You are on page 1of 6

Introduction To The Internet Of Things Security

Standardization and research challenges

Salim ELBOUANANI My Ahmed EL KIRAM


Computer Science Dept Computer Science Dept
University Cadi Ayyad, UCA University Cadi Ayyad, UCA
Marrakesh, Morocco Marrakesh, Morocco
elbouanani.salim@gmail.com kiram@uca.ma

Omar ACHBAROU
Computer Science Dept
University Cadi Ayyad, UCA
Marrakesh, Morocco
Omar.achbarou@gmail.com

AbstractThe transition from the current Internet to the Our survey treats the IoT from a security approaches and
Internet of things (IoT) is inevitable and is already necessary. tries to give generals definitions in this domain.
The main aspect about the IoT paradigm is the integration of
several technologies and standards. However, what places II. OVERVIEW OF THE INTERNET OF THINGS
have the security and privacy in this paradigm?
A. History of the IoT
We present the necessary background by introducing the IoT The term Internet of Things was firstly coined by Kevin
paradigm. Then, we summarize the standards and enabling Ashton [3] in 1999. But the concept began to be clearer with
technologies that refer to security in the IoT. Furthermore, we the MIT Auto-ID and their presentation of the IoT vision in
point some major issues that should be faced by the research 2001. Later, IoT [4]was formally introduced by the
community related to the security in the IoT. Finally, based on International Telecommunication Union (ITU) in the ITU
our evaluation, we highlight some possible directions for future Internet report in 2005.
research. Our goal is not only to analyze, compare and According to the Cisco Internet Business Solutions
consolidate past research work but also to appreciate their Group (IBSG)[2] , IoT is simply the point in time when more
findings and discuss their applicability towards securing the
things or objects were connected to the Internet than
IoT and to provide a solid base to start a scientific research
around security and privacy on the IoT.
people and it was around 2008 and 2009.
The web has gone through several distinct evolutionary
Keywords-Internet of things; Security; Privacy; Sensor; stages: from the first stage with the Arpanet to the fourth
thing; object stage, where we are now, is the social or experience
web, what we call the web 2.0.
I. INTRODUCTION Unlike the Web, the Internet has been on a steady path of
The IoT technology offers unprecedented opportunities development and improvement, but there have been no
to interconnect human beings as well as Machine-to- fundamental change. IoT becomes immensely important
Machine (M2M) communication, whereby sensors and because it is the first real evolution of the Internet.
networks allow all things to communicate directly with each B. The IOT Concepts
other to share information and allow us to have an
The Internet of Things encompasses several concepts,
instrumented universe where accurate data is readily
IDATE listed three distinct but complementary concepts [5] :
available to inform optimal decision making.This revolution
is based on a constant evolution of the Internet, technologies Communicating devices referring to devices
and software, communication protocols, embedded sensors, connected to the Internet or other types of network.
smart physical objects able to collect data in real time. Its Machine-to-machine (M2M) communications refers
the future internet[1], it will dramatically change our way of to machines which are objects that can work
living as the Internet impacts on education, health, homes, autonomously without any connectivity.
communications, transportation, cities, business, science, Internet of Objects (IoO) here refers to inert and
government and men in general. However, several issues are passive objects that do not generate any data by
threatening the IoT development, like the privacy and themselves.
security in this technology, the transition from IPv4 to The numerous technologies of the IoT that drive its very
IPv6[2], having a common set of standards and managing the broad vision make the research into this area still in its
enormous amount of data that will be stored, accessed, and infancy. Therefore, there arent any standard definitions for
analyzed. IoT. Next, we choose to list some interesting definitions:

978-1-4673-8715-6/15/$31.00 2015 IEEE 32


Definition by the Cluster of European Research D. The Device, thing and object
Projects (CERP) [6] : The Internet of Things allows With regard to the IoT, thing is defined by ITU-T
people and things to be connected Anytime, Y.2060 [7] : an object of the physical world (physical
Anyplace, with Anything and Anyone, ideally using things) or the information world (virtual things), which is
Any path/network and Any service. capable of being identified and integrated into
Definition by ITU-T Y.2060 [7] Recommendation: communication networks. Some other terms used by the
the IoT is a global infrastructure for the information research community are smart objects, devices, nodes.
society, enabling advanced services by
interconnecting (physical and virtual) things based
on existing and evolving interoperable information
and communication technologies. Through the
exploitation of identification, data capture,
processing and communication capabilities, the IoT
makes full use of "things" to offer services to all
kinds of applications, whilst ensuring that security
and privacy requirements are fulfilled. The IoT adds
the dimension "Any THING communication" to the
information and communication technologies which Figure 2. A device in the IOT
already provide "any TIME" and "any PLACE"
communication. While the device by the ITU is a piece of equipment with
We find that the last two definitions provided by ITU and the mandatory capabilities of communication and the
the CERP covers the principals definitions and aspects of the optional capabilities of sensing, actuation, data capture data
IoT. On the one hand, the definition by the CERP-IOT is storage and data processing.
more general in specifying the communication with Anyone More generally, The device from an technical view [8] is
in addition with anything, and the part ideally using Any a set of electronic components with low computation
path/network and Any service. On the other hand, the capabilities, in addition to communication devices connected
definition by the ITU is more understandable and accessible to the Internet or other types of network to interact with the
to the public and mentions that IoT services need to ensure real world not only with sensor nodes but also actuators.
security and privacy requirements.
E. IoT statistics and numbers
C. A standard IOT platform According to Gartner Internet of Things Report 2013[9]
The typical structure of a standard IoT platform in the in 2020, The IoT will grow to 26 billion units installed, the
figure 1 comprises the cloud and mobile applications and the revenue will exceed 300 billion $ with 1.9 trillion $ in global
things themselves. economic impact.
Cisco IBSG [2]predicts there will be even more, 50
billion devices by 2020 with 6.58 as number of connected
devices per person.
For the IDATE[5], 80 billion things will be connected by
2020. The IoO will represent 85% of the total IoT, ahead of
communicating devices (11%) and M2M (4%).
The HP Security Research and its Internet of Things
Research Study 2014 report reviewed 10 of the most
popular devices in some of the most common IoT niches and
conclude with an alarmingly high average number of
vulnerabilities per device, up to 80 percent for some
concerns. Vulnerabilities ranged from Heartbleed to denial of
service to weak passwords to cross-site scripting.
F. Applications Domains
Figure 1. Typical structure of a IoT Platform The Internet of Things is based on existing technologies,
such as the cloud and social networks, not to mention mobile
Any security architecture must address the security technologies. Potential applications of the IoT are numerous
requirements of the object itself with its OS and and diverse, permeating into practically all areas of every-
computational capabilities, the mobile and the cloud parts. day life of individuals or organizations. The Cerp-IoT
The security and privacy of communications between object divided this application domains into three categories based
and cloud / mobile applications and objects through its on their focus [6]: Industry, environment and society. While
access point will be implemented essentially in the the Internet of things : survey[10] listed four categories :
middleware of the device. Transportation and logistics , Healthcare, Smart environment
and finally Personal and social domain.

2015 11th International Conference on Information Assurance and Security (IAS) 33


