Abstract
There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.
Highlights
There has been tremendous growth in the use of the Internet of Things (IoT) [1] in our daily lives
Our approach is three-fold: (1) we outline the potential threats and attacks in an IoT system, (2) we examine the available security requirements for the IoT, and (3) we study and analyse how those requirements can be employed to design a secure IoT architecture
Compared to the existing proposals in the field of the IoT security, we provide a comprehensive discussion of the IoT security requirements in a systematic way, and present a critical discussion of the employments of such requirements to design an IoT security architecture
Summary
There has been tremendous growth in the use of the Internet of Things (IoT) [1] in our daily lives. The rapid growth in the number of smart devices (e.g., smart phones, tablets, intelligent circuits, sensors, actuators, etc.) makes it more convenient to use IoT applications and services than ever before [3]. It is predicted that the number of devices connected to Internet will be. The average number of devices and connections per household and per Internet user is predicted to increase by 51% by 2022. This trend will increase the annual global Internet traffic, which is predicted to reach 4.8 ZB (zetta-bit) per Sensors 2020, 20, 5897; doi:10.3390/s20205897 www.mdpi.com/journal/sensors
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.