A Survey on Energy-Aware Security Mechanisms for the Internet of Things
Abstract
:1. Introduction
1.1. Motivation
1.2. Importance of Energy Efficiency
1.3. Importance of Security Protection
1.4. Contributions
1.5. Organization
2. Energy-Efficient IoT
2.1. Energy Consumption Factors in the IoT
2.1.1. Data Centers
2.1.2. Machine-to-Machine (M2M) Communication
2.1.3. Technological Evolution
2.2. Challenges of Achieving Energy Efficiency in the IoT
2.2.1. Resource Constraints
2.2.2. Heterogeneity
2.2.3. Dynamic Atmospheres
2.3. Existing Energy-Saving Techniques
2.3.1. Hardware Energy-Saving Techniques
- Low-power microcontrollers. Low-power microcontrollers in IoT systems considerably extend the battery life, making them ideal for applications that require long runtimes. Due to the fact that sensor nodes are often battery-powered in reality, lowering the energy consumption not only extends battery life but also reduces battery replacement needs, which in turn slashes the risk of environmental contamination when discarding old batteries [22]. Additionally, energy savings yielded by low-power microcontrollers help cut back the demand for power resources.
- Energy Harvesting and Sleep Mode. Energy harvesting technologies refer to the processes that capture and convert external energy sources into electrical energy. There exists a broad spectrum of external energy sources, including solar, mechanical, thermal, wind, water, radio frequency, etc. For example, solar energy-harvesting technologies strive to leverage solar cells to convert light energy into electrical energy, whereas radio-frequency energy-harvesting technologies harness radio frequency signals to perform electrical energy conversion. On the other hand, the development of sleep-mode technologies becomes essential to achieve long-term self-sustainability for IoT applications [23]. Taking a sensor node as an example, if there is no need for it to sense its target environment for a certain period of time, it can transition to sleep mode for energy-saving purposes. Likewise, its sensors can be transitioned to sleep mode if its battery power drops below a critical threshold. The transitions can be performed dynamically based on multiple factors such as the sensors’ battery status and information quality. In short, energy-harvesting and sleep mode technologies help extend devices’ life and enhance the energy utilization of IoT systems [24].
- Power Management. Advanced power-management techniques, such as power-curtailment strategies and dynamic voltage and frequency scaling (DVFS), can effectively diminish power consumption. Power-curtailment strategies (e.g., power-gating techniques) focus on reducing the static power consumption of digital circuits. The power consumption of digital circuits consists of two main contributors: dynamic power consumption and static power consumption. Dynamic power consumption refers to the power consumed when the circuit is switched, while static power consumption is primarily due to the leakage current of the transistors, which consumes power even when the circuit is not performing any operation [25]. The power-gating technique inserts control switches between different parts of a circuit such that the power supply to a block of circuitry will be cut off when the block has no task to perform, thereby reducing the power consumption of digital circuits [26]. As for DVFS, it is a commonly used strategy that dynamically adjusts the power voltage and clock frequency of processors. In particular, in underload conditions, DVFS lowers a processor’s voltage and frequency to reduce the power consumption. Conversely, in overload conditions, DVFS increases the processor’s voltage and frequency to provide necessary computing power [27]. This technique is especially critical for battery-powered mobile devices because it enables IoT devices to achieve the best performance-to-energy ratio under various workload conditions, thereby prolonging their service time. In brief, power-management techniques fine-tune the power supply to IoT systems, reducing the overall power consumption of IoT devices and extending the battery life of battery-powered devices.
2.3.2. Software Energy-Saving Techniques
- Optimized operating systems. IoT devices often utilize specifically designed lightweight operating systems (e.g., Contiki and TinyOS) to enhance the operation efficiency and reduce system overhead [28], satisfying the needs of resource-constrained environments. For instance, an optimized operating system can intelligently switch an IoT device between sleep and active modes to reduce the power consumption when it sits in an idle state for a certain period, thereby effectively improving the energy efficiency of the device.
- Dynamic Network Configuration. Dynamic network configuration can improve the energy efficiency of IoT devices through communication optimization [29]. It allows IoT devices to make adjustments according to changing network conditions, such as the signal strength, network load, and interference. Such adaptability enables IoT devices to operate with minimal energy consumption under various conditions. For example, reducing the frequency of data transmission when a network signal is weak can reduce the power consumption. This example signifies that a dynamic network configuration not only lowers the energy consumption but also mitigates network congestion.
2.3.3. Network Protocols and Communication Technologies
2.3.4. Data-Management Technology
2.3.5. Optimizing Machine Learning
2.4. Emerging Trends and Future Directions
2.4.1. Energy Harvesting
2.4.2. Artificial Intelligence
2.4.3. Blockchain
3. Security Protections in IoT Environments
3.1. Evolving Threats in the IoT
3.1.1. Denial of Service Attacks (DoS)
- Flow-of-Traffic Attacks. Under this type of attacks, the network bandwidth is blocked by a large number of malicious packets that overwhelm legitimate traffic. These attacks aim to exhaust the network’s capacity to handle data, effectively denying service to legitimate users.
