). The mecha-
2.6 Ransomware Challenges nism is developed by extending MQTT, which
Few notable challenges may arise during miti- is a popular communication protocol in the
gation and application of remedies: IoT paradigm, by introducing a secure pub-
lish/subscribe system within the protocol. The
• Resetting IoT devices may not work in
developed mechanism proposed a key manage-
most cases because the devices are al-
ment framework, and introduces new policies,
ready compromised and owners are left
thus allowing flexible control of the flow of
with no option except paying the ran-
information in MQTT-powered IoT systems.
som amount. To address this challenge,
The proposed system has been released as open
researchers can develop new strategies
source under an Apache v.2 license. In the
for early ransomware detection before
future, the system must be tested in a larger
the devices are compromised. In case of
and more complex environment in the presence
known ransomware attacks, the devices
of various networked brokers and Networked
must not be able to download certain
Smart Objects (NOSs), where issues related to
file extensions or files having certain
synchronization of policies among hosts may
names as identifiers. To this end, IoT
arise.
device vendors can provide a predefined
A novel cloud architectural model is devel-
list of data files that are interoperable
oped in [40] to provide better services in a smart
and safe for execution inside an IoT de-
home. The model enables secure seamless inter-
vice/network.
action among heterogeneous smart home de-
• The heterogeneity (in terms of operating
vices provided by different vendors. Further-
systems, network topologies, communi-
more, this study reveals that the use of ontology
cation interfaces, data, and sensors) in
methods is a better solution for the hetero-
IoT devices brings immense challenge to
geneity issues within the developed model by
incorporate security by design. To fully
ensuring high security and privacy in IoT-based
implement security by design, IoT de-
smart homes. However, the proposed solution
vices/systems should be able to mitigate
is still in its infancy, and future advanced home
ransomware during the entire lifecycle
services, (i.e., home device remote monitoring
of the application execution. This lifecy-
and control, and multimedia entertainment)
cle begins from installation of security
need to be provided and deployed. In addition,
software to secure authentication and
secure intelligence extraction methods are still
registration of devices in IoT networks.
required in IoT-based smart homes.
Furthermore, IoT devices should per-
An end-to-end security solution is proposed
form commissioning, configuring, mon-
in [41] to secure a mobility-enabled health-
itoring, controlling, and decommission-
care IoT. The proposed solution is designed by
ing functions only within the networks.
employing a certificate based Datagram Trans-
port Layer Security (DTLS) handshake between
3 S TATE - OF - THE - ART R ESEARCH ON end-users and smart gateways as well as uti-
lizing the session resumption technique. The
I OT S ECURITY proposed solution significantly outperforms the
Although various aspects of security are exten- existing end-to-end security solutions in terms
sively investigated in different domains, such of communication overhead, energy consump-
as ad hoc and sensor networks [35], [36] and tion, and communication latency. However, the
software defined networks [37], [38], however, solution still needs to focus on further reducing
IoT security is still largely unexplored. the energy consumption while strengthening
COMPUTER NETWORKS 9

end-to-end security. posed in [45]. The model allows investigators


The authors in [42] proposed a novel to identify necessary pieces of evidence from
framework that helps to detect sinkhole the IoT environment, and then collects and
and selective-forwarding attacks in IoT. The analyzes the potential evidence in an efficient
framework comprised two modules: anomaly- manner. In another study [46], a Digital Foren-
based and specification-based intrusion detec- sic Investigation Framework for IoT (DFIF-IoT)
tion modules. The specification-based anomaly is proposed, which extends the investigation
module helps to analyze the behavior of the capabilities with a high degree of certainty. One
host nodes and send their data to the root of the key strengths of the framework is that “it
nodes, whereas a anomaly-based agent em- complies with the ISO/IEC 27043: 2015, which is an
ploys the unsupervised optimum-path forest international standard for information technology,
algorithm for projecting clustering models. In security techniques, incident investigation princi-
addition, the anomaly-based agent works in ples, and process.” The qualitative results reveal
a distributed manner because it is based on that incorporation of the DFIT-IoT in future dig-
a MapReduce framework. The proposed solu- ital forensic tools can facilitate effective forensic
tion employs a voting method to analyze the crime investigation in the IoT environment.
suspicious behavior. Results of the proposed A model was proposed in [47] to help foren-
solution show that it outperforms the existing sics experts in conducting investigations in the
solutions. In the future, incorporation of the IoT paradigm. The model is based on triage
data mining techniques and intelligence-based and 1-2-3 zone models for a volatile-based data
methods may improve the performance of the preservation. Although the proposed approach
proposed framework. can help forensics experts in conducting inves-
A previous study [43] proposed a privacy- tigations in the IoT environment with large-
preserving smart parking application system, size-based perspective, the automation of this
which ensures that there is no leakage of confi- model is quite difficult in a practical envi-
dential information between the system agents. ronment. The authors in [48], [49] proposed
In this context, the study adopts Elliptic Curve automatic authentication/forensics systems to
Cryptography (ECC), which is very suitable identify, detect, and recognize audio forgery.
for resource-constraint devices. Furthermore, O. Arias et al. [50] investigated security-
the study provides a generic implementation related concerns of wearable devices by con-
of ECC that runs on different host operating sidering the manufacturing practices and their
systems, such as Contiki, TinyOS, iSenseOS, consequence on both security and privacy is-
ScatterWeb, and Arduino. Despite many advan- sues. In this study, different types of devices,
tages of the proposed system, implementation such as Google Nest Thermostat and the Nike+
of the attribute-based credentials on embedded Fuelband, are used to evaluate how the pro-
devices is still lacking, which can be performed cesses of manufacturing deals with the security
in the future. and privacy issues. Moreover, the authors pro-
The researchers in [44] presented a dis- posed a set of suggestions to enhance the cur-
tributed middleware layer called NOS, which rent design flow with consideration of the se-
helps to manage heterogeneous data and eval- curity mechanisms, which can be implemented
uates the security and quality level associated capably into wearable devices for a better secu-
with each data unit. In addition, a security al- rity concept than the traditional manufacturing
gorithm that helps to measure the trustworthi- practice.
ness of registered IoT data sources is proposed. A previous work [51] aimed to improve
The results of the proposed scheme are very the security level for smart home systems. In
promising. In the future, a key management this context, equipment such as air condition-
system needs to be introduced in the proposed ers, doors control, thermostat, and lighting sys-
platform. tems are linked with one another through IoT
A Forensics-aware IoT (FAIoT) model is pro- technologies. To have a robust security sys-
COMPUTER NETWORKS 10