We will propose a combination of the last two Specific security capabilities are closely coupled with
classifications in the table I, we also list sub categories from application-specific requirements, for example security
the precedent classifications in addition of the one proposed requirements of mobile payment.
by Asin & Gascon[11]. 2) ITU-T Y.2061 recommandation :
This Recommendation ITU-T Y.2061 [13] approved in
TABLE I. IOT CATEGORIES AND SUB CATEGORIES DOMAINS
june 2012 covers extensions and additions to next generation
Category Sub domain Categories networks (NGN) as well as device capabilities in order to
retail, transportations, logistics, industrial control, support machine-oriented communication (MOC)
Industry
telecommunications, manufacturing applications in the NGN environment and can conceptually
Healthcare eHealth, independent living, Pharmaceutical be applicable to other networks. As already mentioned in
smart environment, smart metering and water, smart section II-D, the communication in NGN environment or
Environment
agriculture, smart animal farming,domestic automation networks in general will be essential in the IoT.
Society
smart cities, security and emergencies, Social The security aspects described by the recommendation
networking are concerning:
III. STANDARDS AND ENABLING TECHNOLOGIES RELATED Authentication and authorization
TO THE SECURITY AND PRIVACY IN THE IOT
Security data
Security of MOC device access
There is currently no standard or framework for all
aspects of the security in the IOT and its an actual issue of B. IEEE initiative
research. The fact is that IOT is based on existing IEEE has tried to expand the TCP/IP model layers by
technologies and the actors in this area need to use several introducing more appropriate protocols to the IoT for the
standards. It would be very difficult to go through all these different layers. However, IoT can also use conventional
standards and enabling technologies, we choose to focus on Internet standards as Ethernet, IP, TCP / IP and HTTP
initiatives related to "generic" standards of the IoT, The standard IEEE 802.15.4 is a communication protocol
especially those that are already used by industry, we list the for low rate wireless personal area networks (LR-WPAN).
following initiatives [10] [12]: The 802.15.4 is used by many implementations based on
A. IoT-GSI (Internet of Things Global Standard Initiative) proprietary protocols such as ZigBee or 6LoWPAN. The
IEEE 802.15.4 [14]architecture is defined in terms of layers.
1) ITU-T Y.2060 recommandation : Each layer is responsible for one part of the standard and
Recommendation ITU-T Y.2060 [7]approved in june offers services to the higher layers. The 3 layers of the IEEE
2012 provides an overview of the Internet of things (IoT). It 802.15.4 starting by the upper one:
clarifies the concept and scope of the IoT, identifies the The link layer provides error control mechanism to
fundamental characteristics and high-level requirements of check frame integrity. This is a fundamental
the IoT and describes the IoT reference model. difference with the Ethernet standard.
The recommendation has proposed an IoT reference The Medium Access Control sublayer (MAC)
model. It is composed of four layers as well as management defines the method of exchange of frames among the
capabilities and security capabilities which are associated network elements. Each item is identified by a
with the four layers that are: specific MAC address to the Protocol.
Application layer The physical layer (PHY) contains the radio
Service support and application support layer transmitter / receiver, with a low-level control
Network layer mechanism.
Device layer. The 802.15.4 specification provides security functions at
The security aspects of this model are mentioned in the the link layer: access Control, messages integrity, messages
security capabilities. There are two kinds of security privacy and protection against replay. These elements are set
capabilities: generic security capabilities and specific at the security enabled field in the MAC frames. We can
security capabilities. Generic security capabilities are enable one, several or all the functions, based on encryption
independent of applications. They include: algorithms AES.
At the application layer: authorization,
authentication, application data confidentiality and C. IETF initiative
integrity protection, privacy protection, security The IETF standards around the Internet of things mainly
audit and anti-virus; concern network protocols.
At the network layer: authorization, authentication, 1) IETF standard RFC 4919 & RFC 4944:
use data and signaling data confidentiality, and IPv4 and IPv6 are effective for data delivery to
signaling integrity protection; LANs, MANs and WANs such as the Internet. However,
At the device layer: authentication, authorization, they are difficult to implement in sensors network and other
device integrity validation, access control, data constrained systems due in particular to the large size of
confidentiality and integrity protection. headers [15]. Responding to the increasing interest of
connecting those resource constrained devices to the Internet,

34 2015 11th International Conference on Information Assurance and Security (IAS)


