On The Features and Challenges of Security and Privacy in Distributed Internet of Things. Computer Networks
On The Features and Challenges of Security and Privacy in Distributed Internet of Things. Computer Networks
On The Features and Challenges of Security and Privacy in Distributed Internet of Things. Computer Networks
Lopez, “On the features and challenges of security and privacy in distributed internet of things”, Computer Networks, vol.
57, pp. 22662279, 2013.
http://doi.org/10.1016/j.comnet.2012.12.018
NICS Lab. Publications: https://www.nics.uma.es/publications
Abstract
In the Internet of Things, services can be provisioned using centralized ar-
chitectures, where central entities acquire, process, and provide information.
Alternatively, distributed architectures, where entities at the edge of the
network exchange information and collaborate with each other in a dynamic
way, can also be used. In order to understand the applicability and viabil-
ity of this distributed approach, it is necessary to know its advantages and
disadvantages – not only in terms of features but also in terms of security
and privacy challenges. The purpose of this paper is to show that the dis-
tributed approach has various challenges that need to be solved, but also
various interesting properties and strengths.
Keywords: Internet of Things, Distributed Architectures, Security
1. Introduction
The concept of the Internet of Things (IoT) has evolved over time [1, 2, 3].
Nevertheless, its core idea can be summarized in a sentence: ‘A worldwide
network of interconnected entities’. In most cases, these heterogeneous enti-
ties, ‘things’ (e.g. Human beings and computers, books and cars, appliances
and food) have a locatable, addressable, and readable counterpart on the
Internet. They can open a communication channel with any other entity,
providing and receiving services at any time, any place, and in any way.
Many technologies serve as the building blocks of this new paradigm, such as
2
2. A Distributed Internet of Things
2.1. Related Work: Government, Academia and Industry
The concept of a distributed IoT is not novel. In fact, various official
documents consider it as one of the possible strategies that can push the
dream of the IoT into the real world, and it has been explicitly mentioned that
the development of decentralized autonomic architectures and the location
of intelligence at the very edge of the networks are issues that need to be
addressed [2]. Still, some key questions have to be answered to make the most
of this strategy in the real world, such as the specific situations on which
the network intelligence should be distributed [1]. In order to answer these
questions, it is necessary to study the specific requirements of applications.
For example, whether an application needs support for distributed ownership
of data [3]. This and other issues that have been raised by these governmental
studies are being carefully considered by the research community.
There are various research articles that study different instances of dis-
tributed IoT architectures. For example, Gomez-Goiri et al. [6] combine the
concept of the web of things (using web protocols to implement the IoT)
with the concept of triple spaces (using semantic web techniques to exchange
knowledge in a distributed local shared space) to create a distributed envi-
ronment where devices located in two or more spaces can collaborate with
each other through Internet services. In another example, which follows a
more holistic point of view, Ning et al. [7] describe a heterogeneous system
known as U2IoT that comprises two subsystems: Unit IoTs, which are basic
local cells that provide solutions for special applications, and Ubiquitous IoT,
which comprises the different Unit IoTs plus other managers and controls the
collaboration between all entities.
There are also many research projects funded by various government
bodies that, directly or indirectly, are studying as of 2012 the needs of a
distributed IoT architecture. Precisely, one of these projects, IoT-A [8], is
aiming to provide an architectural reference model for the interoperability of
Internet of Things systems. Note that such a reference architecture does not
mandate how all entities should collaborate, or who should analyze the data
and provide the different services. Still, the communication model provides
the foundations for the creation of distributed applications, allowing digital
entities to directly connect and interact with other digital entities. Moreover,
the location of intelligence at the edge of the network is implicitly considered,
as digital entities range from simple devices to abstract entities made up of
3
various distributed devices. Therefore, its building blocks [9] could be used
in the future to create fully distributed IoT applications.
Some concrete building blocks, which can help to build a distributed IoT,
have been indirectly studied in other research projects. For example, the HY-
DRA project [10] developed an open source middleware that allows legacy
devices to provide web services over the Internet – directly or indirectly.
HYDRA also provides some tools that can be used to enable collaboration,
such as a device and service discovery interface. This interface can make
use of an ontology to describe the available services, achieving semantic
consistency. Another project, SENSEI [11], was more focused on provid-
ing a consistent interface to access the services of Wireless Sensor Networks
(WSN) islands. But it produced other relevant results, such as semantically-
enabled resource directories, and local management systems that benefit of
the existence of such directories. Finally, other projects, like CUBIQ [12]
and SMARTPRODUCTS [13], studied and developed various P2P-based dis-
tributed mechanisms, such as a distributed publish/subscribe system and a
distributed storage system.
Beyond theoretical research, there are numerous companies and start-ups
that are making use of cloud technologies to provide IoT services. The key
idea is that all edge devices and intranet of things will send their information
periodically to an application platform located in the cloud. This platform
stores all the data and provides specialized API interfaces that can be used
by 3rd parties to create their IoT applications. There are various approaches
for implementing these types of platforms: from closed environments where
even the sensors are controlled by the company [4] to more open platforms
that allow the integration of external devices and databases [5]. Most of
these solutions are completely centralized: edge systems act mainly as data
acquisition networks, and application platforms from different vendors are
not prepared to interact with each other. Yet there are some platforms that,
pursuing the idea of creating private and hybrid clouds, can be deployed
in a local environment [14]. These platforms not only enable the existence
of local intelligence but also can exchange information and services with
external systems, thus they can easily become instances of the distributed
IoT.