tem, this study proposed encryption and hash evaluated in actual application.
algorithms through which the devices in the A previous study [55] dealt with embed-
loT can perform secure communication. This ded device security and suggested the embed-
encryption approach aims to ensure confiden- ded security requirements using the concept
tiality while transmitting the messages. How- of trusted computing. In addition, the study
ever, there are still two ways to compromise elucidated various attacks that resist temper
the security in this approach. First, the storing proofing of the embedded devices. The work
mechanism can be compromised with SQL in- specifically resolves the security issue related
jection. Second, the operating system (OS) itself to data at rest. Despite many advantages of the
may be compromised. work, this study only has partially addressed
C. Bing et al. [52] enabled users to utilize data security problem in IoT. In addition, cer-
the “multi-application RFID (Radio Frequency tain other issues related to the embedded sys-
Identification)” in smart applications with a tems adaptability and their dynamic adjust-
higher security level and greater performance ment remained to be addressed.
efficiency. The proposed scheme implements The IoT needs traceability and visibility of
the hash function and a random number to pro- devices during the entire processing lifecycle.
duce the respective module using a represen- Consequently, the protocol has to must con-
tative challenge response mechanism. Further- firm security concerns, such as non-injection
more, the study proposes a new approach that of fake tags and privacy breaching, to solve
can be used in “multi-application RFID” and the issues regarding vulnerabilities of current
“one-application RFID”. This scheme claims to approaches given that they cannot be applied
have higher security level and better perfor- in a passive RFID tag system. A previous study
mance than other existing schemes. However, [56] proposed a tracker protocol for IoT, which
for ensuring privacy and security, IoT still re- enhances the devices’ tracking and improves
quires to have certain strict security mecha- the visibility of devices in IoT. The proposed
nisms that can efficiently block malicious mes- protocol is proved to be computationally rea-
sages within the IoT structure. sonable for use in low-cost RFID tags. However,
A previous study [53] focused on enabling it requires further improvement to construct a
secure communication among IoT devices (lim- generalized protocol that can accumulate sig-
ited resource in terms of computational and nificant context information of a device to guar-
networking capabilities). Consequently, these antee context awareness and enhance control
devices have become possible targets for con- over a device.
ventional Internet attacks (i.e., Denial of Service Key management is one of the crucial is-
and man-in-the-middle). To cope with these sues in cybersecurity and is more complex in
issues, this study presented an architecture the IoT, wherein many devices are resource-
that permits IoT devices to use DTLS with a constrained. Consequently, IoT tiny objects ei-
mutual authentication mechanism. This task is ther use Pre-shared Key (PSK) mode or Raw
achieved by introducing an IoT Security Sup- Public Key (RPK) mode. These modes both
port Provider (IoTSSP), which is a third party either need a pre-provisioning of wholly likely-
device that offers two main features: (i) optional trusted users for every separate object before
handshaking delegation and (ii) transfer of ses- implementation or needs out-of-band valida-
sion. tion of RPKs. These modes are not scalable
The authors in [54] proposed a scheme to a huge number of objects. Consequently,
to automatically measure quality of security the research in [57] aimed to address this is-
services to be provided in IoT products and sue by proposing a key management architec-
devices. Moreover, the study introduced the ture called S3K for resource-constrained de-
concept of “Utility Matrix” that measures the vices. The proposed S3K is practical for use
needs of users in terms of security and legal in resource-constrained devices, and scalable to
necessities. However, this work has not been a huge number of IoT objects. Nevertheless,
COMPUTER NETWORKS 11

the implementation and investigation of the threats, requirements, IEEE standards, deploy-
feasibility of S3K with further security protocols ment level, and technologies.
such as IPsec (Internet Protocol Security)/IKE
(Internet Key Exchange) are recommended. 4.1 Threats
A previous study [58] recommended an IoT
architecture to implement vital security and In the IoT paradigm, numerous threats that in-
privacy essentials throughout the lifespan of clude improper or unsafe operation, malicious
an IoT device. The recommended architectural code modifications, and bypassing of controls
design in this research is based on the design of and tampering with data integrity are arising.
diverse security and privacy mechanisms. This Information exposure or loss can occur in IoT
study also emphasizes that the suitable applica- applications. Therefore, protecting private in-
tion of revocation processes becomes one of the formation, keys, and credentials is important
major issues for the entire security and privacy [61]. Intellectual property can be compromised
range requirements during the lifespan of smart given that unprotected IoT applications and de-
devices. vices expose embedded proprietary algorithms
Fifth Generation (5G) mobile networks and that can easily be pirated or analyzed [62]. To
wireless systems can permit a unified commu- prevent exposure of unknown vulnerabilities,
nication among diverse types of things. Never- it is recommended to make it generally more
theless, 5G heterogeneous networks make the difficult for the hackers to reverse-engineer, an-
IoT communication susceptible to an eaves- alyze, or exploit the code.
dropping attack. In this context, a previous
work [59] investigated the secure relay com- 4.2 Requirements
munications networks of IoT devices against Integrity mechanisms are used to assure con-
unsystematically distributed eavesdroppers in sistency and accuracy of data. Hash functions
view of two scenarios: using single and multi- and digital signatures are used to ensure the
ple antennas. This study concludes that suitable integrity of data. Moreover, in the IoT envi-
establishment of relay transmission can im- ronment, data confidentiality also needs to be
prove throughput rate and increases the secure preserved at the level of storage and on the net-
coverage area. work path. This refers to protecting information
In the current healthcare systems, the de- against unauthorized access and disclosure. For
ployment of IoT applications provides ad- instance, an IoT network should not reveal the
vanced and convenient health services for doc- sensor readings to its neighbors.
tors and patients, as they are useful to numer- Anonymity is the service of hiding data
ous medical areas with help of Body Sensor sources. This service also helps in terms of as-
Network (BSN) technology. However, the lack suring data confidentiality and privacy. In IoT,
of security and privacy insurance solutions hin- non-repudiation helps in ensuring that a party
der the adoption of BSN. In this context, a pre- to the contract cannot deny the authenticity of
vious study [60] proposed a secure IoT-based their signature on official documents. Lastly,
healthcare method by means of BSN, called freshness guarantees that the data are recent
BSN-Care. The proposed scheme is mainly in- and no old messages have been replayed.
tended to achieve mutual authentication and
anonymity property, secure localization prop-
erty, eliminate forgery attacks, and decrease 4.3 IEEE Standards
computation overhead. The IEEE P1363 standard identifies specifi-
cations of asymmetric encryption techniques,
such as mathematical fundamental for pri-
4 TAXONOMY vate key generation. Moreover, it uses the
Figure 3 depicts the taxonomy that is de- same mathematical bases for the cryptosystem
vised based on various parameters, including scheme. The IEEE P1619 specifies elements of
COMPUTER NETWORKS 12

Taxonomy of IoT Security

IEEE Deployment
Threats Requirements Technologies
Standards Levels
Improper or
Integrity P1363 Device or Virtual Private
Unsafe Equipment Networks
Operation
P1619
Information Information Gateway & DNS Security
Exposure or Protection Network Extensions
Lose P2600
Intellectual Onion
Property Anonymity 802.1AE Utilities
Theft Routing

Reverse Non- Private


Engineering Repudiation Application Information
Retrieval

Freshness

Fig. 3: Taxonomy of IoT Security

cryptographic architecture for data protection ing external device connection, disabling sen-
on block-oriented storage devices and describes sitive devices/endpoints from direct Internet
the methods, algorithms, and data protection access, ensuring that just specified services are
modes. Specification of such a mechanism sup- enabled, secure booting (using keys) and se-
ports the development of powerful tools for cure firmware, applying device authentication
implementation of highly secure and interop- in each connection establishment, applying up-
erable protection of stored data. dates and patches on devices OS, building con-
The IEEE P2600 standard addresses the se- nection whitelisting, and implementing secure
curity of peripherals devices, such as copiers key exchange [63]. IoT gateway security against
and printers. The IEEE 802.1AE standard speci- intrusions and malware must be preserved by
fies provision of connectionless user data, confi- employing different mechanisms, such as filter-
dentiality, frame data integrity, and data origin ing and access control lists (gateway or hub).
authenticity by media access independent pro- Physical and network security are effective
tocols and entities that operate transparently to solutions in terms of isolating sensitive infor-
MAC clients. IEEE 802.1X enables interoperable mation. The service provider must obtain and
user identification, centralized authentication, produce assurance certifications [64]. This pro-
and key management. User-based identifica- cedure can be performed in several ways, such
tion is based on network access identifier that as by applying remote access security, allowing
enables support for roaming access in public only strong authentication for remote access to
spaces through dynamic key management. privileged users like administrators, employing
maintenance technicians for logging in securely
from remote places to the network, and running
4.4 Deployment Level secure channels, such as Virtual Private Net-
Device or equipment protection is an impor- works (VPNs) for regular partners accessing
tant issue, and various ways to secure them the network from outside locations. Wireless
include adopting best practices, such as restrict- communications security ensures secure con-
COMPUTER NETWORKS 13