the IETF has proposed standards that enable IPv6-based eavesdropping, tampering, or message forgery. The DTLS
networks. The 6LoWPAN [16]as IPv6 over Low power protocol is based on the Transport Layer Security (TLS)
Wireless Personal Area Networks, defines encapsulation and protocol and provides equivalent security guarantees. DTLS
header compression mechanisms that allow IPv6 packets to is a derivation of SSL protocol. It provides the same security
be sent to and received between resource constrained devices services (integrity, authentication and confidentiality) but
usually by adopting low-power radio communication under UDP protocol.
protocols such as IEEE 802.15.4 and 802.15.6 . The standard 5) COAP & DTLS
does not provide security features in addition to those Analogous to TLS-protected HTTP (HTTPs), the DTLS-
potentially implemented at the 802.15.4 and IPV6. secured CoAP protocol is termed CoAPs [20]. DTLS
2) IETF Standard RFC 6550 : RPL guarantees E2E security of different applications on a single
One of the challenges of the Internet of Things is routing machine by operating between the transport and application
IP packets. RPL or the IPv6 Routing Protocol for LLNs ( layers.
Low-power and Lossy Network) [17] creates routes without
changing the IP forwarding process. Designed for machines D. GS1 initiative
with limited network capacity, RPL by default has few GS1 (Global Standard 1) is a global organization active
security requirements .It supports message confidentiality in the standardization field of coding methods used in the
and integrity. It is designed such that link-layer mechanisms supply chain.
can be used when available and appropriate; yet, in their 1) EPC : Electronic Product Code
absence, RPL can use its own mechanisms. Electronic Product Code system (EPC) [21]developed by
RPL has three basic security modes: the Auto-ID, is a universal identifier for any physical object
In the first, called "unsecured", RPL control [21]. It is used in information systems that need to track or
messages are sent without any additional security otherwise refer to physical objects.
mechanisms. In the version 2.0.0 of this standard, ratified in late 2013,
In the second, called "preinstalled", nodes joining a Security requirements were proposed allowing:
RPL Instance have preinstalled keys that enable Fighting counterfeiting by verifying the tag
them to process and generate secured RPL messages. authenticity,
The third mode is called "authenticated". In this Enhancing the security by modifying the information
mode, nodes have preinstalled keys; the key may contained in a tag. Commands such as Challenge',
only be used to join a RPL Instance as a leaf. Joining 'Authenticate, Authcomm will support the
an authenticated RPL Instance as a router requires cryptographic suites developed in the framework of
obtaining a key from an authentication authority. the ISO / IEC 29167-1x,
3) IETF Standard RFC 7252 : CoAP Ensuring better management of files by setting
The HTTP protocol is based on TCP, which is the most access privileges,
used transport protocol on the Internet. Unfortunately, this Ensure non-traceability, with hiding some data in a
protocol requires a lot of resources making its tag to protect consumer privacy;
implementation ineffective for the IoT environment. Loss prevention by using the tag as anti-theft system.
The Constrained Application Protocol (CoAP) [18] is a 2) ONS Standard
specialized web transfer protocol for use with constrained Domain Name System (DNS) is a distributed database
nodes and constrained (e.g., low-power, lossy) networks. that is indexed by domain names. It is a service for
CoAP is designed to easily interface with HTTP for translating a domain in several types of information,
integration with the Web while meeting specialized including the IP addresses of the machine. Similarly, the
requirements such as multicast support, very low overhead, ONS (Object Naming Service) [22]standard published in
and simplicity for constrained environments. December 2012, ensures naming objects and the routing
Essentially, COAP operates above UDP and not TCP. requests. ONS 2.0 enables to set up a root by region or
COAP is a client / server protocol. It gives ability to manage country according to the choice of GS1 member/country.
resources with commands as GET, PUT, POST, DELETE on Being based upon DNS, A lot of functions depend or are
IP networks. related on DNS, as the ONS lookup function which is
The COAP specifications related to security offer two implemented by a distributed set of servers with a single
methods with the following functions to ensure for the (replicated) root, currently at onsepc.com. The ONS security
datagrams: authentication, integrity checking, protection might also have the same security problems as the DNS what
against replay attacks and confidentiality protection (through we will try to test in our future researches.
encryption). These two methods are the DTLS protocol
(Datagram Transport Layer Security) and IPSec E. OASIS Initiative : MQTT ( Message Queuing Telemetry
4) IETF Standard RFC 6347 : DTLS Transport )
The Datagram Transport Layer Security (DTLS)[19] OASIS (the Advancement of Structured Information
protocol provides communications privacy for datagram Standards) is a global consortium working for the
protocols. The protocol allows client/server applications to standardization of open file formats based on XML.
communicate in a way that is designed to prevent

2015 11th International Conference on Information Assurance and Security (IAS) 35


MQTT (Message Queuing Telemetry Transport) has E. Anoymity
been standardized by the Oasis in 2013. It is a As the promising future IoT technology tends to be more
publish/subscribe, extremely simple and lightweight pervasive and omnipresent, the anonymity and unlinkability
messaging protocol [23], designed for constrained devices have regained great interest within the research community,
and low-bandwidth, high-latency or unreliable networks. as users demand fully private transactions. Most of the
3 concepts are fundamental to the security in the MQTT: proposed solutions provide anonymous authentication via the
Identification consists of naming the server and the use of digital credentials. Research about the optimal fully
client to which it gives access rights. decentralized anonymous authentication protocol is still in
Authentication seeks to prove the identity of each progress[29].
client and the server.
The authorization is to manage the client's rights. F. Digital forgetting
It is possible to pass a user name and password with an All the information collected about a person by the IoT
MQTT packet in V3.1 of the protocol. Encryption across the may be retained indefinitely as the cost of storage decreases.
network can be handled with SSL, independently of the Also data mining techniques can be used to easily retrieve
MQTT protocol itself. An MQTT server authenticates a any information even after several years
client using SSL, a password, or both. The authorization is
not part of the MQTT protocol. It is provided by the MQTT G. Standardization
servers. One major area of development for IoT revolves around
interoperability and standards. As described in the section
IV. RESEARCH CHALLENGES IN THE IOT SECURITY IV, There are several standardization efforts but they are not
In this section problems and required researchs related to integrated in a comprehensive framework about security and
security and privacy in the IoT are mentioned [10] . Each of privacy for the IoT. Also, In order to make Privacy by design
the topic discussions primarily focuses on new problems and and Privacy by default a reality, the consideration of data
challenges that arise for future IoT systems. They are protection requirements should become a mandatory design
representative and not complete: goal in standardization.