- Resource-Exhaustion Attacks. The focal point of these attacks is the server itself, which receives a multitude of attack packets that deplete memory or CPU resources. Such attacks aim to prevent servers from processing legitimate requests, leading to a denial of service.
3.1.2. Botnets, Data Breaches, and Physical Manipulation
3.1.3. Unique Vulnerabilities of IoT Devices
- Weak Authentication. Weak authentication in IoT devices, like unchangeable default passwords, opens doors for attackers to seize control of entire networks.
- Insecure Communication Protocols. Insecure communication protocols, similar to weak authentication, leave users vulnerable to data theft and manipulation attacks by acting as open doors for hackers, especially on public WiFi networks.
- Outdated Firmware. Outdated firmware and limited update capabilities in IoT devices create easy openings for hackers, leaving networks vulnerable to known software attacks.
3.2. Layers of Defense in IoT Security
- Device Layer. This layers contains a massive amount of sensors and control devices—such as sensors and control devices—deployed on sites.
- Communication Layer. The second layer provides a variety of communication protocols coupled with interfaces to realize functions such as data collection, device control, and system maintenance.
- Application Layer. This layer is comprised of a cloud platform performing the comprehensive configuration, operation and management of IoT terminals like smart grids and telemedicine.
3.3. Defense at the Device Layer
3.3.1. Secure Hardware Components
3.3.2. Robust Operating Systems and Attack Surface Reduction
3.3.3. Secure Booting
3.3.4. Tamper-Resistant Hardware
3.3.5. Secure Enclaves
3.3.6. Encryption Module
3.4. Defense at the Network Level
3.4.1. Secure Communication Protocols
3.4.2. Network Segmentation
3.4.3. Intrusion-Detection/Prevention Systems (IDS/IPS)
3.4.4. Secure WiFi Standard (WPA3)
3.5. Defense at the Software Level
3.5.1. Secure Coding Practices
3.5.2. Vulnerability Management
3.5.3. Access Control and Data Storage
3.6. Defense at the Application Level
3.6.1. Secure User Authentication
3.6.2. Data Security APIs
3.6.3. Encryption of Data at Rest and in Transit
3.6.4. Access Control Lists
3.7. Defense at the Management Level
3.7.1. Secure Supply and Configuration
3.7.2. Firmware Updates
3.7.3. Patch Management
3.7.4. Incident Response
3.7.5. Security Configuration Protocols
3.8. Challenges and Future Directions in IoT Security
3.8.1. Challenges
- Resource Constraints. Many IoT devices have limited processing power, memory, and communication bandwidth, which limits the possibility of implementing robust security measures on these devices. Therefore, designing security solutions that adapt to resource-constrained environments is a challenge.
- Heterogeneity of Devices. There are various types of devices in the IoT that may have different operating systems, processor architectures, and communication protocols. Harmonizing security standards and mechanisms for these heterogeneous devices is a complex task.
- Lack of Standardization. The lack of unified IoT security standards and specifications makes it more difficult to develop comprehensive security policies and implementation strategies. The lack of standardization may lead device manufacturers and service providers to take different approaches to security.
3.8.2. Future Directions
- Lightweight Encryption. Lightweight encryption algorithms for resource-constrained devices are a key future direction for IoT security. These algorithms need to secure data while minimizing the impact on device performance to improve the overall security of the IoT system [90]. Efficient and lightweight authentication is also one of the future directions of security research, which is important because verifying the identity of the user prevents sensitive data leakage and improves the performance of IoT networks.
- Artificial Intelligence-Driven Security. Traditional encryption methods are often utilized to address security and privacy issues in IoT networks; however, the nature of IoT nodes makes it impossible for existing methods to support the architecture of an entire complex and large IoT network, in part due to resource constraints and the large amount of real-time data generated by IoT devices. One may apply machine learning and deep learning solutions to IoT devices and networks, aiming to optimize the overall security of the system by learning statistical information collected from sensors. For instance, IoT systems may adopt deep learning to train a model that automatically identifies malicious behaviors to improve the self-protection performance.
- Blockchain-based Security. Blockchain technology provides decentralized and tamper-proof data management, which is suitable for security and tamper-proof requirements in the IoT. Thus, the blockchain ensures trust between devices and provides traceable data records that help prevent data tampering and malicious access and can effectively protect customers from data privacy breaches [91].
- Privacy-Protection Technologies. IoT devices provide personalized services by collecting and analyzing user data, which poses the risk of privacy leakage. Therefore, the future development of IoT security will inevitably focus more on privacy-protection techniques.
4. Energy-Aware Security Mechanisms in IoT
4.1. Energy–Security Trade-off in the IoT
4.2. Challenges of Implementing Energy-Aware Security
4.3. Approaches to Energy-Aware Security
4.3.1. Hardware-Based Approaches
- Low-power processors. Low-power processor design aims to reduce the power consumption at an acceptable cost of performance degradation [92], which is widely used in mobile devices, as well as wearable and embedded systems. With low-power processors in place, devices gain longer battery life and better energy efficiency.
