a survey on next generation computing iot issues and ... · keywords ² internet of things (iot),...

20
A Survey on Next generation Computing IoT Issues and Challenges Anurag Shukla Department of Computer Science & Engineering National Institutes of Technology Raipur, India [email protected] Sarsij Tripathi Department of Computer Science & Engineering National Institutes of Technology Raipur, India [email protected] AbstractWith the popularity of the Internet of things (IoT), an enormous number of sensors and smart object, which is heterogeneous in nature deployed into a network, send/receive data through the internet on the web. It is tedious to secure the communicated data and the device identity otherwise it cannot be adopted by their natives. But, existing security techniques that are very popular on the Internet are too complex to integrate on small, constrained objects. While initiating security through some protocol and techniques, the life of battery operated sensor can be reduced, so there is need to provide a proper balance between security and energy. This paper presents a survey of existing security protocols applied on IoT, their comparison and possible solution for various attacks KeywordsInternet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services (QoS). I. INTRODUCTION With the progress in wireless communication, Pervasive computing and mobile computing, resulted in a new model known as the internet of things (IoT). IoT is attracting a lot of researchers and industrial innovation. The definition for the IoT could be as the ubiquitous and global networks, which offer various applications for controlling and monitoring the physical world activities of the information collection, data cleaning, processing and analysis of data generated by IoT sensors. These IoT devices have in built computation and sensing capabilities such as RFID, GPS, actuators, LAN and wireless LAN (Zhao & Ge, 2013). These "things" could interact with each other (machine-to-machine (M2M) communication) by making request and response for data and sensing the real world attributes like temperature, pressure, etc. These devices can be bind to the internet and could be managed and operated remotely (Xu, Ding, Zhao, Hu & Fu, 2013; Wei & Qi, 2011). It can be seen as a network of wide-range devices that introduces not only the various security issues available in sensor devices, mobile communication, and the internet, but also some abnormal and accentuated issues like user and network privacy, sensor life cycle (energy consumption), secure routing and quality of service among these devices (Zhao & Ge, 2013). In the last few years, IoT became a hot topic in industry and academic research. IoT is expanding everywhere and supports a complete view of the real world and high level of interaction with the physical world (Atzori, Iera & Morabito, 2010; Gubbi, Buyya & Marusic, 2010). Such areas are smart transportation system; Energy monitoring system, e- healthcare is just a few examples where IoT will be applicable. The reorganization of IoT will largely depend on reliable communication, network, system architecture, data computation, resource allocation, and pervasive computing technology, which provides efficient, secure, and physically as well as cyber interconnectivity. The main agenda of it is the device interconnection within the network, routing between the networks, and specifically the last one dynamic security level mechanism for the various nodes according their real need by considering various parameters: energy and computation capabilities. With increasing number of interconnected devices on the internet (as shown in figure 2), the daunting challenge is to secure the node network from possible threats and attacks. People will feel insecure to migrate their devices on the internet if there is a possibility of being controlled or attacked from unauthorized person or machine over the network (Ericsson, 2011). International Journal of Pure and Applied Mathematics Volume 118 No. 9 2018, 45-64 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu 45

Upload: others

Post on 08-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

A Survey on Next generation Computing IoT Issues

and Challenges

Anurag Shukla

Department of Computer Science & Engineering

National Institutes of Technology

Raipur, India

[email protected]

Sarsij Tripathi

Department of Computer Science & Engineering

National Institutes of Technology

Raipur, India

[email protected]

Abstract— With the popularity of the Internet of things (IoT),

an enormous number of sensors and smart object, which is

heterogeneous in nature deployed into a network, send/receive

data through the internet on the web. It is tedious to secure the

communicated data and the device identity otherwise it cannot be

adopted by their natives. But, existing security techniques that

are very popular on the Internet are too complex to integrate on

small, constrained objects. While initiating security through some

protocol and techniques, the life of battery operated sensor can

be reduced, so there is need to provide a proper balance between

security and energy. This paper presents a survey of existing

security protocols applied on IoT, their comparison and possible

solution for various attacks

Keywords— Internet of Things (IoT), Challenges and Issues,

Security, Possible Solutions, Energy and Quality of Services (QoS).

I. INTRODUCTION

With the progress in wireless communication, Pervasive

computing and mobile computing, resulted in a new model

known as the internet of things (IoT). IoT is attracting a lot of

researchers and industrial innovation. The definition for the

IoT could be as the ubiquitous and global networks, which

offer various applications for controlling and monitoring the

physical world activities of the information collection, data

cleaning, processing and analysis of data generated by IoT

sensors. These IoT devices have in built computation and

sensing capabilities such as RFID, GPS, actuators, LAN and

wireless LAN (Zhao & Ge, 2013). These "things" could

interact with each other (machine-to-machine (M2M)

communication) by making request and response for data and

sensing the real world attributes like temperature, pressure,

etc. These devices can be bind to the internet and could be

managed and operated remotely (Xu, Ding, Zhao, Hu & Fu,

2013; Wei & Qi, 2011).

It can be seen as a network of wide-range devices that

introduces not only the various security issues available in

sensor devices, mobile communication, and the internet, but

also some abnormal and accentuated issues like user and

network privacy, sensor life cycle (energy consumption),

secure routing and quality of service among these devices

(Zhao & Ge, 2013).

In the last few years, IoT became a hot topic in industry

and academic research. IoT is expanding everywhere and

supports a complete view of the real world and high level of

interaction with the physical world (Atzori, Iera & Morabito,

2010; Gubbi, Buyya & Marusic, 2010). Such areas are smart

transportation system; Energy monitoring system, e-

healthcare is just a few examples where IoT will be applicable.

The reorganization of IoT will largely depend on reliable

communication, network, system architecture, data

computation, resource allocation, and pervasive computing

technology, which provides efficient, secure, and physically as

well as cyber interconnectivity. The main agenda of it is the

device interconnection within the network, routing between

the networks, and specifically the last one dynamic security

level mechanism for the various nodes according their real

need by considering various parameters: energy and

computation capabilities. With increasing number of

interconnected devices on the internet (as shown in figure 2),

the daunting challenge is to secure the node network from

possible threats and attacks. People will feel insecure to

migrate their devices on the internet if there is a possibility of

being controlled or attacked from unauthorized person or

machine over the network (Ericsson, 2011).

International Journal of Pure and Applied MathematicsVolume 118 No. 9 2018, 45-64ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)url: http://www.ijpam.euSpecial Issue ijpam.eu

45

Page 2: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

Figure 1. Internet of Things and It’s Popular Application

Continue with our discussion, device communication and

routing is a critical part of it due to the need of maintaining

consistency while data or packet is transmitted between IoT

nodes across various network topologies. The processes of

making secure communication and maintaining a QoS even

more tedious (Gubbi et al., 2010). In it, various Sensor nodes

have different-different computation capabilities, and it is

running on battery power. Consider via the above factor‘s;

there is an essential need of a real-time security model so that

system can assign the different level of security techniques

according to node characteristics like- energy, computation

power, etc. for securing the data and routing process across

IoT nodes.

Figure 2. A forecast of more than 50 billion interconnected devices

by 2020. (Adapted from [CISCO, 2011]).

The IoT architecture (indicated in figure 3) is being

organized into three layers: perception, network, and

application layer (Zhao et al., 2013). The support layer (such

as cloud computing, intelligent computing) is also included in

some system architecture for the support of the application

layer (Suo, Wan, Zou, & Liu, 2012). In this survey, we have

considered three-layer architectures, which have been reported

frequently by other researcher. In this article, we explore the

IoT protocol, which works on network and application layer

and their vulnerability of being attacked during

communication.

The Rest of the article is organized into three sections. In

the first section we cover, the various definitions related to IoT

and their history followed by IoT application, in the very next

section, we provide the various IoT related challenges and

their issues: Security, Energy, and Quality of Service (QoS).

In the next section, we give the protocol stack corresponding

IoT layers and provide a comparison between them. In the last

section we analyze various IoT related security work which is

isolated from the standard protocols and categorize them

according to their key cryptographic techniques, we

summarize all these techniques and provide a comparison

table between them by considering their provide solution

against security threats.

