NB Iot Security: A Survey: Vinod Kumar Rakesh Kumar Jha Sanjeev Jain
NB Iot Security: A Survey: Vinod Kumar Rakesh Kumar Jha Sanjeev Jain
https://doi.org/10.1007/s11277-020-07346-7
Abstract
In the past few years, the term Internet of Things (IoT) has become very prevalent. In IoT,
aggregation of data (from sensors) to processing the data (to the cloud) is energy constraint.
To address this challenge, Narrowband- Internet of Things (NB-IoT) is becoming a popular
choice for smart devices manufacturer due to its characteristics of high energy-efficient and
long battery life. Researchers and academia have addressed the problem related to energy
constraints, but it opens the door for security issues related to NB-IoT devices. In this
paper, we have done a survey closely related to security issues related to NB-IoT technolo-
gies like RFID, WSN, WoT, and IoT. IoT is enabled with five-layered architectures, and
each layer is prone to different security attacks. In this paper, we have provided a compara-
tive analysis of security issues in a layer-based approach. We propose the different possible
security attacks like shared node attack, synchronization attack, node failure attack, source
code attack, and battery drainage attack associated with NB-IoT. To do the performance
analysis of security attacks, related matrix, and their mathematical formulation is based on
Secrecy Rate and Secrecy Outage Probability for the smart home application. This paper
also raises security issues related to smart health and smart agriculture applications.
13
Vol.:(0123456789)
V. Kumar et al.
1 Introduction
For the last few years, the way of using technical devices, home appliances, instruments,
and other objects have changed according to the reliability of the users. Due to which, IoT
concept is increasing exponentially to make human life more relaxed and comfortable,
which has led to a rise in data transfer and storage related to security is also increasing
rapidly. IoT gives an image of the future Internet where every computing device, things of
daily life, and every user has sensing and actuating capabilities. All of these cooperate and
communicate with each other according to their convenience and economic benefit [1]. IoT
is associated with the various concepts coming from Radio Frequency and Identification
(RFID), Wireless Sensor Network (WSN), Web of Things (WoT) and Smart Things.
If IoT is combined with the cloud, it provides the benefit of integrating the Cyber-Phys-
ical System (CPS) with Supervisory Control and Data Acquisition (SCADA) [2]. Many
essentials functional and nonfunctional requirements of IoT middleware technologies
are defined, such as resource recovery, resource management, data, code and event man-
agement, scalability, reliability, availability, and security. The author in [3] explains the
role of service-oriented middleware architecture design in IoT based on Service-oriented
Computing.
Third Generation Partnership Projects (3GPP), in their radio access network plenary
meeting, have decided to standardize the NB-IoT, which gives better indoor coverage, sup-
ports a large number of low-throughput devices, and better utilization of resource block
[4]. Social IoT (SIoT) describes a world where the objects around human beings can intel-
ligently sense and are motivated by various social networks over huge Internet sites such as
Facebook, WhatsApp, Twitter, and Instagram [5]. The three-layer system model defined in
[6] gives the concept of social IoT, based on the “trust management and security in the IoT
world” by defining the exploitability matrix and impact matrix. The authors in [7] proposed
an encapsulation of RFID messages for IPv6 packet for each IoT node so that each element
or node is within reach of another node in the network. It also defines web squared, which
is the evolution of Web 2.0.
Different IoT research areas and their challenges have been explained by authors in [8],
which are related to security and standardization. IoT supports establishing connections and
designing networks between two different objects in various heterogeneous environments.
Confidentiality, integrity, availability, less space, and power consumption are the necessi-
ties of any IoT algorithm. Authors have proposed a Hybrid lightweight algorithm (HLA)
[9] by combining the two lightweight asymmetric and asymmetric encryption algorithms.
By using the Near-Threshold Computing (NTC) method, it reduces the power consump-
tion, as compared to the standard voltage. The author in [10] aims to study the security of
post-quantum cryptography and implement a cryptosystem based on these problems. This
mathematical problem evaluates the performance in a real-time deployed network—the
research project named Crypto-MathCREST supported by a Japanese agency named Japan
science and technology. A lightweight protocol for IoT application is a transfer protocol,
designed at the Internet Engineering Task Force (IETF), named [11] Constrained Appli-
cation Protocol (CoAP). The author in [12] proposed a model for IoT, having a limited
budget for protecting the device communication where computation time is very less, but
the key size is large. In another case, he combined FPGA with Moore’s law and calculated
the cost of breaking the security of the cryptosystem having a small key size. He showed
that the cost of a cryptosystem decreases rapidly if the key size is small and suitable for IoT
devices.
13
NB‑IoT Security: A Survey
Various attacks on smart wearable devices (such as man-in-the-middle, mole attack, and
mule attack) and its countermeasures are described in brief [13]. A lightweight game theo-
retic technique based on the Nash equilibrium concept [14] is used to activate an anom-
aly detection technique when a new attack’s signature is expected to occur. The relation
between the time spent on analyzing the traffic volume and the time instance to patch the
AP’s are analyzed in [15]. It proposed the patching of intermediate nodes, for preventing
the redirection of malicious traffic, and introduced the DDoS attack, launched by the IoT
botnets. The main requirement of IoT applications is to develop such protocols that are
compatible with low power IoT devices. These protocols scale up to enormous storage of
data in the cloud. As the low power IoT devices may work for 10–20 years, so it is required
to secure today’s devices against the attacks for the next 20 years [16].
In LPWAN technologies, on both licensed and unlicensed spectrum, the unlicensed
spectrum consists of Long Range (LoRa) and SIGFOX, while the licensed spectrum con-
sists of LTE-M and NB-IoT technology. All these technologies use a narrowband spec-
trum and suitable for small data, sent over a large area, by the object and maintains the
battery life over the years. In [17], author(s) introduced a method of non-orthogonal
multiple access (NOMA) to overcome the limitation of system capacity and also defined
LTE-M and LTE-N techniques for machine type communication and Narrowband IoT Cat-
egory. Power consumption analysis, effective bandwidth, and transmission time analysis
for LPWAN are performed in [18, 19]. 3GPP standardized two LTE operated technolo-
gies called eMTC (enhanced Machine Type Communication) and NB-IoT in release-13.
eMTC works with relatively large data transmission (≤ 1 Mb/s) as compared with NB-
IoT (160–250 kbps(DL), 160–200 kbps(UL), low mobility and high coverage (~ 17 km in
suburban and ~ 5 km in urban) while NB-IoT is designed to achieve better performance as
compared to eMTC [16].
This paper provides a detailed analysis of possible security attacks on NB-IoT enabled
devices, with proposed approaches and techniques related to smart home and smart health
care applications.
Our contributions in the paper are summarized below:
• This paper cogitates the security perspectives of RFID, WSN, and WoT used in the
evolution of IoT and NB-IoT through proposed architecture.
• Analyze the possible security attacks on different layers of IoT and NB-IoT.
• Provide a detailed analysis of different possible attacks on NB-IoT.
• Proposed possible attacks on NB-IoT with proposed architecture and detail mathemati-
cal analysis such as Node failure attack, shared node attack, and synchronization attack.
The layout of this paper is shown in Fig. 1. This section of the paper provides the back-
ground of the basic concept of IoT and associated security issues with IoT and NB-IoT.
Section 2 gives an introduction of technologies like RFID, WSN, WoT with security provi-
sion, used in IoT advancement. Section 3 contains definitions of various security matrices,
a table of detailed layer-wise security attacks, techniques, or methods proposed by vari-
ous authors for IoT scenarios and various challenges related to IoT. Section 4 provides a
brief idea about NB-IoT operation modes. The network architecture has been proposed in
this section. Section 5 is the most significant section, describe different possible attacks on
13
V. Kumar et al.
NB-IoT devices based on applications such as smart home, critical smart healthcare. In this
section, we have also proposed a system model and security issues for NB-IoT and have
given the mathematical formulation and methods for solving these attacking scenarios.
Resource allocation based possible attacks and proposed attacks are defined in this part
of the paper. Section 6 concludes this paper with future work. Additionally, the appendix
provides the list of research projects working on IoT security and the list of abbreviations.
13
NB‑IoT Security: A Survey
In the evolution, IoT technology identification and tracking enabled technology, which
came into existence in the 80 s, about 3 decades ago, are being used worldwide in the
form of RFID tag. The first patent filed by Mario W. Cardullo, on active RFID tag con-
sists of rewritable storage, in 1973 in the United States. Subsequently, the evolution of
IoT technology in 1999, RFID has taken the backside of connected sensors. In 2004,
Juels [20] had been proposed yoking protocol, for providing cryptographic proof to scan
two RFID tags simultaneously.
International Standards Organization (ISO) and Electronics Product Code Global
(EPC Global) are the two central standardization bodies, incorporated into standard-
izing the RFID technology [21]. This radio sensing technology utilizes radio waves for
automatic identification of objects from the RFID tag of smart labels. These tags may be
passive or powered by battery as per the requirements of the objects.
Figure 3 shows the system architecture for the RFID tag cloning attack (A1–A4), and
its detection by using the BASE algorithm [22]. A passive cloning attacker launches the
cloning attack and injects the clone tags. These cloned tags work the same as the genu-
ine tags and are hard to distinguish. It gives a proper response to the RFID reader que-
ries so that detection protocol fails to detect the cloned tag. The workflow of this base-
line protocol (P1–P4) is shown in Fig. 3. A detection approach is fed on ID cardinality,
as input in the BASE algorithm. If the tag cardinality is higher than the ID cardinality
(ALOHA frame size), the clone is detected. Otherwise, it’s not detected. This approach
is mainly coordinated by an RFID reader, which queries from clone tags (step-P2), and
the reply comes from the tag (step-P3). Based on the response from the reader, the clone
13
13
Table 1 Comparison of RFID/WSN/WoT in IoT evolution
Technology RFID WSN Web/Internet of Things
Mobility support Tags move with attached objects Usually static Both static as well as dynamic
Database requirement Yes Yes Yes/greatly
Range of frequency High freq: 13.56 MHz 315, 433, and 868 MHz (Europe) The frequency of operation
Low freq: 125–134.2 kHz and 140–148.5 kHz 915 MHz (N.A.), 2.45 GHz ISM band is between 100 MHz and
5.8 GHz
Power requirement Battery-powered or passive Battery-powered Battery powered
Security provision Less Less Moderate
Encryption algorithm used DES, AES, SecureRF, DESL DES, 3DES, DES-X, blowfish, TEA, XTEA, AES, ECC, Diffie-Hellman, COSE
HEIGHT
Possible security techniques Optimistic trivial RFID authentication protocol Route optimization algorithm, active Trust, Q-s com- REST, HTTP, JWT, CWT,
(O-TRAP) posite, TinySec, SPINS, LSec, LISA, and LISP Web Sockets, TLS, DTLS
V. Kumar et al.
NB‑IoT Security: A Survey
Fig. 3 RFID system model with cloning attack and detection [22]
sends alert as an output (step-P4). In the next iteration, the system proposed in Fig. 3 is
detached from clone tags (clone free) operations.