- Energy-efficient communication modules. Energy-efficient communication modules aim to reduce the power consumption of security operations, thereby ensuring security while achieving overall energy efficiency [93].
- Cryptographically secure enclaves. Cryptographically secure enclaves allow encryption and decryption operations to be executed efficiently at the hardware level. Applications executing in a secure enclave can reduce the demand for repetitive security checks and data encryption operations, thereby diminishing the power consumption.
4.3.2. Software-Based Approaches
- Lightweight cryptographic algorithms. Lightweight encryption algorithms are designed to utilize fewer computational resources when performing encryption and decryption operations to lower power consumption. This is extremely important for battery-powered devices, as these devices can perform security operations with a reduced amount of time and a lower energy consumption [94].
- Optimized security protocols. Optimized security protocols that require less computation can diminish the power consumption when performing security-related tasks. For example, security protocols for specific low-power communication standards, such as Bluetooth low-energy (BLE) security, can ensure secure communication with minimal energy consumption [95].
- Context-based adaptive security levels. Encryption algorithms that adaptively adjust the strength according to security requirements and energy availability are conducive to achieving energy efficiency [96]. Specifically, When network conditions are stable or the data transmitted are non-sensitive, energy-efficient communication methods will be adopted. Conversely, when sensitive data need to be transmitted, secure but energy-intensive protocols will be utilized. Likewise, lower-strength encryption will be utilized in low-risk environments to conserve energy, whereas strong encryption algorithms will be adopted in high-risk environments to ensure data protection.
4.3.3. Network-Based Approaches
- Energy-efficient Communication Protocols. Energy-efficient communication protocols reduce packet sizes during data transmission to cut back on energy consumption. These protocols leverage effective data compression algorithms to diminish the number of communications. In addition, energy-efficient communication protocols harness optimized security mechanisms, such as lightweight encryption algorithms and efficient key management systems, for low-power environments.
- Network Segmentation. Network segmentation refers to monitoring and maintaining each segment independently in terms of security assurance. This security simplification facilitates reducing computational and communication activities, which in turn lowers power consumption.
- Collaborative Security Between Devices. Collaborative security mechanisms remove unnecessary security checks and response activities via information sharing and the collaborative analysis between devices, thereby conserving energy. Devices can also share security-processing tasks, such as distributed intrusion detection, to eliminate the burden on individual devices and thus remove power consumption.
4.3.4. Data-Centric Approaches
- Data Aggregation and Compression. This allows for data-processing tasks to be performed locally, thereby reducing data transmission, data leakage risks, network congestion, and power consumption.
- In-network processing. In-network processing reduces the amount of data transmitted to processing nodes over a network and thus conserves energy consumed for the communication between nodes.
4.3.5. Machine Learning Methods
- Anomaly Detection and Intrusion Prevention. Supervised learning algorithms can be used to identify types of attacks with high accuracy, whereas unsupervised learning algorithms are able to detect unknown, untagged attacks and anomalous behaviors. Pierpaolo et al. [97] demonstrated the outstanding effectiveness of machine learning (ML) models in identifying attacks, particularly in the realm of anomaly detection (binary classification) and anomaly classification (multi-class issues).
- Real-Time Monitoring. Based on historical energy usage data, ML models can be trained to identify patterns of energy wastage to facilitate designing energy-aware security policies. Additionally, ML models deployed on IoT devices can monitor incoming data streams to detect security threats in real-time while minimizing power consumption. For example, in IoT systems powered by federated learning algorithms, raw data are kept locally, with only model parameters transmitted to a central server or other devices (see Figure 10). By keeping sensitive data on local devices, federated learning reduces the risk of data leakage or unauthorized access, as well as the energy required to transfer large amounts of data [98].