II. DEFIN ITIONS, HISTORY & TRENDS

A. Definitions

Atzori et al. (2010) defined, IoT can be combined into three parts—internet (middleware), things (sensors) and semantic (knowledge/data analysis). Although this type paradigm is required due to the subject nature, the IoT requirement can be expanded only in the service domain.

Figure 3. Security Architecture (Suo, Wan, Zou, & Liu, 2011 ; Zhao & Ge, 2013)

According to the RFID group, the definition of IoT is: The worldwide-interconnected network of different objects uniquely identified based on an address scheme through standard protocols.

The Clusters of European research projects on IoT (Sundmaeker, Guillemin, Friess, & Woelfflé, 2010): "Things" can participate actively in social and business process where they able to interact and communicate with each other by transmitting the data and sensed value about the physical world, while responding autonomously without any human interaction to real/ physical world events and trigger some actions and offer the service.

International Journal of Pure and Applied Mathematics Special Issue

46

Page 3: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

By Forrester, Smart environment (Bélissent, 2010): Uses of information, communication technologies, and protocols for developing an infrastructure to serve the society, cities administrates transportation, health care and education more efficient, interactive and better.

In our definition, we believe in the theory that a common static architecture cannot be a blueprint for all applications, so we should make it more flexible to support scalability and do not restrict to any standard protocol. Our definition of IoT is Interconnection of devices in IoT networks is achieved through some standards or protocols. Day by day new devices are introduced into a market, for instance, some couple of years ago no one wonders about a mobile phone. Now, these days the mobile phone is smarter as computer and cheaper too. Therefore, we are suggesting here, Standards or protocols, which are used for developing the IoT network, should be open. When new devices are introduced in a network, standards can be modified according to their need.

B. IoT History

The term IoT is around 17 years old, but the real idea about connecting devices had been longer, around since 1970. At that time, the idea was often called "pervasive computing" or "embedded internet". The term, IoT was actually invented by Kevin Ashton at Procter & Gamble during his work. In 1999 "internet" was a hot topic and Kevin Ashton was working in supply chain optimization, wanted to collaborate two technologies: internet and RFID so that he can attract the senior management team. He called his presentation "Internet of Things". Even he got successes, but then it was remained untouched for next 10 years.

In the table 1, we give the brief history about IoT and cover the important events year by year, which can help to know that how IoT came into existence from other areas and what is the required technology, which can help in shaping the IoT world.

C. Trends

IoT is known as one of the emerging technology in research and it‘s industry. People's interest about different paradigms varied with respect to time. According to Google search (2017) trends, the web search popularity during the last 13 years for the terms IoT, wireless sensor network and ubiquitous computing is given in figure 4. It can be clearly observed that the popularity of it is increasing day by day with the downtrend of the wireless sensor network.

Figure 4. Google search trends (2004-2016) for terms Internet of Things, Wireless Sensor Networks, Ubiquitous Computing.

Table 1. Events Which Helped Shaping The IoT World. (Adapted from [POSTSCAPES])

Year Event

1967 Remotely Monitored Battlefield Sensor System (REMBASS)

1978 Aircraft Detection through Distributed Sensor Networks at Lincoln Labs

1993-1996 DARPA ISAT studies - Many Wireless Sensor Network ideas and its possible applications discussed. Deborah Estrin leads

one of the studies.

1994 Low Power Wireless Integrated Micro sensors (LWIM) - Bill Kaiser

1999 1999: The term Internet of Things (IoT) is introduced by K. Ashton, Executive Director of the Auto-ID Center in MIT (Massa chute Institute of Technology).

First time N. Gershenfeld share his ideas about IoT in his book entitled ―When Things Start to Think‖.

MIT Auto-ID Lab, originally founded by K. Ashton, D. Brock and S. Sharma .They introduced the Electronic Product Code (EPC), a global RFID-based item identification system intended to replace the UPC bar code.

2000 LG shared his idea and plans on internet refrigerator.

2002 The Ambient Orb created by David Rose and others in a spin-off from the MIT Media Lab is released into wild with NY

Times Magazine naming it as one of the Ideas of Year. The Orb monitors the Dow Jones, personal portfolios, weather and

other data sources and changes its color based on the dynamic parameters.

2003-2004 RFID is deployed on large number by the Department of Defense (US) in their Savi program and Wal-Mart in the

commercial world.

2005 The UN‘s International Telecommunications Union (ITU) published its first report on the IoT‘s topic. 2008 Identified by the EU and the First IoT European conference is held.

Group of companies launched the IPSO Alliance to encourage the use of IP in ―Smart Objects‖ networks and to enable the

IoT.

International Journal of Pure and Applied Mathematics Special Issue

47

Page 4: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

2008-2009

The FCC voted to approve and launching the ‗white space‘ spectrum.

IoT was listed as one of the 6 ―Disruptive Civil Technologies‖ by US Intelligence Council, with Potential impacts on US

interests out to 2025.

According to Cisco‘s Business Solutions Group in 2008-2009, IoT was born.

2010 Chinese Premier Wen Jiabao calls IoT as a key for China industry and has plans to major investments in IoT industry.

2011 IPv6 public launch-The new protocol allows approximately for 2128 addresses to support IoT.

III. APPLICATION

IoT has the ability and can take the society to another level, where things can be very systematic and easy to operate from anytime or anywhere. IoT allows the device for making smart decisions and appropriate action without any human interaction. IoT concepts have been revealed in various domains ranging from transport, logistics, object tracking, agriculture, smart environment (home, office, city) to energy and defense.

According to Fleisch (2010), IoT is appropriate in every phase and everywhere. He considered 100 existence and emerging application that leveraging the IoT concept. He identified seven primary value drivers. Starting four applications are based on machine-to- machine communication (M2M) and rest of three based on user

participation.

1. Simplified manual proximity trigger: IoT nodes can

transmit their name or identity when they are in reach of

sensor range. As soon as the node is close, enough into

sensing space, a particular activity or transaction will be

triggered automatically.

2. Automatic proximity trigger: It triggered an automatic

action when the physical distance between two nodes

under below to some particular value (threshold).

3. Automatic sensor triggering: A smart device can collect

data through various types of sensors, including

brightness, temperature, smell, acceleration, vibration,

noise, chemical composition, humidity, and vision and

life signals. Devices sense these data and communicate

with the server and action will trigger based on pre-

program rules.

4. Automatic product security: A IoT nodes can provide

security based on the QR code, and its cyber

representation (Bind a specific URL corresponding to

every QR code).

5. Simple and direct user feedback: IoT nodes contain

simple mechanism and can give feedback to an

authenticate person present in the domain either in audio

format (small beep) or visual signal (flashlight).

6. Extensive user feedback: IoT nodes can offer a service to

the user (node is linked to a service through some

gateway device). Augmented service is an appropriate

example of this kind of application.

7. Mind changing feedback: The combination of virtual

world and the real world might be a reason of new levels

of change in the human behavior.

Fleisch's seven drivers can be suitable for real IoT

applications.

By integrating subsystem (smart home, smart city, and

transportation system) will form a smart environment that is

shown in Table 2 and their specification on technical

perspective is listed there. We identified some IoT application

and grouped them according to their domain in Table 3.

Table 2. Specification of IoT Applications

Smart office /

Home (Kidd et al., 1999)

Smart city (Murty et al., 2008)

Smart Forest/ Agriculture (Aun , 2000)

Smart Parking / Transportation (Lin et al.,

2005)

Network size Small Medium/Large Medium Small/Large

Users Very few Many/Policy maker/General Public

Few/Landowner General Public/ Many

Energy source Rechargeable battery Energy harvesting Energy harvesting Rechargeable battery/Energy harvesting

Communication Wi-Fi/3G/4G LTE Wi-Fi/3G/4G LTE Wi-Fi/ Satellite Wi-Fi/ Satellite

Data storage Local Server Shared Server Local Server/Shared Server

Shared Server

IoT device RFID/ WSN RFID/ WSN WSN RFID/WSN

Bandwidth Small Large Medium Medium/ Large

International Journal of Pure and Applied Mathematics Special Issue

48

Page 5: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

Table 3. IoT Application Domains - Description and Examples.

