Smart City Gnosys

Smart city article details

Title A Survey For Security Of Iot Wireless Protocols; [物联网无线协议安全综述]
ID_Doc 5123
Authors Zhang W.; Zeng F.; Tao Y.; Li X.
Year 2022
Published Journal of Cyber Security, 7, 2
DOI http://dx.doi.org/10.19363/J.cnki.cn10-1380/tn.2022.03.04
Abstract In recent years, with the rapid development of the Internet of Things, its application scenarios have covered smart home, smart city, smart medical treatment, smart industry and smart agriculture. Compared with traditional Ethernet, the Internet of Things can combine various sensing devices with the network to realize the interconnection of people, computers and objects. Various IoT protocols are the keys to realize the interconnection of Internet of Things devices. IoT protocols occupy different protocol stacks, which make the IoT protocols show different characteristics. At present, ZigBee, BLE, Wi-Fi, LoRa, RFID and so on are widely used. These IoT protocols can be applied to different application scenarios according to their own characteristics. For example, LoRa is widely used in LPWAN and RFID is used for device recognition. However, as IoT end devices only occupy limited computing and storage resources, it is impossible to implement a complete security algorithm for them. Many IoT protocols balance their power consumption and security, so it is necessary to evaluate the security of IoT protocols. This paper describes the security capabilities of these Internet of Things protocols, including the rules of IoT protocols implemented in protecting confidentiality, integrity and identity authentication. Then we analyze the security problems of each protocol from the common wireless protocol attacks, including eavesdropping attack, replay attack, battery depletion and RF interference. We analyze the IoT protocols' behaviors while facing these wireless attacks. Besides, we compare some common IoT protocols on security properties and reactions while facing attacks and we conclude relevant research works about IoT protocols' security. At the end of this paper, we prospect and summarize the development direction of Internet of Things protocol security, and believe that it is an effective method to improve the security of IoT protocols by combining formal verification, lightweight encryption technology and blockchain technology. © 2022, China Science Publishing & Media LTD. All right reserved.
Author Keywords Attack; BLE; The Internet of Things; Wireless protocol; ZigBee


Similar Articles


Id Similarity Authors Title Published
32963 View0.877Dargaoui S.; Azrour M.; El Allaoui A.; Guezzaz A.; Alabdulatif A.; Alnajim A.Internet Of Things Authentication Protocols: Comparative StudyComputers, Materials and Continua, 79, 1 (2024)
4954 View0.872Vidwans A.; Ramaiya M.A Study And Comparison Of Cryptographic Mechanisms On Data Communication In Internet Of Things (Iot) Network And DevicesLecture Notes in Networks and Systems, 894 (2024)
47964 View0.871Cynthia J.; Parveen Sultana H.; Saroja M.N.; Senthil J.Security Protocols For IotStudies in Big Data, 47 (2019)
5129 View0.869Mohammad Z.; Abusukhon A.; Qattam T.A.A Survey Of Authenticated Key Agreement Protocols For Securing Iot2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2019 - Proceedings (2019)
53792 View0.869Nishandhi S.; Vidhya J.; Ragasudha I.; Vishnupriya M.Survey On Various Iot Standard Protocols And Its Applications2020 International Conference on System, Computation, Automation and Networking, ICSCAN 2020 (2020)
53786 View0.867Rakshe A.; Dongre N.Survey On Security Protocols For Iot2024 IEEE 9th International Conference for Convergence in Technology, I2CT 2024 (2024)
47934 View0.865Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
12631 View0.864Patel O.; Patel H.Blockchain-Based Mechanisms To Address Iot Security Issues: A ReviewLecture Notes on Data Engineering and Communications Technologies, 52 (2021)
27240 View0.863Vaishnav J.; Thulasiram R.; Kumar R.; Pandey P.From Protocols To Countermeasures: A Comprehensive Survey Into Iot SafetyMultidisciplinary Reviews, 6 (2023)
47612 View0.861Kiran P.; Shilpa S.Secure Communication Protocols For The IotSecure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation (2024)