4.4. Case Studies
4.5. Future Directions and Open Research Questions
4.5.1. Energy-Harvesting Technologies
4.5.2. Context-Aware Security
4.5.3. Blockchain-Based Security
4.5.4. Standardization and Interoperability
5. Concluding Remarks
5.1. Conclusions
5.2. Limitations and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Malik, P.K.; Sharma, R.; Singh, R.; Gehlot, A.; Satapathy, S.C.; Alnumay, W.S.; Pelusi, D.; Ghosh, U.; Nayak, J. Industrial Internet of Things and its applications in industry 4.0: State of the art. Comput. Commun. 2021, 166, 125–139. [Google Scholar] [CrossRef]
- Yousefpour, A.; Fung, C.; Nguyen, T.; Kadiyala, K.; Jalali, F.; Niakanlahiji, A.; Kong, J.; Jue, J.P. All one needs to know about fog computing and related edge computing paradigms: A complete survey. J. Syst. Archit. 2019, 98, 289–330. [Google Scholar] [CrossRef]
- Miller, M. The Internet of Things: How Smart TVs, Smart Cars, Smart Homes, and Smart Cities Are Changing the World; Pearson Education: London, UK, 2015. [Google Scholar]
- Memić, B.; Džubur, A.H.; Avdagić-Golub, E. Green IoT: Sustainability environment and technologies. Sci. Eng. Technol. 2022, 2, 24–29. [Google Scholar] [CrossRef]
- Georgakopoulos, D.; Jayaraman, P.P. Internet of things: From internet scale sensing to smart services. Computing 2016, 98, 1041–1058. [Google Scholar] [CrossRef]
- Harrop, P. Battery Elimination in Electronics and Electrical Engineering 2018–2028; IDTechEx: Cambridge, UK, 2017. [Google Scholar]
- Mrozik, W.; Rajaeifar, M.A.; Heidrich, O.; Christensen, P. Environmental impacts, pollution sources and pathways of spent lithium-ion batteries. Energy Environ. Sci. 2021, 14, 6099–6121. [Google Scholar] [CrossRef]
- Raj, A.; Steingart, D. Power sources for the internet of things. J. Electrochem. Soc. 2018, 165, B3130. [Google Scholar] [CrossRef]
- Tien, J.M. Internet of things, real-time decision making, and artificial intelligence. Ann. Data Sci. 2017, 4, 149–178. [Google Scholar] [CrossRef]
- Stellios, I.; Kotzanikolaou, P.; Psarakis, M.; Alcaraz, C.; Lopez, J. A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services. IEEE Commun. Surv. Tutor. 2018, 20, 3453–3495. [Google Scholar] [CrossRef]
- Puschmann, D.; Barnaghi, P.; Tafazolli, R. Adaptive Clustering for Dynamic IoT Data Streams. IEEE Internet Things J. 2017, 4, 64–74. [Google Scholar] [CrossRef]
- Ullah, R.; Ahmed, S.H.; Kim, B.S. Information-centric networking with edge computing for IoT: Research challenges and future directions. IEEE Access 2018, 6, 73465–73488. [Google Scholar] [CrossRef]
- Chen, M.; Wan, J.; Li, F. Machine-to-machine communications: Architectures, standards and applications. Ksii Trans. Internet Inf. Syst. 2012, 6, 480–497. [Google Scholar] [CrossRef]
- Gaidajis, G.; Angelakoglou, K.; Aktsoglou, D. E-waste: Environmental problems and current management. J. Eng. Sci. Technol. Rev. 2010, 3, 193–199. [Google Scholar] [CrossRef]
- McKay, K.; Bassham, L.; Sönmez Turan, M.; Mouha, N. Report on Lightweight Cryptography; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2016. [Google Scholar]
- Lee, I.; Lee, K. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Bus. Horiz. 2015, 58, 431–440. [Google Scholar] [CrossRef]
- Qiu, T.; Chen, N.; Li, K.; Atiquzzaman, M.; Zhao, W. How can heterogeneous internet of things build our future: A survey. IEEE Commun. Surv. Tutor. 2018, 20, 2011–2027. [Google Scholar] [CrossRef]
- Al-Masri, E.; Kalyanam, K.R.; Batts, J.; Kim, J.; Singh, S.; Vo, T.; Yan, C. Investigating messaging protocols for the Internet of Things (IoT). IEEE Access 2020, 8, 94880–94911. [Google Scholar] [CrossRef]
- Erdinc, O.; Vural, B.; Uzunoglu, M. A dynamic lithium-ion battery model considering the effects of temperature and capacity fading. In Proceedings of the 2009 International Conference on Clean Electrical Power 2009, Capri, Italy, 9–11 June 2009; IEEE: New York, NY, USA, 2009; pp. 383–386. [Google Scholar]
- Azari, A.; Stefanović, Č.; Popovski, P.; Cavdar, C. On the Latency-Energy Performance of NB-IoT Systems in Providing Wide-Area IoT Connectivity. IEEE Trans. Green Commun. Netw. 2020, 4, 57–68. [Google Scholar] [CrossRef]
- Al-Janabi, T.A.; Al-Raweshidy, H.S. An Energy Efficient Hybrid MAC Protocol With Dynamic Sleep-Based Scheduling for High Density IoT Networks. IEEE Internet Things J. 2019, 6, 2273–2287. [Google Scholar] [CrossRef]
- Chulde, C.H.; Cantero, J.P. Internet of Things implementation with nodes based on low-power microcontroller MSP430. In Proceedings of the 2017 International Conference on Information Systems and Computer Science (INCISCOS), Quito, Ecuador, 23–25 November 2017; IEEE: New York, NY, USA, 2017; pp. 33–40. [Google Scholar]