Domain Description Examples

Industry Application on automation industry and commercial or financial transactions between companies and various organizations.

Publicsector, water infrastructure, manufacturing, logistic, transport, etc.

Enviorment Applications for monitoring, protection and efficient utilization of all natural resources.

Agriculture, forest, energy managment, enviormental managment servvices, recycling etc.

Society Activities regarding the development and serve better societies, nation, and peoples.

Government services towards society and citizens (e.g.,- Smart traffic control system, health monitoring system, smart city).

IV. CHALLENGES AND ISSUES

The heterogeneous nature in its network is rising different challenges with respect of security, resource availability and functionality. A safe IoT system must overcome to all challenges given in table 4.

A. Security and Privacy

In IoT, two major issues are the privacy (user related information) and security about the sensed data and business processes. The heterogeneity in IoT nodes, large scale of deployment, resource constraints, and their mobility make it harder to secure the network. There are a large number of techniques for ensuring the confidentiality. However, the primary task is to execute this algorithm faster to match the constraint of real time and should be less energy consuming. In addition, for making encryption technique secure, an efficient key distribution should be used. In the small-scale system, key distribution can be possible at the time of deployment, but at a large level, only novel key distribution schemes can be used for ensuring the privacy. Data anonymity can be a solution for privacy, but it is supported by equipment like high computation power and large bandwidth which is just contradict to IoT requirements (Miorandi, Sicari, De Pellegrini & Chlamtac 2012).

Security is a critical component for adopting the IoT at a global level, and without any guarantee, regarding authenticity, confidentiality, integrity and non-repudiation the related party is unlikely to adopt on a large scale. We will explore these key points in this section.

1. Availability

Availability is the consistency of every layer services of a network to the devices and makes sure the survivability of

network service even in the presence of attacks. IoT services will apply to commercial and real-time applications, so security in respect of availability should be on top.

2. Authenticity

A Process, where a user or node needs to prove their identity to use some services. Authentication is required to protect the system from impersonating nodes, which can breach the safety of the entire network. In IoT, many node support heterogeneous communication in a network, authentication is necessary to avoid illegal accesses.

3. Confidentiality

Data confidentiality is relevant to the business application, where an only authorized person can access or modify the data. In the context of IoT, data confidentiality addressing two important aspects: first is about the data access mechanism and a second are about object authentication processes. While data is transmitted, routing and encryption are precious to provide safety during communication.

4. Integrity

It provides an assurance that received data to the destination node should be original as sender sent, it should not be damaged or modified either from collision or through a third party (hacker).

5. Non-repudiation

Non-repudiation is an assurance that someone cannot deny to anything; as like source node send their data to the destination and should acknowledge the same. Non-repudiation is important to identify and some untrusted node can send the wrong information to some other nodes in a network and can deny, they never posted such information.

Table 4. IoT Challenges.

Interoperability Incorporate of security techniques in IoT network should not obstruct the functionality of the heterogeneous devices.

Fault tolerance The system should avoid even a single failure in the network, so infected node will not affect the entire system. Apart from that network must also avoid resource exhaustion attack against limited resource device.

Limitation of resource

Most of the IoT devices are restricted with respect to computation power, energy resources (battery operated), memory and bandwidth (linked to each other on low bandwidth). Therefore, it is tough to apply on internet security protocols directly in the context of IoT network. Hence, the standard security techniques need to redesign to full fill

International Journal of Pure and Applied Mathematics Special Issue

49

Page 6: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

the requirement of IoT security with more efficient performance.

Availability The IoT devices must be functionally available when it is required. It is specifically vulnerable the Dos attacks such as message flooding to various nodes forced them to be unavailable in the network.

Scalability On internet million of devices existing and increasing continuously (Ericsson, 2011). The security, addressing protocols and required memory to store the generated information for each IoT device and s should able to scale when new devices introduce in the network.

Privacy protection

The popularity of sensors and RFID has increased the privacy concern because when the data are sensed and communicated, anyone can track these data and breach the identity or person (e.g., wearable device). In future, humans can connect their bodies to the internet by microchip implant in human bodies. Hence, health records must not be traceable and remain secure.

B. Energy

Many of IoT node runs on battery operated power and energy efficiency is most crucial for availability and proper functionality of the network. Energy efficiency in IoT sensor nodes is an active research area (Yoo, Wu, & Qiao, 2015; He, Chen, Yau & Sun, 2012). Most of it nodes are running on non-chargeable energy source and communication between heterogeneous nodes is more energy consuming. Deployment of complex security protocols in an IoT network can consume more energy, so it is advisable that in its network, we need a mechanism where a level of security can assign while considering the parameters like energy and probability of actual threads at a particular node.

C. Quality of Services (QoS)

While developing an IoT network, various challenges exist for a developer, one of them a quality of service (QoS) in respect of sensing data quality, resource consumption, data drop and so on. The QoS deal with all the parameters, which can directly or indirectly affect the reliability, performance and availability of the network. Considering some of the points (European Commission, 2014) under this category are:

Bandwidth, Capacity and Throughput

Trustworthiness

Latency

Resource Optimization and Cost Efficiency

Scalability

V. Related Work About IoT Protocols

In this section, we will discuss about various IoT protocols

and try to identify their benefits as well as limitations. The

discussion includes perception layer, network layer and

application layer protocols. Network layer functionality is

further divided into two parts.

A. IoT perception layer protocol

In this section, we will discuss different communication

protocols for IoT device. In IoT, all types of sensors, actuator

devices and communication technology or protocols between

them will reside in this category only. ZigBee and Bluetooth

are most commonly used in IoT network. In this layer, we will

discuss various protocol standards. On the other hand, IEEE

801.11ah can be used easily due to the existing and globally

spread infrastructure of IEEE 802.11 in a wireless application.

In some application, reliability is preferable hence; they use

Home Plug for LAN connectivity.

1. IEEE 802.15.4

IEEE 802.15.4 is most used standard in IoT for medium

access control. It includes device communication, a header

with source and destination address and frame format. The

traditional network frame format does not use in IoT network

due to their overhead so, in 2008 IEEE 802.15.4e was

introduced to upgrade IEEE 802.15.4 to support less power

energy. It is highly reliable because it uses channel hopping

and time synchronization method.

2. IEEE 802.11ah

IEEE 802.11ah runs on low energy and apart from that, it is

same as IEEE 802.11. IEEE 802.11 standard are not

appropriate for IoT due to high power requirements and frame

overhead, so it is a redesigned version of IEEE 802.11 to meet

IoT requirements with less overhead and less power

communication for motes and sensors. IEEE 802.11 (known

as Wi-Fi) is very popular wireless standard and mostly used in

Laptops, mobile phones, etc (Park, 2015).

Table 5. Protocol Stack for IoT Layer.

Application Layer

(MQTT, SMQT, DDS, XMPP, AMQP CoRE, CoAP )

Network Layer

Encapsulation

( 6LowPAN,

6TiSCH,6Lo, Thread...)

Routing

(RPL, CORPL, CARP…)

Perception Layer

(WiFi, Bluetooth, Zigbee smart, DECT/ ULE,

Weightless, Z-wave, DASH7, 3G/LTE, Home Plug GP,

LoRaWAN, LTE-A, G.9959, 802.11ah, 802.15.4e…)

3. Wireless HART

Wireless HART acquires time division multiple access

(TDMA) to accesses medium and operate on the top of IEEE

802.15.4 PHY. It uses advanced encryption techniques to

International Journal of Pure and Applied Mathematics Special Issue

50

Page 7: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

encrypt data and maintain integrity, so it is a secure and

reliable protocol. This protocol ensures security source to

destination (End to End security mechanism) and peer-to peer

as well (Raza, & Voigt, 2010; Kim, Hekland, Petersen &

Doyle, 2008).

4. Z-Wave

This protocol comes under MAC protocol and very

popular for home automation. Its range up to 30-meter,

appropriate for a small message and low power protocol and

used for communication in smart home or office. Z-Wave

follows master-slave architecture and master control the entire

network and instructs the slaves through commands. It

acknowledges the message to ensure reliability and uses

CSMA/CA for collision detection (He, Chen, Yau, & Sun,

2012).