As per RFID security concern, tag counterfeiting and tag encoding are the essential
aspects of maintaining the integrity of tag. In a situation when multiple RFID tags trans-
mit data to the RFID reader simultaneously, conflict in data may occur. This problem can
be solved by applying anti-collision techniques. Multiple security threats, such as reverse
engineering attack, power analysis attack, tracking cloning attacks, and their countermeas-
ures in respect of RFID, are explained in [23]. In RFID concern, authors in [24] introduced
various tags, side-channel attack, timing attack, and briefly explained a protocol named
“An Optimistic Trivial RFID Authentication Protocol” (O-TRAP). A security framework
for E-passports, medical information systems, and implant-based access-control types vul-
nerable application areas, provided in [25], evaluates the security and privacy risk based
on RFID. K. Bu et al. [26] has classified the cloning attack and their countermeasures on
RFID, proposed in the last 15 years. They have also proposed their cryptographic solution
to prevent cloning. An ultra-lightweight authentication protocol for RFID tags is defined
in [27], which is suitable to provide security in IoT objects. An RFID based lightweight
mutual authentication scheme is proposed in [28], which is suitable for providing security
in medical IoT objects. Thus lightweight approaches for securing the RFID can also be
used for securing the IoT network, concerned with RFID.
On one step towards the IoT, WSN technology is an integral part. Without sensors, one
cannot assume the existence of IoT. In the 1950s, the first WSN was introduced by the US
Military to find and track Russian submarines. A program on Distributed Sensor Network
(DSN) was also started by the Defense Advanced Research Projects Agency (DARPA) of
the United States in 1980 [29]. This technology is working on frequency bands 315, 433,
and 868 MHz in the European countries, 915 MHz in North American countries, and 2.45-
GHz ISM frequency band. Typically, the sensors used in WSN are battery powered and are
less secure. The continuous development of WSN technologies, wireless communication
technologies, embedded systems, nanotechnologies, and optimization of the sensors makes
it possible to develop smart systems, to monitor activities of human beings and other
13
V. Kumar et al.
activities continuously. Various standards used by the WSN technology are ZigBee, 6LoW-
PAN, ISA100.11a, OCARI, and Wireless HART. IEEE 802.15.4 physical layer specifica-
tions standards are similar for all standards [30].
A WSN network with a blackhole attack scenario is shown in Fig. 4. Here, initially, the
malicious sensor node “A” detects the active route for the sensor’s data transfer from the
sender node “S1” to the sink node or gateway. Attacker node “A” recognizes the detection
address and sends a Route Replay Packet (RREP) with the spoofed destination address,
based on the significant sequence number and small hop count to a nearest normal sensor
node “S2”. This node “S2” forwards RREP packets to the sender node “S1”. Hence the
data is being sent from sensor node uses the new route, which goes via malicious node “A.”
These data drop by a malicious node. Thus, the communication occurs between the sender
and sink nodes, in case of a black hole attack [31]. In normal conditions (without attack),
the sensing data is collected by the sink node/gateway and forwarded to the end-user by
accessing the infrastructure network of the Internet.
A scheme named Active Trust proposed in [32] generates the number of detection routes
for reducing the attack success probability of a black hole attack. For securing the WSN
network, the probabilistic risk assessment framework is defined in [33], for the sensor’s
cloud environment with the help of Bayesian networks. Another security approach using
the route optimization algorithm for increasing the network lifetime, and protection of the
weak WSN node, is proposed by [34]. For a large mobile WSN case, a protocol named Q-s
composite [35] is defined for random pre-distribution of the classified material.
Designing a network of “smart things” in the physical world in huge amount has become
the aim of various research activities. The layered architecture is the same in both the
cases for IoT and WoT. IoT is the hardware layer to connect everyday items to the Inter-
net, while WoT is the software layer to connect them to the Internet. For developing smart
things applications, WoT uses various web technologies, such as JavaScript, PHP, and
Ajax explained in [36]. A survey on WoT security conducted in [37], points out the current
limitations of security research. He proposed architecture for WoT with security, based on
smart gateways as the ideal devices.
13
NB‑IoT Security: A Survey
Things Directory
(Cloud)
WoT Client
(Browser) WoT Things
Ambient Space
Constraints,
Authencaon
(RBAC) User constatnt,
Monitor Request
and eventual
ADF decision factor
AEF Obligaon
Response
Update
Condions
Policies
Database
Figure 5 shows the underlying communication architecture between WoT client and
WoT things. The WoT client can be a web browser or an application on the user’s system
or smartphone. WoT Things (e.g., Street light controller) have a WoT network interface,
driver’s API, and firmware. Things description describes the interactions that can either be
stored in the WoT device itself or any things directory stored remotely, such as the cloud
server. When more secure access to the things description is required, the device supports
itself.
For security consideration, initially, the WoT checks weather the WoT Client is talk-
ing with the correct WoT things or with some other network device. The WoT client must
check the authenticity of the WoT thing device. Secondly, WoT things must verify the WoT
client authentication before receiving the requests. Therefore, the mutual authentication
process is performed between IoT client and IoT thing to supply credential information.
A Role-Based Access Control (RBAC) security architecture [38] is shown in Fig. 6. Its
objective is to integrate the RBAC model with the WoT environment. A set of authoriza-
tion rules are provided in this model to access any WoT Things/entities. Access control of
the things resources is done centrally. It specifies a process, continuously working inside a
trusted computer base named Reference Monitor (RM).
13
V. Kumar et al.
It is located inside the ambient space manager, compounded with two main facilities (1)
Access Control Enforcement Facility (AEF) and (2) Access Decision Facility (ADF). AEF
is situated inside the monitor section and ADF in the rule engine section. AEF and ADF
interact with each other to check whether the access request is approved (yes) or blocked
(no). AEF intercept each request coming from any WoT resource ‘Things’ and forwards it
to ADF, before making any decision. ADF decision process depends on various decision
factors, including hierarchal relationships, constraints, and policies database, and responds
to the AEF. The rest of the process performed by the AEF would continue based on RBAC
authorization permission.
As the name implies, it is the combination of three components, i.e., Internet, connectiv-
ity, and physical objects (things). IoT is the future of the Internet, in which every physical
object is identified and access through the Internet. Various technologies (such as ZigBee
(IEEE802.15.4), WLAN (IEEE802.11), Bluetooth/Bluetooth Low Energy (BLE) (IEEE
802.15.1), and Wireless Body Area Network (WBAN) (IEEE802.15.6)) are used to com-
municate the IoT data in the network [5].
Figure 7 on this page shows the IoT real-time application architecture, broadly classi-
fied into three parts (a) Transmitting unit. (b) Communication channel and (c) Receiving
unit. The transmission unit consists of various sensors, processors, and radio nodes. These
nodes are further processed, and the cluster head is made. These sensor nodes are within
the jurisdiction of the gateway, which assigns locally unique addresses to these IoT nodes
within that particular LAN. This data flow through a proxy server and then goes to the
cloud networks by using the Internet, where it uses a web socket to go to the cloud server.
The cloud server analyzes the data, and various backend processes run in that cloud server.
Based on that analytics and data processing, the actuation of devices takes place.
IoT technology supports applications such as smart homes, wearables, smart cities,
smart grid, smart industry, connected health, smart security, transportation, and smart
agriculture. These applications cover the maximum number of IoT objects, according to
Cluster Head
Gateway
Proxy Server
LAN
Storage
Processes
Actuator
WAN
Internet
Fog
Web Socket Computing Cloud Analysis
Sensors
C-RAN Protocols
13
NB‑IoT Security: A Survey
IoT devices are always an attractive target for attacking. That’s why security always
becomes a challenging issue at the physical as well as the application layer. Due to the
low cost and ultra-low-cost IoT modules, security solutions must be lightweight; otherwise,
the cost of IoT devices would increase due to the complexity of the algorithm. Instead of
securing a single unit of software or a single layer of IoT, we require to secure the entire
IoT system. Three layers of security architecture have been proposed in [39], consisting of
application layer, transportation layer, and perception layer. It differentiates various secu-
rity issues based on this layered architecture. Authors in [40], defined Service Oriented
Architecture (SOA) for IoT middleware and divided IoT Architecture into 5 sub-layers
(application layer, middleware layer, Internet layer, access gateway layer, and edge layer)
and also give the overview on the applications and various challenges on IoT. From the
perspective of industry, [41] has introduced the background and some industrial applica-
tions of IoT. Service-oriented Architecture (SoA) of IoT defines the IoT as a well-defined
simple subsystem. It divides the architecture into four sub-layers defined as an interface
layer, service layer, network layer, and sensing layer. A five-layer architecture defined in
Fig. 8 consists of the following layers.
2.4.2.1 Object Layer It is the lowermost layer. It may also be called a perception layer or
physical layer. Different types of sensors like RFID, barcodes, infrared sensors, and other
Business Layer
Applicaon Layer
Object Layer
13
V. Kumar et al.
sensor-enabled physical objects come under this layer. This layer collects the data of sensors
and sends it to the upper layer.
2.4.2.2 Object Abstraction Layer This is the second layer in IoT architecture. It may also
be called as the network layer. This layer abstracts the data of the object layer and transfers
safely to the service management layer by using various communication technologies such
as cloud computing, fog computing, WiFi, GSM, and LTE.
2.4.2.3 Service Layer The third layer of this architecture is the Middle layer of IoT architec-
ture design. This layer manages and processes the data received from various heterogeneous
networks. Services division and integration, service implementation, and provide services
using a service repository to the upper layer. It works as a service platform to the upper layer.
2.4.2.4 Application Layer It gives the service to the customers based on their request for
various applications of IoT such as smart home, smart healthcare, smart agriculture, smart
industry, and smart grid.
2.4.2.5 Business Layer The uppermost layer of the IoT framework is a business Layer. It is
also called the management layer. This layer is responsible for developing a business model,
flowchart, and graphs. These are based on the data coming from the application layer. It
helps in making future business strategies and planning for the growth of the organization.
With the growth of IoT in the past few decades, Internet traffic is increasing, and issues
related to security are also increasing gradually. To address these issues, much research
has been carried out by the industry and academia, such as resource allocation, lifetime
enhancement in the sensor nodes, and power optimization. However, few works are there
on security issues. Paradoxically, there is no security matrix that can accurately evaluate
cryptographic security in the IoT environment. It still requires a more precise definition of
the security standards in the IoT environment.