- Sanislav, T.; Mois, G.D.; Zeadally, S.; Folea, S.C. Energy harvesting techniques for internet of things (IoT). IEEE Access 2021, 9, 39530–39549. [Google Scholar] [CrossRef]
- Kaur, N.; Sood, S.K. An Energy-Efficient Architecture for the Internet of Things (IoT). IEEE Syst. J. 2017, 11, 796–805. [Google Scholar] [CrossRef]
- Kim, N.; Austin, T.; Baauw, D.; Mudge, T.; Flautner, K.; Hu, J.; Irwin, M.; Kandemir, M.; Narayanan, V. Leakage current: Moore’s law meets static power. Computer 2003, 36, 68–75. [Google Scholar] [CrossRef]
- Jiang, H.; Marek-Sadowska, M.; Nassif, S. Benefits and costs of power-gating technique. In Proceedings of the 2005 International Conference on Computer Design, San Jose, CA, USA, 2–5 October 2005; IEEE: New York, NY, USA, 2005; pp. 559–566. [Google Scholar] [CrossRef]
- Zhuo, C.; Luo, S.; Gan, H.; Hu, J.; Shi, Z. Noise-Aware DVFS for Efficient Transitions on Battery-Powered IoT Devices. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2020, 39, 1498–1510. [Google Scholar] [CrossRef]
- Dunkels, A.; Gronvall, B.; Voigt, T. Contiki—A lightweight and flexible operating system for tiny networked sensors. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, Tampa, FL, USA, 16–18 November 2004; IEEE: New York, NY, USA, 2004; pp. 455–462. [Google Scholar] [CrossRef]
- Santana, T.V.; Galindo-Serrano, A.; Sayrac, B.; López, S.M. Dynamic network configuration: Hotspot identification for Virtual Small Cells. In Proceedings of the 2016 International Symposium on Wireless Communication Systems (ISWCS), Poznan, Poland, 20–23 September 2016; IEEE: New York, NY, USA, 2016; pp. 49–53. [Google Scholar] [CrossRef]
- Gomez, C.; Oller, J.; Paradells, J. Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. Sensors 2012, 12, 11734–11753. [Google Scholar] [CrossRef]
- Mekki, K.; Bajic, E.; Chaxel, F.; Meyer, F. A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 2019, 5, 1–7. [Google Scholar] [CrossRef]
- Qiao, L.; Zheng, Z.; Cui, W.; Wang, L. A survey on WiFi HaLow technology for Internet of Things. In Proceedings of the 2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, China, 20–22 October 2018; IEEE: New York, NY, USA, 2018; pp. 1–5. [Google Scholar]
- Adame, T.; Bel, A.; Bellalta, B.; Barcelo, J.; Oliver, M. IEEE 802.11AH: The WiFi approach for M2M communications. IEEE Wirel. Commun. 2014, 21, 144–152. [Google Scholar] [CrossRef]
- Gambier, P.; Anton, S.; Kong, N.; Erturk, A.; Inman, D. Piezoelectric, solar and thermal energy harvesting for hybrid low-power generator systems with thin-film batteries. Meas. Sci. Technol. 2011, 23, 015101. [Google Scholar] [CrossRef]
- Wu, J.; Tran, N.K. Application of blockchain technology in sustainable energy systems: An overview. Sustainability 2018, 10, 3067. [Google Scholar] [CrossRef]
- Wood, A.D.; Stankovic, J.A. Denial of service in sensor networks. Computer 2002, 35, 54–62. [Google Scholar] [CrossRef]
- Osanaiye, O.; Choo, K.K.R.; Dlodlo, M. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 2016, 67, 147–165. [Google Scholar] [CrossRef]
- Zargar, S.T.; Joshi, J.; Tipper, D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 2013, 15, 2046–2069. [Google Scholar] [CrossRef]
- Sacramento, L.; Medeiros, I.; Bota, J.; Correia, M. Flowhacker: Detecting unknown network attacks in big traffic data using network flows. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing Additionally, Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; IEEE: New York, NY, USA, 2018; pp. 567–572. [Google Scholar]
- Groza, B.; Minea, M. Formal modelling and automatic detection of resource exhaustion attacks. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, 22–24 March 2011; Association for Computing Machinery: New York, NY, USA, 2011; pp. 326–333. [Google Scholar]
- Mansfield-Devine, S. The evolution of DDoS. Comput. Fraud Secur. 2014, 2014, 15–20. [Google Scholar] [CrossRef]
- Janes, B.; Crawford, H.; OConnor, T. Never ending story: Authentication and access control design flaws in shared IoT devices. In Proceedings of the 2020 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 21 May 2020; IEEE: New York, NY, USA, 2020; pp. 104–109. [Google Scholar]
- Bagga, M.; Thakral, P.; Bagga, T. A Study on IoT: Model, Communication Protocols, Security Hazards & Countermeasures. In Proceedings of the 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, India, 20–22 December 2018; IEEE: New York, NY, USA, 2018; pp. 591–598. [Google Scholar]
- Bakhshi, T.; Ghita, B.; Kuzminykh, I. A Review of IoT Firmware Vulnerabilities and Auditing Techniques. Sensors 2024, 24, 708. [Google Scholar] [CrossRef] [PubMed]