5. Bluetooth Low Energy

Bluetooth is used for short distance communication and

consume ten times less energy with 15 times more latency

than classical Bluetooth. It works on master-slave architecture

and uses two types of frame: data frame and adverting. Slaves

send the adverting frame on one or more dedicated link. The

master continues to sense these links, find them and connect

with slaves. Nodes are mostly in an inactive state to make an

efficient source of resource and awake only when they

communicate with each other (Decuir, 2010; Hasan, Hossain,

& Niyato, 2013).

6. Zigbee Smart Energy

Zigbee supports a large range of communication and can

be used in a healthcare system, remote controls or in smart

office. It supports different network topologies like peer to

peer, star, tree soon. ZigBee standards divide in two profiles:

ZigBee and ZigBee Pro. ZigBee. These protocols work with

different applications and support implementation with low

computational power and memory. ZigBee Pro includes more

features like efficiency through many to one routing

techniques, security through symmetric key exchange and

scalability (ZigBee Standards Organization, 2008).

7. DASH7

It is wireless communication protocol and for RFID and

employ globally on ISM Band (Industrial, scientific and

medical) and appropriate for IoT applications. It supports high

range, scalable and offers higher data rate than ZigBee. It is

designed to support lightweight, low cost to support

encryption and follow IPv6 addressing (LoRa Alliance, 2015).

8. HomePlug

Homeplug is a MAC protocol and used in a home

automation system. It comes in three versions: Home plug-

AV, HomePlug AV2, and HomePlugGP. HomePlugGp is a

redesigned version of HomePlugAv for ensuring low power

and cost; it is specially designed for its applications (smart

home). HomePlugGp uses Orthogonal Frequency Division

coding Multiplexing (OFDM) coding for reliable

communication. HomePlugGP use CDMA and TDMA

techniques for medium accesses while HomePlugAV used

only CSMA as a MAC protocol. HomePlugGP synchronizes

the sleeping time and wakes up only when in requires, so it

operates on less power than HomePlug9) G.9959 (HomePlug

Alliance, 2012).

9. Long Term Evolution-Advances (LTE-A)

Long Term Evolution Advances (LTE-A) is a set of

standards, introduced for communication between M2M

(machine to machine) or IoT devices in a cellular network.

Compared to other cellular protocols, LTE supports scalability

and low power. LTE-A divide the frequency into independent

band and can them separately (Orthogonal Frequency Division

Multiple Access). LTE-A architecture consists of a Core

network- responsible for to track IPs and to control the mobile

nodes; 2nd one is Radio accesses network to deal with access

control, wireless connectivity, and data plan and the last one is

mobile nodes (Hasan, Hossain, & Niyato, 2013).

10. LoRaWAN

LoRaWAN is a new and emerging wireless technology,

with low energy, low cost, secures and supports full duplex

communication. It is designed to support large or scalable with

million numbers of devices. It supports the future needs of IoT

like energy harvesting, mobility, operated at low power and

redundant operation (LoRa Alliance, 2015).

11. Weightless

It is a wireless area network technology and designed by

Special Interest Group (SIG) -Nonprofit organization. It

supports two standards Weightless-N and Weightless-w.

Weightless introduced earlier, support low cost and consumed

less energy and communicating between machine to machine

using TDM access. Weightless- W offers above features too,

but uses only television band frequencies (Poole, 2014).

12. Digital Enhanced Cordless Telecommunications (DECT)

/ Ultra Low Energy (ULE)

It is the European standard for cordless phones. Digital

Enhanced Cordless Telecommunications (DECT) / Ultra Low

Energy (ULE) is an improved version of DECT. It operates on

low power and less cost air interface technique so it can be use

International Journal of Pure and Applied Mathematics Special Issue

51

Page 8: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

Table 6. Perception Layer Protocols Comparison

in IoT applications. It communicates through the dedicated

channel, so it is free from congestion. DECT/ULE uses

FDMA and TDMA, which were not supported by DECT

(Bush, 2015).

B. IoT Network layer protocol

We divide the network layer functionality into two parts:

Routing and Encapsulation. In this section, we will discuss

various routing and encapsulation protocols.

1. IoT Network layer Routing protocol

In this section, we will discuss IoT routing protocol, which

is responsible for delivering the packets from source to target

device.

a. Routing Protocol (RPL)

RPL (Routing Protocol) is a distance vector routing

protocol that can support various communication protocols,

which we discuss in an upper section of perception layer. It

constructs Destination-oriented direct acyclic graph (DODAG)

that has one and unique route from the root to all leaf nodes.

Firstly, each node advertises him as a root node by sending an

advertisement message. This message will spread in a

network, and the entire DODAG will slowly build. When

communicating, root sends a DAO (Destination

Advertisement Object) to its parents, like this it's will

propagate to root, and root will decide according to the

destination address that's where it has to send. When any new

node wants to join a network, it will request, through the

DODAG Information Solicitation (DIS), and root gives

acknowledge through DAO Acknowledgment (DAO-ACK).

RPL node can be stateless and stateful, the stateful node used

commonly and node keeps track of parents only. Root has

complete knowledge of entire DODAG so communication will

go through root only. Stateful node keeps information about

the parents as well as children where communication will go

through it does not need to go through the root (Winter, 2012).

b. Cognitive RPL (CORPL)

CORPL (Cognitive RPL) is an extension of RPL protocol,

used DODAG topology and designed for the cognitive

network. CORPL comes with two modifications of RPL that is

it forwards the packet to best hope by choosing multiple

forwarders from forwarder set. Each node maintains their

forwarder set in place of its parent and use DIO message to

update their neighbors when there is any change. Each node

changes neighbor‘s priorities corresponding these updates to

create forwarder set (Aijaz, & Aghvami, 2015).

c. Content-aware routing protocol (CARP)

CARP (Content-aware routing protocol) is used in underwater

communication, and it considers link reliability based on the

successful communication by neighbor sensor history. It is a

distributed routing protocol and uses a lightweight packet

mechanism so that we can use in IoT application. It works

based on two scenarios: network initialization and data

forwarding. In first scenario: hello message will broadcast

from the source to each available node in a network. In second

scenario: packet will be routed in the network hop by hop.

Each hop identifies independently. The main drawbacks with

the CARP protocol are that it does not maintain the previously

sensed data means if there is significant change is sensor data

and if an application requires the previous one, in this kind of

situation CARP is not applicable. E-CARP is an extended

version of CARP with allowing to node save the previous data

(Zhou, Yao, Xing, Shu, & Bu, 2015).

Protocol Energy Efficient

Reliability Remark: Techniques for ensuring the reliability

IEEE 802.15.4 High High Channel hopping, time synchronization

IEEE 802.11 AH

High Less

Wireless HART

Less High Advance encryption

Z-Wave High High Acknowledge system, CSMA/CD

Bluetooth Low Energy

Very High High Encryption

Zigbee Smart Energy

High High Symmetric key

DASH7 High Average Encryption

HomePlug High High OFDM

LTE-A High Less

LoRaWAN Very High High Acknowledgement, time-synchronization mechanisms at regular fixed intervals

Weightless High Less

DECT/ULE High High Congestion free

International Journal of Pure and Applied Mathematics Special Issue

52

Page 9: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

2. Network Layer Encapsulation Protocols

Ericsson (2011) estimated that up to 2020 there will be 50

billion devices on the Internet, so to support the unique

addressing mechanism IPV6 protocol is used on its network.

Now one problem is that, IoT data link frame format relatively

small to store IPV6 addresses. Therefore, to handle this kind

of situation IETF (Internet Engineering Task Force) working

on a set of standards to enclose the IPV6 datagram‘s into IoT

data link layer frames. In this section, we will discuss this

mechanism in brief.

Table 7. Network Layer Routing Protocols Comparison.