4
A) CENTRALIZED IOT B) COLLABORATIVE IOT
(MANUAL C ONFIG)
Data
Data/Info
Process
Data Process
Provide
5
the intelligence and the provisioning of services at the edge of the network
(edge intelligence), and ii) the collaboration between diverse entities in order
to achieve a common goal (collaboration). In fact, these two principles are
core elements in the construction of ‘decentralized systems’ and ‘distributed
systems’, respectively. In organizational theory, decentralized systems del-
egate the decision-making authority to entities located in the lower levels.
Such delegation can also allow the implementation of any decisions without
relying on the approval of high-level entities [15]. On the other hand, a dis-
tributed system consists of multiple entities that collaborate with each other
and appear to users as a single coherent system [16].
These two principles, edge intelligence and collaboration, can be used
to define a taxonomy of possible Distributed Internet of Things approaches,
which is presented below. Two of these approaches (collaborative IoT and
connected intranet of things) comply with only one of the principles, while
a “full” distributed IoT complies with both principles. We will also include
the definition of a centralized IoT for the sake of completeness.
(A) Centralized IoT. A Centralized Internet of Things (cf. Figure 1A) does
not provide any of the previously mentioned principles. In this scenario,
the data acquisition networks (i.e. networks of things such as mobile
phones, radiation sensors [17], cars, etc) are passive: their only task is
to provide data. All this data will be retrieved by a single central entity,
which will process it into information, combine it, and provide it to its
customers. Consequently, if users want to make use of IoT services,
they must connect through the Internet to the interfaces provided by
this central entity. Note that there are various strategies to implement
this approach. For example, the central entity can be instantiated using
a simple server or a cluster of devices forming a cloud (or even located
in the cloud itself, cf. solutions such as [4]). Also, its interfaces can
provide both raw and preprocessed data, enabling the creation of more
complex 3rd party services.
(B) Collaborative IoT. While in this approach the ‘intelligence’ of the net-
work is still located within the central entities (data acquisition networks
still behave as passive entities, users access the information through the
central entity interfaces), the main difference with a centralized IoT is
its compliance with the collaboration principle. As a result, there are
various central entities that can exchange data and/or information with
each other, generating new services or enriching existing ones (cf. Fig-
6
ure 1B). For example, IoT service providers that analyze the radiation
in the atmosphere of different cities can collaborate in order to provide
a snapshot of the radiation levels in the whole country.
(C) Connected Intranets of Things. In this approach, data acquisition net-
works (Intranets of Things) can actually process local information, and
also provide it not only to central entities but also to local and remote
users (cf. Figure 1C). However, there are no underlying mechanisms (e.g.
discovery services, ontologies) that facilitate the collaboration between
entities. As a result, the information mainly flows from the intranets to
a central entity, which will be able to provide a holistic point of view
of the whole system. For example, IoT-enabled hospitals need to access
the services of a central IoT entity to obtain global information (e.g.
overall bed occupancy). Note, however, that if the central entities fail,
the local services (e.g. the vital signs records of local patients) can still
be accessed.
(D) Distributed IoT. In this vision, all entities can have the ability to re-
trieve, process, combine, and provide information and services to other
entities (cf. Figure 1D). Intranet of things (ranging from personal area
networks (PAN) [18] to smart city infrastructures [19]) evolve from iso-
lated entities to fully interconnected systems, not only providing services
at a local level but also collaborating with each other and with other IoT
architectures towards common goals. Observe that it is also possible to
integrate higher-level cloud-based services or other centralized entities
(e.g. data repositories) within this architecture, but they are not re-
quired. Following the e-health example highlighted above, the IoT of a
hospital can interact with the IoT located in the household of a patient,
or even with the PANs of the personnel located inside the premises.
Moreover, all hospitals can easily collaborate so as to obtain the overall
bed occupancy.
7
approaches in order to measure their viability, even if the notion of a dis-
tributed IoT has been explicitly mentioned as one of the elements of the
Future Internet infrastructure [3, 2, 8]. For this analysis, we will use various
requirements and properties of IoT deployments that have been gathered
from existing reports and research documents. They are enumerated below:
• Security Issues. There are various security issues that must be consid-
ered in order to achieve a trusted and fault-tolerant IoT: how to protect
the communications? how to manage authentication and access control
in a world of billions of things? what about the privacy of the users,
and the security of the data generated by the things?
8
PRINCIPLES
PROP./REQ. CENTRALIZED IoT
(Collaboration) (Edge Intelligence)
Openness High (Simple) High (Multiple APIs)
Business Model Already in market Similar to hybrid clouds
Viability
Vendor Lock-in Possible More choices Access to data sources
Availability Zero if failure Partial if failure Local data if failure
Reliability
Performance Service level + Latency Distr. bandwidth Limited latency (local)
Scalability Limited to cloud resources Scalable Scalable at edge
Interoperability Simple Complex (global) Complex (raw)
Data Management Pull, Data at cloud Pull, Push (partial)
Table 1: Analysis of properties and requirements of the different distributed IoT principles
9
exchange between the different service providers, but the risk of bottleneck
decreases.