figurations when communicating across wire- this technology is not visible for a dynamic
less networks and devices/sensors to gateways global information exchange and not safe for
by using encryption and authentication mecha- third parties beyond the extranet borders. DNS
nisms. Security Extensions (DNSSEC), uses asymmet-
Cloud security and management need spe- ric cryptography for signing resource records
cial attention from IT industries. Data gener- to achieve origin authenticity and integrity of
ated by IoT devices is mostly stored in the received or delivered information.
cloud [65]. Therefore, Virtual Machines (VMs) Onion routing technology encrypts and
security blocks unauthorized access to VMs, mixes Internet traffic coming from many
wherein applications need to have strong con- senders; for example, data are wrapped in mul-
trol mechanisms. Data security within the cloud tiple encryption layers, employing the public
with appropriate technologies and approved keys of the onion routers on the transmis-
encryption algorithms, including strong key sion path. This process can impede match-
management procedures, need to be properly ing an Internet protocol packet to a particu-
established. Protection of the web facing cloud lar source. However, onion routing increases
instances must be ensured with IDS/IPS, host- waiting times, thereby resulting in performance
based firewalls. In addition, log monitoring issues.
especially for privileged users and log man- Private Information Retrieval (PIR) systems
agement integrating logs from multiple and are used to hide customer information interest.
disparate sources should be handled very care- However, problems of scalability and key man-
fully. agement, as well as performance issues, would
In applications development phase, stan- be encountered in a globally accessible system.
dard secure coding practices must be consid- Thus, this method can be impractical.
ered to minimize the risk of application-related
attacks, such as preventing session replay, XSS,
SQLite, and buffer. To mitigate these attacks, 5 C ASE S TUDIES ON I OT S ECURITY
some of the approaches that can be considered This section discusses different case studies that
as best practices include scanning/fuzz testing aim to alert users on how serious IoT devices
the applications (dynamic, static, and hybrid) are vulnerable to exploitation. This section is
for vulnerabilities and taking corrective actions also a motivation for the need to strengthen the
to fix them. Moreover, code signing can also be security in the IoT paradigm. Table 2 provides
employed to assure customers in terms of au- the summary of the case studies.
thenticity of the software and non-repudiation.
Critical information and files must be mon-
5.1 Fiat Chrysler3
itored and protected against any unauthorized
changes or alteration; for example, traffic and Fiat Chrysler is the world’s seventh largest
configuration files must be monitored against automaker company. In 2015, the company
intentional or accidental unwanted changes launched a recall of 1.4 million cars that were
(i.e., integrity monitoring). Appropriate tech- vulnerable to exploitation. The Jeep Cherokee
nologies such as integrity monitoring tools (2014–2015) was one of the 14 models that made
must be applied to prevent or keep the alert on the news for being hacked. The cyber criminals
the above concern and must be complemented were able to control and access this car remotely
with strong change approval and review pro- due to the weak security, as reported by Wired.
cesses. The complete hack details were provided in the
Wired article, which states that this incident
4.5 Technologies happened on the busy interstate 64 near St.
VPNs are extranets that allow access only to
3. http://www.pcworld.com/article/2952592/car-
partners, which they promise to keep confiden- tech/chrysler-recalls-14m-cars-that-were-vulnerable-to-
tial and have ensured the integrity. However, remote-hacking.html
COMPUTER NETWORKS 14

Louis under controlled conditions. After some for a few hours. An investigation revealed that
time, it has been revealed that the purpose of a group of hackers named “Lizard Squad”
this hacking was to determine the loophole in was involved in this incident. They hacked the
the cars considering that anyone can access and gaming networks with the help of a tool to
control them remotely and can use them for which they added their own developed module
criminal purposes. named “Lizard Stressor”. They bought the tool
using an alternative payment service, namely,
5.2 Eurecom 4 Bitcoin, as stated by the National Crime Agency
(NCA). The story was released by KrebsOnSe-
Eurecom is a graduate school and a research
curity. When the story was released, the service
center in France. Researchers working in Eu-
of the Lizard Stressor was hacked by a group
recom downloaded 32,000 firmware images
named White Hats.
of IoT devices to understand their security
strengths. After analyzing the images, they
found 38 vulnerabilities across 123 products. 6 N EW R EQUIREMENTS F OR S ECUR -
Thus, Eurecom declared that the lack of en-
ING I OT
cryption mechanisms was the major reason of
the weak security. Moreover, Eurecom declared An IoT framework can be divided into three
that weak security can provide backdoors that layers: device, gateway, and service. The secu-
can allow unauthorized access. In addition, one rity implementation at each of these layer is
weak link can open access to hundreds of thou- vital for securing the entire IoT. However, the
sands of devices on a network with potentially requirements of security model for each layer
serious consequences. are different. Herein, we discuss the security re-
quirements for each layer of the IoT framework.
5.3 Internet-connected Baby Monitors5
In New York, internet-connected baby monitors 6.1 Device Layer Security Requirements
have gained much attention. The baby moni- The device layer is involved with people,
tors allow parents/guardians to keep an eye things, and places. To secure the IoT, the se-
on their babies. In September 2015, the baby curity must be implemented in the devices,
monitors were found to lack a security feature, i.e., the process through which devices perform
which made them vulnerable even for basic their operation and interact with users should
hacking attempts, as stated by CBS news. The be secure. The key security requirements in
possibility of an unknown person monitoring the context of device layer are secure booting,
every activity of their babies worried the par- secure code updates, access control, and device
ents who were relying on the cameras. In addi- authentication.
tion, access to a hacked camera can also allow
the use of other WiFi-enabled devices, which 6.1.1 Secure booting
may provide hackers with financial and other
personal information. When IoT devices power up, the integrity and
authenticity of the installed software should
be verified to ensure that only the authorized
5.4 Lizard Stressor6 software can run on the device.
In December 2014, the gaming networks of Mi-
crosoft Xbox and Sony PlayStation were down 6.1.2 Secure code updates
4. http://www.securingtomorrow.com/blog/knowledge/3- Similar to other devices, IoT devices receive
key-security-challenges-internet-things/ software patches and updates to enhance their
5. http://www.cbsnews.com/news/baby-monitors-connect- functionalities over time. The IoT devices
internet-vulnerable-hackers-cybersecurity/
6. http://www.aliasforensics.com/policing-the-people- should only install signed patches and software
lizard-stressor/ to avoid malicious activities.
COMPUTER NETWORKS 15

TABLE 2: Summary of the Case Study


Case Study Description News Source Target Country Year
Fiat Chrysler The company PCWorld Smart Cars USA 2015
launched a recall
of 1.4 million
cars which were
vulnerable to the
exploit
Eurecom French researchers Securing Tomorrow Potential IoT Devices France -
aim at finding the
vulnerabilities in the
potential IoT devices
Interconnected Baby The aim of the hacker CBS News Baby Moni- USA 2015
Monitors was to monitor the tors(Cameras)
movement of the
baby with some bad
intentions.
Lizard Stressor Six young males Alias Forensics Gaming Networks UK 2014
down the gaming (Xbox and
network. PlayStation)