Protocols Energy Efficient

Security

RPL

CORPL

CARP

a. 6LoWPAN

IPv6 over low power wireless area network (6LoWPAN) is

most popular protocol under this category. It encapsulates long

header of IPv6 protocol in IEEE 802.15.4 packets which

maximum size is 128 bytes. This standard introduces

compression techniques to decrease transmission overhead,

support multi hop delivery and fragmentation support to

maintain maximum frame size of 128 bytes. Four types of

header supported by 6LoWPAN frame: 6LoWPAN, mess,

fragment and dispatcher header. If any frame does not follow

specialization of 6LoWPAN network, then it will reject. Mess

is used for broadcasting, the fragment is used to break the

large IPv6 header to fit into 128-byte size and dispatcher is

used for multicast and compression over IPv6 header (Jain,

2015).

b. 6TiSCH

It is a working group of Internet Engineering Task Force

(IETF) developing a mechanism to distribute channel in

TSCH (Time-Slotted Channel Hopping) mode. It consists a

matrix where column represents the available frequencies and

rows available time slots for network scheduling and the

channel will be distributed according to this matrix. The

matrix is partitioned into many chunks and known to all nodes

in a network. There is a possibility that some nodes can have

the same parameters, so to avoid this kind of situation node

will negotiate so that each node will get a chance. This

standard will not specify the scheduling techniques, so

according to application requirements allow maximum

flexibility to IoT application. The scheduling can be

distributed or centralized depending on topology or

application (Dujovne, Watteyne, Vilajosana, & Thubert,

2014).

c. IPv6 over G.9959

G.9959 supports a frame format, where 32 bits reserved for

the network identifier (home network) that is given by a

controller and 8 bit for node identifier that is assigned to each

node. RFC 7428 introduce a frame format to transmit IPv6

packet over G.9959 packet, and support a level of security

through shared key mechanism for encryption, but some

applications required end-to-end encryption mechanism for

maintaining the high level of security.

d. IPv6 over Bluetooth Low Energy

The Bluetooth Special Interest Group (BSIG) in Bluetooth

v4.0 and an enhanced version in v4.1 introduced Bluetooth

low energy. It is a radio technology, which is run on low

power, such as battery power and it, attracts IoT applications

such as environmental sensing, health monitoring, etc.

Bluetooth LE using the same compression method as

6LowPAN and fragmentation feature is different from a

6LowPAN standard. It is achieved through sub layer L2CAP

(Logical Link Control and Adaptation Protocol) which

reassemble the large payload packet into 27 bytes. Bluetooth

LE can use over small messages with low power (Nieminen,

Savolainen, Isomaki, Patil, Shelby & Gomez, 2015).

Table 8. Network Layer Encapsulation Protocols Comparison

Protocol Energy Efficient Security

6LoWPAN

6TiSCH

IPv6 over G.9959

IPv6 over Bluetooth

Low Energy

C. IoT application Layer Protocols

In this section, we briefly highlighted many standard

application protocols. Application layer protocols are

dependent on application type and specifications. In Table-6

we summarize comparison points between these application

layer protocols.

1. Message Queue Telemetry Transport (MQTT)

Message Queue Telemetry Transport (MQTT) was

constructed by IBM in 1999 and standardized in 2013 by

OASIS (Locke, 2010; Karagiannis, Chatzimisios, Vazquez-

Gallego, & Alonso-Zarate, 2015). The architecture of MQTT

organized into three components: publisher, broker (queue)

and subscriber. The publisher is lightweight sensors from IoT

point of view that connects to a broker; broker is a queue

system where publisher sends their sensed data and go back to

sleep. Subscribers are IoT applications; they are interested in

sensed data, so they in contact with a broker when new data

are received. Brokers categorized the data in topics and

delivered to the subscriber according to interesting topics.

2. Secure-MQTT (SMQTT)

An improved version of MQTT is Secure-MQTT (SMQTT),

which used an encryption technique based on a light attribute.

The main advantage of SMQTT is broadcast encryption

feature where one encrypts a message to send to multiple

destinations, so it is a required function for IoT application.

The algorithm work in four stages: setup, encryption, publish

and decryption. The publisher and subscriber registered them

International Journal of Pure and Applied Mathematics Special Issue

53

Page 10: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

self to broker in the setup phase and get a key from the

developer of an application according to required security

level. When new data are formed, it is encrypted, published

and send them to a subscriber by a broker. The encryption

algorithm and set of keys are not standardized; SMQTT is

introduced just to add the security feature in MQTT (Singh,

Rajan, Shivraj, & Balamuralidhar, 2015).

3. Advance Message Queue Protocol (AMQP)

The Advance Message Queue Protocol (AMQP) is a session

layer protocol, which in introduced for financial applications.

It follows the same architecture (Publisher/subscriber) as

MQTT and runs over TCP/IP protocol. In AMQP, broker

functionality is divided into two parts: exchange and queue.

The exchange processes the publisher message and organizes

them into a queue according to roles and condition, which is

predefined into the queue. Queues corresponding to the

subscriber and the topics, whenever the data available in the

queue then will get (OASIS, 2012).

4. Constrained Application Protocol (CoAP)

The Constrained Application Protocol (CoAP) is developed by

the IETF working group to provide a lightweight interface. It

is an application-layer protocol. REST (representational state

transfer protocol) is a standard interface work between HTTP

client and interface. As compared to light it application

requirements, REST consumes more power and significantly

overhead. The CoAP is introduced to match the IoT

requirements such as low power overhead to operate sensors.

CoAP architecture, functionality divided into two layers:

messaging and request/response. The first sub layer is ensured

the reliability and deal with the duplicity of the packet and

request/response sub layer for communication. CoAP has four

messaging nodes - conformable, non-confirmable, piggyback

and separate. Reliable and unreliable transmission represent

by confirmable and unconformable modes respectively, while

piggyback used in the client / server model, where the server

get a message sends the response directly with acknowledged

the message. On the other side, the separate mode will use

when server response within the message separate from the

acknowledgment (Karagiannis, Chatzimisios, Vazquez-

Gallego & Alonso-Zarate 2015; Shelby, Hartke, & Bormann,

2014).

5. Extensible Messaging and Presence Protocol (XMPP)

XMPP was introduced for chatting and message exchange

purpose and standardized by IETF many years ago. It is a

standard and efficient protocol over the internet. Now, it is

reusing the same standards because of its use XML, which

make it easily extensible. It is a very efficient protocol over

the internet and has been raised over the IoT application.

XMPP can work on request/response, or publisher/subscriber

architecture and developer can choose according to the

development application. It is developed for near real-time

application and provides efficient support for a small message.

It does not provide any support for QoS. Therefore, it does not

take place in M2M communication. Furthermore, XML

involves a lot of tag format and headers, which cause for more

power consumption. So, it is rarely used in IoT applications

(Karagiannis, Chatzimisios, Vazquez-Gallego & Alonso-

Zarate, 2015; Saint-Andre, 2011).

Table 9. Application Layer Protocols Comparison.

Protocols Security QoS

MQTT

AMQP

CoAP

XMPP

DDS

V. COMPAIRSION AND CLASSIFICATION OF IOT RELATED

SECURITY ATTACKS

In this section, existing IoT related security work analyzed

and categorized into two types: techniques that work on

asymmetric key schemes and symmetric pre-distribution

schemes. These techniques are isolated from standard IoT

protocols, which are covered in the above section. In figure 5

taxonomy of security techniques according to cryptography

schemes.

In table 10, we compare all these security techniques by

considering the various attributes: energy, latency, complexity

and bandwidth utilization. We use simple notations to

compare the security techniques: ‗‘– supported, ‗blank

means‘ – not applicable or not comparable and ‗’ not

supported.

In table 11 we consider six metrics to evaluate the

solutions: Privacy, Authentication, Confidentiality, Denial-of-

service (DOS), Integrity and end-to-end (E2E) Security. We

define simple notations to evaluate the security services: ‗ ‗–

supported, ‗blank means‘ – not supported.

VI. RESEARCH CHALLENGES

The concept of IoT has been extended to various domains of real life in order to solve various problems. It can be viewed as a combination of heterogeneous devices, sensor, actuator, etc. communicating with each other without very less human intervention and providing meaningful information to control and monitor situation for example: Patient monitoring, energy management , and traffic monitoring System. The applications of IoT can be constrained by resource limitation such as less computation power, limited energy, limited bandwidth, limited memory etc. Apart from above, challenges the applications developed using IoT concept are prone to security and privacy attack. The computing nodes/sensors are deployed in open environment and their communication is limited but vulnerable to attack. Further, the sensed data is collected at one key node and forwarded for analysis and monitoring purpose. This involves use of Internet quite often. So, in view of above scenarios a security framework or model for IoT application is desirable, where it has to be ensured that privacy and security of data cannot be compromised.