Regarding the advantages of the connected intranets of things ap-
proach (which follows the edge intelligence principle), while the risk of ven-
dor lock-in remains the same (i.e. a customer uses only one service provider
for a particular service), customers can still directly access the interfaces
provided by the intranets. This is also beneficial for the availability of the
services, as customers can still retrieve raw and processed data from the in-
tranets in case a problematic situation arises. There are also some minor
improvements in scalability, since the complexity of the central entities can
be simplified by delegating various processing tasks to the intranets. Note
that these advantages are mostly related to external customers (i.e. users
that access the information produced by various intranets through a central
entity), but this approach also provides specific benefits to local customers,
that is, users that make use of the specific local services of the intranet.
Firstly, users do not need to be connected to the Internet in order to obtain
relevant information about its surroundings. Secondly, in case of failure of
the central entities or the Internet connection, the local services are still avail-
able. Thirdly, the performance of local services is also improved, as services
are available through the local communication channels.
Both of the previous approaches also have some disadvantages that are
worth mentioning. Due to the interactions between various heterogeneous
devices and infrastructures (e.g. intranets providing interfaces to external
users, different service providers exchanging information), the underlying
mechanisms that are needed to achieve openness and interoperability (e.g.
ontologies, search and discovery, interfaces) are more complex and probably
need to be standardized.
Finally, although the distributed IoT approach combines most of the
advantages and disadvantages of the previous two approaches (superior scala-
bility, limited vendor lock-in, infrastructure complexity), there are some new
aspects that need to be explicitly mentioned. For example, in terms of data
management, the provisioning of data can follow the ‘push’ model (provide
only when it is needed), as it is not necessary to provide all data to a central
system. In terms of availability, the service uptime is more dependant on
how many resources are invested in maintaining the underlying IoT infras-
tructures, but a failure in one element of the infrastructure will not affect
the whole system. As for the business model, it might be less well-defined in
comparison to the model of a centralized IoT, but there are some approaches
10
that can be taken, such as maintenance fees or management of open source
(OSS) services.
All centralized and distributed approaches have their own advantages and
disadvantages; and in case of the distributed approaches, the challenges that
need to be solved are more numerous (e.g. locate and manage different APIs
from multiple and heterogeneous service providers, achieve semantic inter-
operability). Still, the partially distributed approaches, which comply either
with the collaboration or with the edge intelligence principle, provide sev-
eral interesting advantages such as better availability and higher scalability.
Moreover, the distributed IoT approach also allows diverse IoT entities to
cooperate even if no central systems are available, amongst other benefits.
Therefore, they can be seriously considered as an enabler of future IoT de-
ployments, such as remote healthcare management. Note that all approaches
are not mutually exclusive: central entities (e.g. data storage systems) can
coexist with distributed IoT entities (e.g. service providers) within the dis-
tributed IoT ecosystem.
There is one open question that must be answered, though. Security has
not been studied in this section, due to the need of analyzing its impact on
all approaches more thoroughly.
11
will interact with each other and with other entities, such as human beings
or virtual entities. And all these interactions must be secured somehow,
protecting the information and service provisioning of all relevant actors and
limiting the number of incidents that will affect the entire IoT.
However, protecting the Internet of Things is a complex and difficult
task. The number of attack vectors available to malicious attackers might
become staggering, as global connectivity (“access anyone”) and accessibility
(“access anyhow, anytime”) are key tenets of the IoT. The threats that can
affect the IoT entities are numerous, such as attacks that target diverse com-
munication channels, physical threats, denial of service, identity fabrication,
and others [21]. Finally, the inherent complexity of the IoT, where multiple
heterogeneous entities located in different contexts can exchange information
with each other, further complicates the design and deployment of efficient,
interoperable and scalable security mechanisms.
Some of the previously mentioned challenges, alongside with the security
mechanisms that should be integrated into the Internet of Things, have been
already enumerated by the research community [3, 22, 23]. They are as
follows:
• Heterogeneity has a great influence over the protocol and network
security services that must be implemented in the IoT. Constrained
devices will interact with various heterogeneous devices (e.g. other
constrained devices, full-fledged web servers) either directly or through
gateways. In this scenario, not only it is essential to implement efficient
cryptographic algorithms that can provide a high throughput even in
8-bit or 16-bit devices, but also to adapt or create lightweight secu-
rity protocols that offer an end-to-end secure communication channel.
These protocols require credentials, thus optimal key management sys-
tems must be implemented to distribute these credentials and to help
in establishing the necessary session keys between peers.
