Internetof Things Security ASurvey
Internetof Things Security ASurvey
    Abstract— Internet of Things (IoT) is a huge number of objects            (RFID), sensors, and etc. In addition, each IoT devices has a
which communicate over a network or the Internet. These objects               unique identifier that allows these devices to communicate with
are a combination of electronics, sensors, and a software to control          each other over the Internet automatically, they can make
the way of working other parts of the object. Each object generates           decisions without the human assistant[3].
and collects data from its environment using sensors and transfers
them to other objects or a central database through a channel.                    IoT Technology can be seen in many different applications
Keeping this generated data and its transformation is one of the              and it makes networking smarter and more sophisticated. With
biggest challenges in IoT today and it is one of the biggest concerns         the growth of the number of IoT devices and applications, a
of all organizations that they use the IoT technology. In this paper,         variety of security approaches should be used to make them
the most crucial researches related to security in the IoT field have         more robust and resistant against different attacks. On the other
been reviewed and discussed while taking account of the great                 hand, because of the limitation of the resources within the IoT
power of the Quantum Computers. Significant attributes of these               devices such as processing power, energy limitation, and
studies are compared. IoT security ranges from the software layer             memory limitations, it is challenging to implement an
security, board and chip, vulnerable cryptography algorithm,                  encryption algorithm in the IoT system. The challenging part is
protocol and network security, social engineering, malware like               implementing a light and quick cryptography algorithm with the
(viruses, ransomware, trojan horses). Due to a variety of IoT                 provision of the highest level of security. Furthermore, the
devices and the rapid emergence of new devices, it is difficult to
                                                                              optimization on the algorithms should not degrade the
measure the security of IoT systems and identify risks and
                                                                              robustness of the system like previous versions of algorithms on
vulnerabilities.
                                                                              a computer with more resource[4, 5]. The IoT dominated the
 Keywords— Internet of Things, IoT attacks, Cyber privacy, data               world of technology more than only data exchange, it also plays
security, security safeguards.                                                an important role in the physical world. In a near future, there
                                                                              will not be any place for marketing devices that are not
                                                                              connected to the Internet. Also, it is predicted that IoT devices
                        I. INTRODUCTION                                       will dominate several trillions of world’s economies by 2020.
    The fast growth of various electronic devices connected to                However, the IoT security issues are remaining unsolved. As the
the Internet is way a good enough proof of the Internet of Things             father of security, Bruce Schneider from Harvard University and
technology. Thermostats and HCAC (Heating, Ventilation, and                   chief technology officer of IBM Resilient, said that, IoT device
Air Conditioning) that controls and monitors the heating/cooling              manufacturers are continuing with producing cheap devices
systems of smart houses are instances of such technology. IoT                 without thinking about enhancing their security. The attacks of
has major roles in human life that can solve and facilitate many              the Ukraine power grid, where the IoT technology has been used
other situations of humanity, and it helps us to live a better life.          to control lightings, clearly tell us that it could make human
These applications embrace smart car, to nature ruins that may                being life darker by malicious users. Even from the researchers’
cause by nature itself or man-made[1]. IERC defines IoT as a                  perspectives, they only tried to show the vulnerabilities of IoT
dynamic worldwide network infrastructure that able to configure               security without taking care of the great power of quantum
themselves       automatically     depending       on     ordinary            computing that should be taken as a consideration[5].
communication protocols whereas virtual and real objects are                      In this era, many types of researches have been done on the
identified, physical peroperties, and virtual features, use smart             security of embedded systems, such as Wireless Sensor
interfaces and are seamlessly integrated into the information                 Networks (WSNs), since it is widely used in the quickly growing
network[2].                                                                   IoT systems. Using asymmetric cryptography is essential to
   IoT combines different technologies, for instance,                         secure data communication, but it is difficult to apply it on IoT
smartphones, home appliances, Radio Frequency IDentification                  systems since it requires too many resources. Using complex
encryption algorithms in IoT systems lead to overheating the                microcontrollers that are AVR-based and MSP430. The speed
hardware, slow processing, time consuming, and extreme power                of the execution of the algorithm can be aligned by changing the
consumption, therefore, these algorithms are not suitable for               values of (meticulous optimization) and (hybrid selection of
such systems. A state-of-the-art specification of the WSNs is an            curve models) and its group arithmetic. Their proposed system
8-bit or 16-bit microcontroller with the frequency of up to 10              can accept both Montgomery and twisted Edwards curves on
MHz, few kilobytes of RAM, and a 256-kilobytes of secondary                 two different versions that are high-speed and memory-efficient,
memory to hold the executable program. Besides, the processing              that can be chosen based on energy consumption or memory
power limitations in IoT systems and the constraint of energy               consumption. However, their work is inspired by an early
are other challenging points that should be considered during               research on AsiaCCS 2015[9], but they added some
cryptography algorithms’ implementation. Usually, WSNs run                  contributions in their work. The following are their summarized
on two AA sized batteries for months or years without                       contributions:
recharging or replacement[6].