6.1.3 Access control 6.3 Service Layer Security Requirements


Access control mechanisms are also required The service layer in an IoT framework deals
to define the limits on the privileges of ap- with the device interactions involved in acquir-
plications and device components in an IoT ing data from IoT devices and sending control
environment [66]. The implementation of access commands to them. The service layer handles
control should be compartmentalized so that the communication between device and gate-
in case of any compromise, the compromised way layer. The interaction should proceed in
information can be limited to specific areas of a way that the changes made by users and de-
the network. vices cannot be refuted. This non-repudiation is
achieved by an audit trail of the changes. There-
6.1.4 Device authentication fore, dynamic auditing mechanisms should be
New devices should be able to authenticate implemented to enable the security at the ser-
themselves when they are connected to a net- vice layer.
work. There is a need to design a machine au-
thentication mechanism for IoT devices so that
device spoofing can be considerably nullified in 7 O PEN R ESEARCH C HALLENGES
an IoT environment.
This section discusses the research challenges
on security in the IoT paradigm. In Table 3, we
6.2 Gateway Layer Security Requirements enlist some of IoT security startups.
Gateway layer security is mainly related to
the gateway that is deployed between the IoT
7.1 Data Integrity
devices and the Internet. These gateway de-
vices are mainly subject to physical intrusion Ensuring data integrity in an IoT environment
and have limited functional redundancy. The has become very challenging due to the flood
network designers should ensure that the IoT of large data generated by a large number of
gateway is protected from malware and intru- connected smart devices. Ensuring that the col-
sions by applying access control lists, filtering, lected data is not compromised is very difficult
etc. Further, message integrity should be guar- [67]. In a scenario where utility companies are
anteed by applying hash functions and verifi- collecting data from the customers’ smart me-
cation protocols. ters in an automated manner, a hacker can send
COMPUTER NETWORKS 16

false data from the meter to show an under- lightweight mechanisms in terms of upgrad-
reported energy use. Such false data can mis- ability in tiny devices.
lead the utility companies in terms of knowing
the exact energy consumption. Several research 7.4 Physical protection of trillions of de-
efforts have been conducted for ensuring data vices
security [68]; however, these research efforts are
in their infancy. In the future, data integrity in Physical protection of IoT devices is very chal-
IoT should be given considerable attention. lenging due to the placement and distribution
of voluminous amounts of devices in different
areas [74]. The lack of physical security can
7.2 Lightweight security mechanisms
allow unauthorized users to access devices by
Devices involved in the IoT have limited re- using an available Universal Serial Bus (USB)
sources in terms of CPU power, storage, and port, thus posing serious problems [75]. Al-
battery. The existing encryption mechanisms re- though basic security is present on devices,
quire high processing power. However, IoT de- such as password, manipulating the basic se-
vices have less processing power and antivirus curity is not very difficult, as can demonstrated
software cannot be installed on all the devices, by the above case studies. Physical protection
as in a case of IP-addressable light bulbs [69]. of trillions of IoT devices seems very challeng-
The design of lightweight security mechanisms, ing because of multiple factors, such as 24-
such as encryption, decryption, and digital sig- h protection, devices are small, and countless
natures, are very challenging because IoT in- individuals are needed to monitor every device
herits the attributes of WSNs and the Internet, to prevent unauthorized physical access.
such as limited battery constraints, multi-hop
communications, scalability, and global acces-
7.5 Privacy
sibility. Although several research efforts have
been conducted to develop lightweight secu- IoT privacy requires special considerations to
rity mechanisms [70]–[72], these efforts are in prevent exposure of individuals’ information.
the early stage of development. Nevertheless, In an IoT environment, when data are collected
the developments can act as guidelines for re- from multiple connected devices in the form
searchers working in this domain. of the segment, sensitive information can be
acquired. The leakage of this sensitive informa-
7.3 Lack of security software’s upgradabil- tion can help competitors in outranking other
ity and patchability features companies by designing the same product (if
leaked information is related to the product)
In IoT paradigms, wherein mostly tiny devices [76]. Ensuring privacy in an IoT environment
are connected to the Internet, security has be- would become increasingly difficult because if
come a serious concern due to the lack of someone’s data are compromised once, then
support of upgradability and patchability of he/she may lose trust in the IoT. In [77], [78],
the security software installed on the devices several privacy-enhancing techniques are dis-
for protection. Companies do not like adding cussed for IoT that can act as guidelines for
upgradability and patchability features due to researchers working in the domain.
the limited resources of the devices, as these
processes require a lot of resources from the de-
vices [73]. In this context, several new alterna- 7.6 Trust
tives would be required that allowing devices Trust is based on the assumption that noth-
to support the upgradability and patchability ing will harm the desired entity. Given that
because virus signatures in databases of the an IoT system comprises many heterogeneous
devices must be upgraded. Researchers need networks connected via the Internet, network
to think out of the box in terms of resolving interaction with other systems of lower security
this matter considering the unavailability of the standards can raise trust issues. The current
COMPUTER NETWORKS 17

TABLE 3: IoT Security Startups


IoT Security Startups Objective/Description
ZingBox To offer security-as-a-service in the IoT paradigm
Visual Threat Strengthening the cybersecurity in smart cars
Bastille Network To secure the enterprise by identifying the airborne threats
Mocana To provide a software platform for enabling companies to develop, test, and distribute secure
IoT devices
TrustWave To provide security in terms of network, database, endpoints, and application in the IoT
Paradigm
Symantec To protect over one billion IoT devices, from smart television to critical infrastructure and detect
advanced threats to the IoT systems through analytics

trust system must be upgraded to meet the 8.1.1 Inability to Receive Security Patches
growth of IoT devices to remain fully feasible In certain environments, such as nuclear reac-
[79]. To achieve trust in the IoT, two principles tors and chemical factories, if the software bugs
can be considered [80]: first, the device and in the constantly controlling node are not fixed
the linked service must have positive inten- by updating through software patches, then
tions; second, predictability and transparency, this case may lead to catastrophic consequences
i.e., the functional scope of the service pro- [85].
vided by devices need to be known and well-
defined. Moreover, the IoT system behavior 8.1.2 Malicious Code Attacks
can be checked at any time by independent Several types of attacks that target application
third parties. Although several solutions have programs of IoT exist, such as worms, which
been proposed for evaluating positive interac- could attack home routers, set-top boxes, and
tion and reputation, such as TripAdvisor [81], security cameras. Moreover, worms can exploit
Trivago, and HolidayCheck, further research is the presence of well-known software vulnera-
required. bilities. Such types of code attacks may break
into automobile’s WiFi to seize the control of
the steering wheel, which can result in car
8 F UTURE R ESEARCH D IRECTIONS damages, injuries, or even death.

In this section, a few prominent security-related 8.1.3 Tampering with Node-based Applica-
research directions in IoT are provided. tions
In this type of attack, application vulnerabilities
in IoT devices are exploited to install malicious
8.1 Application Programs Security kits [86]. Different types of threats can ma-
nipulate a specific environment to induce de-
In IoT, several problems can hinder software vices malfunctioning. For example, a tampered
applications from providing adequate level of weather-monitoring sensor will just display a
services or even lead to unreliable authentica- fixed value of humidity or temperature, while a
tion [82]. In such scenarios, malicious attacks tampered camera may convey outdated videos
can generate bugs in the application program and pictures. Device buyers need to consider
code, which can easily lead to malfunctioning tamper-resistant issues by purchasing products
of the applications or, in worst case, complete from reliable manufacturers. Moreover, protect-
failure. The severity of this problem is intensi- ing only specific parts of devices is insufficient.
fied with the increase in number of devices [83],
[84]. Some possible attacks on application pro-
gram in an IoT environment include inability to 8.2 Secure Data Perception
receive security patches, malicious code attacks, The threats of data perception are at the de-
and tampering with node-based applications. vice level where devices, such as sensors or
COMPUTER NETWORKS 18