• The existence of billions of heterogeneous objects also affects iden-
tity management. Beyond defining the actual scope of ‘identity’ in
this context (e.g. underlying identity vs real identity, core identity
vs temporary identity), we also need to provide some mechanisms for
achieving universal authentication. Without authentication, it will not
be possible to assure that the data flow produced by a certain entity
contains what it is supposed to contain. Another important aspect re-
lated to authentication is authorization. If there is no access control
12
whatsoever, everything will be accessed by everyone, which is neither
viable nor realistic.
• The size and heterogeneity of the IoT also affects its trust and gov-
ernance. There are actually two dimensions of trust: a) trust in the
interaction between entities, where we have to deal with uncertainty
about the future actions of all collaborating entities, and b) trust in
the system from the point of view of the user, as users must be able
to manage their things so as to not feel under some unknown external
control. Regarding governance, it is a double-edged sword that must
be wielded with care. On the one hand, it offers stability, support for
political decisions, and the possibility to define common frameworks
and interoperability mechanisms. On the other hand, governance can
easily become excessive, fostering an over-controlled environment.
• The number of vulnerable systems and attacks vectors will surely in-
crease in the context of the IoT, thus fault tolerance becomes essen-
tial. Not only we must strive for security by default (robust implemen-
tations, usable systems, etc) in the IoT, but also we need to develop
awareness mechanisms that can be used to create the foundations of
intrusion detection and prevention mechanisms, which will help IoT
entities to protect or even gracefully degrade their services. Finally,
recovery services must be able to locate unsafe zones (i.e. zones af-
fected by attacks) and redirect the functionality of the systems to other
trusted zones.
13
to enumerate and analyze the attacker models. These models have been de-
fined in a way that they can be applied to both centralized and distributed
IoT approaches. Note, however, that the concept of ‘perimeter’ in the Inter-
net of Things is a bit fuzzy: an attacker can control part of the network, but
due to the inherent distributed nature of the IoT, it is nearly impossible for
an attacker to fully control the whole system. As a result, an attacker can
be both ‘internal’ and ‘external’ at the same time. These attacker models,
categorized by threats, are introduced in the following paragraph.
• Denial of service (DoS). There are a wide number of DoS attacks that
can be launched against the IoT. Beyond traditional Internet DoS at-
tacks that exhaust service provider resources and network bandwidth,
the actual wireless communication infrastructure of most data acquisi-
tion networks can also be targeted (e.g. jamming the channels). Mali-
cious internal attackers that take control of part of the infrastructure
can create even more mayhem.
14
• Controlling. As long as there is an attack path, active attackers can
try to gain partial or full control over an IoT entity. The scope of the
damage caused by these attackers depends mainly on a) the importance
of the data managed by that particular entity, b) the services that are
provided by that particular entity.
While both centralized and distributed approaches share the same at-
tacker models, there are subtle differences caused by the distributed IoT
features and principles. They change various aspects of the underlying in-
frastructures, such as the deployment strategies of the different IoT entities,
the actual information flow, and the availability of certain interfaces and
services. Such changes can create new threats and facilitate the work of at-
tackers, but also can reduce the effectiveness of certain attack vectors. In
the following paragraphs we will discuss the different aspects that are influ-
enced by the distributed IoT features and principles, and how they impact
the threats and attacker models.
One aspect is the centralization of resources. Most adversaries will aim
to target systems that provide the biggest payoff, and central entities fall
under this category – they store, manage, and process a huge amount of
information. Theoretically, these central entities will have better protection
mechanisms, but any vulnerability can make the whole system fall apart.
On the other hand, if the actual intelligence of the Internet of Things is
distributed, the information will be created and processed in different entities,
thus adversaries need to redouble their efforts in order to control the same
amount of resources. However, the distribution of resources is a double-edged
sword. If the adversary is only interested in a specific piece of information,
it can target the system that manages that particular information – which
might not be as protected as a central entity. Besides, node capture attacks
become more dangerous, as more logic is placed within the things themselves.
In fact, an adversary can use a guerrilla warfare strategy and gradually take
control of small parts of the network, so as to affect the whole system in a
covert way.
Another aspect, related to the centralization of resources, is the nature of
the information flow. In centralized IoT deployments, the information flow
will follow a hierarchical pattern, as a central entity will receive information
from every ‘thing’. On the other hand, in more distributed approaches, the
information flow will resemble a peer-to-peer system, where information is
only exchanged when needed. In this particular case, an adversary that
15
eavesdrops on a section of the network will not be able to obtain a holistic
point of view of the whole system. There is a caveat here: if an adversary
targets an intranet of things (e.g. an IoT-enabled hospital) in a distributed
scenario, he might be able to retrieve processed information instead of raw
data.
Regarding the overall connectivity of the network, in approaches that fol-
low the edge intelligence principle, constrained entities are expected to be
directly locatable and addressable via the Internet. Therefore, they must be
able to accept connections from external entities. This situation allows ma-
licious adversaries to launch attacks that can easily exhaust their resources.
Observe that this situation can also arise in networks (either centralized or
distributed) with actuators (e.g. electric motors, industrial machinery), as
the behavior of actuators can change when receiving orders from remote ad-
ministrators. Note also that it is possible to implement additional protection
mechanisms to control these incoming connections, such as firewalls and ad-
ditional middleware layers.