- Albalawi, A.; Almrshed, A.; Badhib, A.; Alshehri, S. A Survey on Authentication Techniques for the Internet of Things. In Proceedings of the 2019 International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 3–4 April 2019; IEEE: New York, NY, USA, 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Shivraj, V.; Rajan, M.; Singh, M.; Balamuralidhar, P. One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In Proceedings of the 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), Riyadh, Saudi Arabia, 17–19 February 2015; IEEE: New York, NY, USA, 2015; pp. 1–6. [Google Scholar]
- Sidhu, S.; Mohd, B.J.; Hayajneh, T. Hardware security in IoT devices with emphasis on hardware trojans. J. Sens. Actuator Netw. 2019, 8, 42. [Google Scholar] [CrossRef]
- Mavrovouniotis, S.; Ganley, M. Hardware security modules. In Secure Smart Embedded Devices, Platforms and Applications; Springer: Berlin/Heidelberg, Germany, 2013; pp. 383–405. [Google Scholar]
- Raymundo Belleza, R.; de Freitas Pignaton, E. Performance study of real-time operating systems for internet of things devices. IET Softw. 2018, 12, 176–182. [Google Scholar] [CrossRef]
- Liu, Y.; Briones, J.; Zhou, R.; Magotra, N. Study of secure boot with a FPGA-based IoT device. In Proceedings of the 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), Boston, MA, USA, 6–9 August 2017; IEEE: New York, NY, USA, 2017; pp. 1053–1056. [Google Scholar]
- Simon, T.; Batina, L.; Daemen, J.; Grosso, V.; Massolino, P.M.C.; Papagiannopoulos, K.; Regazzoni, F.; Samwel, N. Friet: An authenticated encryption scheme with built-in fault detection. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques 2020, Zagreb, Croatia, 10–14 May 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 581–611. [Google Scholar]
- Zhao, S.; Zhang, Q.; Qin, Y.; Feng, W.; Feng, D. Sectee: A software-based approach to secure enclave architecture using tee. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 1723–1740. [Google Scholar]
- Arthur, W.; Challener, D.; Goldman, K. A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security; Springer Nature: Berlin, Germany, 2015. [Google Scholar]
- Al Fardan, N.J.; Paterson, K.G. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 19–22 May 2013; IEEE: New York, NY, USA, 2013; pp. 526–540. [Google Scholar] [CrossRef]
- Freier, A.; Karlton, P.; Kocher, P. The Secure Sockets Layer (SSL) Protocol Version 3.0. Technical Report. 2011. Available online: https://www.rfc-editor.org/rfc/rfc6101.html (accessed on 1 March 2024).
- Durumeric, Z.; Kasten, J.; Bailey, M.; Halderman, J.A. Analysis of the HTTPS certificate ecosystem. In Proceedings of the 2013 Conference on Internet Measurement Conference, Barcelona, Spain, 23–25 October 2013; Association for Computing Machinery: New York, NY, USA, 2013; pp. 291–304. [Google Scholar]
- Sicari, S.; Rizzardi, A.; Grieco, L.A.; Coen-Porisini, A. Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. 2015, 76, 146–164. [Google Scholar] [CrossRef]
- Tian, Y.; Xu, K.; Ansari, N. TCP in wireless environments: Problems and solutions. IEEE Commun. Mag. 2005, 43, S27–S32. [Google Scholar] [CrossRef]
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Shif, L.; Wang, F.; Lung, C.H. Improvement of security and scalability for IoT network using SD-VPN. In Proceedings of the NOMS 2018—2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; IEEE: New York, NY, USA, 2018; pp. 1–5. [Google Scholar] [CrossRef]
- Butun, I.; Morgera, S.D.; Sankar, R. A Survey of Intrusion Detection Systems in Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2014, 16, 266–282. [Google Scholar] [CrossRef]
- Liao, H.J.; Richard Lin, C.H.; Lin, Y.C.; Tung, K.Y. Intrusion detection system: A comprehensive review. J. Netw. Comput. Appl. 2013, 36, 16–24. [Google Scholar] [CrossRef]
- Bhatt, S.; Manadhata, P.K.; Zomlot, L. The Operational Role of Security Information and Event Management Systems. IEEE Secur. Priv. 2014, 12, 35–41. [Google Scholar] [CrossRef]
- Samrin, R.; Vasumathi, D. Review on anomaly based network intrusion detection system. In Proceedings of the 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), Mysuru, India, 15–16 December 2017; IEEE: New York, NY, USA, 2017; pp. 141–147. [Google Scholar] [CrossRef]
- Frahim, J.; Santos, O.; Ossipov, A. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance; Pearson Education: London, UK, 2014. [Google Scholar]
- Kwon, S.; Choi, H.K. Evolution of WiFi Protected Access: Security Challenges. IEEE Consum. Electron. Mag. 2021, 10, 74–81. [Google Scholar] [CrossRef]
- Meng, N.; Nagy, S.; Yao, D.; Zhuang, W.; Argoty, G.A. Secure coding practices in java: Challenges and vulnerabilities. In Proceedings of the 40th International Conference on Software Engineering, Gothenburg, Sweden, 27 May–3 June 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 372–383. [Google Scholar]
