The adopters of IoT face challenges with the surging
Internet-based attackson their IoT assets and
inefficiencies within the technology. Unfortunately, IoT is overly distributed, still evolving and facing implementation and security
challenges. Given the above scenario, we argue that the IoT network should always be decentralized design, and security should be built by design. The paper is the design and construction of a decentralized IoT security
framework, with the goal of making emerging
IoT systems more resilient to attacks andsupporting complex communication and resource sharing. The frameworkimproves efficiency and scalability in IoT,
exposes vulnerable subsystems and components as possible weak links to system compromise,
References
[1]
Liu, X., Zhao, M., Li, S., Zhang, F. and Trappe, W. (2017) A Security Framework for the Internet of Things in the Future Internet Architecture. Future Internet, 9, Article No. 27. https://doi.org/10.3390/fi9030027
[2]
Dahlqvist, F., Patel, M., Rajko, A. and Shulman, J. (2019, July 22) Growing Opportunities in the Internet of Things. https://www.mckinsey.com/industries/private-equity-and-principal-investors/ our-insights/growing-opportunities-in-the-internet-of-things
[3]
Babar, S., Stango, A., Prasad, N., Sen, J. and Prasad, R. (2011) Proposed Embedded Security Framework for Internet of Things (IoT). Proceedings of the International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology (Wireless VITAE), Chennai, 28 February-3 March 2011, 1-5. https://doi.org/10.1109/WIRELESSVITAE.2011.5940923
[4]
Rahman, A.F.A, Daud, M. and Mohamadr, M.Z. (2016) Securing Sensor to Cloud Ecosystem Using Internet of Things (IoT) Security Framework. Proceedings of the International Conference on Internet of things and Cloud Computing, Cambridge, 22-23 March 2016, Article No. 79. https://doi.org/10.1145/2896387.2906198
[5]
Mohsin, M., Sardar, M.U., Hasan, O. and Anwar, Z. (2017) IoT Risk Analyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things. IEEE Access, 5, 5494-5505. https://doi.org/10.1109/ACCESS.2017.2696031
[6]
Inustrial Internet Consortium (2016) Industrial Internet of Things Volume G4: Security Framework. https://www.iiconsortium.org/pdf/IIC_PUB_G4_V1.00_PB-3.pdf
[7]
Samaila, M.G., Sequeiros, J.B.F., Simões, T., Freire, M.M. and Inácio, P.R.M. (2020) IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space. IEEE Access, 8, 16462-16494. https://doi.org/10.1109/ACCESS.2020.2965925
[8]
George, G. and Thampi, S.M. (2018) A Graph-Based Security Framework for Securing Industrial IoT Networks from Vulnerability Exploitations. IEEE Access, 8, 43586-43601. https://doi.org/10.1109/ACCESS.2018.2863244
[9]
Duan, L., Sun, C., Zhang, Y., Ni, W. and Chen, J. (2019) A Comprehensive Security Framework for Publish/Subscribe-Based IoT Services Communication. IEEE Access, 7, 25989-26001. https://doi.org/10.1109/ACCESS.2019.2899076
[10]
Yin, D., Zhang, L. and Yang, K. (2018) A DDoS Attack Detection and Mitigation with Software-Defined Internet of Things Framework. IEEE Access, 6, 24694-24705. https://doi.org/10.1109/ACCESS.2018.2831284
[11]
Kim, H., Kang, E., Lee, E.A. and Broman, D. (2017) A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things. Proceedings of the IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation (IoTDI), Pittsburgh, 18-21 April 2017, 147-158. https://doi.org/10.1145/3054977.3054980
[12]
Kim, H., Wasicek, A., Mehne, B. and Lee, E.A. (2016) A Secure Network Architecture for the Internet of Things Based on Local Authorization Entities. Proceedings of the IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, 22-24 August 2016, 114-122. https://doi.org/10.1109/FiCloud.2016.24
[13]
Kim, H. and Lee, E.A. (2017) Authentication and Authorization for the Internet of Things. IT Professional, 19, 27-33. https://doi.org/10.1109/MITP.2017.3680960
[14]
Sheron, P.S.F., Sridhar, K.P., Baskar, S. and Shakeel, P.M. (2019) A Decentralized Scalable Security Framework for End-to-End Authentication of Future IoT Communication. Transactions on Emerging Telecommunication Technology, 31, Article No. e3815. https://doi.org/10.1002/ett.3815
