Importance of authentication and security in IoT
The report will consider the problem domain of security and authenticity in IOT. The task of securing the IOT devices is often considered as the key issues is implementing IOT in practical applications. Hence proper mechanism and technology is needed for ensuring that the devices are authenticated to the network and data that is communicated through the network is secured properly. However while formulating the mechanism and the technology, it is important to consider the constraints of the IOT environment such as processing power , device memory and the power consumption of the devices so that the technology works properly.
According to Farooq et al. (2017) one of the important aspect of the IOT connected smart transportation is the need for authentication. In the IOT environment millions of devices are connected in the network. Hence it becomes important to have some mechanism for the device authentication. The authors here proposed for the RFID tag for the authentication. RFID tag works on the radio frequency wave. The RFID tag stores the information in the embedded chip and when the tag is activated with the radio frequency wave, it then sends the information. The information is collected and interpreted with the radio frequency reader. It is possible to track the device on which the RFID tag is attached. The authors claims that it is one of the efficient technology available to track devices in the IOT network.
Dorri et al. (2017) also suggested the RFID tag for the device authentication. The authors makes it clear that in the IOT environment one of the primary need is to have some reliable and efficient techniques that helps to properly authenticate the devices. The authentication is particularly important as without authentication it is not possible to control the cars properly and if the control is not proper it will create issue in the transportation. Hence for effective execution of the smart transportation system with the IOT it is important to have proper authentication technique and RFID tag is one of the efficient techniques in this purpose according to the authors.
Zhang et al. (2016) argues that although the barcode technique is very popular in the traditional system, but it is not effective in the IOT context. In order to barcode technique to work the device have to be in the line of sight of the barcode reader means that physical access is needed which is not possible for the cars that is connected in the IOT network. The one and only feasible solution is to have some reliable technique that helps to track and identify devices wirelessly. RFID technology is currently one of the popular technique that is currently available in the industry. The authors have also suggested for the same.
Although Fradrich et al. (2016) have admitted that the authentication is important for successful implementation of IOT in the smart transportation, it is not the only aspect of the implementation strategy. Organization should look beyond the authentication as there are other issues too for the integration of IOT in the transportation. Even before authentication mechanism is implemented it is important to make sure that privacy of the users are maintained in the IOT environment. The author has suggested although the use of the cloud computing for data storage is an efficient technique considering the vast amount of data, what even more important is the privacy of these data. In order to ensure that the data that is stored in the cloud storage remotely is secured it is suggested to opt for the private cloud as it offers more control and security over the public cloud.
The use of RFID tags as an efficient authentication technique
Tappler et al. (2015) has also suggested for the use of the private cloud for better data security.
Li et al. (2015) in the article have taken more detailed approach like how to increase data security for the IOT devices while opting for the private cloud. according to the author in order to make sure that the private cloud is actually secure , the VLAN has to be secured first as the communication of the data have to be done through this VLAN. In order to protect the data the authors have here actually suggested for the use of the firewall along with the virtual server. It will make sure that the access to the data is restricted to the users that are not authorized for accessing the data in the server.
In the IOT environment, it is required that the communication in the network is fast, secure and reliable. The IOT, when implemented in the transportation, it should be take into account that any delay in communication might often lead to miscommunication and the aspect of proper communication is not necessary, it is mandatory for proper execution of the process. Huang et al. (2015) have suggested for the IPv6 protocol. This is the latest version of the internet protocol and IOT use the internet protocol for the communication over internet. The feature that makes IPv6 appropriate for the secure communication along with speed is the level of encryption used for the communication. This version of the internet protocol uses supports 2128 address mode and hence it is difficult to temper with the data that is communicated through the network.
According to Tayeb, Latifi and Kim (2015) as a lot of devices are connected in the IOT network, it is likely that the devices will overlap with each other and this should be avoided to ensure the privacy. Hence it is important to categorize devices in the group. Additionally a group authentication key must be assigned. The technique is based on the “Shamir’s secret sharing scheme”. In the group there is a primary device that is responsible to monitor the activity of other devices in the group. Every time a new device is included in the group, a new key pair is formed which is then communicated to other devices that are part of the group. This makes all the devices aware that any new device is added in the. If any other devices that are not part of the devices will not be able to join the group and communicate. Hence it is effective technique to make sure that the communication is secured and only restricted to the devices that are part of the group.