A. Authentication H. Security Architecture


Authentication is difficult in the IOT as it requires As trillions of things (objects) are connected to the
appropriate authentication infrastructures that will not be Internet it is necessary to have an adequate architecture[26]
available in IOT scenarios. Challenge will be to distribute that permits easy connectivity, control, communications, and
keys [24] for trillions of devices. Also man-in-the-middle useful applications while ensuring security and privacy.
attack is a serious problem because of the architecture. I. Security
B. Data integrity and provenance In the IoT, every 'thing' is connected which results in
Ensuring the trustworthiness [25] of data coming from significant security threats, such as threats towards
IoT to applications that analyze that data and potentially confidentiality, authenticity and integrity of both data and
actuate requires that trust be addressed at both the producer services [7]. A critical example of security requirements is
and the consumer side. This is usually ensured by protecting the need to integrate different security policies and
data with passwords. However, the password lengths techniques related to the variety of devices and user
supported by IoT technologies are in most cases too short to networks in the IoT.
provide strong levels of protection. J. Security Attacks
C. Privacy Protection Security attacks are problematic [26] for the IoT because
Things may contain private information concerning their of the minimal capacity things (devices) being used, the
owners or users. The IoT needs to support privacy protection physical accessibility to sensors, actuators and objects, and
[7]during data transmission, aggregation, storage, mining the openness of the systems, including the fact that most
and processing. Privacy protection should not set a barrier to devices will communicate wirelessly. IoT applications must
data source authentication. A solution can be to specify the be able to continue to operate satisfactorily in the presence of
privacy policies for each (system) domain [26] and the security attacks, and to recover effectively from these
interoperability between privacy policy of each system must attacks. Solutions may require designing system that
be studied. Another challenge in this field will be to respect operates with a base level of support including strong attack
the balance between privacy and utility. detection and self-healing capabilities. To heal from security
attacks, a system needs to detect the attack, diagnose the
D. identity Management attack, and deploy countermeasures and repairs, but perform
An open question in IoT research is identification and all of this in a lightweight manner due to the types of low
accessing of the objects and services offered by them, as well capacity devices involved.
as how to bind objects/services to machine addressable and
identifiable name[27]s. These issues can be solved with a
Virtual Identity[28], common for all IoT devices.

36 2015 11th International Conference on Information Assurance and Security (IAS)


