Secure Routing Challenges for Opportunistic Internet of Things

Secure Routing Challenges for Opportunistic Internet of Things

Nisha Kandhoul (Division of Information Technology, Netaji Subhas University of Technology, New Delhi, India) and Sanjay K. Dhurandher (Division of Information Technology, Netaji Subhas University of Technology, New Delhi, India)
Copyright: © 2020 |Pages: 24
DOI: 10.4018/978-1-7998-0373-7.ch006

Abstract

Internet of Things(IoT) is a technical revolution of the internet where users, computing systems, and daily objects having sensing abilities, collaborate to provide innovative services in several application domains. Opportunistic IoT(OppIoT)is an extension of the opportunistic networks that exploits the interactions between the human-based communities and the IoT devices to increase the network connectivity and reliability. In this context, the security and privacy requirements play a crucial role as the collected information is exposed to a wide unknown audience. An adaptable infrastructure is required to handle the intrinsic vulnerabilities of OppIoT devices, with limited resources and heterogeneous technologies. This chapter elaborates the security requirements, the possible threats, and the current work conducted in the field of security in OppIoT networks.
Chapter Preview
Top

Introduction

Internet of Things (IoT) (Atzori et al., 2010) is a global network of connected objects that can be accessed via internet. IoT network provides a system for collecting, analyzing and processing the data generated by the sensor-based devices. IoT embodies a huge number of technologies and connects a variety of things or devices via unique addressing approach and standard protocols are used for communication. These devices are capable of interaction with one another and cooperate with their neighbors for achieving certain common goals. It is an innovation for the future of communications and computing. The connected objects in IoT vary from a person with a heart monitor to any device with built-in-sensors, i.e. devices having IP address and having the capability of data collection and interchange over a network without any manual intervention. The technology embedded in these objects enable them to interact with the external environment and affects their decision making. The devices can be managed and controlled remotely because of their inherent capability of connecting to the internet. IoT devices interact among themselves by transmitting and gathering information, sensing the environmental parameters like temperature, pressure etc., thereby transmitting the same to other devices in their communication range for further processing and other actions. The future era of internet will support interactions among humans, human based societies and smart objects held by them.

The network connections can be broadly categorized into two types based on its topology: infrastructure-based connection and infrastructure-less connections that is, ad-hoc or opportunistic connection. The infrastructure-based connections use pre- established infrastructure like base stations, routers, access points and manage the data a centralized way. In contrast, infrastructure-less connections do not use any infrastructure and make use of short-range radio techniques like Bluetooth, RFID, Wi-Fi etc for building decentralized networks.

Opportunistic Networks (Pelusi et al., 2006) is a class of Delay Tolerant Networks (Fall, 2003) that perform routing of messages and data sharing by exploiting the human characteristics like mobility patterns, similarities among humans, their daily routines and interests. Opportunistic IoT(OppIoT) extends the concepts of Opportunistic networks by merging human users and their smart devices. OppIoT explores the social side of IoT networks whereby the data is shared among communities, formed on the basis of movement and opportunistic contacts between humans and their personal devices like mobile phones, wearable devices, vehicles etc. Figure 1 shows a basic OppIoT network comprising of some mobile devices, laptops, sensors and human beings.

Figure 1.

Opportunistic IoT

978-1-7998-0373-7.ch006.f01

The excessive heterogeneity of devices and vast scale of OppIoT (B. Guo et al., 2013) systems magnifies the security threats. User’s data are insecure as they are exposed to attacks from uncertified users or devices present across the network. In OppIoT based systems, securing the routing procedure is a challenging task as the packet travels across varying network topology and uniformity must be maintained while routing the packets between the source and the destination. Thus, dynamic prevention, detection and isolation for the attacks is required. In context of security, anonymity of users and data integrity and confidentiality, needs to be ensured. Also, for preventing unauthorized access to the system, authentication and authorization mechanisms need to be designed. Privacy requirements for OppIoT networks include both data protection and user’s personal information security. Thus, security and privacy of the routing process is very important and needs significant research contributions.

Complete Chapter List

Search this Book:
Reset