Dobrescu et al. (2015) argues that in order to successfully implement IOT in the transportation system, the legal compliance is also important. In the IOT based smart transportation system, cars as well as owners of the cars are tracked continuously to inform them about traffic information. However according to international data security laws, it is mandatory to protect the security of the data and every organization should provide necessary means to secure this data. The authors have argued that if the information like location of car, transportation path of the car are significant in nature. It is possible to trace the car through hacking this information. In order to protect the digital data the author has proposed for the hash algorithm. The algorithm is based on the digital cryptography. The digital content is first hashed and an encryption key is generated. This value is only made available to the users who are authorized to access the information. Without providing the encryption key it is not possible to read or modify the content. Hence it provides an efficient method for securing the digital information that is collected through the network.
VLAN Security and Firewall techniques for secure data storage in Private Cloud
Al-Sarawi et al. (2014) have however suggested for Constrained Application Protocol or CoAP for securing the information. In the algorithm the system first verifies the identity of the user. In order to verify the identity the user need to provide the correct system credentials like username and password for that was generated during the registration. After the credentials are verified, the system then only grants the access. Only after the system grants the access, it is possible to access the server and access the data stored in it. Hence it is an efficient technique for securing the information and protecting the identity of the owner of the data.
Li, C. T., Lee, C. C., Weng, C. Y., & Chen, C. M. (2018). Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Networking and Applications, 11(1), 198-208.
The authors have first discussed the concept of IOT in effective manner. Although the discussion is not detailed, but the discussion is simple and easy to follow. After the introduction the author sets the discussion for the issues of IOT in the various application with the majority of the discussion focused on the issues of IOT in transportation.
The research method selected by the authors is the comparison of literature review. The author have identified the relevant literatures and analyzed the previous works of the authors of those literatures. The authors have then identified the most appropriate solution to the problem on which the authors was working and that is the authentication of device in the IOT environment. The solution that has been proposed by the authors is the application of RFID for tracking and authenticating the devices in the network. This journal is basically focused on the technique that is used for implementation of the internet of thing. The basic concept of the entire terminology of implementation of internet of things is provided in this journal. The data that is present in the journal is very well structured and the researchers find it easy to surf the journal. This acts as one of the main reason behind the prosecution of the journal and this is also one of the major reason that ensures that the journal is very famous among the researchers. The data that is present in the journal is very precise in nature this is the reason that the journal helps in time saving of the researchers.
Lopes, A.P.G. and Hilgert, L.D.O., 2017. Group authentication protocols for Internet of Things (IoT)–QoS and Security Properties Evaluation.
The authors have followed a very detailed approach while discussing the concept of IOT. The authors have not opted for any general discussion like what is meant by IOT and what are the application of it. Instead from the starting of the article the authors are very specific in terms of the discussion, application of IOT in the smart transportation. The authors have first discussed the various problems and the importance for successful implementation of the IOT in transportation system. However instead of discussing the solution for each of the listed problem the sub sequent sections are dedicated to the solution for the problem domain that the authors have considered, the need and technique for secure communication over the internet.
IPv6 protocol for fast and secure communication in IoT
The authors have proposed IPv6 internet protocol for the communication while maintaining the speed and security. The authors have reviewed several literature on this topic. Along with that the authors have also verified the concept through original work. Instead of collecting presented the information based on the secondary research the authors verified the speed and level of encryption on their own through testing and prototyping. The result of the same have been presented in the paper as well which makes it easy to follow. This journal basically deals with the processing of the implementation of the IPv6. Basic concept of the data regarding the concept of IPv6 is stated in this journal. The main processing of the Internet of tings is stayed in this journal. Researchers find it easy for the process of the internet of things. The need for the implementation of internet of things in the platform of data storage is also discussed in a very conceptual manner. Another aspect of this journal is that the data that are present in this journal is not at all in texted and this leads to the fact that the data that are present in the journal cannot be used for future purpose. This is the main reason that the journal is not given much importance and the popularity of the journal is very low.
Lee, Y. S., Alasaarela, E., & Lee, H. (2014, February). Secure key management scheme based on ECC algorithm in transportation system. In Information Networking (ICOIN), 2014 International Conference on (pp. 453-457). IEEE.
The authors have discussed about the application and the security issue of implementing IOT in the transportation system.