International Journal of Pure and Applied Mathematics Special Issue

54

Page 11: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

As mostly IoT applications are Real time and Energy constrained, the challenge to provide security to applications needs a balancing approach. The strategy for providing security should be adaptive in nature which changes according to the applications parameter such as energy, Timeliness, attack level, security level, Load in the system etc.

In IoT, standard is an important part. The standard development process and protocol should be open accesses to all, so that when new devices will introduce in network, existing standard can be modified to support new object and application. In today‗s network paradigm, global standards are typically more applicable than any local agreements.

Therefore, it becomes an open and viable area of research and effort is required to develop a comprehensive security aware framework where the security level can be flexible and it is decided only after analyzing the network nodes parameters: Energy, Computation power, Attack level, Security level such that QoS feature of things and node-integrated network can be ensured.

VII. CONCLUSIONS

The objective of this survey is to present an explicit analysis of the traditional IoT security protocols, modified techniques, their approach and possible challenges over various attacks. There are numerous issues in IoT, such as user privacy, authentication, data confidentiality, DOS, integrity and end-to-end (E2E) security across network that must be resolve by IoT security techniques. Still, there are multiple security threats, which will be place in the Future IoT. Additionally, In IoT networks most of the devices are resource restricted and it is not only recommended to assure the security in network, but also to implement efficient techniques which balancing the requirements like computation power, energy, and QoS features of things and network, so that these techniques can be applicable to the real world scenarios.

This survey paper also provides a classification of existing security techniques and protocols relying on their key-based cryptography approach for assuring reliability in the IoT network. These techniques and protocols are examine for identify their advantages and limitation over energy and QoS features. Apart from that, this article also identify some research challenges for Future IoT so that organizations and researchers should tackle these problem and further research can be carried out in this direction.

International Journal of Pure and Applied Mathematics Special Issue

55

Page 12: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

Figure 5 Taxonomy of cryptography key classification.

Classification of cryptographic keys

Asymmetric key

schemes

Symmetric key

predistribution scheme

Raw public key

encryption

Server assist

key distribution Certification

based encryption

Offline key

distribution Identity based

encryption

External

assisted

server

Deterministic key

distribution Probabilistic key

distribution

Key agreement

based on asymmetric

techniques

Key transport based on public

key encryption

(Sarikaya

et al.,

2012)

Proxy-

based assisted

server

IoT (Raza

et al.,

2013) (Hummen

et al.,

2013)

(Szczechow

iak et al.,

2009) (Yang et al.,

2013)

(Nicanfar et

al., 2011)

(Yang et al.,

2013)

(Meulenaer

et al., 2008) (Moskowitz

,2012)(Gos

wami et al.,

2014)

(Du et al.,

2006; Blom

et al., 1984)

(Raza et al.,

2011)

(Saied et

al., 2012)

(Hussen et

al., 2013) (Vucinic

et al.,

2015)

(Bhattacha

ryya et al.,

2015)

(Eschen

auer et

al.,

2012)

International Journal of Pure and Applied Mathematics Special Issue

56

Page 13: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

Table 10. Summary of Proposed Security work and their key Techniques for IoT.

Protocol/References Briefdescription Energy Efficient

Latency

Complexity

B.W. utilization

Security Bootstrapping Solutions for Resource-Constrained Devices( Sarikaya et al., 2012)

This document give an idea how to securely configure the resource constrained device networks at initial stage and bootstrapping architecture, security methods and communication channel are described.

Less

A lattice based authentication for low-cost RFID (Moustaine et al., 2012)

Author proposes an NTRU based schemefor RFID tag (low-cost), and a lightweight mutual authentication protocol based on this NTRU‘s adaptation. This solution covers the security and privacy related requirements for RFID systems. Less

Lightweight secure CoAPs for the IoT: Lithe (Raza et al., 2013)

Author present Lightweight Secure CoAP for the IoT (Lithe) — a combination of DTLS and CoAP for the IoT. With Lithe, additionally give a novel DTLS header compression scheme that motive to decrease the energy consumption by leveraging the 6LoWPAN standard. DTLS header compression scheme does not compromise the end-to-end security properties. Simultaneously, it greatly reduces the number of data bytes while maintaining DTLS standard compliance.

Certificate-based authentication for the IoT (Hummen et al., 2013)

Author proposes these methods to decrease the overheads of the DTLS handshake. These methodss are based on pre-validation, handshake delegation and session resumption. High

Establishment of ECC-based initial secrecy usable for IKE implementation (Ray et al., 2012)

Author proposes a new flexible approach for reduce the complexity and security improvement of the IKE implementation. Less

Identity-based encryption for heterogeneous sensor networks: TinyIBE (Szczechowiak et al., 2009)

Author present an efficient security bootstrapping mechanism for heterogeneous Sensor Networks that base on Identity-Based Encryption and exploits the enhanced capabilities of high-end cluster heads. Propose asymmetric security scheme provides authenticated key distribution without using expensive certificates.

Less

Authenticated Pair wise Key using Pairing-based Cryptography (Yang et al., 2013)

This technique stand on the elliptic curve Diffie-Hellman (ECDH). It can effectively protect from various attacks: man-in-the-middle attacks and node-capture attacks through encrypting the exchanged parameters using identity-based encryption.

Less

Elliptic Curve Diffie-Hellman - Elliptic Curve Digital Signature Algorithm (ECDH-ECDSA) (Meulenaeret al., 2008)

Author verify the energy cost of cryptographic protocols, both from a computation point and a communication of view, based on practical measurements on the MICAz and TelosB sensors. Author focus on the cost of two key agreement protocols: Kerberos and the Elliptic Curve Diffie-Hellman key exchange with authentication provided by the Elliptic Curve Digital Signature Algorithm (ECDH-ECDSA).

HIP Diet EXchange (DEX) (Moskowitz, 2012)

HIP is introduced to provide secure authentication of hosts. HIP also explore to limit the exposure of the host to various attacks denial-of-service and man-in-the-middle (MitM).

International Journal of Pure and Applied Mathematics Special Issue

57

Page 14: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

A Key-Management Scheme for Distributed Sensor Networks (Eschenauer et al., 2002)

Author presents a key-management scheme designed to satisfy both operational and security requirements of DSNs. The scheme includes selective distribution and revocation of keys to sensor nodes as well as node re-keying without substantial computation and communication capabilities. It relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.

A key predistribution scheme for sensor networks using deployment knowledge (Du et al., 2006)

Author propose a novel random key pre-distribution scheme that exploits deployment knowledge and avoids unnecessary key assignments and the performance including memory usage, connectivity and network resilience against node capture of sensor networks can be substantially improved with the use of our proposed scheme.

An Optimaal Class of Symmetric Key Generation Systmes

The purpose of this paper is to provide a class of SKGS for which the amount of secret information needed by each user to generate his keys is the least possible while at the same time a certain minimum number of users have to cooperate to resolve the uncertainty of unknown keys.

High

D-HIP: a distributed key exchange scheme for HIP-based IoT (Saied et al., 2012)

Author proposes a distributed lightweight key exchange protocol designed to reduce the requirements of HIP Base Exchange, in order to be supported by resource-constrained nodes.

SAKES: secure authentication and key establishment scheme (Hussen et al., 2013)

Author propose Secure Authentication and Key Establishment (SAKES) scheme for the machine-to-machine (M2M) communication in the 6LoWPAN. SAKES light weight public key during the session establishment processes and pair wise key for node authentication.

Less

BROSK (Lai et al., 2002) BROSK protocol: To make link dependent keys by broadcasting key negotiation messages

An Measurement Transmission Scheme for Privacy Protection (Li et al., 2013)

Author proposed a Ring Communication Architecture (RCA). This technique which assure customers‘ privacy by using the ortho code.

Energy-efficient physical layer packet authenticator (Bartoli et al., 2013)

In this method, verification test will conduct at Physical layer to challenge exhaustion DoS attacks and this technique is able to reject non-intended packets without the need to their total reception.