The main goal of security is to obtain favorable results for the following matrices.
13
NB‑IoT Security: A Survey
It is the costing to the attacker for successfully achieving the attack goal. For any IoT object
case, the metric is the costing by an attacker to compromise that object. The value of the
attack cost depends on the node or object position on the IoT network [42].
It is an effective loss done by an attacker to achieve his aim. This effective loss is the loss in
terms of other previous basic metrics like availability, Integrity, and confidentiality. In the
case of a single node, AI is the loss caused by an attacker to perform a successful attack on
that node.
3.1.4 Mean‑Time‑to‑Compromise (MTTC)
In IoT/NB-IoT network or any IoT object, MTTC is the value of average time consumed by
an attacker to successfully compromise the node/network.
This term is used to characterize the secrecy performance of the communication system
in terms of probability. The SOP is the probability that the secrecy capacity at a particular
instant is less than a predetermined threshold secrecy rate. NB-IoT device’s security will
not be guaranteed to spoof the information, and hence, that system is said to be in an out-
age; otherwise, it is secured.
Figure 9 distributes the various possible security attacks on IoT as well as NB-IoT,
layer-wise in 3 layers and 5 layers. These attacks break the device’s security at a physical
level, communication security at the network level, and management or application secu-
rity at the application level. The definition of these attacks and their possible countermeas-
ures are explained in Table 2.
For securing the IoT device’s data and communication networks, various algorithms proposed
in recent years are described in this section in brief. These IoT security techniques focus on
the small size, lightweight, efficient methods/algorithms. Various IoT techniques given in the
table provided on the next page are related to NB-IoT, cybersecurity, fog-cloud-based IoT Net-
works. The pros and cons of these techniques are mentioned in the corresponding column.
13
V. Kumar et al.
IoT 3 Layer IoT 5 Layer IoT Security Attacks NB-IoT Security Attack
Singh et al. [61], combined symmetric and asymmetric key encryption and proposed hybrid
lightweight techniques. Sedjelmaci et al. [14] used a simulator for achieving high detection
accuracy. For Mobile IoT, Cheng et al. [15] introduced various patching techniques for block-
ing malware in IoT nodes. For narrowband IoT, Yang et al. [62] proposed an algorithm to
secure traffic offloading for scenarios of single and multiple smart devices. Another hybrid
algorithm has been given by Safi et al. [63] to improve the security of IoT. [64], proposed the
HEIGHT algorithm to optimize energy requirement and hardware resources. For cloud and
fog based networks, Shen et al. [65] gave a game-based strategy for detecting the malware. On
the next page, Table 3 shows the security algorithms related to IoT.
In IoT, most of the researchers are working to resolve the issues/challenges which will make
the future IoT devices more reliable, standardize, secure, and compatible with another device.
IoT applications cover the entire field related to our life. Everyone’s identity is available for all,
due to which in the current age of social networking IoT related device’s data is always avail-
able for a robust security attack. There is no perfect secure prone architecture available in IoT
networks, hence designing the standardized security architecture is a big challenge. NB-IoT
technology is based on LTE technology, whereas some features of its specifications deemed
unnecessary for LPWA needs have been stripped out. Due to this, NB-IoT is capable of pro-
viding unique advantages that other technologies like 2G, 3G, or LTE cannot achieve or could
only do so at enormous cost. So, only NB-IoT gains its capability of long battery lifetime,
deeper indoor coverage, and low module cost. In short, NB-IoT provides a bridge between
IoT and power-optimized networks, i.e., it can solve the problem of energy consumption. The
following are the significant challenges listed in tabular form, on which researchers and stand-
ardization committees have been working. IoT challenges are described in Table 4, and Fig. 10
shows it diagrammatically.
13
Table 2 Layerwise IoT/NB-IoT security attack
S. no. Layer Available attacks on IoT devices Definition Countermeasures Refs.
1. Business Layer Data aggregation distortion After collecting the data, the device sends Data integrity protection mechanism [43]
it to the base station for further pro-
cessing. An eavesdropper may distort
(modify) this data, to be aggregated
NB‑IoT Security: A Survey
2. Application layer API Attacks/Interface risk between clouds API consists of a set of protocols and The cloud service provider interfaced [44]
tools, for developing a software appli- security model should be analyzed
cation. A poorly designed Applica- carefully
tion Programming Interface is often Provides high Authentication and access
subjected to this type of attack. In IoT, control
the cloud service provider provides a set Understands the dependency chain asso-
of API, that a user uses to interact with ciated with API
the clouds
3. DoS/DDoS attack It is the most dangerous threat to IoT Recognize the signs of a DDoS attack as [45]
devices and networks. In this attack, early as possible
the network becomes down due to a DDoS mitigation plan by using a hybrid
massive number of useless requests. It approach
consumes the network resource due to Introduce extra filter to inform the routers
which legitimate node does not respond about packet drop from obvious attack
to the request. Some DoS attacks, like source
Teardrop attack and Ping of Death,
exploit the limitations in the TCP/IP
protocols
4. Malicious code injection attack An attacker determines the system Estimation model [46]
configuration to create Malicious/false Similarity check
measurements in the IoT network. It Testing before installation
allows the attacker to bypass the secu-
rity in the network
13
Table 2 (continued)
S. no. Layer Available attacks on IoT devices Definition Countermeasures Refs.
13
5. Service layer Underlying infrastructure security/service This type of security attack is performed Fragmentation redundancy scattering [43]
Hijacking in the lower layer of IoT services,
i.e., Platform as a service (PaaS). The
service provider is responsible for
the security of this layer. Developer
builds a secure application for the IoT
device, but the security of these devices
remains vulnerable due to the lower
layer, due to which the services of this
layer may also be hijacked
6. Virtualization threat The virtualization process allows the Using the HyperSafe approach which [43]
virtual machine to run different applica- gives hypervisor control-flow integrity
tions. It creates new opportunities for
the attacker due to an extra layer that
must be secured
7. Third-party relationship When two or more than two data sources Encryption of source data [47]
are combined, it increases data and
network security issues. Platform as a
service provides third-party web ser-
vices components, called a mashup
8. Object abstraction layer Replay attack In this, the attacker intercepts the message Introduce timestamp [48]
and retransmits this message multiple Implement the secure session key agree-
times, to consume the resource at the ment
sensor
9. MITM attack In this most general attacking methodol- Install and configure the firewall properly [49–51]
ogy, the attacker observes and interprets Update software regularly from trusted
the information transfer between the IoT sources
devices and gateway. After intercepting, Use efficient encryption method between
the attacker can easily inject his infor- client and server and SSL certificates
mation in the communication channel
V. Kumar et al.
Table 2 (continued)
S. no. Layer Available attacks on IoT devices Definition Countermeasures Refs.
10. Sybil attack In this type of attack on IoT devices, Use comprehensive comparisons for [52]
attackers show itself as a legitimate detecting mobile Sybil
user, although it manipulates fake iden- By using Sybil detection techniques
tity, and thus it uses pseudo identities to based on the Social graph (SGSD) or
NB‑IoT Security: A Survey
13
Table 2 (continued)
S. no. Layer Available attacks on IoT devices Definition Countermeasures Refs.
13
15. Sinkhole attack In a sinkhole attack, the attacker node Using cryptographic methods for protect- [56]
reflects the other nodes by showing its ing the network
false routing information. By this, it Make the restriction to each node with a
attracts the network’s traffic towards certain threshold on the flow of data
itself. It allows an attacker to redirect
a system to a potentially malicious
destination
16. Object layer Jamming attack IoT network is vulnerable to jamming The proposed algorithm can find a mixed- [57]
attacks, which could make IoT devices, strategy Nash equilibrium of the Blotto
deny the provide services to legitimate game
user, due to malicious radio jamming Detect and sleep Route around jammed
regions
17. Device/node capture/tampering attack This attack occurs when sensor nodes/ Hide or camouflage nodes [58]
devices are not physically secured. In Tamper-proof packaging
it, the attacker makes changes in the
device in the form of program code or
hardware circuits, due to which security
of the device is compromised
18. Eavesdropping attack In this attack, eavesdropper interprets the Using a cryptographic algorithm [55]
data transmitted from the base station Isolation, to prevent sniffing
to IoT nodes. This captured data is used Access restriction
by an eavesdropper as input for a future
attack. In the case of NB-IOT, a smart
energy meter attacker intercepts the
information about energy consumption.
When it is negligible, he understands
that no one is in the house, and steals
the goods
V. Kumar et al.
Table 2 (continued)
S. no. Layer Available attacks on IoT devices Definition Countermeasures Refs.
19. Tag cloning In this attack, the attacker spoofs the iden- Tag authentication algorithms [59]
tity of the RFID tag and clones it. The
attacker uses this cloned tag in place of
the original tag and replaces this cloned
NB‑IoT Security: A Survey
13
Table 3 Algorithms/techniques proposed for IoT/NB-IoT security
References Algorithm/technique proposed Objective Outcome Pros(P) and Cons(C) Year
13
[14] Lightweight anomaly detection The main objective of the work is to Using the TOSSIM simulator, the P: The technique consumes rela- 2017
technique reduce the false-positive rate and author achieves the objective tively less energy, compared to
energy consumption to achieve relatively other hybrid detection
High detection accuracy algorithms
C: Suitable only for low resource
IoT devices
[62] SolTPM To find the optimal pairing between In a single-SD case, it effectively P: This algorithm can help to 2017
the smart devices (SD’s) and reduces the total power consump- improve the secure throughput,
access points (AP’s), with secrecy tion offloaded to the AP’s
provision for NB-IoT Systems In multiple-SD’s and Multiple AP’s, C: Results are based on the limited
case, performance to optimal for number of SD’s and AP’s
SD-AD pairing with multiple
parameters
[15] Traffic-aware patching The main objective of this scheme is Proposed various other patching P: A useful technique for blocking 2017
to block the IoT botnet masters and strategies like: malware intermediate node, via
malicious sites, instead of securing • Patching by Path-Based Traffic patching and restricts the damage
important infrastructure links Patterns C: Technique does not give an
between the intermediate nodes • Various Importance Metrics for adequate mathematical model for
and IoT devices Intermediate Nodes predicting the malicious node
• Transfer Learning for Optimal
Patch Time
[63] HAN Algorithm The proposed Hybrid encryption The algorithm uses less memory, P: Reduces encryption and decryp- 2017
algorithm, which is the combi- and implementation time is much tion time, i.e., speeds up the