Finally, we also have to consider the user involvement in the configu-
ration of the security mechanisms. User-centric networks, such as personal
area networks [18], are one of the elements of the Internet of Things. By
pushing the intelligence onto the edge of the network, it is possible for the
owners of these networks to create and manage their own policies (cf. sec-
tion 3.3.4). However, as most users are not experts, mistakes will happen if
the security mechanisms are not usable enough. Such misconfigurations can
be exploited by malicious adversaries to access personal data or even take
control of that particular user-centric network. Note that in centralized en-
tities the configuration of the security mechanisms will be made by experts,
but any misconfiguration will create a very rewarding window of opportunity
that can be exploited by any knowledgeable adversary.
By reviewing these attacker models, we can conclude that no approach is
better in terms of threats and attacker models – all of them have various ad-
vantages and disadvantages. In a centralized IoT the central entity becomes a
single point of failure; and although the number of attack vectors are smaller
(and the protection mechanisms might be better), a single vulnerability or
a misconfiguration can cause extreme damage to the whole network. If the
resources of the network are distributed, the impact caused by a successful
attack will be smaller, but the number of attack vectors will increase. Note
that in all approaches there will be a huge number of data providers, the
things, that can be highly constrained and physically accessible – in other
16
words, easy targets. Therefore, it is clear that any IoT application will have
to deal with a certain amount of bogus data.
17
identity management system, where all the service providers belong to the
same circle of trust.
This simplification cannot be found in purely distributed IoT architec-
tures, which fulfill both the collaboration and edge intelligence principles. In
this context we find a dynamic N-to-N scenario, where data providers are no
longer passive and are able to acquire and process information from other
sources. Moreover, due to the edge intelligence principle, local users can
query local information providers directly, without intervention from exter-
nal entities. As a result, some kind of authentication logic must be present
in every service provider – including the tiniest of objects. Note, however,
that things do not exist in a vacuum: they usually belong to a specific group,
are located in a particular context, and are owned by certain entities. These
aspects must be taken into account.
18
in this situation, although it should be noted that they were not designed to
fulfill certain IoT requirements such as identity disclosure (i.e. support for
privacy) [30], thus more analyses are needed.
If the thing is actually a human being, it can also be possible to use ex-
isting authentication mechanisms (e.g. web credentials, electronic identity
cards) if the resource provider understands them. For example, Guinard et
al. [31] proposed a smart gateway infrastructure (Social Access Controller, or
SAC) that allows users to retrieve data from local sensors using their social
network (e.g. Facebook) credentials. Note that this approach might not work
in case the human being does not directly interact with the IoT entities. In
such cases, it is necessary to develop surrogate mechanisms that can act on
behalf of the human users. One existing example is the concept of the Mini-
mal Entity (ME) [32] – a device that stores the digital identity of the user and
acts as his representative in the virtual world. Not only it does provide end-
to-end secure communication and collaboration with anonymous receivers,
but also allows the implementation of pseudonyms. Another example is the
concept of a digital shadow [33], where users can delegate their credentials
(including access control credentials) to multiple objects or virtual entities.
19
permanently or temporarily) and may belong to a group (e.g. personal area
network), it is necessary to consider the design of delegation mechanisms, as
these things may act in the name of the user / group.
As with authentication, access control policies are easier to manage in
centralized IoT architectures: all access control policies are stored and man-
aged within a single central entity. Therefore, data providers do not need
to implement any kind of access control logic: they will send all their data
to those whom they trust (i.e. the central entity). As a side effect of this
configuration, both data providers and information consumers must com-
pletely trust the central entity, as it will store the information generated by
all network entities. On the other hand, purely distributed IoT architectures
have to deal with all previously mentioned challenges: management of het-
erogeneous policies, multiple enforcement points, etc. Nevertheless, as will
be mentioned in Section 3.3.4, the overall privacy of the network improves
once the things can control directly who accesses their own data.
Observe that additional mechanisms must be implemented whenever the
collaboration principle is applied to centralized IoT architectures (e.g. tools
for maintaining consistency between access control lists, resource delegation
mechanisms). Note also that we need to manually configure the direct links
between the intranets and the external entities in networks that only comply
with the edge intelligence principle.
Promising approaches. There have been very few advances in the manage-
ment of access control policies for distributed IoTs. In fact, it is not trivial
to apply existing access control approaches to completely distributed envi-
ronments. For example, there are scalability and consistency issues when
storing the list of users and their associated access rights in access control
lists (ACLs). Role-based access control (RBAC) mechanisms need to define
the different roles that users can take, which might be different in various
contexts even if they refer to the same type of entity (e.g. custodian vs.
janitor). Finally, RBAC policies that use attribute certificates [34] need of
an infrastructure that allows validating such certificates in a cross-domain
environment. Note, however, that due to the specific features of the Internet
of Things, it is possible to consider certain factors such as context as part
of the access control model [35]. As a consequence, with adequate techno-
logical support, certain policies (e.g. only authenticated users located within
my vicinity during working hours can access today’s reports) can be easily
implemented.