Lightweight Establishment of Secure Session (Bhattacharyya, et al., 2015)

This is a novel lightweight cross layer approach for session establishment and interchange of application layer message through a secure channel.

Object security architecture (Vucinic et al., 2015)

OSCAR: Architecture provides End-to-End security in IoT network and work on the concept of object security and relates security with the application payload.

Securing communication in 6LoWPAN with compressed IPSec (Raza et al.,

This technique offer secure communication (End-to-End) between the internet and IP enabled sensor network in 6LoWPANs.

International Journal of Pure and Applied Mathematics Special Issue

58

Page 15: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

2011)

Securing Intra-Communication in 6LoWPAN: A PKI Integrated Scheme (Goswami et al., 2014)

A public key infrastructure (PKI) enabled scheme with database system, which contains the required keying information about all the network nodes.

Smart Grid Authentication Scheme (SGAS-I) Authentication and Smart Grid Key Management (SGKM-I) for Unicast and Multicast Communications (Nicanfar et al., 2011)

A novel key management and mutual authentication protocol for establish a link between the utility server and customers smart meters so that communication can take place. This protocol secure from various attacks like Brute-force, DoS and Man-In-The-Middle Replay attacks.

low High

Table 11. Summary of Proposed Security Methods for IoT.

Author Privacy

Authentication Confidentiality DOS

Integrity E2E Security

(Sarikaya et al., 2012)

(Moustaine et al., 2012)

(Hummen et al., 2013)

(Raza et al., 2013)

(Ray et al., 2012)

(Szczechowiak et al., 2012)

(Yang et al., 2013)

(De Meulenaer et al., 2008)

(Moskowitz et al., 2012)

(Eschenauer et al ., 2002)

(Du et al., 2006)

(Du et al., 2006 ; Blom et al., 1984)

(Saied et al., 2012)

(Hussen et al., 2013)

(Lai et al., 2002)

(Li et al., 2013)

(Bartoli et al., 2013)

(Vucinic et al., 2015)

(Raza et al ., 2011)

(Goswami et al., 2014)

(Nicanfar et al. 2011)

International Journal of Pure and Applied Mathematics Special Issue

59

Page 16: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

References [1] Aijaz, A., & Aghvami, A. H. (2015). Cognitive machine-

to-machine communications for Internet-of-Things: A protocol stack perspective. IEEE Internet of Things Journal, 2(2), 103-112.

[2] Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787-2805.

[3] Aun (2000). System of Monitoring and Environmental Surveillance.Oxford University Press, ISBN 0-8218-0531-2, Retrieved from http://www.dimap.es/enviromental-agriculture-services.html.

[4] Bartoli, A., Hernández‐Serrano, J., León, O., Kountouris, A., & Barthel, D. (2013). Energy‐efficient physical layer packet authenticator for machine‐to‐machine networks. Transactions on Emerging Telecommunications Technologies, 24(4), 401-412.

[5] Bélissent, J. (2010). Getting clever about smart cities: New opportunities require new business models.

[6] Blom, R. (1984, April). An optimal class of symmetric key generation systems. In Workshop on the Theory and Application of of Cryptographic Techniques (pp. 335-338). Springer Berlin Heidelberg.

[7] Brandt, A., & Buron, J. (2015). Transmission of IPv6 packets over ITU-T G. 9959 Networks.

[8] Bush, S. (2015). DECT/ULE connects homes for IoT. Electronics weekly, Retrieved from february 6, 2017, from, http://www.electronicsweekly.com/news/design/communications/dect-ule-connectshomes-iot-2015-09/

[9] Cañete, E., Díaz, M., Llopis, L., & Rubio, B. (2012). HERO: A hierarchical, efficient and reliable routing protocol for wireless sensor and actor networks. Computer Communications, 35(11), 1392-1409.

[10] Cetinkaya, O., & Akan, O. B. (2015, January). A DASH7-based power metering system. In Consumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE (pp. 406-411). IEEE.

[11] Chui, M., Löffler, M. & Roberts, R. (2010). The Internet of Things. Mkcinsey Quaterly, Retrieved february 9, 2017, from, http://www.mckinseyquarterly.com/High_Tech/Hardwa-re/The_Internet_of_Things_2538?gp=1.

[12] Cragie, R., Ohba, Y., Moskowitz, R., Cao, Z., & Sarikaya, B. (2012). Security bootstrapping solution for resource-constrained devices.

[13] D. Locke, (2010). MQ telemetry transport (MQTT) v3. 1 protocol specification.IBM Developer Works Technical Library, Retrieved from http://www.ibm.com/developerworks/webservices/-library/ws-mqtt/index.html

[14] Dave, E. (2011). The internet of things: How the next evolution of the internet is changing everything. CISCO white paper (pp. 1-11).

[15] De Meulenaer, G., Gosset, F., Standaert, F. X., & Pereira, O. (2008, October). On the energy cost of communication and cryptography in wireless sensor networks. In Networking and Communications, 2008. WIMOB'08. IEEE International Conference on Wireless and Mobile Computing, (pp. 580-585). IEEE.

[16] Decuir, J., (2010). Bluetooth 4.0: Low Energy, Presentation slides. Retrieved from http://chapters.comsoc.org/vancouver/BTLER3.pdf.

[17] Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2006). A key predistribution scheme for sensor networks using

deployment knowledge. IEEE Transactions on dependable and secure computing, 3(1), 62-77.

[18] Dujovne, D., Watteyne, T., Vilajosana, X., & Thubert, P. (2014). 6TiSCH: deterministic IP-enabled industrial internet (of things). IEEE Communications Magazine, 52(12), 36-41.

[19] El Moustaine, E., & Laurent, M. (2012, November). A lattice based authentication for low-cost RFID. In RFID-Technologies and Applications (RFID-TA), 2012 IEEE International Conference on (pp. 68-73). IEEE.

[20] Ericsson, L. (2011). More than 50 billion connected devices—taking connected devices to mass market and profitability. Tech. Rep, Retrieved from http://vdna. be/publications/Wp-50-Billions. Pdf.

[21] Eschenauer, L., & Gligor, V. D. (2002, November). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security (pp. 41-47). ACM.

[22] European Commission. (2014, Februray 20, 2017).Quality of Service (QoS) for IoT services. Available:(http://cordis.europa.eu/docs/projects/cnect/5/287305/080/deliverables/001-OpenIoTD46Draft.pdf).

[23] Fleisch, E. (2010). What is the internet of things? An economic perspective. Economics, Management, and Financial Markets, (2), 125-157.

[24] Gomez, C., Oller, J., & Paradells, J. (2012). Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. Sensors, 12(9), 11734-11753.

[25] Google Trends, Google (n.d.). Retrived from http://www.google.com/trends.

[26] Goswami, S., Misra, S., Taneja, C., & Mukherjee, A. (2014, December). Securing intra-communication in 6LoWPAN: A PKI integrated scheme. In Advanced Networks and Telecommunications Systems (ANTS), 2014 IEEE International Conference on (pp. 1-5). IEEE.

[27] Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.

[28] Hasan, M., Hossain, E., & Niyato, D. (2013). Random access for machine-to-machine communication in LTE-advanced networks: issues and approaches. IEEE Communications Magazine, 51(6), 86-93.

[29] He, S., Chen, J., Yau, D. K., & Sun, Y. (2012). Cross-layer optimization of correlated data gathering in wireless sensor networks. IEEE Transactions on Mobile Computing, 11(11), 1678-1691.

[30] HomePlug Alliance, (2012). Homeplug GreenPHY v1.1, Reterived from http://www.homeplug.org/tech-resources/resources .

[31] Hummen, R., Ziegeldorf, J. H., Shafagh, H., Raza, S., & Wehrle, K. (2013, April). Towards viable certificate-based authentication for the internet of things. In Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy (pp. 37-42). ACM.

[32] Hussen, H. R., Tizazu, G. A., Ting, M., Lee, T., Choi, Y., & Kim, K. H. (2013, July). SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN). In Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on (pp. 246-251). IEEE.

[33] IETF, IPv6 over Networks of Resource-constrained Nodes (6lo). Reterived from https://datatracker.ietf.org/wg/6lo/documents/

International Journal of Pure and Applied Mathematics Special Issue

60

Page 17: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

[34] Jain, R. (2015). Networking Layer Protocols for Internet of Things: 6LoWPAN and RPL.