nation of asymmetric key and lesser and reduced as compared to calculation
symmetric key algorithm, reduces AES and RSA C: The algorithm uses multiple
the implementation time for IoT cryptographic techniques
devices
V. Kumar et al.
Table 3 (continued)
References Algorithm/technique proposed Objective Outcome Pros(P) and Cons(C) Year
[64] HIGHT cipher It aims to enhance the performance This encryption algorithm optimizes P: Enhances the performance twice 2014
of the block cipher algorithm the FPGA implementation of the as compared to a conventional
HEIGHT cipher. It has presented design algorithm
various optimization design C: Number of gates increases to
NB‑IoT Security: A Survey
13
Table 4 Major IoT challenges with NB-IoT solutions
S. no. Type of challenge Description Possible solutions References
13
1 Security issues at a different layer Security in NB-IoT devices at low cost, lightweight, and As it is the primary concern of this paper, the develop- [39]
designing cost-effective, efficient algorithms, which is ment of the low resource, lightweight authentication
acceptable for all types of IoT communication, is one schemes, or game theoretic-based approach, is a pos-
of the critical issues in IoT. In 3 layer IoT architecture, sible solution
various security issues like Key management, Sensors Blockchain coding can also be a solution in the case of
tag security, routing protocol security at perception NB-IoT
layer, GPRS, Network, Internet Security at Transporta- One most favorable solution to these types of challenges
tion Layer and service support platform security, cloud is to develop cross-layer security techniques
computing platform security, etc. are at the Application
Layer
2 Heterogeneity Heterogeneity of IoT devices is also an issue for manag- Developing a user interoperability framework for work- [67]
ing the different types of applications, environments, ing with various types of devices, which can coordinate
and a large number of devices in current scenarios. and interoperate between thousands of distributed
Heterogeneity may occur from a different perspective, devices
like in topology, technology, the protocol used, etc.
Co-operation between millions of IoT devices distribute
over the Internet is also a big challenge. In other words,
it can be said as global heterogeneity
3 Enormous heterogeneous data IoT system generates a large amount of heterogeneous It may be a good idea for implementing big data as a [39, 68]
data, and it is different from the Internet. IoT devices solution for solving this problem
generate trillions of gigabytes of data every year, so it For handling huge amounts of different kinds of data, it
is required to generate an efficient secure protocol to requires a more comprehensive security solution. AI,
organize all this information. It would increase by ten Deep Learning based techniques will be better choices
times between 2013 and 2020, from 4.4 trillion to 44 for resolving these data
trillion GB. This huge data can be treated as big data
generation for the Internet. However, the IoT system
generates heterogeneous data, and it is different from
the Internet
4 Standardization and Regulation There is no standardized architecture of IoT defined by Initially, all supporting technologies related to IoT should [69]
any certified regulatory authority till now. So it is a big be standardized, only then NB-IoT standardization can
issue to standardize and regulate various heterogeneous be possible
technologies, devices, and application interfaces used in
V. Kumar et al.
5 Compatibility IoT devices are increasing in all directions and using Due to the versatility of IoT, compatibility issues can be [39]
various technologies, due to which deployment of extra resolved by designing algorithms that support heteroge-
hardware and software will be a problem neous integration technology
6 Computational limitation NB-IoT devices are very low-cost small devices. Finding In the case of NB-IoT and other low-cost devices, the [70]
NB‑IoT Security: A Survey
a low-cost security solution is a significant challenge. development of an efficient lightweight protocol, hav-
The processing unit used in these NB-IoT enabled ing a small key size, may resolve it up to a certain level
devices is not capable of processing large data size due
to limited processing speed
7 Energy-efficient IoT IoT devices are operated through the battery. Implant NB-IoT can resolve this problem up to some extent [70]
devices require long battery life. So it is a big challenge
to find an energy-efficient security solution for devices
8 Longevity IoT enabled home appliances (smart TV, fridge, etc.) For improving durability, proper quality checks and [39]
remain in functioning for a long time duration, even if services should be maintained
their manufacturers may not
13
V. Kumar et al.
Standardizati
on and Massive
Energy
Regulation Heterogeneous
Efficient IoT
data
Longevity Heterogenity
Security
4 NB‑IoT
If we compare various LPWAN technologies, NB-IoT has drawn more attention from
researchers and academia. Due to its features of High-end point density, low-cost, high
indoor coverage, long battery life, and massive capacity, it is becoming the choice of
most of the IoT devices, as shown in Fig. 11.
NB-IoT is operated at a low-frequency bandwidth of 180 kHz for both uplink and
downlink and is suitable for low-cost devices. It offers a coverage range of 164 dB, and
the latency of NB-IoT is around 10 s, i.e., it will target IoT devices that are located in
the areas where signals are not good and are delay tolerant. Both IP and non-IP based
data delivery are supported by NB-IoT. In the non-IP based data delivery, SMS service
may also be used to deliver data, without using Internet protocol. As compared with
other LPWAN technologies, the lesser spectrum is allocated for NB-IoT. The efficient
use of the NB-IoT spectrum (i.e., resource allocation) is one of the key issues [71]. It
reuses the existing LTE of GSM network structure. NB-IoT gives more flexibility for the
deployment; hence, it is suitable for deploying the 5G network [72].
4.1 Operation Modes
NB-IoT can work in three operation modes, as shown in Fig. 12. Based on the available
spectrum and use cases, the operator selects the most suitable operation mode to satisfy
its requirement [73].
13
NB‑IoT Security: A Survey
Bi-
dereconal NB-IoT High End-
point
Communic
aon
Charactersc Density
Opmized
LTE level power
Security Consump
Low on
complexity
devices
In-band
LTE Carrier(200 kHz)
NB - IoT
Guard band
GSM Carrier(200 kHz)
NB - IoT
Stand alone
1. In-band mode: In the In-band operation technique, it utilizes 1 PRB of (180 kHz) the
resources within the LTE carrier bandwidth.
2. Guard-band mode: In the guard band operation technique, NB-IoT uses the resource
blocks within the guard band (edge frequency band) of the LTE carrier. It uses 200 kHz
frequency band from the guard band.
13
V. Kumar et al.
3. Standalone mode. In it, NB-IoT can use one or more than one GSM (200 kHz) carriers
and does not overlap with the LTE frequency band.
In NB-IoT uplink transmission, for a single tone, BPSK or QPSK modulation is used with
3.75 and 15 kHz subcarrier spacing. For a multi-tone case, the transmission is based on
SC-FDMA with 15 kHz subcarrier spacing. For downlink transmission, QPSK modulation
is used with 15 kHz subcarrier spacing with OFDMA technology.
4.2 Network Architecture
1. NB-IoT device This layer is the physical layer consisting of the various NB-IoT sensor
nodes which receive the commands and transmit the data to the base station.
2. NB-IoT network It consists of gateway nodes and base stations which transfer the NB-IoT
device’s sensing data.
3. NB-IoT cloud This layer receives, and stores sensing data from the base station and fur-
ther performs data analysis. This platform may be a commercial platform like Amazon
web services or any other end-user platform. NB-IoT Cloud platform consists of the
Application Programming Interface (API). The main security issues concerned with
NB-IoT originate in this layer.
4. NB-IoT application server It consists of various user applications, by which the user can
interact with NB-IoT objects. The companies develop it according to their requirements.
When any user requests for the data of any IoT device, this request will go through the
NB-IoT cloud platform in the form of an HTTP request, then it forwards the request to
the NB-IoT device. According to the request, the device will execute and reply to the
cloud platform. Further, the cloud platform sends this data to the application server.
There are various LPWAN technologies that have been proposed by various network oper-
ators. Out of them, NB-IoT and LTE-M both are licensed LPWAN technologies, standard-
ized in June 2016, by 3GPP release 13. NB-IoT network supports to design IoT devices.
NB-IoT
Plateform
NB-IoT Base
Home Station
Sensor API
Consumer
Implant electronics Conn ec tion Data Oper ation
Ma nag ement Ma nag ement Ma nag ement
Device Security
Smart Security Data Security
Water Access Security
Meter Watering
13
NB‑IoT Security: A Survey
As IoT devices are small and cheap, security is neglected in most of the cases. That is the
reason; the standardization is done by 3GPP, took no compromise when they defined this
technology. NB-IoT devices have the capability of security directly from LTE, but NB-
IoT is devised of any standardized security architecture. Some possible security attack sce-
narios based on applications and resource allocation are mentioned below, which can take
place on NB-IoT.
5.1 Smart Home
We are living in a world of smart objects. These objects are not intelligent, just smart
enough to be dangerous. Most of these devices are connected to the Internet, and hence
IP enabled. These smart devices contribute to the pool of things that can be recruited into
botnets or other platforms used for distributed attacks. These attacks make it more difficult
to detect the source of the attack and also make it easier to overwhelm the target. In the
past year, DDoS has become the attack of choice for attackers or blackmailers. In security
attacks, IP spoofing [74] is the most common type of attack. Typically, this attack is per-
formed over the stateless protocol named User Datagram Protocol (UDP). NB-IoT enabled
devices, such as Digital Video Recorders (DVRs) and IP Cameras are the most vulnerable
devices for the attack, in case of smart home security. There are approximately 1,20,000 IP
cameras detected that are vulnerable to ELF_PERSIRAI.A, detected by Trend Micro Inc.
Out of these vulnerable users, many users are unaware that their IP Cameras are exposed to
the Internet.
Smart home appliances and household IoT devices are easy targets to eavesdropper for
compromising the security. These devices are typically secure and in the reach of the
attacker. Fig. 14 shows some possible attacks that could impact on smart home objects/
devices.
1. Social attack Social attacks may occur in many steps. In one of these, an eavesdropper
investigates the victim’s information, like which low-security protocol the victim is
using and what is its trapdoor. After that, the attacker performs his action and gains the
victim’s trust. Then he takes the subsequent actions that break the security.
2. Bandwidth spoofing In this attack, we flood the communication channel to an extent,
that legitimate traffic starts affecting the communication. While the bandwidth is being
assigned to the NB-IoT device, there is more probability of acquisition of the bandwidth
by the Attacker. Due to which communication between the base station and the device
will be compromised. A possible solution to this type of attack is by using game theory
[75].
In our proposed system model, we highlight mainly smart home security attacks and
attacks on various sensitive inner implanted NB-IoT device. These devices consume very
less amount of power, as they send and receive very less amount of data in a range of byte
to few KB’s to users. The battery life of these devices may extend up to 10 years.