embedded RFID tags, are prime targets for the 8.3.1 Denial of Service
attackers. The attackers either replace or modify In this type of attack, IoT devices or servers
the device software to achieve their own illegal are the target. Attackers bombard them to stop
purposes by exploiting the device [87]. their services. The DoS attack can appear in a
At the data perception level, the threats different form, such as machine shutdown or
mainly come from outside entities, typically data transfer interruption [89].
with respect to data gathering utilities. The
main security threats in data perception level 8.3.2 Gateway Attack
are discussed below. The gateway attack aims to cut-off the con-
nection between the sensing devices and the
8.2.1 Eavesdropping Internet infrastructure. Such attacks can include
Given that communication between IoT devices routing attacks or DoS attack targeting the gate-
can be carried out through wireless connection way to stop transmission or transmit wrong
and via the Internet, the devices in the networks information via the Internet from or to actua-
can be vulnerable to an eavesdropping attack. tors/sensors [90].
For example, in a smart home, a compromised
sensor can push notification to the user’s phone 8.3.3 Unauthorized Access
or peer’s sensors and collect sensitive informa- Omission may happen from the owner of the
tion from them. sensor or actuator by leaving their devices un-
secured. In an IoT environment, devices follow
8.2.2 Sniffing Problem a Machine-to-Machine communication mech-
anism to transfer and receive data. Conse-
In this type of attacks, malicious de- quently, malicious entities may act as authenti-
vices/sensors are placed near the targeted sen- cated machines to access other devices without
sors of IoT devices to obtain desired infor- having actual authority.
mation. The availability of IoT devices in a
smart environment enables human identifica-
tion, tracking, and profiling via the physical 8.4 Physical Protection and Availability
environment, without their consent. In certain scenarios, IoT devices are deployed in
remote and insecure spaces. In such situations,
8.2.3 Data Noise the devices become vulnerable to theft and
damages. Thus, sensors and actuators must be
Given that data transmission is done mostly via secure enough to prevent such attacks. More-
wireless network, the possibility of a noise-data over, power efficiency is one of the crucial fac-
problem, such as incomplete or false informa- tors for the availability of the services. Batteries
tion, is imminent. need to be charged frequently, and thus energy-
harvesting mechanisms should be utilized to
8.3 Data Transmission Security keep the devices active and running.

An IoT network is highly vulnerable to noise


data because it carries massive data, leading 9 C ONCLUSION
to frequent network congestion [88]. In data Remarkable advances in smart technologies
transmission level, the major security threat have paved the way toward a new computing
is related to integrity and authentication. An paradigm called the IoT. This study discussed
attacker and malicious devices can compro- the ransomware attacks and security concerns
mise the network during data transmission and in IoT. First, we discussed the rise of ran-
cause severe problems. The main threats to data somware attacks and outlined the associated
transmission in IoT are DoS attack, gateway challenges. Second, we investigated, reported,
attack, and unauthorized access. and highlighted the state-of-the-art research
COMPUTER NETWORKS 19

efforts on IoT security. Third, a taxonomy is [9] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security
devised by classifying and categorizing the lit- of the internet of things: Perspectives and challenges,”
Wireless Networks, vol. 20, no. 8, pp. 2481–2501, 2014.
erature. Fourth, a few credible case studies are [10] J. Pacheco, S. Satam, S. Hariri, C. Grijalva, and H. Berken-
presented to alert people on the vulnerability of brock, “Iot security development framework for building
trustworthy smart car services,” in IEEE Conference on
IoT devices to threats. Fifth, we enumerated the Intelligence and Security Informatics (ISI), Sept 2016, pp.
requirements for securing the IoT. Sixth, several 237–242.
indispensable research challenges are identified [11] Q. Wen, X. Dong, and R. Zhang, “Application of dynamic
variable cipher security certificate in internet of things,” in
and discussed. Seventh, several prominent re- Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE
search directions are provided. Finally, we con- 2nd International Conference on, vol. 3. IEEE, 2012, pp.
clude that although IoT can facilitate different 1062–1066.
[12] G. Ketema, J. Hoebeke, I. Moerman, P. Demeester, L. S.
aspects of lives of people, most IoT devices are Tao, and A. J. Jara, “Efficiently observing internet of things
vulnerable to ransomware attacks. Therefore, resources,” in IEEE International Conference on Green Com-
strengthening of the IoT security and mitigation puting and Communications, Nov 2012, pp. 446–449.
[13] J. Granjal, E. Monteiro, and J. S. Silva, “Security for the
of ransomware attacks should be given great internet of things: a survey of existing protocols and open
importance to build user trust in the IoT. research issues,” IEEE Communications Surveys & Tutorials,
vol. 17, no. 3, pp. 1294–1312, 2015.
[14] K. Zhao and L. Ge, “A survey on the internet of things
ACKNOWLEDGEMENT security,” in Computational Intelligence and Security (CIS),
2013 9th International Conference on. IEEE, 2013, pp. 663–
Imran’s work is supported by the Deanship 667.
of Scientific Research at King Saud University [15] Z. Yan, P. Zhang, and A. V. Vasilakos, “A survey on trust
through Research group No. (RG 1435-051) management for internet of things,” Journal of network and
computer applications, vol. 42, pp. 120–134, 2014.
[16] F. A. Alaba, M. Othman, I. A. T. Hashem, and
R EFERENCES F. Alotaibi, “Internet of things security: A survey,” Journal
of Network and Computer Applications, vol. 88, pp. 10 –
[1] R. J. Tobias, “Wireless communication of real-time ultra-
28, 2017. [Online]. Available: http://www.sciencedirect.
sound data and control,” in SPIE Medical Imaging. In-
com/science/article/pii/S1084804517301455
ternational Society for Optics and Photonics, 2015, pp.
[17] R. H. Weber, “Internet of things–new security and privacy
94 190M–94 190M.
challenges,” Computer Law & Security Review, vol. 26, no. 1,
[2] E. Ahmed, I. Yaqoob, A. Gani, M. Imran, and M. Guizani,
pp. 23–30, 2010.
“Internet-of-things-based smart environments: state of the
art, taxonomy, and open research challenges,” IEEE Wire- [18] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the internet
less Communications, vol. 23, no. 5, pp. 10–16, October 2016. of things: a review,” in Computer Science and Electronics En-
[3] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, gineering (ICCSEE), 2012 International Conference on, vol. 3.
and M. Ayyash, “Internet of things: A survey on enabling IEEE, 2012, pp. 648–651.
technologies, protocols, and applications,” IEEE Commu- [19] R. Roman, J. Zhou, and J. Lopez, “On the features and
nications Surveys & Tutorials, vol. 17, no. 4, pp. 2347–2376, challenges of security and privacy in distributed internet
2015. of things,” Computer Networks, vol. 57, no. 10, pp. 2266–
[4] D. Lin, Y. Tang, F. Labeau, Y. Yao, M. Imran, and A. V. 2279, 2013.
Vasilakos, “Internet of vehicles for e-health applications: [20] J. S. Kumar and D. R. Patel, “A survey on internet of
A potential game for optimal network capacity,” IEEE things: Security and privacy issues,” International Journal
Systems Journal, vol. PP, no. 99, pp. 1–9, 2017. of Computer Applications, vol. 90, no. 11, 2014.
[5] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopou- [21] E. Bertino and N. Islam, “Botnets and internet of things
los, “Context aware computing for the internet of things: security,” Computer, vol. 50, no. 2, pp. 76–79, 2017.
A survey,” IEEE Communications Surveys & Tutorials, [22] L. Chen, S. Thombre, K. Jarvinen, E. S. Lohan, A. K. Alen-
vol. 16, no. 1, pp. 414–454, 2014. Savikko, H. Leppakoski, M. Z. H. Bhuiyan, S. Bu-Pasha,
[6] A. M. Ghosh, D. Halder, and S. K. A. Hossain, “Remote G. N. Ferrara, S. Honkala et al., “Robustness, security
health monitoring system through iot,” in 5th International and privacy in location-based services for future iot: A
Conference on Informatics, Electronics and Vision (ICIEV), survey,” IEEE Access, 2017.
May 2016, pp. 921–926. [23] E. Bertino and N. Islam, “Botnets and internet of things
[7] N. M. Khoi, S. Saguna, K. Mitra, and C. hlund, “Irehmo: security,” Computer, vol. 50, pp. 76–79, 2017.
An efficient iot-based remote health monitoring system for [24] B. Nassi, A. Shamir, and Y. Elovici, “Oops!... i think i
smart regions,” in 17th International Conference on E-health scanned a malware,” arXiv preprint arXiv:1703.07751, 2017.
Networking, Application Services (HealthCom), Oct 2015, pp. [25] R. Richardson and M. North, “Ransomware: Evolution,
563–568. mitigation and prevention,” International Management Re-
[8] M. Sanduleac, C. L. Chimirel, M. Eremia, L. Toma, C. Cris- view, vol. 13, no. 1, p. 10, 2017.
tian, and D. Stanescu, “Unleashing smart cities efficient [26] J. Bugeja, A. Jacobsson, and P. Davidsson, “An analysis of
and sustainable energy policies with iot based unbundled malicious threat agents for the smart connected home,” in
smart meters,” in IEEE International Conference on Emerging Pervasive Computing and Communications Workshops (Per-
Technologies and Innovative Business Practices for the Trans- Com Workshops), 2017 IEEE International Conference on.
formation of Societies (EmergiTech), Aug 2016, pp. 112–117. IEEE, 2017, pp. 557–562.
COMPUTER NETWORKS 20