The authors have selected the area of data privacy and data storage. The authors makes it clear that as the data that is collected is huge in volume, it is not possible to store the data in the traditional storage system. Hence cloud computing or the cloud storage is the alternative option. However organization should opt for the private cloud over the public cloud for better security and control over the data
The authors have opted for the secondary research methods that is review of existing literature in the domain of data security in IOT. This journal is basically dependent on the comparison in between the earlier stage and the post stage. This journal helps in understanding the advantages that the people of smart city enjoys after the implementation of the internet of things. This journal also helps in understanding the disadvantages that are present in the society after the implementation of the Internet of things
Hofheinz, D., & Jager, T. (2016). Tightly secure signatures and public-key encryption. Designs, Codes and Cryptography, 80(1), 29-61.
The author have discussed the security and application of IOT for preparing the research paper.
The problem domain chosen for the topic is the security of the digital content. The author here have proposed for hashing technique for securing the data. The hashing algorithm encrypt the data and in order to decrypt the data the hashing value must be provided. Once the values match it is then decrypted and it is then possible to read.
Group authentication technique to prevent overlapping and ensure privacy
The author has here opted for the primary research. Although relevant literatures were reviewed, the authors have opted for simulation of the Hashing algorithm and the result has been discussed in the paper too. This journal deals with the problems that are present in the processing of the implementation of the internet of things. After the implementation of the internet of things the security issues that are present is well commenced in this journal. This also shows that the journal that is used is well constructed and precise in nature and due to this preciseness of the journal this journal gains very high importance.
Jan, S. R., Khan, F., Ullah, F., Azim, N., & Tahir, M. (2016). Using CoAP Protocol for Resource Observation in IoT. International Journal of Emerging Technology in Computer Science & Electronics, ISSN, 0976-1353.
The authors in this article have discussed for legal issues of implementing the IOT in the smart transportation system
The authors have discussed that in order to comply with the legal issue it is important to secure the data that is collected for controlling and monitoring the traffic through IOT and provide the correct information to the user to help them obtain proper information about the traffic and make effective decision based on that.
In order to secure the information the author have suggested Constrained Application Protocol or CoAP. It makes it mandatory for the users to verify the authorization to the system before accessing the data from the server.
The authors have chosen the secondary research method that includes analysis and review of previous research works. The techniques identified in the literatures have been compared and based on that the authors have suggested the appropriate method. This journal is termed as an advanced level textual concept. The data that is present in the journal generally deals with the processing of the Constrained Application Protocol or CoAP. This definition of the conceptual proposing of the data helps in gaining conceptual knowledge regarding the platform of the internet of things. The structuring of the data is not very well performed. This leads to the fact that the time that is taken to surf the data is very high. The data that are present in this journal is very well in texted which makes this journal usable among the researchers. This is the main reason that this journal is gaining importance
After conducting the literature review the following requirements have identified for the project
• Proper review and the analysis of the authentication problem in the IOT connected smart transportation
• Review of the security issues in the smart transportation
• Review and comparison of several algorithms proposed by the previous works
• Formulating effective algorithm for the authentication
• Review of the effectiveness of the proposed algorithm
• Suggest the most appropriate algorithm after analyzing the strength and weakness of the previous proposed algorithms
Although IOT is having huge potential there are several issues with the technology. This issues have to be addressed for the successful implementation of the technology. There are several problems for the successful implementation of IOT in the smart transportation and several authors have identified different issues with specific solution against that. However the majority of the articles that have been reviewed, confirms that the leading problem in the IOT environment is the lack of proper authentication scheme and it is required to formulate a robust framework for authentication in order to realize the potential of IOT in the transportation system properly.
Although several authors have suggested different technology for the device authentication in the IOT environment, but the majority of the researchers have opted for the RFID technology and the authors of the literatures that have been chosen here also suggested for the same. This particular report also recommend for that as it is requires less resources and less processing power to implement which is one of the prime consideration for the IOT environment.