13
V. Kumar et al.
NB-IoT Cloud
ED Eavesderpper Server
Wireless Connection
Attacking Signals Doctor with
User/ Monitoring
Communication Link
Applicaon Device
After
Attack Flooding Attack
Before
ED-2 attack (Battery Drainage)
ED-1
ED- 5
NB-IoT eNode
S5 NB-IoT
S4
Device
C S3
NB-IoT
Device
S2 S1 ED-4
Acticity in
Home Under ED-3
Survellience
Patient with NB-IoT Heart
Device
In smart home security, a smart security wireless camera is connected with the gate-
way, and using the bandwidth of NB-IoT is the crucial device to attack. Thief primarily
attacks the device physically by switching off lights and may break it. If the attacker\eaves-
dropper (ED) is situated remotely, he can compromise that device in various manners like
(a) IP spoofing, (b) flooding attack, and (c) Bandwidth spoofing, etc. As in IP spoofing,
ED-2 may spoof the stationary device’s (camera) IP packets, containing source (camera) IP
address that is forged (spoofed) and may send the altered IP address to the base station. In
the second case of flooding attack, eaves transmit a large number of requests to the device
making it busy, due to which device is not able to respond to the request coming from a
legitimate user (base station). In the third case of bandwidth spoofing attack, as the NB-IoT
devices work on very low bandwidth, this type of attack is relatively easy in comparison
with other technologies.
5.1.3 Mathematical Modeling
For physical layer Security, Shannon theory is used for analyzing the impact of eavesdrop-
per in the NB-IoT device. First, we evaluate the secrecy capacity of the narrowband chan-
nel. In this section, we have derived the equation to calculate the secrecy rate and secrecy
outage probability of the system model proposed above. Here we compare the complexity
of the channel in an ideal situation with the secure transmission and after the attack of an
eavesdropper. NB-IoT devices are working on half duplex-frequency division multiplex-
ing operation mode with 60 kbps peak rate in uplink and 30 kbps peak rate in downlink
13
NB‑IoT Security: A Survey
transmission. [76–80] define the secrecy rate and secrecy outage probability for different
scenarios.
In the first case, Base Station (BS) allocates the channel to the NB-IoT enabled security
camera, which is stationary and situated in a smart home. Let us consider a scenario in
Smart Device (SD), i.e., that receives a signal ybs from the base station, having the sig-
nal strength, i.e., SNR is Δ. Simultaneously, an ED has intercepted the signal and spoof
the original signal (Δ) fully or partially, coming from BS to SD. ED has introduced the
noise ned , due to which signal strength received by the NB-IoT enabled camera is now (Δ′),
where (Δ ≫ Δ′). The same phenomena are incorporated with the mathematical analysis is
shown below.
For notation, we are considering that BS transmits the signal xs.
The signal received from the base station is given by:
√
ybs = Pbs hbs xs + nbs (1)
where, Pbs is the average transmitted power from the base station, hbs is the wireless fading
channel coefficient and nbs is the AWGN with variance 𝜎bs 2
.
Simultaneously, the received signal from eavesdropper is given as:
√
yed = Pbs hed xs + nbs + ned (2)
Here,Pbs is the average transmitted power from the base station, hed is the wireless fading
channel coefficient from ED to SD, nbs is the Additive White Gaussian Noise (AWGN) and
ned is AWGN due to eavesdropper signal, with variance 𝜎ed2
.
From (1), the channel capacity (BS- SD) can be written as:
( )
Cbs = log2 1 + 𝛽bs (3)
Pbs ||hbs ||
2
𝛽bs = 2
(4)
𝛼 + 𝜎bs
From (2), the channel capacity Ced has been affected by ED, and an intruder also
inspects it. Hence channel capacity has been reduced as per equation is written as:
( )
Ced = log2 1 + 𝛽ed (5)
Pbs ||hed ||
2
𝛽ed = 2 2
(6)
𝛼 + 𝜎bs + 𝜎ed
13
V. Kumar et al.
Pbs ||hedn ||
2
𝛽edn = 2 2 2 2 2 (8)
𝛼 + 𝜎bs + 𝜎ed + 𝜎ed + 𝜎ed − − − +𝜎ed
1 2 3 n
𝛽edn is SINR due to n cooperative eavesdroppers on the channel, ||hedn || is the channel gain
2
and 𝜎ed , 𝜎ed , 𝜎ed , … .., 𝜎ed are the variance of n eavesdroppers respectively.
2 2 2 2
1 2 3 n
Secrecy capacity is denoted by the difference between the capacities of the base station
channel and the eavesdropper channel. As the channel capacity has a non-negative value,
therefore the secrecy capacity (SD–BS) in the presence of eavesdroppers is given by:
( ) ( )
CSecrecy = [Cbs − Ced ]+ = [log2 1 + 𝛽bs − log2 1 + 𝛽ed ]+
{
(1+𝛽 ) (9)
log2 1+𝛽bs 𝛽bs > 𝛽ed
𝛽bs ≤ 𝛽ed
CSecrecy = ( ed )
0
i.e., Secrecy capacity is positive if the SINR of the base station is greater than the eaves-
dropper, and it becomes zero when eavesdropper’s SINR is greater than the base station.
From Eq. (9):
{
(1+𝛽 )
log2 1+𝛽bs 𝛽bs > 𝛽ed
𝛽bs ≤ 𝛽ed
CSecrecy = ( ed )
0
Putting values of 𝛽bs and 𝛽ed from Eqs. (4) and (6) the equation becomes:
� �
P �h �2
⎧ 1+ bs bs2
⎪ log
𝛼+𝜎
� bs � 𝛽bs > 𝛽ed
CSecrecy =⎨ 2 P �h �2
1+ bs 2 ed 2
𝛽bs ≤ 𝛽ed
⎪ 𝛼+𝜎 +𝜎
bs ed
⎩0
i.e., in the above situation, in cooperative eavesdropping attack, when SINR of the base sta-
tion is greater than the SINR of cooperative attacks of an eavesdropper, secrecy rate will be
positive. Otherwise, it will be zero, and eavesdropper will compromise the system.
Now, Channel capacity becomes
Case-I When eavesdropper trapped the mail channel, additional noise added with the
channel. The same has been reflected in equation (9).
Case-II In NB-IoT, operating devices are associated with low power, and if intruder
spoofs the bandwidth using game theory against the valid user, then bandwidth spoofing
plays a vital role in NB-IoT security issues because this attack directly affects the band-
width assigned to the valid user (capacity assigned to the valid user). Let us assume that
if λ is a factor associated with the bandwidth spoofing attack, then resultant capacity is
reduced by C/λ, so in this case from equation (5) the channel capacity is
13
NB‑IoT Security: A Survey
� Ced 1 ( )
Ced = = log2 1 + 𝛽ed (11)
𝜆 𝜆
Case-III (protection phenomena) In the case of IPsec, an encapsulation phenomenon
appears, so there is a tunnel between NB-IoT device (Camera) and the base station.
So eavesdropping and bandwidth spoofing can be avoided.
� Ced 1 ( )
Ced� = = � log2 1 + 𝛽ed (12)
𝜆� 𝜆
Hence the value 𝜆ed′ > 𝜆ed , when 𝜆′ > 𝜆 , due to the protection of the spoofed channel by
C C
IPSec.
Secrecy Outage Probability Analysis
In this section, we find the secrecy capacity of the channel in terms of the Secrecy
outage probability (SOP). This performance measurement is used to characterize the
secrecy performance of the NB-IoT channel communication system. The SOP is termed
as the probability that the instantaneous secrecy capacity CSecrecy is less than a predeter-
mined threshold secrecy rate Rsec (i.e., if CSecrecy < Rsec ). NB-IoT devices security will
not be guaranteed to spoofed information, and so that the system is said to be in outage;
otherwise, it will be secured.
( )
Pout RSec = P(CSecrecy < RSec ) (13)
As RSec < CSecrecy, eavesdropper channel is worse than base station channel i.e. Ced < Ced ,
′
so it will ensure perfect secrecy. Otherwise, if RSec > CSecrecy, then Ced > Ced and informa-
′
tion is compromised.
In Case-I when additional noise is added by an eavesdropper, SOP comes from (14)
� � � �
Pout CSecrecy ⟨RSec ��𝛽bs > 𝛽ed = P(𝛽bs < 2RSec 1 + 𝛽ed − 1��𝛽bs ⟩𝛽ed )
∞ 2 Sec (1+𝛽ed )−1
R
∫ ∫
= P(𝛽bs , 𝛽ed �𝛽bs > 𝛽ed )d𝛽ed d𝛽bs
𝛽ed (15)
∞ 2 Sec (1+𝛽ed )−1
R
� �
P(𝛽bs P 𝛽ed
∫ ∫
= d𝛽ed d
P(𝛽bs > 𝛽ed )
0 𝛽ed
13
V. Kumar et al.
Considering case-II of bandwidth spoofing and case-III of game theory and encapsulation
phenomena will be proposed for future work.
Let us assume that
nbs is the Additive White Gaussian Noise (AWGN) and ned is AWGN due to eavesdropper
signal, with variance 𝜎ed
2
.
If nbs ≤ nbs + ned → 𝜎bs2
≤ 𝜎bs
2 2
+ 𝜎ed
So from Eqs. (4) and (6)
𝛽bs ≥ 𝛽ed
Hence from Eqs. (3) and (5) channel capacity of the eavesdropper signal is less than the
channel capacity of base station.
Cbs ≥ Ced
≥ 1i.e. ≥1
Cbs C
(19)
Ced CS
For example, if we have taken 𝛽bs = [3, 7, 15, 31, …] and 𝛽ed = [1, 3, 7, 15, …], then ratio of
both capacity comes CC = [2.0, 1.5, 1.33, 1.25, … towards 1] (Table 5).
S
5.2 Smart Healthcare
If we go towards smart healthcare devices, they are tiny in size and consume very less
amount of battery power for transmitting the information to the end-user. Some of these
device implants in the inner body of the human/animal and are very critical. If an eaves-
dropper sends a fake request to the device continuously, the battery power starts draining
quickly, i.e., battery life is reduced from 10 years to a few days. It will make the patient’s
condition critical. Another attack shown in the system architecture is the source code
attack, i.e., if the attacker changes the hardware source code anyhow, the device will not
perform as usual and give wrong results, which can also result in severe problems with the
patient. Figure 15 shows the small overview of attacks on health implants devices. Many
13
NB‑IoT Security: A Survey
Eavesdropper
13
V. Kumar et al.
smart wearable healthcare devices use NB-IoT technology due to long battery life and deep
indoor coverage features.
In the first case, we consider another attack possible on the pacemaker device, i.e., the
source code attack in which the code written on EEPROM is altered or erased so that it
will give wrong information of the patient. These devices are implanted inside the human
body or are wearable in the wrist or other body parts. Attacks on these type of devices are
critical due to concern with the health. The scenario of these attacks is shown in Fig. 15.
Attacks on healthcare monitoring devices come under this category.