20
Besides, there are various simple strategies that could be used whenever
the things belong to a certain group (cf. Section 3.3.1). For example, the
access control logic could be pushed to specific trusted entities, which will
act as token-granting services à la Kerberos (i.e. a thing will grant access to
anyone that has a valid signature created by a trusted entity). In another
approach, the access control logic can be implemented within the things
themselves, but relying only on locally-defined roles (e.g. a doctor from
another hospital must retrieve his locally-issued role before interacting with
the local things). A drawback of all these strategies is that users must first
access the trusted entity before requesting information from the things.
21
nections (e.g. multiple incoming connections that require the use of public
key cryptography).
3.3.4. Privacy
Up to this point we have seen that a distributed IoT architecture requires
more complex security mechanisms. There is, however, one area where dis-
tributed IoTs provide immediate benefits: Data management and privacy.
The core idea is that, due to the edge intelligence principle, every entity has
more control over the data it generates and processes. There are several con-
sequences of this approach. Firstly, entities can control the granularity of the
data they produce. For example, a portable radiation sensor can announce
that it is located in a certain area without providing its exact coordinates.
Secondly, entities can define their own access policies. The previously men-
tioned object can provide the city where it is located (Tokyo) to anonymous
22
entities, the area where it is deployed (Shibuya, Tokyo) to entities with ade-
quate permissions, or even detailed GPS location information to local entities
in case of emergencies. Thirdly, entities do not need to provide all the data
they produce, only the data that is needed by the external entities for a par-
ticular service. This is closely related to privacy, as it will be more difficult
to create a profile of a certain entity if not all information is available.
As for centralized IoT architectures (including those who comply with the
collaboration principle), a data provider can also decide whether to share or
not a particular data stream. Still, as the intelligence is located on the cen-
tral entity, the type of services it provides will be limited to the amount of
data it receives. Another approach can be used if the centralized architecture
complies with the edge intelligence principle: as data providers and informa-
tion consumers are able to communicate directly, they might negotiate a set
of secret keys in order to protect their information. However, in this case
the central entity cannot process the data, thus it becomes a simple storage
system unless it implements advanced cryptographic mechanisms that can
manipulate encrypted data, such as homomorphic encryption.
As a final note, we have to point out that the previous paragraphs focus
mainly on the protection of personal information, but there is another di-
mension of privacy that is especially relevant in the context of the IoT: the
existence of entities that profile and track users without their consent. Here,
the benefits of a distributed IoT might turn into nightmares when misused.
By following the edge intelligence principle, entities can adapt their behav-
ior and track users more effectively. Moreover, thanks to the collaboration
principle, these entities can share up-to-date information about the target.
23
especially sensitive data, advanced concepts such as active bundles (i.e. a
container with a payload of sensitive data, metadata, and a virtual machine
(VM) [46]) might be used. Finally, the legal privacy regulations should be
revised to fully consider the intricacies of an always connected Internet of
Things [47].
Regarding the problem of user tracking and profiling, there are some on-
going efforts in the research community that aim to provide solutions for
this particular threat. For example, there is an interesting perspective that
considers a local environment as an operative system [48]. In short, incom-
ing and outgoing items need to be scanned for rogue devices and malicious
software that can threaten the privacy of the user. This can be achieved by
using mechanisms such as the privacy coach [49]. However, as users could be
tracked anywhere and anytime, these concepts should be extended in order
to help users to become more aware of how their surroundings capture and
use their information. Frameworks like uTRUSTit (cf. Section 3.3.5) might
help in this area. Besides, existing studies on surveillance systems such as
CCTVs [50] might also provide a clue on the specific legal challenges that
our society will face once the Internet of Things becomes a reality.
24
reputation, this reputation can be propagated to other entities that might
interact with such an outlier in the future.
As for the trust in the system, it is largely dependant on knowing the
internal state of the Internet of Things that surround us. In a centralized IoT
not all information will be available: in order to provide services, a central
entity is more interested in retrieving physical and entity data instead of
status and network data. Still, if a centralized system provides an additional
‘internal status’ service, it can be able to supply this kind of information
very quickly, as a) it stores internally most of the information from the data
providers and b) if fresh data is not available, it can send immediate queries
to the specific data providers. As for a distributed IoT, this kind of service
is more complex and needs more time to be completed, as relevant data
providers must be discovered and queried. Nevertheless, the more intelligence
at the edge of the network, the more relevant information (e.g. network
status, existing connections between entities) that can be retrieved. This
way, it can be possible to have a more accurate picture of the status of the
whole system.
Regarding the issues associated with Governance, it is not clear how this
problem will be solved in the context of the IoT [51], although the distributed
IoT approach can provide some solutions. As policies in a distributed IoT
can be defined at the edge of the network, it could be possible to implement
and enforce certain rules such as limiting the countries that can access to our
data. This is not possible in a centralized system, whose data servers will
be located in most cases in foreign countries. Still, as with many other secu-
rity mechanisms, a distributed IoT needs to implement various distributed
mechanisms to control and enforce these policies, which is not trivial. This
same problem affects the management of accountability in the IoT. As log-
ging subsystems will be distributed throughout the network, it will be more
difficult to retrieve all the relevant information that might be needed for
forensic analysis. There is one clear benefit, though: if a balance between
accountability and privacy is achieved, it will be possible to pinpoint the
source of a particular problem thanks to the detailed information about the
behavior of the system.