                                                                            •   an efficient MoTE curves algorithm in the microcontroller
    In recent years, working practically on a quantum computer                  for IoT purposes is used. This idea comes from the new
is one of the ten innovation technologies. The well-known                       cohort of ECC standards curves, Curve P159, P191, P223
companies like Google, IBM, Intel, Microsoft, and NTT invest                    and P255 are selected as a lightweight EC, for different
to produce the first general-purpose quantum computer that has                  levels of security in IoT applications. This algorithm got
the highest specification of 72 qubits, and specialized processor               benefits from emerging Montgomery and twisted Edwards
with the specification of 2048 qubits[7]. Simultaneously, too                   curves. Then two versions of this algorithm are generated
much effort has been put to create a language for programming
                                                                                to tune the required performance and security using
quantum computers and some of the projects currently exist for
instance (OpenQASM by IBM), (Q# by Microsoft)[8], software                      (compact curve parameters).
development kits (SDKs) like (QISKit by IBM), quantum                       •   The proposed algorithm solved the biggest problem in IoT
computing simulator like (QuTip and Open Fermion), cloud-                       systems that is resource limitation. Two different types of
based quantum computing services like (IBM Q Experience)                        this algorithm are implemented: high-speed program and
that allows programmers to run their code over the Internet using               memory efficient program. The first one requires more
quantum processor for scientific experiments and educational                    program code and more resources for the execution, while
purpose. However, there are many unsolved problems in                           the second one is slower and requires fewer resources. Both
quantum computers, but it can be assumed as a revolutionary era                 algorithms are real-time and can defense against SPA and
of processing power. It also burst many vulnerabilities in                      Timings attacks. The ECC algorithm is re-developed and
cybersecurity and more precisely for IoT systems with all its                   optimized on MICAz and Tmote Sky nodes. It accepts the
resource limitation[7].                                                         verification of ECDSA and ephemeral ECDH.
    The idea of decentralized data processing and storage is a              •   Finding a better approach to measure energy consumption
new subject for researchers. Blockchain plays a great role in this              in IoT System. There are a few research on the assessment
way. Internet of Things can take advantages of the benefits of                  of energy consumption for cryptographic algorithms. But
blockchain to provide a better security in general and data                     in their work, they developed a new approach for energy
integrity in specific. Usually, connecting this blockchain to IoT               consumption evaluation for encryption processing cost
systems require implementing of smart contracts, edge                           depending on performance, communication cost between
blockchain nodes and the IoT System configurations[8].                          objects in the IoT environment. That could be useful for
                                                                                further researches and readers of this paper.
    The objectives and motivations of this prepare are
introducing the IoT, showing its importance in this era, doing a
survey on IoT security, reviewing the latest important researches               Zhou, R., et al, [10], they produced an industrial system in a
related to IoT Security.                                                    form of a file-centric framework, and it dramatically reduces the
                                                                            cost of data encryption by avoiding pairing computations. The
    The rest of this work is organized as the following. IOT and            summarization of their contributions is shown below:
IOT security is revised in section two. In section three all
mentioned and reviewed researches are compared and                          •   A new technique is proposed for attacking Cui’s Multi-key
discussed. Finally, in section four the conclusion of this work is              aggregate searchable encryption. In this attack, the
presented.                                                                      malicious user can find an authorized users’ passkey from
                                                                                the unauthorized internal user’s passkey.