[27] D. Kavya, “Ransomware of things (rot),” Fuzzy Systems, elliptic curve based security platform,” Computer Commu-
vol. 9, no. 2, pp. 29–32, 2017. nications, 2016.
[28] V. Adat and B. Gupta, “Security in internet of things: [44] S. Sicari, A. Rizzardi, D. Miorandi, C. Cappiello, and
issues, challenges, taxonomy, and architecture,” Telecom- A. Coen-Porisini, “A secure and quality-aware prototyp-
munication Systems, pp. 1–19, 2017. ical architecture for the internet of things,” Information
[29] C. J. D’Orazio, K.-K. R. Choo, and L. T. Yang, “Data Systems, vol. 58, pp. 43–55, 2016.
exfiltration from internet of things devices: ios devices as [45] S. Zawoad and R. Hasan, “Faiot: Towards building a
case studies,” IEEE Internet of Things Journal, vol. 4, no. 2, forensics aware eco system for the internet of things,” in
pp. 524–535, 2017. Services Computing (SCC), 2015 IEEE International Confer-
[30] T. Ring, “Connected cars–the next target for hackers,” ence on. IEEE, 2015, pp. 279–284.
Network Security, vol. 2015, no. 11, pp. 11–16, 2015. [46] V. R. Kebande and I. Ray, “A generic digital forensic
[31] K. Cabaj, M. Gregorczyk, and W. Mazurczyk, “Software- investigation framework for internet of things (iot),” in
defined networking-based crypto ransomware detec- Future Internet of Things and Cloud (FiCloud), 2016 IEEE 4th
tion using http traffic characteristics,” arXiv preprint International Conference on. IEEE, 2016, pp. 356–362.
arXiv:1611.08294, 2016. [47] S. Perumal, N. M. Norwawi, and V. Raman, “Internet
[32] S.-M. Cheng, P.-Y. Chen, C.-C. Lin, and H.-C. Hsiao, of things (iot) digital forensic investigation model: Top-
“Traffic-aware patching for cyber security in mobile iot,” down forensic approach methodology,” in Digital Infor-
arXiv preprint arXiv:1703.05400, 2017. mation Processing and Communications (ICDIPC), 2015 Fifth
[33] S. D. Castilho, E. P. Godoy, T. W. Castilho, and F. Salmen, International Conference on. IEEE, 2015, pp. 19–23.
“Proposed model to implement high-level information [48] Z. Ali, M. Imran, and M. Alsulaiman, “An automatic dig-
security in internet of things,” in Fog and Mobile Edge ital audio authentication/forensics system,” IEEE Access,
Computing (FMEC), 2017 Second International Conference on. vol. 5, pp. 2994–3007, 2017.
IEEE, 2017, pp. 165–170. [49] M. Imran, Z. Ali, S. T. Bakhsh, and S. Akram, “Blind
[34] C. E. Stewart, A. M. Vasu, and E. Keller, “Community- detection of copy-move forgery in digital audio forensics,”
guard: A crowdsourced home cyber-security system,” in IEEE Access, vol. PP, no. 99, pp. 1–1, 2017.
Proceedings of the ACM International Workshop on Security [50] O. Arias, J. Wurm, K. Hoang, and Y. Jin, “Privacy and
in Software Defined Networks & Network Function Virtualiza- security in internet of things and wearable devices,” Multi-
tion. ACM, 2017, pp. 1–6. Scale Computing Systems, IEEE Transactions on, vol. 1, no. 2,
[35] A. Derhab, A. Bouras, M. R. Senouci, and M. Imran, pp. 99–109, 2015.
“Fortifying intrusion detection systems in dynamic [51] B. Vinayaga Sundaram, M. Ramnath, M. Prasanth, and
ad hoc and wireless sensor networks,” International J. Varsha Sundaram, “Encryption and hash based security
Journal of Distributed Sensor Networks, vol. 10, no. 12, p. in internet of things,” in Signal Processing, Communication
608162, 2014. [Online]. Available: http://dx.doi.org/10. and Networking (ICSCN), 2015 3rd International Conference
1155/2014/608162 on. IEEE, 2015, pp. 1–6.
[36] T. Hayajneh, B. J. Mohd, M. Imran, G. Almashaqbeh, and [52] K. Fan, Y. Gong, Z. Du, H. Li, and Y. Yang, “Rfid
A. V. Vasilakos, “Secure authentication for remote patient secure application revocation for iot in 5g,” in Trust-
monitoring with wireless medical sensor networks,” Sen- com/BigDataSE/ISPA, 2015 IEEE, vol. 1. IEEE, 2015, pp.
sors, vol. 16, no. 4, 2016. 175–181.
[37] A. Akhunzada, E. Ahmed, A. Gani, M. K. Khan, M. Imran, [53] G. L. dos Santos, G. da Cunha Rodrigues, L. Z. Granville,
and S. Guizani, “Securing software defined networks: L. M. R. Tarouco et al., “A dtls-based security architecture
taxonomy, requirements, and open issues,” IEEE Commu- for the internet of things,” in 2015 IEEE Symposium on
nications Magazine, vol. 53, no. 4, pp. 36–44, 2015. Computers and Communication (ISCC). IEEE, 2015, pp. 809–
[38] Z. Shu, J. Wan, D. Li, J. Lin, A. V. Vasilakos, and 815.
M. Imran, “Security in software-defined networking: [54] J.-A. Sanchez Alcon, L. Lopez, J.-F. Martinez, and
Threats and countermeasures,” Mobile Networks and P. Castillejo, “Automated determination of security ser-
Applications, vol. 21, no. 5, pp. 764–776, Oct 2016. [Online]. vices to ensure personal data protection in the internet
Available: http://dx.doi.org/10.1007/s11036-016-0676-x of things applications,” in Innovative Computing Technology
[39] A. Rizzardi, S. Sicari, D. Miorandi, and A. Coen-Porisini, (INTECH), 2013 Third International Conference on. IEEE,
“Aups: An open source authenticated publish/subscribe 2013, pp. 71–76.
system for the internet of things,” Information Systems, [55] A. Ukil, J. Sen, and S. Koilakonda, “Embedded security for
2016. internet of things,” in Emerging Trends and Applications in
[40] M. Tao, J. Zuo, Z. Liu, A. Castiglione, and F. Palmieri, Computer Science (NCETACS), 2011 2nd National Conference
“Multi-layer cloud architectural model and ontology- on. IEEE, 2011, pp. 1–6.
based security service framework for iot-based smart [56] B. R. Ray, M. U. Chowdhury, and J. H. Abawajy, “Secure
homes,” Future Generation Computer Systems, 2016. object tracking protocol for the internet of things,” IEEE
[41] S. R. Moosavi, T. N. Gia, E. Nigussie, A. M. Rahmani, Internet of Things Journal, vol. 3, no. 4, pp. 544–553, 2016.
S. Virtanen, H. Tenhunen, and J. Isoaho, “End-to-end [57] S. Raza, L. Seitz, D. Sitenkov, and G. Selander, “S3k:
security scheme for mobility enabled healthcare internet Scalable security with symmetric keys—dtls key estab-
of things,” Future Generation Computer Systems, vol. 64, pp. lishment for the internet of things,” IEEE Transactions on
108–124, 2016. Automation Science and Engineering, vol. 13, no. 3, pp. 1270–
[42] H. Bostani and M. Sheikhan, “Hybrid of anomaly-based 1280, 2016.
and specification-based ids for internet of things using un- [58] J. L. Hernandez-Ramos, J. B. Bernabé, and A. Skarmeta,
supervised opf based on mapreduce approach,” Computer “Army: architecture for a secure and privacy-aware life-
Communications, vol. 98, pp. 52–71, 2017. cycle of smart objects in the internet of my things,” IEEE
[43] I. Chatzigiannakis, A. Vitaletti, and A. Pyrgelis, “A Communications Magazine, vol. 54, no. 9, pp. 28–35, 2016.
privacy-preserving smart parking system using an iot [59] Q. Xu, P. Ren, H. Song, and Q. Du, “Security enhancement
COMPUTER NETWORKS 21

