Security and Privacy in Internet of Things: Methods, Architectures, and Solutions
Guangjie Han,Lei Shu,Sammy Chan,Jiankun Hu
DOI: https://doi.org/10.1002/sec.1497
IF: 1.968
2016-01-01
Security and Communication Networks
Abstract:Internet of Things (IoT) is a fast-growing research area which spans various technological fields, including computer science, electronic engineering, mobile and wireless communications, embedded systems, etc. Many technologies serve as the building blocks of this new paradigm, such as wireless sensor networks, RFID, cloud services, machine-to-machine interfaces, and so on. IoT will allow billions of objects in the physical world as well as virtual environments to exchange data with each other in an autonomous way so as to create smart environments such as automotive, healthcare, logistics, environmental monitoring, and many others. However, IoT introduces new challenges for the security of systems and processes and the privacy of individuals. Protecting the information in IoT is a complex and difficult task. IoT requires global connectivity and accessibility, which means that anyone can access in anytime and anyway, and that the number of attack vectors available to malicious attackers might become staggering. Furthermore, the inherent complexity of the IoT, where multiple heterogeneous entities located in different contexts can exchange information with each other, further complicates the design and deployment of efficient, interoperable, and scalable security mechanisms. Ubiquitous and cloud computing also increase the urgency of the privacy leakage problem. As a result, there is an increasing demand for development of new security and privacy approaches to guarantee the security, privacy, integrity, and availability of resources in IoTs. Traditional security countermeasures cannot be directly used in IoTs because of the different standards and communication stacks involved. Moreover, the large number of interconnected devices in IoTs introduces scalability issues. Therefore, new and novel security and privacy methods, architectures, and solutions are needed to deal with security threats in IoTs. In this special issue, we are delighted to present a selection of nine papers, which, in our opinion, will contribute to the enhancement of knowledge in security and privacy research for IoTs. The collection of high-quality research papers provides a view on the latest research advances on security and privacy methods, architectures, and solutions in IoTs. The contributions of these papers are outlined in the succeeding text. In the first paper, A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity, Xiong Li, Jianwei Niu, Saru Kumari, Junguo Liao, Wei Liang, and Muhammad Khurram Khan adopt the biometrics as the third authentication factor and propose a new authentication protocol to guarantee secure communication and protect the user privacy for healthcare application using WMSNs with user anonymity. In the proposed protocol, a wrong password detection mechanism is designed to reduce unnecessary computation and communication costs. In the second paper, Fusion: coalesced confidential storage and communication framework for the IoT, instead of developing independent security solutions, Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig, and Thiemo Voigt present Fusion to address both the communication and storage security. The paper demonstrates that compared with performing traditional cryptographic operations separately, using the combined solution is much safer and more energy efficient. In the third paper, A changeable personal identification number-based keystroke dynamics authentication system on smart phones, Ting-Yi Chang, Cheng-Jung Tsai, Wang-Jui Tsai, Chun-Cheng Peng, and Han-Sing Wu propose a novel keystroke dynamics-based authentication (KDA) system to protect security of smart phones. Compared with the traditional KDA system, in the proposed new KDA system, the personal identification number codes of the subscribers can be well protected, and the users can change their personal identification number codes and passwords anytime without extra retraining. With the wide use of smart mobile devices, task collaborations among mobile devices are becoming ubiquitous and important. The security issues can be well guaranteed if the tasks can be effectively balanced. Therefore, in the fourth paper, SAFE-CROWD: secure task allocation for collaborative mobile social network, Xiaochen Fan, Panlong Yang, Qingyu Li, Dawei Liu, Chaocan Xiang, and Yonggang Zhao propose “SAFE-CROWD”, which is a secure task-allocation scheme. Using SAFE-CROWD, the tasks can be securely and collaboratively completed among mobile devices. In the fifth paper, ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services, Béla Genge and Cǎlin Enǎchescu propose a novel tool called Shodan-based vulnerability assessment tool (ShoVAT) to guarantee the automated vulnerability assessment of Internet-facing services. Based on the indexing capabilities of Shodan search engine, ShoVAT first finds services and then reconstructs key vulnerability identifiers. Finally, the vulnerabilities are obtained using National Vulnerability Database. The experiment results show that 3922 vulnerabilities are found on 1501 services in 12 different institutions. In the sixth paper, Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks, Muhammad Altaf Khan, Shafiullah Khan, Bilal Shams, and Jaime Lloret propose an artificial neural network-based technique to detect distributed flooding attacks in multi-hop wireless mesh networks. The proposed scheme is named as the distributed flood attack detector. The distributed flood attack detector is designed to be implemented at mesh gateway in wireless mesh network. By using artificial neural networks, the network traffic can be divided into different categories, and thus, the flood attacks can be detected. In the seventh paper, Toward a flexible and fine-grained access control framework for infrastructure as a service clouds, Bo Li, Jianxin Li, Lu Liu, and Chao Zhou propose a flexible and fine-grained access control framework, named IaaS-oriented Hybrid Access Control (iHAC), to ensure that the resources cannot be illegally accessed or used. iHAC consists of three main parts: an IaaS-oriented Hybrid Access Control model, a VM-centric access control approach, and a VMM-enabled network access control mechanism. The simulation results show that iHAC can efficiently make correct access control decisions with acceptable performance overhead. In the eighth paper, An intrusion detection method for wireless sensor network based on mathematical morphology, Yanwen Wang, Xiaoling Wu, and Hainan Chen propose an innovative intrusion detection method called granulometric size distribution (GSD) method based on mathematical morphology to detect malicious attack in IoTs. If the number of active nodes in a wireless sensor network is fixed, the GSD curves are similar. Therefore, malicious nodes can be efficiently detected based on the abnormal GSD. In the last of the presented papers, A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography, Yuanyuan Zhang, Neeraj Kumar, Jianhua Chen, and Joel J. P. C. Rodrigues propose a secure energy-efficient access-control scheme for wireless sensor networks based on elliptic curve cryptography. The algorithm is explained in detail, and a variety of malicious attacks are simulated to evaluate the performance of the proposed algorithm. To summarize, we believe that this special issue will contribute to enhancing knowledge in security and privacy research in IoT in particular. In addition, we also hope that the presented results will stimulate further research in the important areas of information and network security. We also want to thank the editor-in-chief of the Security and Communication Networks journal, the leading researchers contributing to the special issue, and excellent reviewers for their great help and support that made this special issue possible.