              II.    IOT AND IOT SECURITY SURVEY
                                                                                To reduce the disadvantages of Cui’s Scheme, a new
    In the last few years, many researchers addressed the                   formalized definition is introduced for file-centric aggregate
security problems and their solutions in IoT systems. In this               keyword searchable encryption (Fc-MKA-KSE) that is possible
section of this paper, the crucial points of some of the newest             to be implemented in IoT System for data sharing purpose and
researches will be addressed.                                               authenticated searching for data. They generated two different
    Liu, Z., et al, [6], in their research implemented a light              security algorithms for Fc-MKA-KSE system, the first one can
version of the elliptic curves suitable algorithm that is continent         record the key cyphertext i.e. the indistinguishability against
for IoT systems, they could maintain the high performance with              selective file chosen keyword attack (IND-sF-CKA), and the
robustness in the algorithm and tested on two different
                                                                      163
                     2018 International Conference on Advanced Science and Engineering (ICOASE), Kurdistan Region, Iraq
                                                                       164
                  2018 International Conference on Advanced Science and Engineering (ICOASE), Kurdistan Region, Iraq
this work is saving time, saving cost, shorter time for application         existing models. Finally, the results confirmed that the proposed
development.                                                                model is more efficient than the existing models.
    Yi, H., et al, [13], in this work an effectual scheme is
proposed depending on side channel analysis of Unbalanced Oil                              III. COMPARISON AND DISCUSSION
and Vinegar (UOV) with a security level of more than 80 bits.                   From the previous section, it can be concluded that
The Xilinx ISE software is used with Verilog-HDL code on                    researchers have worked in different fields using various tools
Sakura-G FPGA board for UOV signature implementation,                       and algorithms. Researchers illustrated significant points related
hence, 350 MHz Keysight’s oscilloscope (DSOX3034T) is used                  to the valuation of their proposed approaches.
as the power collection. They attacked the model using side
channel attacks that implemented on a cloud-based IoT system,               Table I represents a comparison among the researches explained
as the result, all the UOV secret keys have been recovered                  in section II. The comparison includes four main features that
successfully.                                                               satisfy their trends in order to verify the aims drawn through
                                                                            their approaches in IoT security field. From the table, it is clear
    Qiu, L., et al, [14], they concentrated on access control of            that references [5, 6, 12, 17]depended directly on security
confidential information in healthcare based on uses of quantum             algorithms without using specific tools. While reference [14]
signature. And their proposed scheme is more representative                 used tools without the need for famous algorithms. In another
then previous schemes of the same area. The security of the                 hand, the rest six references used both tools and security
proposed model is absolute also can be simply by using current              algorithms to illustrate their works.
resource and technologies. It is observed that designing and
creating a quantum protocol is much simpler than producing a                    Zhou, R., et al, [10], approach highlighted an Fc-MKA-KSE
quantum computer. Nowadays, devices for quantum key                         system for IIoT data sharing and authorized data searching by
distribution are sold by profitable companies and they should               applying Keygen algorithm that used IND-sF-CKA and IND-
develop models of technologies that are the same as the                     sF-KGA tools in Industrial field.
technologies required for quantum key distribution. Finally, they               Cheng, C., et al, [11], provided a Cryptosystem algorithm
suggest concentrating on the applications of the new model on               that utilizes quantum resistant for securing communication in
confidential data communication and take it to a new step in this           the IoT depending on Public and private key in the commercial
field.                                                                      field.
    Yi, H., et al, [15], they worked on a security level greater               El-Latif, A.A.A., et al, [7], depended on XOR gray code with
than 80 bits of the rainbow, and MQ cryptographic schemes by                hash function tools that been built based on Fog cloud IoT
doing the physical analysis. They performed the attack by using             model. They proposed a new approach for IoT security in the
the combination of differential and fault analysis. Xilinx ISE              industrial field and produced a new framework for secure
software and Verilog-HDL code are used to implement the                     quantum steganography in fog cloud IoT.
rainbow signature schemes on SAKURA-G FPGA. 350 MHz
Keysights oscilloscope (DSOX3034T) used as an accumulated                       Yi, H., et al, [13], addressed an efficient algorithm based on
power. The result of this work shows the significant of securing            side channel analysis of (UOV) using on Sakura-G, FPGA
multivariate signature on medical systems as secret keys of the             board, Xilinx ISE software tools.
rainbow signature could be hacked successfully.                                 Yi, H., et al, [15], based on Sakura-G, FPGA board and
    Yan, Y., et al, [16], discussed the research literature of              Xilinx ISE software tools for a security of MQ cryptographic
signature summarized and cloud storage, they also done some                 system. This system has been modeled using ECC and RSA
enhancement in these models. This new model, the lattice-based              algorithms. The validity related to presenting a physical analysis
signature is used for the cloud storage application that can resist         of Rainbow with a security level equal to and greater than 80
better against attacks from quantum computers, and its                      bits. Yan, Y., et al, [16], used an oracle tool to produce a new
algorithm is enhanced to be even stronger. Then, a third-party              scheme for efficiency improvement and maintaining data
audit verification is created by joining the first application with         security.