for iot communications exposed to eavesdroppers with [76] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini,
uncertain locations,” IEEE Access, vol. 4, pp. 2840–2853, “Security, privacy and trust in internet of things: The road
2016. ahead,” Computer Networks, vol. 76, pp. 146–164, 2015.
[60] P. Gope and T. Hwang, “Bsn-care: A secure iot-based [77] C. Tian, X. Chen, D. Guo, J. Sun, L. Liu, and J. Hong,
modern healthcare system using body sensor network,” “Analysis and design of security in internet of things,” in
IEEE Sensors Journal, vol. 16, no. 5, pp. 1368–1376, 2016. 2015 8th International Conference on Biomedical Engineering
[61] B. Daghighi, M. L. M. Kiah, S. Iqbal, M. H. Rehman, and and Informatics (BMEI). IEEE, 2015, pp. 678–684.
K. Martin, “Host mobility key management in dynamic [78] S. N. Premnath and Z. J. Haas, “Security and privacy
secure group communication,” Wireless Networks, pp. 1– in the internet-of-things under time-and-budget-limited
19, 2017. adversary model,” IEEE Wireless Communications Letters,
[62] A. Riahi, E. Natalizio, Y. Challal, N. Mitton, and A. Iera, vol. 4, no. 3, pp. 277–280, 2015.
“A systemic and cognitive approach for iot security,” in [79] R. Chen, F. Bao, and J. Guo, “Trust-based service manage-
Computing, Networking and Communications (ICNC), 2014 ment for social internet of things systems,” IEEE Transac-
International Conference on. IEEE, 2014, pp. 183–188. tions on Dependable and Secure Computing, vol. 13, no. 6, pp.
[63] B. Daghighi, M. L. M. Kiah, S. Shamshirband, and M. H.- 684–696, 2016.
u. Rehman, “Toward secure group communication in [80] G. Lize, W. Jingpei, and S. Bin, “Trust management mecha-
wireless mobile environments: Issues, solutions, and chal- nism for internet of things,” China Communications, vol. 11,
lenges,” Journal of Network and Computer Applications, no. 2, pp. 148–156, 2014.
vol. 50, pp. 1–14, 2015. [81] F. Buccafurri, G. Lax, S. Nicolazzo, and A. Nocera, “A
[64] I. Yaqoob, E. Ahmed, I. A. T. Hashem, A. I. A. Ahmed, model implementing certified reputation and its appli-
A. Gani, M. Imran, and M. Guizani, “Internet of things ar- cation to tripadvisor,” in 10th International Conference on
chitecture: Recent advances, taxonomy, requirements, and Availability, Reliability and Security, Aug 2015, pp. 218–223.
open challenges,” IEEE Wireless Communications, vol. 24, [82] C. Kolias, A. Stavrou, J. Voas, I. Bojanova, and R. Kuhn,
no. 3, pp. 10–16, 2017. “Learning internet-of-things security” hands-on”,” IEEE
[65] E. Ahmed, I. Yaqoob, I. A. T. Hashem, I. Khan, A. I. A. Security & Privacy, vol. 14, no. 1, pp. 37–46, 2016.
Ahmed, M. Imran, and A. V. Vasilakos, “The role of big [83] X. Xiaohui, “Study on security problems and key tech-
data analytics in internet of things,” Computer Networks, nologies of the internet of things,” in Computational and
2017. [Online]. Available: http://www.sciencedirect.com/ Information Sciences (ICCIS), 2013 Fifth International Confer-
science/article/pii/S1389128617302591 ence on. IEEE, 2013, pp. 407–410.
[66] R. Giuliano, F. Mazzenga, A. Neri, and A. M. Vegni, [84] D. Kozlov, J. Veijalainen, and Y. Ali, “Security and pri-
“Security access protocols in iot capillary networks,” IEEE vacy threats in iot architectures,” in Proceedings of the
Internet of Things Journal, vol. 4, no. 3, pp. 645–657, 2017. 7th International Conference on Body Area Networks. ICST
[67] J.-H. Lee and H. Kim, “Security and privacy challenges (Institute for Computer Sciences, Social-Informatics and
in the internet of things [security and privacy matters],” Telecommunications Engineering), 2012, pp. 256–262.
IEEE Consumer Electronics Magazine, vol. 6, no. 3, pp. 134– [85] D.-Y. Kim, “Cyber security issues imposed on nuclear
136, 2017. power plants,” Annals of Nuclear Energy, vol. 65, pp. 141–
143, 2014.
[68] C. Liu, C. Yang, X. Zhang, and J. Chen, “External integrity
[86] H. Ning, H. Liu, and L. T. Yang, “Cyberentity security in
verification for outsourced big data in cloud and iot: A big
the internet of things,” Computer, vol. 46, no. 4, pp. 46–53,
picture,” Future Generation Computer Systems, vol. 49, pp.
2013.
58–67, 2015.
[87] S. Li, L. Da Xu, and S. Zhao, “The internet of things: a
[69] M. Gao, Q. Wang, M. T. Arafin, Y. Lyu, and G. Qu,
survey,” Information Systems Frontiers, vol. 17, no. 2, p. 243,
“Approximate computing for low power and security in
2015.
the internet of things,” Computer, vol. 50, no. 6, pp. 27–34,
[88] H. Bostani and M. Sheikhan, “Hybrid of anomaly-based
2017.
and specification-based ids for internet of things using un-
[70] S. Al Salami, J. Baek, K. Salah, and E. Damiani,
supervised opf based on mapreduce approach,” Computer
“Lightweight encryption for smart home,” in Availability,
Communications, 2016.
Reliability and Security (ARES), 2016 11th International Con-
[89] R. M. Savola, H. Abie, and M. Sihvonen, “Towards
ference on. IEEE, 2016, pp. 382–388.
metrics-driven adaptive security management in e-health
[71] S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, iot applications,” in Proceedings of the 7th International
“Lithe: Lightweight secure coap for the internet of things,” Conference on Body Area Networks. ICST (Institute for
Sensors Journal, IEEE, vol. 13, no. 10, pp. 3711–3720, 2013. Computer Sciences, Social-Informatics and Telecommuni-
[72] S. Challa, M. Wazid, A. K. Das, N. Kumar, A. G. Reddy, cations Engineering), 2012, pp. 276–281.
E.-J. Yoon, and K.-Y. Yoo, “Secure signature-based authen- [90] A. Kanuparthi, R. Karri, and S. Addepalli, “Hardware and
ticated key establishment scheme for future iot applica- embedded security in the context of internet of things,” in
tions,” IEEE Access, vol. 5, pp. 3028–3043, 2017. Proceedings of the 2013 ACM workshop on Security, privacy &
[73] H. Ko, J. Jin, and S. L. Keoh, “Secure service virtualization dependability for cyber vehicles. ACM, 2013, pp. 61–64.
in iot by dynamic service dependency verification,” IEEE
Internet of Things Journal, vol. 3, no. 6, pp. 1006–1014, 2016.
[74] C. Cheng, R. Lu, A. Petzoldt, and T. Takagi, “Securing the
internet of things in a quantum world,” IEEE Communica-
tions Magazine, vol. 55, no. 2, pp. 116–120, 2017.
[75] E. Al Alkeem, C. Y. Yeun, and M. J. Zemerly, “Security and
privacy framework for ubiquitous healthcare iot devices,”
in Internet Technology and Secured Transactions (ICITST),
2015 10th International Conference for. IEEE, 2015, pp. 70–
75.
COMPUTER NETWORKS 22