[15]
Medhane, D.V., Sangaiah, A.K., Hossain, M.S., Muhammad, G. and Wang, J. (2020) Blockchain-Enabled Distributed Security Framework for Next Generation IoT: An Edge-Cloud and Software Defined Network Integrated Approach. IEEE Internet of Things Journal, 7, 6143-6149. https://doi.org/10.1109/JIOT.2020.2977196
[16]
Pacheco, J. and Hariri, S. (2016) IoT Security Framework for Smart Cyber Infrastructures. Proceeding of the IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), Augsburg, 12-16 September 2016, 242-247. https://doi.org/10.1109/FAS-W.2016.58
[17]
Alsubaei, F., Abuhussein, A., Shandilya, V. and Shiva, S. (2019) IoMT-SAF: Internet of Medical Things Security Assessment Framework. Internet of Things, 8, Article No. 100123. https://doi.org/10.1016/j.iot.2019.100123
[18]
Casola, V., De Benedictis, A., Rak, M. and Villano, U. (2019) Toward the Automation of Threat Modeling and Risk Assessment in IoT Systems. Internet of Things, 7, Article No. 100056. https://doi.org/10.1016/j.iot.2019.100056
[19]
Sharma, P.K., Rathore, S., Jeong, Y. and Park, J.H. (2018) SoftEdgeNet: SDN Based Energy-Efficient Distributed Network Architecture for Edge Computing. IEEE Communications Magazine, 56, 104-111. https://doi.org/10.1109/MCOM.2018.1700822
[20]
Tian, F. (2017) A Supply Chain Traceability System for Food Safety Based on HACCP, Blockchain Internet of Things. Proceedings of the International Conference on Service Systems and Service Management, Dalian, 16-18 June 2017, 1-6.
[21]
Nair, G.R. and Sebastian, S. (2017) BlockChain Technology Centralised Ledger to Distributed Ledger. International Research Journal for engineering and Technology, 4, 2823-2827.
[22]
Puthal, D., Malik, N., Mohanty, S.P., Kougianos, E. and Yang, C. (2018) The Blockchain as a Decentralized Security Framework [Future Directions]. IEEE Consumer Electronics Magazine, 7, 18-21. https://doi.org/10.1109/MCE.2017.2776459
[23]
Wei, L., Liu, S., Wu, J. and Long, C. (2019) Enabling Distributed and Trusted IoT Systems with Blockchain Technology. IEEE Blockchain Technical Briefs, January 2019.
[24]
Okada, H., Yamasaki, S. and Bracamonte, V. (2017) Proposed Classification of Blockchains Based on Authority and Incentive Dimensions. Proceedings of the IEEE 19th International Conference on Advanced Communication Technology (ICACT), PyeongChang, 19-22 February 2017, 593-597. https://doi.org/10.23919/ICACT.2017.7890159
[25]
Castellanos, J.A.F., Coll-Mayor, D. and Notholt, J.A. (2017) Cryptocurrency as Guarantees of Origin: Simulating a Green Certificate Market with the Ethereum Blockchain. Proceedings of the 5th IEEE International Conf. on Smart Energy Grid Engineering, Oshawa, 14-17 August 2017, 367-372. https://doi.org/10.1109/SEGE.2017.8052827
[26]
Dorri, A., Kanhere, S.S. and Jurdak, R. (2017) Towards an Optimized BlockChain for IoT. Proceedings of the IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation (IoTDI), Pittsburgh, 18-21 April 2017, 173-178. https://doi.org/10.1145/3054977.3055003
[27]
Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M. and Salah, K. (2018) A User Authentication Scheme of IoT Devices Using Blockchain-Enabled Fog Nodes. Proceedings of the IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, 28 October-1 November 2018, 1-8. https://doi.org/10.1109/AICCSA.2018.8612856
[28]
Samaniego, M. and Deters, R. (2016) Hosting Virtual IoT Resources on Edge-Hosts with Blockchain. Proceedings of the IEEE International Conference on Computer and Information Technology (CIT), Nadi, 8-10 December 2016, 116-119. https://doi.org/10.1109/CIT.2016.71
[29]
Pahl, C., El Ioini, N. and Helmer, S. (2018) A Decision Framework for Blockchain Platforms for IoT and Edge Computing. Proceedings of the International Conference on Internet of Things, Big Data and Security, Funchal, 19-21 March 2018, 105-113. https://doi.org/10.5220/0006688601050113
[30]
Hewitt, C., Bishop, P. and Steiger, R. (1973) A Universal Modular ACTOR Formalism for Artificial Intelligence. Proceedings of the 3rd International Joint Conference on Artificial Intelligence, Stanford, 20-23 August 1973, 235-245.