Bloom Filter, that does not require the confirmation of a                      A novel lattice-based secure cryptosystem been proposed by
collection, but to confirm the vector, as a result, it enhances the         Chaudhary, R., et al, [17], for smart healthcare (LSCSH) using
efficiency much better. In their research, they combined                    cryptography algorithm applied in the healthcare field.
different techniques like cloud storage, related to basic
knowledge, and lattice signature. The output of this work is
investigating security and correctness of the model and its                     TABLE I.          AN OVERVIEW OF SECURITY OF INTERNET OF THINGS
performance. The integrity of data in this model is verified and             Researcher Applied         Used          Security       Significant Satisfied
introduced in detail.                                                                   Field           Tools         algorithms     Aims
                                                                      165
                       2018 International Conference on Advanced Science and Engineering (ICOASE), Kurdistan Region, Iraq
                                                         Fc-MKA-KSE system             steganography in fog cloud IoT, algorithm based on side channel
                             IND-sF-                                                   analysis of (UOV), and novel lattice-based secure cryptosystem
                                                         for
 Zhou, R., et                CKA,
 al,[10]
              Industrial
                             IND-sF-
                                          Keygen         IIoT data sharing and         for smart healthcare (LSCSH).
                                                         authorized data
                             KGA
                                                         searching
                                                                                                                        REFERENCES
                                                   quantum                             [1]    Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., and Ayyash,
                                                   resistant algorithms                       M.: ‘Internet of things: A survey on enabling technologies, protocols, and
 Cheng, C.,               Public &
               Commercial             Cryptosystem for securing                               applications’, IEEE Communications Surveys & Tutorials, 2015, 17, (4),
 et al,[11]               private key
                                                   communication                              pp. 2347-2376
                                                   in the IoT
                                                                                       [2]    Shinde, G., and Olesen, H.: ‘Interaction between users and IoT clusters:
                                                                                              Moving towards an Internet of People, Things and Services (IoPTS)’, in
                                                        lattice-based
                                          Cryptography,                                       Editor (Ed.)^(Eds.): ‘Book Interaction between users and IoT clusters:
 Xu, R., et al,                                         cryptography is a
                Industrial   ----         quantum                                             Moving towards an Internet of People, Things and Services (IoPTS)’
 [5]                                                    proper choice for
                                          computers                                           (2015, edn.), pp.
                                                        smart IoT
                                                                                       [3]    Liu, Z., Großschädl, J., Hu, Z., Järvinen, K., Wang, H., and Verbauwhede,
                                                                                              I.: ‘Elliptic curve cryptography with efficiently computable
                             (XOR),                      a new framework for                  endomorphisms and its hardware implementations for the internet of
 El-Latif,
                             gray code,                  secure quantum                       things’, IEEE Transactions on Computers, 2017, 66, (5), pp. 773-785
 A.A.A., et    Industrial               Fog clout IoT
                             the hash                    steganography in fog
 al, [7]
                             function                    cloud IoT                     [4]    Zeebaree, S.R., and Jacksi, K.: ‘Effects of Processes Forcing on CPU and
                                                                                              Total Execution-Time Using Multiprocessor Shared Memory System’
                                                       proposes a new model            [5]    Xu, R., Cheng, C., Qin, Y., and Jiang, T.: ‘Lighting the Way to a Smart
                                                       for Cloud-IoT based                    World: Lattice-Based Cryptography for Internet of Things’, arXiv
 Elhoseny,                                                                                    preprint arXiv:1805.04880, 2018
               Health                     (GA), (PSO), health
 M., et al,                  ----------                                                [6]    Liu, Z., Huang, X., Hu, Z., Khan, M.K., Seo, H., and Zhou, L.: ‘On
               services                   (PPSO)       service applications in
 [12]                                                                                         emerging family of elliptic curves to secure internet of things: ECC comes
                                                       integrated industry
                                                       4.0 environment                        of age’, IEEE Transactions on Dependable and Secure Computing, 2017,
                                                                                              14, (3), pp. 237-248