Ibrar Yaqoob (ibraryaqoob@yahoo.com) Abdelmuttlib Ibrahim Abdalla Ahmed


received his Ph.D. degree in Computer (abdelmuttlib@siswa.um.edu.my) received
Science from the University of Malaya, his B.Sc. degree in computer science from
PLACE Malaysia, in 2017. He earned 550 plus PLACE OIU, Sudan, and his M.S. degree in com-
PHOTO citations, and 50 plus impact factor dur- PHOTO puter science from IIUI, Pakistan. He is
HERE ing his Ph.D. candidature. He worked as HERE currently pursuing a Ph.D. degree at the
a researcher at Centre for Mobile Cloud University of Malaya. His research Interest
Computing Research (C4MCCR), Univer- areas include trust and reputation systems,
sity of Malaya. His research experience security and digital forensics, Internet of
spans over more than three and half years. He has published Things, mobile and cloud computing, and vehicular networks.
a number of research articles in refereed international journals
and magazines. His numerous research articles are very fa-
mous and among the most downloaded in top journals. His
research interests include big data, mobile cloud, the Internet
of Things, cloud computing, and wireless networks.

Mohammed Ali Al-Garadi received the


M.Tech. degree in electronic and communi-
cation engineering from Jawaharlal Nehru
PLACE Technological University, Hyderabad, India.
PHOTO He is currently pursuing the Ph.D. de-
Ejaz Ahmed worked at Centre for Mobile HERE gree with the Faculty of Computer Science
Cloud Computing Research (C4MCCR), and Information Technology, University of
University of Malaya, Malaysia. Before that, Malaya, Kuala Lumpur, Malaysia. He has
PLACE he has worked as Research Associate in published several articles in academic jour-
PHOTO CogNet Research Lab NUST, Pakistan, nals indexed in well reputed databases such as ISI-indexed and
HERE (December 2009 to September 2012) and Scopus-indexed.
in CoReNet, CUST, Pakistan, (January
2008 to December 2009). His research
experience spans over more than Eleven
years. He is associate editor of IEEE Communication Magazine,
IEEE Access, Elsevier Journal of Network and Computer Appli-
cations, and KSII TIIS. He has also served as a Lead Guest
Editor/Guest Editor and Chair/Co-chair in international journals
and international conferences, respectively. His areas of inter-
est include Mobile Cloud Computing, Mobile Edge Computing, Muhammad Imran (cimran@ksu.edu.sa)
Internet of Things, Cognitive Radio Networks, and Smart Cities. is an assistant professor in the College of
He has successfully published his research work in more than Computer and Information Science, King
sixty international journals and conferences. He has received PLACE Saud University. His research interests in-
several performance awards during his research career. PHOTO clude mobile ad hoc and sensor networks,
HERE WBANs, IoT, M2M, multihop wireless net-
works, and fault-tolerant computing. He
has published a number of research papers
in peer reviewed international journals and
conferences. His research is financially supported by several
grants. He is serving as a Co-Editor-in-Chief for EAI Transac-
tions on Pervasive Health and Technology. He also serves as
an Associate Editor for the Wireless Communication and Mobile
Muhammad Habib ur Rehman (habib- Computing Journal (Wiley), the Inderscience International Jour-
comsats@gmail.com) is an assistant pro- nal of Autonomous and Adaptive Communications Systems,
fessor at COMSATS Institute of IT, Wah Wireless Sensor Systems (IET), and the International Journal
PLACE Cantt Pakistan, where he works on data of Information Technology and Electrical Engineering. He has
PHOTO stream mining systems for the Internet of served/serves as a Guest Editor for IEEE Communications Mag-
HERE Things. His research covers a wide spec- azine, IJAACS, and the International Journal of Distributed Sen-
trum of application areas, including smart sor Networks. He has been involved in a number of conferences
cities, mobile social networks, quantified and workshops in various capacities such as a Program Co-
self, and mobile health. He received a PhD Chair, Track Chair/Co-Chair, and Technical Program Committee
in mobile distributed analytics systems from the Faculty of Com- member. These include IEEE GLOBECOM, ICC, AINA, LCN,
puter Science and Information Technology at the University of IWCMC, IFIP WWIC, and BWCCA. He has received a number
Malaya, Malaysia. of awards such as an Asia Pacific Advanced Network fellowship.
COMPUTER NETWORKS 23

Mohsen Guizani (S’85-M’89-SM’99-F’09) Editor-in-Chief of Wireless Communications and Mobile Com-


received all of his degrees from Syracuse puting journal (Wiley). He is the author of nine books and more
University, Syracuse, NY, USA, in 1984, than 400 publications in refereed journals and conferences.
PLACE 1986, 1987, and 1990, respectively. He is He guest edited a number of special issues in IEEE journals
PHOTO currently a Professor and the ECE Depart- and magazines. He also served as a member, Chair, and the
HERE ment Chair at the University of Idaho. He General Chair of a number of international conferences. He was
served in a number of academic positions selected as the Best Teaching Assistant for two consecutive
in the USA. His research interests include years at Syracuse University. He was the Chair of the IEEE
wireless communications, mobile comput- Communications Society Wireless Technical Committee and the
ing, computer networks, cloud computing, IoT, security, and Chair of the TAOS Technical Committee. He served as the IEEE
smart grid. He currently serves on the editorial boards of sev- Computer Society Distinguished Speaker from 2003 to 2005. He
eral international technical journals and the Founder and the is a Fellow of IEEE and a senior member of ACM.

View publication stats

Vous aimerez peut-être aussi