[31]
Persson, P. and Angelsmark, O. (2015) Calvin-Merging Cloud and IoT. Procedia Computer Science, 52, 210-217. https://doi.org/10.1016/j.procs.2015.05.059
[32]
Brooks, C., Jerad, C., Kim, H., Lee, E.A., Lohstroh, M., Nouvelletz, V., Osyk, B. and Weber, M. (2018) A Component Architecture for the Internet of Things. Proceedings of the IEEE, 106, 1527-1542. https://doi.org/10.1109/JPROC.2018.2812598
[33]
Al-Twajre, B.A. (2019) Performance Analysis of Messages Queue in the Different Actor System Implementation. Proceedings of the 11th International Scientific and Practical Conference on Electronics and Information Technologies (ELIT), Lviv, 16-18 September 2019, 127-131. https://doi.org/10.1109/ELIT.2019.8892329
[34]
Wikipedia (n.d.) Actor Model. https://en.wikipedia.org/wiki/Actor_model
[35]
Grochowski, E., Ronen, R., Shen, J. and Wang, H. (2004) Best of Both Latency and Throughput. Proceedings IEEE International Conference on Computer Design: VLSI in Computers and Processors, San Jose, 11-13 October 2004, 236-243. https://doi.org/10.1109/ICCD.2004.1347928
[36]
Behrtech (n.d.) 6 Leading Types of IoT Wireless Tech and Their Best Use Cases. https://behrtech.com/blog/6-leading-types-of-iot-wireless-tech-and-their-best-use-cases/
[37]
Eze, K.G., Akujuobi, C.M., Sadiku, M.N.O., Chouikha, M. and Alam, S. (2019) Internet of Things and Blockchain Integration: Use Cases and Implementation Challenges. Proceedings of the International Conference on Business Information Systems, Seville, 26-28 June 2019, 287-298. https://doi.org/10.1007/978-3-030-36691-9_25
[38]
Dang, H., Dinh, T.T., Loghin, D., Chang, E., Lin, Q. and Ooi, B.C. (2019) Towards Scaling Blockchain Systems via Sharding. Proceedings of the ACM International Conference on Management of Data (SIGMOD’19), Amsterdam, 30 June-5 July 2019, 123-140. https://doi.org/10.1145/3299869.3319889
[39]
Abdelmoamen, A. and Jamali, N. (2018) A Model for Representing Mobile Distributed Sensing-Based Services. Proceeding of the IEEE International Conference on Services Computing (SCC), California, 2-7 July 2018, 282-286. https://doi.org/10.1109/SCC.2018.00049
[40]
Chauhan, A., Malviya, O.P., Verma, M. and Mor, T.S. (2018) Blockchain and Scalability. Proceedings of the IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Lisbon, 16-20 July 2018, 122-128. https://doi.org/10.1109/QRS-C.2018.00034
[41]
Rosales, R., Guibene, W. and Garcia, G.F. (2018) Actor-Oriented Design Patterns for Performance Modeling of Wireless Communications in Cyber-physical Systems. Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet’18), Montreal, 28 October-2 November 2018, 29-38. https://doi.org/10.1145/3267129.3267136