V. FUTURE WORKS 2015].
[10] L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A
After this global understanding of our subject that results survey, Comput. Networks, vol. 54, no. 15, pp. 27872805, 2010.
in this current introduction to IoT security. It resulted in two [11] A. Asn and D. Gascn, 50 Sensor Applications for a Smarter
main research topics: World: Libelium white paper, Libelium, 2012.
the study of ONS security taking into account the [12] R. Roman, P. Najera, and J. Lopez, Securing the Internet of things,
various advanced in terms of problems and security Computer (Long. Beach. Calif)., vol. 44, no. 9, pp. 5158, 2011.
solutions of the DNS. ONS is based on DNS, it is [13] International Telecommunication Union (ITU), Requirements for the
DNS security problems [30] as Misdirected support of machine-oriented communication applications in the next
Destination (Trusting Faked Information), Name generation network environment, 2012.
Based Authentication / Authorization and Trusting [14] IEEE Computer Society, Part 15.4: Low-Rate Wireless Personal
Area Networks (LR-WPANs), 2011.
Supplementary Non-Authoritative Information. But
also DNS security solutions and extensions as [15] G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, RFC 4944:
Transmission of IPv6 Packets over IEEE 802.15.4 Networks, 2007.
DNSSEC (Domain Name System Security
[16] N. Kushalnagar, G. Montenegro, and C. Schumacher, RFC4919
Extensions), DNS RRL (Response Rate Limit) and IPv6 over Low-Power Wireless Personal Area Networks
using a mixture of DNS engines to mitigate the risk (6LoWPANs): Overview, Assumptions, Problem Statement, and
of attacks. Goals, 2007.
The study of attacks and countermeasures on a [17] T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K.
standard platform of IoT in the IOT-LAB testbed Pister, R. Struik, J. Vasseur, and R. Alexander, RFC6550 RPL: IPv6
Routing Protocol for Low-Power and Lossy Networks, 2012.
and in our lab with real sensors, actuators, cloud
platform and mobile applications. The result will be [18] Z. Shelby, K. Hartke, and C. Bormann, RFC 7252 The Constrained
Application Protocol (CoAP), 2014.
the proposal of an optimal security architecture.
[19] E. Rescorla and N. Modadugu, Request for Comments: 6347 -
Datagram Transport Layer Security Version 1.2, 2012.
VI. CONCLUSIONS
[20] D. Uthaya Sinthan and M. Balamurugan, DTLS & COAP Based
The Internet has changed drastically the way we live, in Security For Internet of Things Enabled Devices, Ijesrt.Com, vol. 2,
our way to communicate, to work or to innovate. IoT is the no. 12, pp. 27, 2013.
next big opportunity and challenge. It integrates several [21] Gs1, EPC Tag Data Standard. Version 1.9, 2014.
technologies and protocols. Until now security and privacy [22] I. January and P. Gautier, GS1 Object Name Service ( ONS ), 2013.
concerns have been neglected in this area. It could be a major [23] MQTT.ORG, MQTT.ORG. [Online]. Available:
issue that could affect and slow down the development of the http://mqtt.org/faq. [Accessed: 25-Oct-2015].
IOT. The challenge then is is to define the principles and [24] P. Balamuralidhar, P. Misra, and A. Pal, Software platforms for
regulatory frameworks that will guide the development of internet of things and M2M, Journal of the Indian Institute of
Science, vol. 93, no. 3. pp. 487497, 2013.
the IoT with a high level of security and privacy.
[25] A. Kanuparthi, R. Karri, and S. Addepalli, Hardware and embedded
REFERENCES security in the context of internet of things, in Proceedings of the
2013 ACM workshop on Security, privacy & dependability for cyber
[1] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, Internet of vehicles - CyCAR 13, 2013, pp. 6164.
Things (IoT): A vision, architectural elements, and future directions, [26] J. a Stankovic and L. Fellow, Research Directions for the Internet of
Futur. Gener. Comput. Syst., vol. 29, no. 7, pp. 16451660, 2013. Things, vol. 1, no. 1, pp. 39, 2014.
[2] D. Evans, The Internet of Things - How the Next Evolution of the [27] J. M. Batalla, P. Krawiec, M. Gajewski, and K. Sienkiewicz, ID
Internet is Changing Everything, CISCO white Pap., no. April, pp. layer for internet of things based on name-oriented networking, J.
111, 2011. Telecommun. Inf. Technol., vol. 2013, pp. 4048, 2013.
[3] K. Ashton, That Internet of Things Thing - RFID Journal, RFID [28] A. C. Sarma and J. Giro, Identities in the future internet of things,
JOURNAL, 2009. [Online]. Available: Wirel. Pers. Commun., vol. 49, no. 3, pp. 353363, 2009.
http://www.rfidjournal.com/articles/view?4986. [Accessed: 06-Oct-
2015]. [29] A. Alcaide, E. Palomar, J. Montero-Castillo, and A. Ribagorda,
Anonymous authentication for privacy-preserving IoT target-driven
[4] ITU Internet Reports 2005: The Internet of Things. [Online]. applications, Comput. Secur., vol. 37, pp. 111123, 2013.
Available: http://www.itu.int/osg/spu/publications/internetofthings/.
[Accessed: 06-Oct-2015]. [30] A. Lioy, F. Maino, M. Marian, I. Politecnico, and T. Torino, DNS
Security, Informatica, pp. 113, 2000.
[5] Institut de laudiovisuel et des tlcommunications en Europe
(France), Internet of Things: Outlook for the Top 8 Vertical Markets.
IDATE, 2013.
[6] O. Vermesan, F. Peter, G. Patrick, G. Sergio, B. Harald, Sundmaeker
Alessandro, J. Ignacio Soler, M. Margaretha, H. Mark, E. Markus,
and D. Pat, Internet of Things: Strategic Research Roadmap,
Internet Things Strateg. Res. Roadmap, pp. 150, 2009.
[7] International Telecommunication Union (ITU), Overview of the
internet of things, 2012.
[8] L. Zhou and H. Chao, Multimedia traffic security architecture for the
internet of things, Network, IEEE, no. June, pp. 3540, 2011.
[9] Gartner Says the Internet of Things Installed Base Will Grow to 26
Billion Units By 2020. [Online]. Available:
http://www.gartner.com/newsroom/id/2636073. [Accessed: 18-Oct-

2015 11th International Conference on Information Assurance and Security (IAS) 37

You might also like