- Hatzivasilis, G. Password-hashing status. Cryptography 2017, 1; Molecular Diversity Preservation International (MDPI): Basel, Switzerland, 2017; p. 10. [Google Scholar]
- Smirnov, A.; Chiueh, T.C. Automatic patch generation for buffer overflow attacks. In Proceedings of the Third International Symposium on Information Assurance and Security, Manchester, UK, 29–31 August 2007; IEEE: New York, NY, USA, 2007; pp. 165–170. [Google Scholar]
- Meneely, A.; Tejeda, A.C.R.; Spates, B.; Trudeau, S.; Neuberger, D.; Whitlock, K.; Ketant, C.; Davis, K. An empirical investigation of socio-technical code review metrics and security vulnerabilities. In Proceedings of the 6th International Workshop on Social Software Engineering, Hong Kong, China, 17 November 2014; Association for Computing Machinery: New York, NY, USA, 2014; pp. 37–44. [Google Scholar]
- Fonseca, J.; Vieira, M. A survey on secure software development lifecycles. In Software Development Techniques for Constructive Information Systems Design; IGI Global: Hershey, PA, USA, 2013; pp. 57–73. [Google Scholar]
- Schumacher, M. Security Engineering with Patterns: Origins, Theoretical Models, and New Applications; Springer Science & Business Media: Berlin, Germany, 2003; Volume 2754. [Google Scholar]
- Schagen, N.; Koning, K.; Bos, H.; Giuffrida, C. Towards automated vulnerability scanning of network servers. In Proceedings of the 11th European Workshop on Systems Security, Porto, Portugal, 23–26 April 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 1–6. [Google Scholar]
- Casey, E.; Stellatos, G.J. The impact of full disk encryption on digital forensics. ACM SIGOPS Oper. Syst. Rev. 2008, 42, 93–98. [Google Scholar] [CrossRef]
- Shmueli, E.; Vaisenberg, R.; Gudes, E.; Elovici, Y. Implementing a database encryption solution, design and implementation issues. Comput. Secur. 2014, 44, 33–50. [Google Scholar] [CrossRef]
- Ometov, A.; Petrov, V.; Bezzateev, S.; Andreev, S.; Koucheryavy, Y.; Gerla, M. Challenges of multi-factor authentication for securing advanced IoT applications. IEEE Netw. 2019, 33, 82–88. [Google Scholar] [CrossRef]
- Siriwardena, P. Advanced API Security; Apress: New York, NY, USA, 2014. [Google Scholar]
- Sidorov, V.; Ng, W.K. Transparent data encryption for data-in-use and data-at-rest in a cloud-based database-as-a-service solution. In Proceedings of the 2015 IEEE World Congress on Services, New York, NY, USA, 27 June–2 July 2015; IEEE: New York, NY, USA, 2015; pp. 221–228. [Google Scholar]
- Ghouse, M.; Nene, M.J.; Vembuselvi, C. Data leakage prevention for data in transit using artificial intelligence and encryption techniques. In Proceedings of the 2019 International Conference on Advances in Computing, Communication and Control (ICAC3), Mumbai, India, 20–21 December 2019; IEEE: New York, NY, USA, 2019; pp. 1–6. [Google Scholar]
- He, W.; Golla, M.; Padhi, R.; Ofek, J.; Dürmuth, M.; Fernandes, E.; Ur, B. Rethinking Access Control and Authentication for the Home Internet of Things ({{{{{IoT}}}}}). In Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA, 15–17 August 2018; USENIX Association: Berkeley, CA, USA, 2018; pp. 255–272. [Google Scholar]
- Sandhu, R.S. Role-based access control. In Advances in Computers; Elsevier: Amsterdam, The Netherlands, 1998; Volume 46, pp. 237–286. [Google Scholar]
- Mao, B.; Kawamoto, Y.; Liu, J.; Kato, N. Harvesting and threat aware security configuration strategy for IEEE 802.15. 4 based IoT networks. IEEE Commun. Lett. 2019, 23, 2130–2134. [Google Scholar] [CrossRef]
- Xie, W.; Jiang, Y.; Tang, Y.; Ding, N.; Gao, Y. Vulnerability detection in iot firmware: A survey. In Proceedings of the 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS), Shenzhen, China, 15–17 December 2017; IEEE: New York, NY, USA, 2017; pp. 769–772. [Google Scholar]
- Nilsson, D.K.; Larson, U.E. Secure firmware updates over the air in intelligent vehicles. In Proceedings of the ICC Workshops-2008 IEEE International Conference on Communications Workshops, Beijing, China, 19–23 May 2008; IEEE: New York, NY, USA, 2008; pp. 380–384. [Google Scholar]
- Mugarza, I.; Flores, J.L.; Montero, J.L. Security issues and software updates management in the industrial internet of things (iiot) era. Sensors 2020, 20, 7160. [Google Scholar] [CrossRef]
- Okhravi, H.; Nicol, D. Evaluation of patch management strategies. Int. J. Comput. Intell. Theory Pract. 2008, 3, 109–117. [Google Scholar]
- Schlette, D.; Caselli, M.; Pernul, G. A comparative study on cyber threat intelligence: The security incident response perspective. IEEE Commun. Surv. Tutor. 2021, 23, 2525–2556. [Google Scholar] [CrossRef]
- Shinde, N.; Kulkarni, P. Cyber incident response and planning: A flexible approach. Comput. Fraud Secur. 2021, 2021, 14–19. [Google Scholar] [CrossRef]
