The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the critical infrastructure is more vulnerable than ever to cyber threats, whether state sponsored, criminal groups or individuals. As the number of interconnected devices increases, the number of potential access points for hackers to disrupt critical infrastructure grows. This new attack surface emerges from fundamental changes in the critical infrastructure of organizations technology systems. This paper aims to improve understanding the challenges to secure future digital infrastructure while it is still evolving. After introducing the infrastructure generating big data, the functionality-based fog architecture is defined. In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed of smart ubiquitous objects that are seamlessly connected to the Internet. These objects are deployed as Low power and Lossy Networks (LLN) to provide innovative services in various application domains such as smart cities, smart health, and smart communities. The LLN is a form of a network where the interconnected devices are highly resource-constrained (i.e., power, memory, and processing) and characterized by high loss rates, low data rates, and instability in the communication links. Additionally, IoT devices produce a massive amount of confidential and security-sensitive data. Various cryptographic-based techniques exist that can effectively cope with security attacks but are not suitable for IoT as they incur high consumption of resources (i.e., memory, storage and processing). One way to address this problem is by offloading the additional security-related operations to a more resourceful entity such as a fog-based node. Generally, fog computing enables security and analysis of latency-sensitive data directly at the network’s edge. This paper proposes a novel Fog Security Service (FSS) to provide end-to-end security at the fog layer for IoT devices using two well-established cryptographic schemes, identity-based encryption, and identity-based signature. The FSS provides security services such as authentication, confidentiality, and non-repudiation. The proposed architecture would be implemented and evaluated in an OPNET simulator using a single network topology with different traffic loads. The FSS performed better when compared with the APaaS and the legacy method.
A multitude of smart things and wirelessly connected Sensor Nodes (SNs) have pervasively facilitated the use of smart applications in every domain of life. Along with the bounties of smart things and applications, there are hazards of external and internal attacks. Unfortunately, mitigating internal attacks is quite challenging, where network lifespan (w.r.t. energy consumption at node level), latency, and scalability are the three main factors that influence the efficacy of security measures. Furthermore, most of the security measures provide centralized solutions, ignoring the decentralized nature of SN-powered Internet of Things (IoT) deployments. This paper presents an energy-efficient decentralized trust mechanism using a blockchain-based multi-mobile code-driven solution for detecting internal attacks in sensor node-powered IoT. The results validate the better performance of the proposed solution over existing solutions with 43.94% and 2.67% less message overhead in blackhole and greyhole attack scenarios, respectively. Similarly, the malicious node detection time is reduced by 20.35% and 11.35% in both blackhole and greyhole attacks. Both of these factors play a vital role in improving network lifetime.
Internet of Things (IoT) fostered a new epoch of innovation by interconnecting digital devices to make human life more convenient and attractive. These smart objects are largely deployed as low power and lossy networks (LLNs) and use routing protocol for LLNs (RPL) for routing. Unfortunately, it is extremely vulnerable to a large variety of external and internal attacks to cause devastating and calamitous effects. However, this article's scope revolves around internal attacks only, where nodes are already part of a legitimate network. Various trust-based mechanisms have been proposed to secure the RPL protocol from insider attackers. Existing trust mechanisms cause high energy depletion due to complex computation on the node level, which consequently decreases the performance of LLNs. Therefore, this article presents a novel hierarchical trust-based mechanism "CTrust-RPL" by assessing the trust of nodes based on their forwarding behaviors. This study ships complex trust-related computations to the higher layer, known as the controller, to save computational, storage, and energy resources at the node level. We also compare the proposed mechanism with a state-of-the-art technique called Sec-trust. Our mechanism demonstrates superior performance in detecting and isolating blackhole attacks. The results depict that CTrust-RPL detects and isolates 10% more malicious nodes than Sec-trust in the same time-lapse. The average packet loss ratio difference is less for our proposed mechanism, with 35% more energy efficiency. 1 INTRODUCTION Internet of Things (IoT) has become an essential part of our personal lives. It is emerging as an epoch of innovation, where devices belonging to digital and machine ecosystems are interconnected over the Internet to yield efficacy and convenience in academia, industries, and human lives. 1-3 Technologies like 5G and 6G enable the next generation of wireless communication systems in compliance with sophisticated techniques for security. 4,5 They support the huge IoT infrastructures, which can be defined as a link, management, and communication of a large number of smart and sensing things (also known as objects). These things are capable of interacting with each other, especially, for transferring information in a network. 6-8 They are largely deployed as low power and lossy networks (LLN). The LLN is a class of networks where Trans Emerging Tel Tech.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.