As the resource constraint need to be included for the IOT environment and the same applies to the communication protocol chosen for smart transportation with IOT. Hence COAP is preferred over the popular HTTP protocol used in internet communication. Besides this the CoAP protocol is more secured than the HTTP protocol as it includes higher encryption level. CoAP protocol uses the ECC authentication mechanism. The table and figures for the recommended technologies have been described in the following section
Fig1: Resource constraints in IOT environment
Fig 2: Low power consumption of RFID tag
Fig3: power consumption comparison of different protocol
Key size ( ECC) |
Key size ( RSA) |
Reduction ratio (approximate) |
162 |
1024 |
1:16 |
256 |
3074 |
1:12 |
383 |
7684 |
1:20 |
512 |
15365 |
1:30 |
Fig 4: Key size of ECC authentication mechanism
Conclusion
The report after doing the research and analyzing the past and current in this domain that discusses various issues and solutions, the report comes to the conclusion that IOT has a huge potential in transforming the transportation system. However there are several challenges as of now to realize the potential of the technology. The major challenges are the challenges regarding the authentication the data security and the communication between devices of the IOT connected objects in the network. Although there are several technology for authentication of the device, but not all are efficient. The most efficient technology for device authentication in the IOT network is the RFID technology as it considers the IOT device constraints such as the limited memory, processing power and the power consumption. Among the communication protocols that are popular for communicating over the internet the protocol that is most appropriate considering the highly constraint environment of the IOT devices is the COAP protocol as it is secure, less power consuming and require less memory to execute which is ideal for IOT applications. However it should be noted that as technology is getting more and more advanced and several new technology is being discovered, there is no fix preference for the ideal technology and the list is subject to change. Hence it is appropriate to consider that some technology might be preferable for now but it is likely to change as new technology provides solution that better and improved than the previous technology. Hence there is always scope for future research in this domain.
References
Al-Sarawi, S., Anbar, M., Alieyan, K., & Alzubaidi, M. (2015, May). Internet of Things (IoT) communication protocols. In Information Technology (ICIT), 2017 8th International Conference on (pp. 685-690). IEEE.
Dobrescu, R., Mocanu, ?., Cr?ciunescu, M., & Anghel, M. (2015, April). Using IoT communication infrastructure for improving performance of power microgrids. In 2018 5th International Conference on Control, Decision and Information Technologies (CoDIT) (pp. 482-487). IEEE.
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017, March). Blockchain for IoT security and privacy: The case study of smart traspotion. In Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on (pp. 618-623). IEEE.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2017). A critical analysis on the security concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).
Frädrich, C., Pöhls, H. C., Popp, W., Rakotondravony, N., & Samelin, K. (2016, November). Integrity and authenticity protection with selective disclosure control in the cloud & iot. In International Conference on Information and Communications Security (pp. 197-213). Springer, Cham.
Hofheinz, D., & Jager, T. (2016). Tightly secure signatures and public-key encryption. Designs, Codes and Cryptography, 80(1), 29-61.
Huang, X., Craig, P., Lin, H., & Yan, Z. (2015). SecIoT: a security framework for the Internet of Things. Security and communication networks, 9(16), 3083-3094.
Jan, S. R., Khan, F., Ullah, F., Azim, N., & Tahir, M. (2016). Using CoAP Protocol for Resource Observation in IoT. International Journal of Emerging Technology in Computer Science & Electronics, ISSN, 0976-1353.
Lee, Y. S., Alasaarela, E., & Lee, H. (2014, February). Secure key management scheme based on ECC algorithm in transportation system. In Information Networking (ICOIN), 2014 International Conference on (pp. 453-457). IEEE.
Li, C. T., Lee, C. C., Weng, C. Y., & Chen, C. M. (2018). Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Networking and Applications, 11(1), 198-208.
Li, X., Wang, H., Yu, Y., & Qian, C. (2017, April). An IoT Data Communication Framework for Authenticity and Integrity. In Internet-of-Things Design and Implementation (IoTDI), 2017 IEEE/ACM Second International Conference on (pp. 159-170). IEEE.
Lopes, A.P.G. and Hilgert, L.D.O., 2017. Group authentication protocols for Internet of Things (IoT)–QoS and Security Properties Evaluation.
Tappler, M., Aichernig, B. K., & Bloem, R. (2015, March). Model-based testing IoT communication via active automata learning. In Software Testing, Verification and Validation (ICST), 2017 IEEE International Conference on (pp. 276-287). IEEE.
Tayeb, S., Latifi, S., & Kim, Y. (2015, January). A survey on IoT communication and computation frameworks: An industrial perspective. In Computing and Communication Workshop and Conference (CCWC), 2017 IEEE 7th ANNUAL (pp. 1-6). IEEE.
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2016, November). IoT security: ongoing challenges and research opportunities. In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on (pp. 230-234). IEEE.