Promising approaches. There are some theoretical studies that analyze the
suitability of trust management systems for the IoT. For example, Køien [52]
points out that subjective logic systems such as TNA-SL [53] can capture dy-
namic environments where beliefs and uncertainties change over time. There
25
are other open issues that the state of the art needs to address, such as the
management of trust without central authorities. Still, it might be possible
to develop preliminary solutions for such problems by analyzing how they
are solved in the building blocks of the Internet of Things (e.g. sensor net-
works, ad hoc networks). The reason is simple: these building blocks have
several features in common with the distributed IoT approach. For example,
ad-hoc networks are dynamic environments where the network is created,
operated and managed by the nodes themselves. In such networks, the de-
centralization of trust, which is essential in a distributed IoT context, has
been extensively studied [54]. Moreover, there are other holistic paradigms
closely related to the Internet of Things, such as ambient intelligence and
pervasive computing, whose existing works in the area might also provide
additional information on how to deal with multidisciplinary challenges [55].
All the previous approaches do not consider the interactions between hu-
man beings and IoT entities. In fact, as the Internet of Things can (and will)
contain user-generated content, we also have to ask ourselves how to model
this type of trust. One promising approach is the existence of user-managed
circles of trust, as described in the shoppingLense system by Robinson et
al. [56]. This system increases users’ trust in the IoT by including trusted
metadata in the information flow. In particular, patterns (e.g. QR codes) lo-
cated in the environment (e.g. shopping mall) are digitally signed and owned
by a user-defined group. Members of that group can also add ratings to a
particular pattern. This way, if a user trusts a particular group, it can ac-
quire both information from the pattern and trusted ratings from other users.
Finally, regarding the trust in the system from the users’ perspective, one
particular research project (uTRUSTit [57]) has already produced promising
results in this area. In particular, the framework developed in this project
not only provides an inventory of the local devices that are connected to the
Internet of Things, but also enables users to know their status, allowing the
creation of a mental model of the virtual world.
26
to consider fault tolerance. We must not only aim to provide a ‘best-effort’
service in case parts of the network are not accessible, but also assume that
every entity can receive bogus information from other entities.
In case one of the things fails and stops sending data, it is necessary to
discover another thing that can provide a similar set of data. In centralized
IoT architectures this task is more simple, as the central entity will have
access to all data flows. As for distributed IoT architectures, they need to
develop a discovery mechanism that is able to pinpoint related data flows.
Note that additional mechanisms need to be implemented in order to assure
the survivability of the network in case of a failure of part of the infrastruc-
ture: not only data providers need to be located, but also service providers
and data processing entities as well.
As for the existence of bogus data, it is possible to develop holistic (cen-
tralized) and detailed (distributed) mechanisms that deal with this problem.
A centralized system can analyze the consistency of the data, pinpointing
data providers who seem to behave erratically. A distributed system can
make use of the additional information (e.g. network information) retrieved
at a local level or in the interactions with other entities to apply advanced
intrusion detection systems. Both approaches have their own challenges, but
they are not mutually exclusive (e.g. in a distributed environment there can
be certain entities that provide high-level services and behave like cloud-
based IoT infrastructures), thus it is advisable to take full advantage of both
of them if possible.
27
of the functionality provided by existing security mechanisms such as trust
management (e.g. only reports from trusted entities will be considered, zones
with high reputation will take care of the extra workload).
Regarding the detection of bogus data and malicious entities, most ex-
isting intrusion detection mechanisms and rules focus on internal adversaries
that try to attack the specific protocols of data acquisition networks (e.g. sen-
sor networks) [59], but do not consider attacks that target the interactions
between different IoT domains (e.g. a DoS attack or a malformed packet
attack targeting a smart door service [60]). In fact, the state of the art on
this specific area is very limited and only few works are available [61, 62].
It is then necessary to implement new detection mechanisms that take into
account the distributed IoT specific attacker models. Note that it is also
possible, in certain scenarios, to adapt existing mechanisms. For example,
centralized entities can make use of clustering-based mechanisms and other
data mining techniques to detect outliers and intrusions [63]. Moreover,
lessons might be taken from existing distributed intrusion detection systems
implemented in similar environments such as smart grids [64].
3.4. Summary
28
In the previous sections we have also highlighted various strategies that
could be used in the near future to design and deploy IoT-specific security
mechanisms. One such strategy assumes that things belong to a certain
group (intranet of things, personal area network) located in a certain spa-
tial area (IoT-enabled hospital, household). These groups comply with the
edge intelligence and collaboration principles, thus they are part of the dis-
tributed IoT. Once the things are grouped, the implementation of certain
security mechanisms becomes easier: local identity providers can be defined,
the access control logic can be pushed onto specific entities, a mental model
of the virtual world can be created, and so on. Note that this strategy might
be partially applicable to highly dynamic environments such as VANETs [26]
if we consider the existence of logical groups (“all cars that have been regis-
tered in Singapore”), although more research is needed to validate this point
of view.