Pacemaker, a medical heart implant device, delivers an electrical impulse to the heart
muscles to regulate the beating of the heart. This pacemaker is programmed by a cardi-
ologist to select optimal pacing modes for individual patients. This device consists of two
main components [81]. The first one is the device controller monitor (DCM), and the sec-
ond is the pulse generator (PG). DCM has a graphical user interface with three tabs, con-
sisting of current pacemaker configuration, system default value, and patient information.
All the information and parameters of DCM are written in EEPROM on the pacemaker
board so that pacemaker can also operate in off mode without any intervention. The work
of DCM is to: (a) review battery status, (b) program the system before implementation, (c)
Evaluate ventricular and atrial lead signal amplitudes, impedances, and pacing thresholds,
(d) set up appropriate parameters (e) test the pacemaker in the patient and (f) Interrogate
the system.
A second most important part of the pacemaker is PG. Its work is sensing and gen-
erating the pulse signals as needed to keep the patient’s heart beating. PG code divides
into two parts: Hardware dependent and hardware independent. The first one has a device
driver, timers, and the second one consists of a model used to verify the correctness of the
pacemaker.
In the second case, an eavesdropper (ED-5) sends a large number of request signals to a
pacemaker. As a result of which, the battery drains rapidly, and the patient’s organs infor-
mation will not transfer to the respective caretaker. This type of flooding attack may gener-
ate a problem for the patient.
1. Source code attack Source code attack is among the deadliest attack on NB-IoT oper-
ated healthcare devices. In this attack, the device code written on PROM, are the main
target of the attacker. This code can be changed by the programmer (attacker) partially
or erased, and a new code can be written on the compromised device. Details of this
attack have been provided in the previous section.
2. Battery drainage attack Another attack possible on the tiny size, healthcare devices,
is the attack on battery power. As the battery life of the NB-IoT device is more than
10 years, its battery drains very slowly. In this type of attack, eavesdropper sends a large
number of request messages to the device. The device responds according to request,
which consumes much energy, i.e., battery usage is very high. As a result, the device’s
battery drains rapidly. It will create a critical condition for the patient, who implants
this healthcare device.
13
NB‑IoT Security: A Survey
5.3 Smart Agriculture
Smart agriculture is not as popular as smart health or smart consumer connected devices.
Smart agriculture consists of crop Management, Cattle monitoring in dairy form, climate
monitoring, greenhouse automation, etc. Attacks on NB-IoT enabled agriculture system
monitoring devices are not as critical as human body implant devices, but it will affect
crop production, cattle health, fish farming, etc. Somewhere it is also called e-farming. IoT
technology can support precision agriculture, whose aim is to provide maximum return
on investment in agriculture with the help of soil ph detection/humidity/temperature sen-
sors. Usually, the agriculture system runs on an unmonitored network, due to which attacks
attempted on it go unobserved. An eavesdropper can easily access the irrigation control
system, pesticide administration, Cattle health information and manipulate it, without the
farmer knowing. These are some attacks that are possible in the agriculture system.
It is a big task to allocate proper resources to the NB-IoT object so that it operates without
any external intervention. The allocation of the resource is performed in a manner to mini-
mize the maximum risk, controlling the range of operation of the attacker. There are vari-
ous types of possible risks/attacks that reduce the effectiveness of their activity.
1. Resource exhaustion It happens when the NB-IoT base station does not control the
amount or size of resources properly that are requested by the object [82]. By which
more resources are utilized, intended by the resource allocator. These limited resources
may be a memory, file system storage, or processing unit. If this resource allocation is
monitored and triggered by an attacker and the amount of the resource is not controlled,
the attacker can consume all the available resources and can perform DoS attack, due
to which legitimate devices may not be able to use the resources appropriately and face
the problem to access it. For example, memory exhaustion attack against an application
used by NB-IoT object could slow down the application as well as the resource allocator
operating system.
2. Selective forwarding attack In this attack, attacker nodes act like normal nodes and
selectively drop the packets. These drop packets may be random, and sometimes it is
impossible to identify such attacks. In [83], the authors simulate the selective forwarding
attack for more than 500 nodes. These nodes are not protected for a long time duration
when the defense strategy is changed, and the security resource that maximizes the risk
is removed.
3. Bandwidth spoofing As already discussed previously [75], it is one of the significant
resource allocation attack possible due to the limited amount of bandwidth (180 kHz)
available for NB-IoT device. This bandwidth allocation attack possibility is high at the
time of the bandwidth assignment.
4. DDoS attack Distributed denial of service [45] is a significant threat in resource alloca-
tion for IoT/NB-IoT. As discussed in Table 2, in this attack, the NB-IoT device refuses
to respond to the request coming from the legitimate user due to the non-availability of
the resource. Earlier, this attack was performed by underground attackers. DDoS attacks
13
V. Kumar et al.
A A
Aacker Aacker
(No power limitaon) (No power limitaon)
S7
x
S6
A S1 x x B
Sender S4 S5
Receiver
S2
S3
Shared Node
on unsecured IoT devices are doubled every year, as per the report published in 2017 by
a security firm Corero. Mirai, the most successful DDoS attack, occurred in September
2016. It almost disabled a website with 620 Gbps of network traffic attack.
1. Node failure attack At the time when sender node transfers the information to the
receiver node, an outside attacker sends multiple requests to the sender for data, due to
which the sender node’s Signal to noise ratio (SNR), which is greater than one, comes
down to less than one. To increase the SNR, the sender node increases power.
This process continuously runs between the sender, attacker, and transmission chan-
nel. After a certain period, due to limited power constraints of NB-IoT device, the sender
power is drained out, and the node becomes down or fails to transmit the data signal.
Fig. 16 helps to understand the node failure attack.
2. Shared node attack This resource allocation attack is possible when sender A is not able
to send the data from S 1 to S
6, and hence sends the data through node S
7. This mediator
node S7 is known as a shared node. As shown in Fig. 17, among these shared nodes, the
attacker acts like a black hole and shows themselves that it provides a better transmission
path to send the data at the destination node with good channel conditions. While in
reality, the attacker node captures the packets and after alteration, shares these packets
to other nodes or with the destination node. This attacked node shows to other adjacent
nodes that it is a reliable node and can forward the adjacent node’s data efficiently to
13
NB‑IoT Security: A Survey
the destination node, that it captures the network data and forwards the altered data to
the receiver node.
A synchronizes with
3. Synchronization attack In synchronization attack, transmitter node N
B by sending a timestamp with the data packet, as shown in Fig. 18.
the receiver node N
In between this communication channel, an attacker C captures the data from Node NA and
forwards it to the receiver N B via another attacker D. However, the data sent via D does not
synchronize with the receiver N B and discards it in starting, due to synchronizing with the
sender node NA. Response time of the attacker node D is less than NA because hop count
associated with N B is less than N
A. Hence, the response time of D is less than N
A. So, after
a certain period, D synchronizes with NB instead of NA.
More than 25% of the cyber-attacks will be on the connected devices till 2025 (according
to the report on IoT security by Digital security). These connected devices may be using
any of the IoT technology. Among these technologies, NB-IoT connected devices will also
get affected by the attackers. However, NB-IoT provides LTE level security. Various pro-
tection strategies like game theory, artificial intelligence, deep learning may be some good
sources to secure data communication between low resourced NB-IoT devices. Rullo et al.
[83], proposed a security model using Pareto optimality solution, by which the probability
of a successful attack is minimized. He also provides a resource allocation plan for differ-
ent large-scale network topologies. Another game theory oriented security approach using
a Nash equilibrium is defined in [84]. In the game model, the defender’s objective is to
maintain the highest security of the whole IoT system, through the selection of respective
detection threshold value, while the attacker’s goal is to optimize the attack on the device/
node with limited attacking resources. Article [85] contributes the Machine Learning (ML)
based on an unauthorized IoT device’s detection approach. This experimental technique is
based on supervised ML, and provides approximately 99% accuracy on test data results,
collected from 17 IoT devices with 9 different types of devices.
Another ML-based IoT security enhancement technique, named RF-PUF proposed
in [86], uses the preexisting asymmetric radio frequency communication framework, so
it does not require extra circuits for physically unclonable function (PUF) generation. He
employed an Artificial Neural Network (ANN) as a learning engine. Simulation results
employ 99% accuracy using supervised learning. [87] provides a deep learning based
approach for detecting Internet of Battlefield Things (IoBT) malware and junk code
TA
NA NB
TD
Sender Receiver
D
Aacker 2
13
V. Kumar et al.
This paper provides an extensive survey of security issues related to IoT and NB-IoT tech-
nologies. At the same time, this paper provides a bridge between IoT and NB-IoT. Secu-
rity issues play a vital role in the current IoT network. With the consideration of this as a
researcher and academia, we have focused our work related to security issues in NB-IoT
like social attack, health care attacks, bandwidth spoofing attack, IP spoofing attack, etc.
To provide the real-time deployment of NB-IoT, we have addressed the resource alloca-
tions with mathematical analysis, and also different algorithms and techniques have been
incorporated with the consideration of security issues in NB-IoT. Possibilities of security
issues in NB-IoT architecture have been proposed with a consideration of real-time appli-
cations and also formulated, how we can overcome these possible security problems.
Artificial Intelligence-based optimizations will provide an excellent platform to protect
spoofing attacks for future NB-IoT real-time deployment. It is based on adaptive prediction
techniques for spoofing attacks by using data mining or stochastic process. The accuracy of
this type of cross-layer optimization is very high as compared to general prediction scenarios.
Acknowledgements The authors thankfully acknowledge the support provided by SMVDU-TBIC and 5G &
IoT Laboratory, School of Electronics and Communication Engineering at Sri Mata Vaishno Devi Univer-
sity, Katra.
Appendix
Under various research projects, the most prominent research and innovation programs are
funded by the European Union named Horizon 2020. The funding of this program is 80 bil-
lion euros and available for the 7-year duration (2014–2020) [88]. Stanford, University of
Michigan, and UC Barkley are collaboratively working on a 5-year project named Secure
Internet of Things Project (SITP). It was started in September-2016 to research fundamen-
tally new and better ways to secure the IoT and make them easy to use. They are working in
this area. Table 6 shown below describes the various projects running currently worldwide.
Most of the projects aim to provide end to end secure transmission between devices, imple-
menting security techniques, and working towards the smart city. Various IoT projects run-
ning in European countries are working towards smart business, smart country, and remov-
ing various security vulnerabilities.