                             Sakura-G,                                                 [7]    El-Latif, A.A.A., Abd-El-Atty, B., Hossain, M.S., Elmougy, S., and
                                                         present an efficient                 Ghoneim, A.: ‘Secure quantum steganography protocol for fog cloud
                             FPGA
 Yi, H., et al,                                          algorithm based on                   Internet of Things’, IEEE Access, 2018, 6, pp. 10332-10340
                Industrial   board,     (UOV)
 [13]                                                    side channel analysis
                             Xilinx ISE                                                [8]    Gaj, K.: ‘Challenges and Rewards of Implementing and Benchmarking
                                                         of (UOV)
                             software                                                         Post-Quantum Cryptography in Hardware’, in Editor (Ed.)^(Eds.): ‘Book
                                                                                              Challenges and Rewards of Implementing and Benchmarking Post-
                                                                                              Quantum Cryptography in Hardware’ (ACM, 2018, edn.), pp. 359-364
 Qiu, L., et                 quantum                     propose quantum               [9]    Atzori, M.: ‘Blockchain-based architectures for the internet of things: a
               Healthcare                 -----
 al, [14]                    signature                   signature protocols                  survey’, 2017
                                                                                       [10]   Zhou, R., Zhang, X., Du, X., Wang, X., Yang, G., and Guizani, M.: ‘File-
                                                                                              centric Multi-Key Aggregate Keyword Searchable Encryption for
                             Sakura-G,                   present a physical                   Industrial Internet of Things’, IEEE Transactions on Industrial
                             FPGA                        analysis of Rainbow                  Informatics, 2018
 Yi, H., et al,
                Healthcare   board,     ECC, RSA         which has a security          [11]   Cheng, C., Lu, R., Petzoldt, A., and Takagi, T.: ‘Securing the Internet of
 [15]
                             Xilinx ISE                  level of not smaller                 Things in a quantum world’, IEEE Communications Magazine, 2017, 55,
                             software                    than 80 bits                         (2), pp. 116-120
                                                                                       [12]   Elhoseny, M., Abdelaziz, A., Salama, A.S., Riad, A., Muhammad, K., and
                                                         New scheme                           Sangaiah, A.K.: ‘A hybrid model of internet of things and cloud
                                          cloud storage,
                                                         proposed efficiency                  computing to manage big data in health services applications’, Future
 Yan, Y., et                              Bloom Filter,
               Industrial    oracle                      improved,                            Generation Computer Systems, 2018
 al, [16]                                 lattice
                                                         maintaining data              [13]   Yi, H., and Nie, Z.: ‘Side-channel security analysis of UOV signature for
                                          signature
                                                         security                             cloud-based Internet of Things’, Future Generation Computer Systems,
                                                         propose a novel                      2018
 Chaudhary,                                              lattice-based secure          [14]   Qiu, L., Cai, F., and Xu, G.: ‘Quantum digital signature for the access
 R., et al, Healthcare       -----        Cryptography cryptosystem for                       control of sensitive data in the big data era’, Future Generation Computer
 [17]                                                    smart healthcare                     Systems, 2018
                                                         (LSCSH)
                                                                                       [15]   Yi, H., and Nie, Z.: ‘On the security of MQ cryptographic systems for
                                                                                              constructing secure Internet of medical things’, Personal and Ubiquitous
                        IV. CONCLUSION                                                        Computing, 2018, pp. 1-7
    From the comparison step applied in section III, we can                            [16]   Yan, Y., Wu, L., Gao, G., Wang, H., and Xu, W.: ‘A dynamic integrity
investigate that active approaches have been produced and                                     verification scheme of cloud storage data based on lattice and Bloom
significant of these works extracted from the style of problem                                filter’, Journal of information security and applications, 2018, 39, pp. 10-
                                                                                              18
manipulation. There is a number of active algorithms that have
                                                                                       [17]   Chaudhary, R., Jindal, A., Aujla, G.S., Kumar, N., Das, A.K., and Saxena,
an important role in the security of IoT fields such as RSA                                   N.: ‘LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in
cryptography, quantum computers, MOTE-ECC, and Fog clout                                      Smart Cities Environment’, IEEE Communications Magazine, 2018, 56,
IoT. Also, there are powerful tools used in this field such as                                (4), pp. 24-32
IND-sF-CKA, Oracle, hash function, and FPGA board. Hence,
efficient IoT security algorithms, or systems been produced such
as Fc-MKA-KSE system, new framework for secure quantum
166