Other strategies focus on the interactions of human users with the In-
ternet of Things. For example, as digital social infrastructures have been
already deployed, they can be used in the implementation of specific se-
curity mechanisms such as user-defined access control and circles of trust.
Finally, another strategy consists of adapting the security mechanisms that
have been developed in i) the building blocks of the Internet of Things (e.g.
sensor networks, ad hoc networks) and ii) other paradigms closely related
to the Internet of Things (ambient intelligence, pervasive computing). Note
that while the building blocks lack the complexity of the distributed IoT
approach, they share certain similarities such as the decentralization of re-
sources. In fact, some security mechanisms, such as Key Management, have
been successfully adapted to certain IoT scenarios [39].
4. Conclusions
The main goal of this paper was to provide an explicit analysis of the
features and security challenges of the distributed approach of the Internet
of Things, in order to understand what is its place in the Future Internet.
There are numerous challenges that must be solved, such as assuring inter-
operability, reaching a business model, and managing the authentication and
authorization of entities. Still, there are multiple benefits as well. Since
intelligence is not concentrated on a limited set of centralized application
platforms – although these platforms can also exist in order to provide addi-
tional support – scalability is improved. Data is managed by the distributed
29
entities, thus it is possible not only to push/pull data only when needed, but
also to implement specific privacy policies. Besides, additional trust and fault
tolerance mechanisms can be specifically created for this approach. These
and other benefits show that this approach is actually useful and applicable
to the real world. As a final note, we would like to stress that both central-
ized and distributed approaches can coexist with each other, providing the
foundations of a full-fledged Internet of Things.
Acknowledgement
This work was partially supported by the Spanish Ministry of Science and
Innovation through the ARES (CSD2007-00004) and SPRINT (TIN2009-
09237) projects. The latter is cofinanced by the European Regional Devel-
opment Fund (FEDER).
References
[1] INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro &
Nanosystems, in co-operation with the Working group RFID of the ETP
EPOSS, Internet of things in 2020: Roadmap for the future, 27 May
2008.
[2] CERP-IoT Cluster, Visions and Challenges for Realising the Internet of
Things, European Commission, 2010.
30
[7] H. Ning, H. Liu, Cyber-Physical-Social Based Security Architecture for
Future Internet of Things, Advances in Internet of Things 2 (1) (2012)
1–7.
[11] Sensei project - Integrating the Physical with the Digital World of the
Network of the Future, Accessed on November, 2012. [link].
URL http://www.sensei-project.eu
[15] G. Jones, Organizational Theory, Design, and Change (7th ed.), Prentice
Hall, 2012.
31
[18] D. Viehland, F. Zhao, The Future of Personal Area Networks in a Ubiq-
uitous Computing World, International Journal of Advanced Pervasive
and Ubiquitous Computing 2 (2) (2010) 30–44.
32
[27] E. Ilie-Zudor, Z. Kemeny, F. van Blommestein, L. Monostori, A. van der
Meulen, A Survey of Applications and Requirements of Unique Identi-
fication Systems and RFID Techniques, Computers in Industry 62 (3)
(2011) 227–252.
[29] T. Bauge (ed.), D3.5 - Global and Pluggable Sensor and Actuator Net-
working Framework, SENSEI project, 2011.
URL http://www.sensei-project.eu/
[34] Z. Wei, C. Meinel, Implement Role Based Access Control with Attribute
Certificates, in: 6th International Conference on Advanced Communica-
tion Technology (ICACT’04), Phoenix Park, Korea, 2004, pp. 536–540.
33
[36] M. Brachmann, S. L. Keoh, O. G. Morchon, S. S. Kumar, End-to-End
Transport Security in the IP-Based Internet of Things, in: 21st Inter-
national Conference on Computer Communications and Networks (IC-
CCN’12), Munich, Germany, 2012, pp. 1–5.
34
[46] P. Angin, B. Bhargava, R. Ranchal, N. Singh, M. Linderman, L. B.
Othmane, L. Lilien, An Entity-Centric Approach for Privacy and Iden-
tity Management in Cloud Computing, in: 29th IEEE Symposium on
Reliable Distributed Systems (SRDS’10), New Delhi, India, 2010, pp.
177–183.
[48] S. Radomirovic, Towards a Model for Security and Privacy in the In-
ternet of Things, in: 1st International Workshop on the Security of the
Internet of Things (SecIoT’10), Tokyo, Japan, 2010.
[50] M. Button, Setting the Watch Privacy and Ethics of CCTV Surveillance,
International Journal of Law, Crime and Justice 39 (4) (2011) 215–217.
[54] J.-H. Cho, A. Swami, I.-R. Chen, A Survey on Trust Management for
Mobile Ad Hoc Networks, IEEE Communications Surveys & Tutorials
13 (4) (2011) 562–583.
35
[56] J. Robinson, I. Wakeman, D. Chalmers, B. Horsfall, Trust and the In-
ternet of Things, in: Joint International Workshop on Trust in Loca-
tion and Communications in Decentralised Computing (TruLoco’10),
Morioka, Japan, 2010.
36