Abstract
With the development of 5G technology, Internet of Things (IoT) is proliferating and deeply integrated with our daily lives and industry productions. IoT applications in the 5G era generate massive connections, and this would bring about many security issues. In this paper, we first analyze security risks for massive IoT in the 5G era, then summarize related security policies and standards. Furthermore, we propose security requirements and measures for various layers, including sensor control equipment and IoT card, IoT network and transmission exchange, IoT business application and service, and IoT security management and operation. Next, we introduce the case of the cyber security monitoring platform, explain the security technology based on edge computing, and point out the related standards. Finally, we put forward suggestions on IoT security technology and standardization work, so as to promote the secure development of IoT in the 5G era.
Similar content being viewed by others
References
Schulz P, Matthe M, Klessig H (2017) Latency critical IoT applications in 5G: perspective on the Design of Radio Interface and Network Architecture. IEEE Commun Mag 55(2):70–78
Qiu Q, Du XT, Yu SQ et al (2020) Research on IoT security technology and standardization in the 5G era. International conference on security and privacy in new computing environments, pp. 77–90
Ahmad I, Kumar T, Liyanage M et al (2018) Overview of 5G security challenges and solutions. IEEE Commun Std Mag 2(1):36–43
Ahmad I, Kumar T, Liyanage M et al (2017) 5G security: analysis of threats and solutions. In: IEEE conference on standards for communications and networking (CSCN). IEEE Press
Huang Q, Yang C (2011) A lightweight RFID authenticate protocol based on smart SIM card. In: Proceedings of the 1st international conference on logistics, informatics and service science, pp 647–650. IEEE Press
He R, Zhao G, Chang C et al (2009) A PK-SIM card based end-to-end security framework for SMS. Comput Std Interfaces 31(4):629–641
Liu SL, Qiu Q, Zhao B et al (2020) 5G-based IoT security technology. In: Proceedings of 5G network innovation seminar, pp 119–123
TC 260 (2019) Communication security standards working group. White paper on Internet of Things security standardization
Neisse R, Steri G, Baldini G (2014) Enforcement of security policy rules for the Internet of Things. In: The 3rd international workshop on internet of things communications and technologies (IoT-CT), IEEE Press
Ministry of industry and information technology: accelerate the development of 5G and Internet of Things related industries, http://www.sohu.com/a/339209778_166680
Cao J, Yu P, Ma M et al (2019) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6(2):1561–1575
Popovski P, Trillingsgaard KF, Simeone O et al (2018) 5G wireless network slicing for eMBB, URLLC, and mMTC: a communication-theoretic view. IEEE Access 6:55765–55779
Bockelmann C, Pratas NK, Wunder G et al (2018) Towards massive connectivity support for scalable mMTC communications in 5G networks. IEEE Access 6:28969–28992
Chakrapani A (2017) Efficient resource scheduling for eMTC/NB-IoT communications in LTE Rel. 13. In: IEEE conference on standards for communications and networking (CSCN), pp 66–71. IEEE Press
ISO/IEC (2012) ISO/IEC 29192 Information Technology - Security Techniques - Lightweight Cryptography
ISO/IEC (2018) ISO/IEC 30141 Information Technology - Internet of Things Reference Architecture
Kafle V, Fukushima Y, Harai H (2016) Internet of Things standardization in ITU and prospective networking technologies. IEEE Commun Mag 54(9):43–49
ETSI (2019) ETSI releases first globally applicable standard for consumer IoT security. China Standardization
Sheng Z, Yang S, Yu Y et al (2016) A survey on the IETF protocol suite for the Internet of Things: standards, challenges, and opportunities. IEEE Wirel Commun 20(6):91–98
GB/T (2018) GB/T 37044-2018. Information Security Technology- Security Reference Model and Generic Requirements for Internet of Things
GB/T (2019) GB/T 22239–2019. Information Security Technology - Baseline for Classified Protection of Cybersecurity
YD/T (2012) YD/T 2437-2012. General Framework and Technical Requirements of IoT (Internet of Things)
YD/T (2018) YD/T 3331-2018. General Requirement for Cellular Narrowband Radio Access for Internet of Things (NB-IoT)
Lu H, Chen D, Fan B, Wang Y, Wu Y (2018) Standardization progress and case analysis of edge computing. J Comput Res Dev 55(3):487–511
ISO/IEC (2018) ISO/IEC 30141:2018. Internet of Things (IoT) - Reference Architecture
Wang D, Wang P, Wang C (2019) Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs. ACM Trans Cyber-Phys Syst. https://doi.org/10.1145/3325130(2019)
Wang C, Wang D, Tu Y, Xu G, Wang H (2020) Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans Depend Secure Comput. https://doi.org/10.1109/TDSC.2020.2974220
Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Inf 14(9):4081–4092
Xi Z, Qixuan Z (2018) Hierarchical caching for statistical QoS guaranteed multimedia transmissions over 5G edge computing mobile wireless networks. IEEE Wirel Commun 25(3):12–20
Li F, Chen J, Wang Z (2019) Wireless map reduce distributed computing. IEEE Trans Inf Theory 65(10):6101–6114
Cordelli E, Pennazza G, Sabatini M et al (2018) An open-source smart sensor architecture for edge computing in IoT applications
Burg A, Chattopadhyay A, Lam K (2018) Wireless communication and security issues for cyber-physical systems and the Internet-of-Things. Proc IEEE 106(1):38–60
Granjal J, Monteiro E, Silva J (2015) Security for the Internet of Things: A survey of existing protocols and open research issues IEEE Communications Surveys & Tutorials. IEEE Press
Alnoman A, Sharma SK, Ejaz W et al (2019) Emerging edge computing technologies for distributed IoT systems. IEEE Netw 99:1–8
Cai H, Xu L, Xu B et al (2014) IoT-Based configurable information service platform for product lifecycle management. IEEE Trans Ind Inf 10(2):1558–1567
Zhang K, Ni J, Yang K et al (2017) Security and privacy in smart city applications: challenges and solutions. IEEE Commun Mag 55(1):122–129
Song Y, Yau S, Yu R et al (2017) An approach to QoS-based task distribution in edge computing networks for IoT applications. In: IEEE international conference on edge computing. IEEE
Li J, Yu F, Deng G et al (2017) Industrial Internet: A Survey on the enabling technologies, applications, and challenges. IEEE Communications Surveys & Tutorials. IEEE Press
Joy J, Gerla M (2017) Internet of vehicles and autonomous connected car - privacy and security issues. In: International conference on computer communication & networks. IEEE Press
Li H, Ota K, Dong M (2018) Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE Netw 32(1):96–101
Gusev M, Dustdar S (2018) Going back to the roots—the evolution of edge computing. An IoT perspective. IEEE Internet Comput 22(2):5–15
Qiu T, Lu Y, Xia F et al (2016) ERGID: an efficient routing protocol for emergency response Internet of Things. J Netw Comput Appl 72:104
Rongrong X, Xiaochun Y, Zhiyu H (2019) Framework for risk assessment in cyber situational awareness. IET Inf Secur 13(2):149–156
Norrman K, Dubrova E (2016) Protecting IMSI and user privacy in 5G networks. In: EAI international conference on mobile multimedia communications. ICST
Li S, Xu L, Zhao S (2018) 5G internet of things: a survey. J Ind Inf Integr 10:1–9
Singh S, Sharma PK, Moon SY et al (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Hum Comput 4:1–18
Alizadeh M, Hassan WH, Zamani M et al (2013) Implementation and evaluation of lightweight encryption algorithms suitable for RFID. J Next Gen Inf Technol 4:65
An-Ping L, Ji-Min Y, Feng LI et al (2014) A comparative study of several lightweight encryption algorithms. Mod Electron Tech
Wang D, Wang P (2018) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Depend Secure Comput 15(4):708–722
Sivanathan A, Gharakheili H, Sivaraman V (2020) Managing IoT cyber-security using programmable telemetry and machine learning. IEEE Trans Netw Serv Manage 17(1):60–74
Bertino E (2020) IoT security a comprehensive life cycle framework. In: 2019 IEEE 5th international conference on collaboration and internet computing (CIC)
Rathore M, Ahmad A, Paul A et al (2016) Real-time medical emergency response system: exploiting IoT and big data for public health. J Med Syst 40(12):283
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, Fog et al. A survey and analysis of security threats and challenges. Fut Gen Comput Syst 78(2):680-698.
Pahl C, Ioini NE, Helmer S (2018) A decision framework for blockchain platforms for IoT and edge computing. In: International confernce on internet of things, big data & security
Li R, Zhou Z, Chen X et al (2019) Resource price-aware offloading for edge-cloud collaboration: a two-timescale online control approach. IEEE Trans Cloud Comput 99:1–1
Han Q, Yang S, Ren X et al (2020) Online learning for edge-cloud collaborative learning on heterogeneous edges with resource constraints. IEEE Commun Mag 58(5):49–55
Acknowledgements
The authors thank the anonymous reviewers for their invaluable comments. Ding Wang is the corresponding author. This paper was presented in part at the Proceeding of 3rd EAI International Conference on Security and Privacy in New Computing Environments (SPNCE 2020). This work is in part supported by Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Qiu, Q., Wang, D., Du, X. et al. Security Standards and Measures for Massive IoT in the 5G Era. Mobile Netw Appl 27, 392–403 (2022). https://doi.org/10.1007/s11036-021-01841-2
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-021-01841-2