- Neisse, R.; Steri, G.; Baldini, G. Enforcement of security policy rules for the internet of things. In Proceedings of the 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca, Cyprus, 8–10 October 2014; IEEE: New York, NY, USA, 2014; pp. 165–172. [Google Scholar]
- Usman, M.; Ahmed, I.; Aslam, M.I.; Khan, S.; Shah, U.A. SIT: A lightweight encryption algorithm for secure internet of things. arXiv 2017, arXiv:1704.08688. [Google Scholar] [CrossRef]
- Monrat, A.A.; Schelén, O.; Andersson, K. A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access 2019, 7, 117134–117151. [Google Scholar] [CrossRef]
- Ekanayake, V.; Kelly IV, C.; Manohar, R. An ultra low-power processor for sensor networks. In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, Boston, MA, USA, 7–13 October 2004; Association for Computing Machinery: New York, NY, USA, 2004; pp. 27–36. [Google Scholar]
- Li, T.; Zhang, J.; Obaidat, M.S.; Lin, C.; Lin, Y.; Shen, Y.; Ma, J. Energy-efficient and secure communication toward UAV networks. IEEE Internet Things J. 2021, 9, 10061–10076. [Google Scholar] [CrossRef]
- Thakor, V.A.; Razzaque, M.A.; Khandaker, M.R. Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities. IEEE Access 2021, 9, 28177–28193. [Google Scholar] [CrossRef]
- Potlapally, N.R.; Ravi, S.; Raghunathan, A.; Jha, N.K. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mob. Comput. 2005, 5, 128–143. [Google Scholar] [CrossRef]
- Nawrocki, P.; Sniezynski, B.; Kolodziej, J.; Szynkiewicz, P. Adaptive context-aware energy optimization for services on mobile devices with use of machine learning considering security aspects. In Proceedings of the 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), Melbourne, VIC, Australia, 11–14 May 2020; IEEE: New York, NY, USA, 2020; pp. 708–717. [Google Scholar] [CrossRef]
- Dini, P.; Elhanashi, A.; Begni, A.; Saponara, S.; Zheng, Q.; Gasmi, K. Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity. Appl. Sci. 2023, 13, 7507. [Google Scholar] [CrossRef]
- McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; y Arcas, B.A. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the Artificial Intelligence and Statistics, Fort Lauderdale, FL, USA, 20–22 April 2017; pp. 1273–1282. [Google Scholar]
- Sultan, I.; Mir, B.J.; Banday, M.T. Analysis and Optimization of Advanced Encryption Standard for the Internet of Things. In Proceedings of the 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 27–28 February 2020; IEEE: New York, NY, USA, 2020; pp. 571–575. [Google Scholar]
- Ahtsham, M.; Yan, H.Y.; Ali, U. IoT based door lock surveillance system using cryptographic algorithms. In Proceedings of the 2019 IEEE 16th International Conference on Networking, Sensing and Control (ICNSC), Banff, AB, Canada, 9–11 May 2019; IEEE: New York, NY, USA, 2019; pp. 448–453. [Google Scholar]
- Hutchinson, S.; Stanković, M.; Ho, S.; Houshmand, S.; Karabiyik, U. Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS. J. Cybersecur. Priv. 2023, 3, 145–165. [Google Scholar] [CrossRef]
- Chi, Q.; Yan, H.; Zhang, C.; Pang, Z.; Da Xu, L. A reconfigurable smart sensor interface for industrial WSN in IoT environment. IEEE Trans. Ind. Inform. 2014, 10, 1417–1425. [Google Scholar]
- Ramos, J.L.H.; Bernabe, J.B.; Skarmeta, A.F. Managing context information for adaptive security in IoT environments. In Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangiu, Republic of Korea, 24–27 March 2015; IEEE: New York, NY, USA, 2015; pp. 676–681. [Google Scholar]
- Ferrag, M.A.; Shu, L. The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial. IEEE Internet Things J. 2021, 8, 17236–17260. [Google Scholar] [CrossRef]
- Bakhouyi, A.; Dehbi, R.; Talea, M.; Hajoui, O. Evolution of standardization and interoperability on E-learning systems: An overview. In Proceedings of the 2017 16th International Conference on Information Technology Based Higher Education and Training (ITHET), Ohrid, Macedonia, 10–12 July 2017; IEEE: New York, NY, USA, 2017; pp. 1–8. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
He, P.; Zhou, Y.; Qin, X. A Survey on Energy-Aware Security Mechanisms for the Internet of Things. Future Internet 2024, 16, 128. https://doi.org/10.3390/fi16040128
He P, Zhou Y, Qin X. A Survey on Energy-Aware Security Mechanisms for the Internet of Things. Future Internet. 2024; 16(4):128. https://doi.org/10.3390/fi16040128
Chicago/Turabian StyleHe, Peixiong, Yi Zhou, and Xiao Qin. 2024. "A Survey on Energy-Aware Security Mechanisms for the Internet of Things" Future Internet 16, no. 4: 128. https://doi.org/10.3390/fi16040128
APA StyleHe, P., Zhou, Y., & Qin, X. (2024). A Survey on Energy-Aware Security Mechanisms for the Internet of Things. Future Internet, 16(4), 128. https://doi.org/10.3390/fi16040128