[35] Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud Computing, 3(1), 11-17.

[36] Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud Computing, 3(1), 11-17.

[37] Kidd, C. D., Orr, R., Abowd, G. D., Atkeson, C. G., Essa, I. A., MacIntyre, B., ... & Newstetter, W. (1999, October). The aware home: A living laboratory for ubiquitous computing research. In International Workshop on Cooperative Buildings (pp. 191-198). Springer Berlin Heidelberg.

[38] Kim, A. N., Hekland, F., Petersen, S., & Doyle, P. (2008, September). When HART goes wireless: Understanding and implementing the WirelessHART standard. In Emerging Technologies and Factory Automation, 2008. ETFA 2008. IEEE International Conference on (pp. 899-907). IEEE.

[39] Lai, B., Kim, S., & Verbauwhede, I. (2002, December). Scalable session key construction protocol for wireless sensor networks. In IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES) (p. 7).

[40] Li, S., Choi, K., & Chae, K. (2013, January). An enhanced measurement transmission scheme for privacy protection in smart grid. In Information Networking (ICOIN), 2013 International Conference on (pp. 18-23). IEEE.

[41] Lin, H. E., Zito, R., & Taylor, M. (2005). A review of travel-time prediction in transport and logistics. In Proceedings of the Eastern Asia Society for transportation studies (Vol. 5, pp. 1433-1448).

[42] LoRa Alliance, (2015). Librarian specification. Retrieved from https://www.loraalliance.org/portals/0/specs/LoRaWAN%20Specification%201R0.pdf

[43] Migault, D. & Guggemos, T. (2014, January). Diet-ESP: A Flexible and Compressed Format for IPsec/ESP, Draft-Internet. Retrieved from https://www.ietf.org/proceedings/89/slides/slides-89-lwig-5.pdf.

[44] Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497-1516.

[45] Moskowitz, R., & Hummen, R. (2012). Hip diet exchange (dex). draft-moskowitz-hip-dex-00 (WiP), IETF.

[46] Murty, R. N., Mainland, G., Rose, I., Chowdhury, A. R., Gosain, A., Bers, J., & Welsh, M. (2008, May). Citysense: An urban-scale wireless sensor network and testbed. In Technologies for Homeland Security, 2008 IEEE Conference on (pp. 583-588). IEEE.

[47] Nicanfar, H., Jokar, P., & Leung, V. C. (2011, November). Smart grid authentication and key management for unicast and multicast communications. In Innovative Smart Grid Technologies Asia (ISGT), 2011 IEEE PES (pp. 1-8). IEEE.

[48] Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Shelby, Z. & Gomez, C. (October 2015). IPv6 over Bluetooth Low Energy. IETF RFC 7668. , Retrieved from http://www.ietf.org/rfc/rfc7668.txt

[49] Object Management Group (April 2015). Data Distribution Service V1.4, Retrieved from http://www.omg.org/spec/DDS/1.4

[50] Park, M. (2015). IEEE 802.11 ah: sub-1-GHz license-exempt operation for the internet of things. IEEE Communications Magazine, 53(9), 145-151.

[51] Poole, I. (2014). Weightless wireless - M2M white space communications - tutorial, Retrieved from http://www.radio-electronics.com/info/wireless/weightless-m2m-white-space-wirelesscom-munications/basics-overview.php

[52] Postscapes. Internet of Things (IoT) History. Retrieved January 13, 2017, from https://www.postscapes.com/internet-of-things-history/

[53] Qiu, Y., & Ma, M. (2015, June). An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs. In Communication Workshop (ICCW), 2015 IEEE International Conference on (pp. 2671-2676). IEEE.

[54] Ray, S., & Biswas, G. P. (2012). Establishment of ECC-based initial secrecy usable for IKE implementation. In Proc. of World Congress on Expert Systems (WCE).

[55] Raza, S., & Voigt, T. (2010, June). Interconnecting WirelessHART and legacy HART networks. In Distributed Computing in Sensor Systems Workshops (DCOSSW), 2010 6th IEEE International Conference on (pp. 1-8). IEEE.

[56] Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., & Roedig, U. (2011, June). Securing communication in 6LoWPAN with compressed IPsec. In Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011 International Conference on (pp. 1-8). IEEE.

[57] Raza, S., Shafagh, H., Hewage, K., Hummen, R., & Voigt, T. (2013). Lithe: Lightweight secure CoAP for the internet of things. IEEE Sensors Journal, 13(10), 3711-3720.

[58] Saied, Y. B., & Olivereau, A. (2012, June). D-HIP: A distributed key exchange scheme for HIP-based Internet of Things. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a (pp. 1-7). IEEE.

[59] Saint-Andre, P. (2011). Extensible messaging and presence protocol (XMPP): Core.

[60] Shelby, Z., Hartke, K., & Bormann, C. (2014). The constrained application protocol (CoAP).

[61] Singh, M., Rajan, M. A., Shivraj, V. L., & Balamuralidhar, P. (2015, April). Secure mqtt for internet of things (iot). In Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on (pp. 746-751). IEEE.

[62] Standard, O. A. S. I. S. (2012). Oasis advanced message queuing protocol (amqp) version 1.0.

[63] Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010). Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commission.

[64] Suo, H., Wan, J., Zou, C., & Liu, J. (2012, March). Security in the internet of things: a review. In Computer Science and Electronics Engineering (ICCSEE), 2012 international conference on (Vol. 3, pp. 648-651). IEEE.

[65] Szczechowiak, P., & Collier, M. (2009, December). Tinyibe: Identity-based encryption for heterogeneous sensor networks. In Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2009 5th International Conference on (pp. 319-354). IEEE.

[66] Vučinić, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., & Guizzetti, R. (2015). OSCAR: Object security architecture for the Internet of Things. Ad Hoc Networks, 32, 3-16.

[67] Wallgren, L., Raza, S., & Voigt, T. (2013). Routing Attacks and Countermeasures in the RPL-based Internet of Things. International Journal of Distributed Sensor Networks..

International Journal of Pure and Applied Mathematics Special Issue

61

Page 18: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

[68] Wei, W., & Qi, Y. (2011). Information potential fields navigation in wireless Ad-Hoc sensor networks. Sensors, 11(5), (pp. 4794-4807).

[69] Winter, T. (2012). RPL: IPv6 routing protocol for low-power and lossy networks.

[70] XuG,Ding Y.,ZhaoJ, HuL & FuX. (2013). Research on the Internet of Things (IoT). Sens. Transducers, 160(46).

[71] Yang, L., Ding, C., & Wu, M. (2013, August). Establishing authenticated pair wise key using Pairing-based Cryptography for sensor networks. In Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on (pp. 517-522). IEEE.

[72] Yoo, M., Wu, F., & Qiao, C. (2015). Recent advances of ICT convergence on WSN applications. International Journal of Distributed Sensor Networks, 11(8).

[73] Zhao, K., & Ge, L. (2013, December). A survey on the internet of things security. In Computational Intelligence and Security (CIS), 2013 9th International Conference on (pp. 663-667). IEEE.

[74] Zhou, Z., Yao, B., Xing, R., Shu, L., & Bu, S. (2015). E-CARP: an energy efficient routing protocol for UWSNs in the internet of underwater things. IEEE Sensors Journal, 16(11), 4072-4082.

[75] ZigBee Standards Organization, (2008, January). ZigBee Specification, Document 053474r17, Retrived from http://home.deib.polimi.it/cesana/teaching/IoT/papers/ZigBee/ZigBeeSpec.pdf .

[76] Z-Wave, (2007, May). Z-Wave Protocol Overview v.4. Retrieved from https://wiki.ase.tut.fi/cou-rseWiki/images/9/94/SDS10243_2_Z_Wave_Protocol_Overview.pdf.

International Journal of Pure and Applied Mathematics Special Issue

62

Page 19: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

International Journal of Pure and Applied Mathematics Special Issue

63

Page 20: A Survey on Next generation Computing IoT Issues and ... · Keywords ² Internet of Things (IoT), Challenges and Issues, Security, Possible Solutions, Energy and Quality of Services

64