13
Table 6 Current ongoing NB-IoT/IoT security-related activities
S. nos. Project name Aim of research Area of research HTTPS location
1 stalkIT This project rovides the low cost and long The project is based on LPWAN technol- https://cordis.europa.eu/project/id/887525
life asset monitoring systems ogy, such as NB-IoT and LTE-M
2 Mitigating IoT-Based DDoS This project aims to lower the vulnerability The project focuses on consumer and small https://www.nccoe.nist.gov/projects/build
of the system to automated distributed business environments ing-blocks/mitigating-iot-based-ddos
NB‑IoT Security: A Survey
13
Table 6 (continued)
S. nos. Project name Aim of research Area of research HTTPS location
13
7 SEMIoTICS SEMIoTICS aims to develop a pattern- This framework support cross-layer intel- https://cordis.europa.eu/project/rcn/21354
driven framework, built upon existing ligent dynamic adaptation, including 8_en.html
IoT platforms, to enable and guarantee heterogeneous smart objects, networks,
secure and dependable actuation and and clouds, addressing effective adapta-
semi-autonomic behavior in IoT/IIoT tion and autonomic behavior at the field
applications (edge) and infrastructure (backend)
layers based on intelligent analysis and
learning
8 SCOTT This project aims to develop trust in wire- Its focus is on WSN and actuator networks. https://scottproject.eu/
less solutions and to improve the social Also, it is working on smart infrastruc-
acceptability of IoT at a full pace. In this ture health and communication in mobil-
project, there are 57 key partners from 12 ity, thus addressing essential European
countries, to provide an effective solution societal challenges and significantly
for wireless and IoT challenges, like an working on urgent issues like Industry
end to end security, interoperability, and 4.0 and Automated vehicles
reliable connectivity
9 EPoCH The work aims to prevent specific danger- This project works on the following two https://www.openaire.eu/search/proje
ous attacks like the backdoor attack main modules: ct?projectId=corda__h2020::acf64d5d0a
in the cryptography of IoT devices. It In the first module, the aim is to actively 9b0661540820c3ae523869
causes a complete system loss of secu- design the fundamental countermeasure
rity. Finding the countermeasure of the for the attack, which is analogous for the
attack on the cryptographic algorithm is cryptoanalysis. Finding the consequences
also the goal of this project of system security
Secondly, the development of a detection
based pro-active approach, that provides
systematic protection against illegitimate
manipulators
10 DOGANA To reduce the modern social engineering This project is doing work on advanced https://www.dogana-project.eu/index.php
2.0 vulnerability risk and to deploy effi- social engineering security model. It is
cient methods to fill the gap by designing also providing an insurance model for
a framework cyber-attack risks
V. Kumar et al.
Table 6 (continued)
S. nos. Project name Aim of research Area of research HTTPS location
11 WORLDTIMING II The aim of this project’s second phase is to The project is working on Industrial IoT https://sevensols.com/index.php/projects/
provide security against Global Naviga- and distributed systems. It is based on world-timing/
tion Satellite System (GNSS) receivers the satellite signal and emphasizing criti-
signal vulnerabilities and guarantee an cal applications like smart grid, telecom-
NB‑IoT Security: A Survey
13
V. Kumar et al.
List of abbreviations
See Table 7.
13
NB‑IoT Security: A Survey
Table 7 (continued)
S. nos. Abbreviation Meaning
13
V. Kumar et al.
References
1. Granjal, J., Monteiro, E., & SáSilva, J. (2015). Security for the Internet of Things: A survey of existing
protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3), 1294–1312.
2. Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A
review of the state of the art and future challenges. IEEE Access, 4, 1375–1384.
3. Razzaque, M. A., Milojevic-Jevric, M., Palade, A., & Clarke, S. (2016). Middleware for Internet of
Things: A Survey. IEEE Internet of Things Journal, 3(1), 70–95.
4. Gozalvez, J. (2016). New 3GPP standard for IoT (mobile radio). IEEE Vehicular Technology Maga-
zine, 11(1), 14–20.
5. Li, S., Xu, L. D., & Zhao, S. (2014). The Internet of Things: A survey (pp. 243–259). New York:
Springer.
6. Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2017). Evaluating critical security issues of the IoT
world: Present and future challenges. IEEE Internet of Things Journal, 5(4), 2483–2495.
7. Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54,
2787–2805.
8. Miorandi, D., Sicari, S., Pellegrini, F. D., & Chlamtac, I. (2012). Internet of Things: Vision, applica-
tions, and research challenges. Ad Hoc Networks, 10(7), 1497–1516.
9. Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2017). Advanced lightweight encryption algo-
rithms for IoT devices: Survey, challenges, and solutions. Journal of Ambient Intelligence and Human-
ized Computing. https://doi.org/10.1007/s12652-017-0494-4.
10. Cheng, C., Lu, R., Petzoldt, A., & Takagi, T. (2017). Securing the Internet of Things in a quantum
world. IEEE Communications Magazine, 55(2), 116–120.
11. Bormann, C., Castellani, A. P., & Shelby, Z. (2012). CoAP: An application protocol for billions of tiny
internet nodes. IEEE Internet Computing, 1(2), 62–67.
12. Premnath, S. N., & Haas, Z. J. (2015). Security and privacy in the Internet-of-Things under time-and-
budget-limited adversary model. IEEE Wireless Communications Letters, 4(3), 277–280.
13. Liu, J., & Sun, W. (2016). Smart attacks against intelligent wearables in people-centric Internet of
Things. IEEE Communications Magazine, 54, 44–49.
14. Sedjelmaci, H., Senouci, S. M., & Taleb, T. (2017). An accurate security game for low-resource IoT
devices. IEEE Transactions on Vehicular Technology, 66, 9381–9393.
15. Cheng, S. M., Chen, P. Y., Lin, C. C., & Hsiao, H. C. (2017). Traffic-aware patching for cyber security
in mobile IoT. IEEE Communications Magazine, 55, 29–35.
16. Chen, J., Hu, K., Wang, Q., Sun, Y., Shi, Z., & He, S. (2017). Narrowband internet of things: Imple-
mentations and applications. IEEE Internet of Things Journal, 4(6), 2309–2314.
17. Elsaadany, M., Ali, A., & Hamouda, W. (2017). Cellular LTE-A technologies for the future Internet-
of-Things: Physical layer features and challenges. IEEE Communications Surveys & Tutorials, 19(4),
2544–2572.
18. Yang, W., Wang, M., Zhang, J., Zou, J., Hua, M., Xia, T., et al. (2017). Narrow band wireless access
for low-power massive internet of things: A bandwidth perspective. IEEE Wireless Communications,
24(3), 138–145.
19. Finnegan, J., & Brown, S. (2018). A comparative survey of LPWA networking.
20. Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in
Communications, 24(2), 381–394.
21. http://www.radio-electronics.com/info/wireless/radio-frequency-identifi-cation-rfid/iso-epcglobal-iec-
standards.php.
22. Bu, K., Xu, M., Liu, X., Luo, J., Zhang, S., & Weng, M. (2015). Deterministic detection of cloning
attacks for anonymous RFID systems. IEEE Transactions on Industrial Informatics, 11(6), 1255–1266.
23. Xiao, Q., Gibbons, T., & Lebrun, H. (2008). RFID technology, security vulnerabilities, and
countermeasures.
24. Burmester, M., & De Medeiros, B. (2007). RFID security: Attacks, countermeasures and chal-
lenges. In The 5th RFID academic convocation, the RFID journal conference.
25. Rotter, P. (2008). A framework for assessing RFID system security and privacy risks. IEEE Pervasive
Computing, 7(2), 70–77.
26. Bu, K., Weng, M., Zheng, Y., Xiao, B., & Liu, X. (2017). You can clone but you cannot hide: A sur-
vey of clone prevention and detection for RFID. IEEE Communications Surveys & Tutorials, 19(3),
1682–1700.
27. Wang, K. H., Chen, C. M., Fang, W., & Wu, T. Y. (2017). On the security of a new ultra-lightweight
authentication protocol in IoT environment for RFID tags. The Journal of Supercomputing, 74, 65–70.
13
NB‑IoT Security: A Survey
28. Fan, K., Jiang, W., Li, H., & Yang, Y. (2018). Lightweight RFID protocol for medical privacy protec-
tion in IoT. IEEE Transactions on Industrial Informatics, 14(4), 1656–1665.
29. https://www.silabs.com/documents/public/white-papers/evolution-of-wir-eless-sensor-networks.pdf.
30. Wang, Q., & Balasingham, I. (2010). Wireless sensor networks—An introduction. In Y. Kheng Tan
(Ed.), Application-centric design. ISBN: 978-953-307-321-7.
31. Jha R. K., Dalal, U. D. & Bholebawa, I. Z. (2012). Performance analysis of black hole attack on
WiMAX-WLAN interface network. In Third international conference on computer and communica-
tion technology, Allahabad, pp. 303–308.
32. Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless
sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.
33. Sen, A., & Madria, S. (2017). Risk assessment in a sensor cloud framework using attack graphs. IEEE
Transactions on Services Computing, 10(6), 942–955.
34. Yuxing, M., Huiyuan, Z., & Dongmei, Y. (2018). Weak node protection to maximize the lifetime of
wireless sensor networks. Journal of Systems Engineering and Electronics, 29(4), 693–706.
35. Gandino, F., Ferrero, R., & Rebaudengo, M. (2017). A key distribution scheme for mobile wireless
sensor networks: q-s-composite. IEEE Transactions on Information Forensics and Security, 12(1),
34–47.
36. Guinard, D., Trifa, V., Mattern, F., & Wilde, E. (2011). From the Internet of Things to the Web of
Things: Resource oriented architecture and best practices.
37. Xie, W., Tang, Y., Chen, S., Zhang, Y., & Gao, Y. (2016). Security of Web of Things: A survey (pp.
61–70). Dordrecht: Springer.
38. Barka, E., Mathew, S. S., & Atif, Y. (2015). Securing the Web of Things with role-based access control
(pp. 14–26). Dordrecht: Springer.
39. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: Perspec-
tives and challenges. Wireless Network, 20, 2481–2501. https://doi.org/10.1007/s11276-014-0761-7.
40. Bandyopadhyay, D., & Sen, J. (2011). Internet of Things: Applications and challenges in technology
and standardization. Wireless Personal Communication, 58, 49–69.
41. Xu, L. D., He, W., & Li, S. (2014). Internet of Things in industries: A Survey. IEEE Transactions on
Industrial Informatics, 10(4), 2233–2243.
42. Ge, M., Hong, J. B., Guttmann, W., & Kim, D. S. (2017). A framework for automating security analy-
sis of the internet of things. Journal of Network and Computer Applications, 83, 12–27.
43. Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of
security issues for cloud computing. Journal of internet services and applications., 4(1), 5.
44. Shah, H., Anandane, S. S., & Shrikanth. (2013). Security issues on cloud computing. arXiv:1308.5996.
45. Aris, A., Oktug, S. F., & Yalcin, S. B. O. (2015). Internet-of-Things security: Denial of service attacks.
In Signal processing and communications applications conference (SIU).
46. Illiano, V. P., & Lupu, E. C. (2015). Detecting malicious data injections in event detection wireless
sensor networks. IEEE Transactions on Network and Service Management, 12(3), 496–510.
47. Xu, K., Zhang, X., Song, M., & Song, J. (2009). Mobile Mashup: Architecture, challenges and sugges-
tions. International Conference on Management and Service Science, Wuhan, 2009, 1–4.
48. Feng, Y., Wang, W., Weng, Y., & Zhang, H. (2017). A replay-attack resistant authentication scheme
for the Internet of Things. In IEEE international conference on computational science and engineering
(CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), Guangzhou,
pp. 541–547.
49. Cyr, B., Horn, W., Miao, D., Specter, M. (2014). Security analysis of wearable fitness devices (Fitbit).
Massachusetts Institute of Technology Cambridge, Massachusetts, USA.
50. Cekerevac, Z., Dvorak, Z., Prigoda, L., & Cekerevac, P. (2017). Internet of Things and the man-in-the-
middle attacks-security and economic risks. MEST Journal, 5(2), 15–25.
51. Mohammadi, S., & Jadidoleslamy, H. (2011). A comparison of link layer attacks on wireless sensor
networks. International Journal on Applications of Graph Theory in Wireless Ad Hoc Networks and
Sensor Networks (GRAPH-HOC), 3(1), 35–56.
52. Zhang, K., Liang, X., Lu, R., & Shen, X. (2014). Sybil attacks and their defenses in the Internet of
Things. IEEE Internet of Things Journal, 1(5), 372–383.
53. Campus, N. M., Govindapura, G., & Yelahanka, B. (2018). Denial-of-service or flooding attack in IoT
routing. International Journal of Pure and Applied Mathematics., 118(19), 29–42.
54. Benzarti, S., Triki, B., & Korbaa, O. (2018). Survey on attacks in Internet of Things based networks. In
2017 International conference on engineering & MIS (ICEMIS).
55. Mosenia, A., & Jha, N. K. (2016). A comprehensive study of security of internet-of-things. IEEE
Transactions on Emerging Topics in Computing., 5(4), 586–602.
13
V. Kumar et al.
56. Salehi, A., Razzaque, M. A., Naraei, P., & Farrokhtala, A. (2013). Detection of sinkhole attack in wire-
less sensor networks. In IEEE international conference on space science and communication (IconS-
pace), pp. 361–365.
57. Namvar, N., Saad, W., Bahadori, N., & Kelley, B. (2016). Jamming in the Internet of Things: A game-
theoretic perspective. In IEEE global communications conference (GLOBECOM), pp. 1–6.
58. Jokhio, S. H., Jokhio, I. A., & Kemp, A. H. (2012). Node capture attack detection and defence in wire-
less sensor networks. IET Wireless Sensor Systems, 2(3), 161–169.
59. Abawajy, J. (2009). Enhancing RFID tag resistance against cloning attack. In 2009 Third international
conference on network and system security, Gold Coast, QLD, pp. 18–23.
60. Ling, Z., Luo, J., Xu, Y., Gao, C., Wu, K., & Fu, X. (2017). Security vulnerabilities of Internet of
Things: A case study of the smart plug system. IEEE Internet of Things Journal, 4(6), 1899–1909.
61. Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2017). Advanced lightweight encryption algo-
rithms for IoT devices: Survey, challenges, and solutions. Berlin: Springer.
62. Yang, X., Wang, X., Wu, Y., Qian, L. P., Lu, W., & Zhou, H. (2018). Small-cell assisted secure traffic
offloading for narrowband Internet of Thing (NB-IoT) systems. IEEE Internet of Things Journal, 5(3),
1516–1526.
63. Safi, A. (2017). Improving the security of Internet of things using encryption algorithms. World Acad-
emy of Science, Engineering and Technology, International Journal of Computer and Information
Engineering, 11(5), 546–549.
64. Lee, J., & Lim, D. (2014). Parallel architecture for high-speed block cipher, HIGHT. International
Journal of Security and Its Applications, 8(2), 59–66.
65. Shen, S., Huang, L., Zhou, H., Yu, S., Fan, E., & Cao, Q. (2018). Multistage signaling game-based
optimal detection strategies for suppressing malware diffusion in fog-cloud-based IoT networks. IEEE
Internet of Things Journal, 5(2), 1043–1054.
66. Usman, M., Ahmed, I., Aslam, M. I., Khan, S., & Shah, U. A. (2017). SIT: A lightweight encryp-
tion algorithm for secure Internet of Things. International Journal of Advanced Computer Science and
Applications, 8(1), 2017. https://doi.org/10.14569/IJACSA.2017.080151.
67. Xiao, G., Guo, J., Xu, L. D., & Gong, Z. (2014). User interoperability with heterogeneous IoT devices
through transformation. IEEE Transactions on Industrial Informatics, 10(2), 1486–1496.
68. Kar, S. (2014). Internet of Things will multiply the digital universe data to 44 trillion GBs by 2020
(online document). http://cloudtimes.org/2014/04/17/internet-of-things-will-multiply-thedigital-unive
rse-data-to-44-trillion-gbs-by-2020.
69. Bandyopadhyay, D., & Sen, J. (2011). Internet of Things: Applications and challenges in technology
and standardization. Wireless Personal Communications, 58(1), 49–69.
70. Islam, S. M. R., Kwak, D., Kabir, M. H., Hossain, M., & Kwak, K. S. (2015). The Internet of Things
for health care: A comprehensive survey. IEEE Access, 3, 678–708.
71. Boisguene, R., Tseng, S. C., Huang, C. W., & Lin, P. (2017). A survey on NB-IoT downlink schedul-
ing: issues and potential solutions. In International wireless communications and mobile computing
conference, pp. 547–551.
72. Hoymann, C., Astely, D., Stattin, M., Wikström, G., Cheng, J. F., Höglund, A., et al. (2016). LTE
release 14 outlook. IEEE Communication Magazine, 54, 44–49.
73. Rico-Alvarino, A., et al. (2016). An overview of 3GPP enhancements on machine to machine commu-
nications. IEEE Communications Magazine, 54(6), 14–21.
74. Rajashree, S., Soman, K. S., & Shah, P. G. (2018). Security with IP address assignment and spoofing
for smart IOT devices. In 2018 international conference on advances in computing, communications
and informatics (ICACCI), Bangalore, pp. 1914–1918.
75. Gupta, A., Jha, R. K., Gandotra, P., & Jain, S. (2018). Bandwidth spoofing and intrusion detection sys-
tem for multistage 5G wireless communication network. IEEE Transactions on Vehicular Technology,
67(1), 618–632.
76. Barros, J., & Rodrigues, M. R. D. (2006). Secrecy capacity of wireless channels. In 2006 IEEE inter-
national symposium on information theory, Seattle, WA, pp. 356–360.
77. Rawat, D. B., White, T., Parwez, M. S., Bajracharya, C., & Song, M. (2017). Evaluating secrecy out-
age of physical layer security in large-scale MIMO wireless communications for cyber-physical sys-
tems. IEEE Internet of Things Journal, 4(6), 1987–1993.
78. Zou, Y., Zhu, J., Wang, G., & Shao, H. (2014). Secrecy outage probability analysis of multi-user multi-
eavesdropper wireless systems. In 2014 IEEE/CIC international conference on communications in
China (ICCC), Shanghai, pp. 309–313.
79. Chen, G., Coon, J. P., & Di Renzo, M. (2017). Secrecy outage analysis for downlink transmissions
in the presence of randomly located eavesdroppers. IEEE Transactions on Information Forensics and
Security, 12(5), 1195–1206.
13
NB‑IoT Security: A Survey
80. Chrysikos, T., Dagiuklas, T., & Kotsopoulos, S. (2010). A closed-form expression for outage secrecy
capacity in wireless information: Theoretic security. Wireless Telecommunications Laboratory, pp.
3–12.
81. PACEMAKER System Specification. (2007). Copyright 2007 Boston Scientific January 3.
82. Brachmann, M., Keoh, S. L., Morchon, O. G., & Kumar, S. S. (2012). End-to-end transport security in
the IP-based Internet of Things. In 2012 21st International conference on computer communications
and networks (ICCCN), Munich, pp. 1–5.
83. Rullo, A., Midi, D., Serra, E., & Bertino, E. (2017). Pareto optimal security resource allocation for
Internet of Things. ACM Transactions on Privacy and Security, 20(4), 1–30.
84. Wu, H., & Wang, W. (2018). A game theory based collaborative security detection method for Internet
of Things systems. IEEE Transactions on Information Forensics and Security, 13(6), 1432–1445.
85. Meidan, Y., Bohadana, M., Shabtai, A., Ochoa, M., Tippenhauer, N. O., Guarnizo, J. D., & Elovici, Y.
(2017). Detection of unauthorized IoT devices using machine learning techniques. arXiv:1709.04647
v1.
86. Chatterjee, B., Das, D., Maity, S., & Sen, S. (2019). RF-PUF: Enhancing IoT security through authen-
tication of wireless nodes using in-situ machine learning. IEEE Internet of Things Journal, 6(1),
388–398.
87. Azmoodeh, A., Dehghantanha, A., & Choo, K. R. (2019). Robust Malware detection for internet of
(battlefield) Things devices using deep eigenspace learning. IEEE Transactions on Sustainable Com-
puting, 4(1), 88–95.
88. https://ec.europa.eu/programmes/horizon2020/what-horizon-2020.
Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
Mr. Vinod Kumar (S’17) received his B.Tech. in Computer Science and
Engineering from Uttar Pradesh Technical University, Lucknow, India,
and M.Tech. degree in Computer Science and Engineering from Dr.
B.R. Ambedkar National Institute of Technology, Jalandhar, India. He
is currently pursuing the Ph.D. degree in Computer Science and Engi-
neering at Shri Mata Vaishno Devi University, Katra, Jammu and
Kashmir, India. His Research Interest includes emerging technology,
like Internet of Things. He is currently working on security issues on
Narrowband- Internet of Things. His area of interest is Network Secu-
rity, Cryptography, and Computer network. He is working on MAT-
LAB, SystemVue, and Python for his research work. He has received
the teaching assistantship from 2006–2008 and since 2017 through
MHRD. He is a student member of IEEE.
13
V. Kumar et al.
2017, and 2018 and a student travel grant from COMSNET 2012. He is a senior member of IEEE, GISFI
and SIAM, International Association of Engineers (IAENG), and ACCS (Advanced Computing and Com-
munication Society). He is also a member of ACM and CSI, many patents, and more than 2161 citations in
his credit.
13