Submitted:
15 February 2023
Posted:
17 February 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
- There are noticeable software and computational resource limitations for IoT devices, which prevents the utilization of more sophisticated security algorithms.
- The IoT devices are low powered, which restricts the usage of more energy intensive security best practices and also increases the risk for technical failures (e.g. loss of data).
- The highly heterogenous hardware also leads to the usage of diverse software stacks and different data formats which increases the available attack surface.
- Analyze and identify the potential risks and available attacks against IoT- based platforms
1.1. Open Urban Platforms
- The implementation of a logical reference architecture following design principles of open APIs that supports data flows within and across city systems as well as enriching the raw data streams to generate smart data as being required by the consuming entities.
- It is exploiting modern technologies to harvest, collect, and analyze the urban data and providing the results to citizens and enterprises, e.g. sensor nodes and other IoT devices, cloud services, mobile connectivity, machine learning for analytics, publishing and sharing via social media and APPs.
- It is providing the building blocks that enable cities to rapidly shift from fragmented and isolated operation of individual infrastructures towards an integrated approach by connecting the systems via a platform, including cross-domain data analytics for predictions, forecasts, or better insight, and novel ways of engaging and serving city stakeholders offering Smart Services, both public and commercial.
1.2. Urban IoT Architectures and OUP
- Data sources and Actors: IoT devices and sensors are utilized for collecting and analyzing data. The collected and analyzed data gets transmitted to explicit gateways via e.g., LoRaWAN or NB-IoT networks.
- IoT Platform and Connectivity: From the gateways the data is forwarded across the network through different communication channels (e.g. mobile network cells) to IoT-platforms. These platforms support the management of the IoT-devices through their complete operational life cycle and are usually operated by the IoT-device vendors.
- Urban Data Platform (UDP) (Smart City Core Services): Connectors receive the data from the IoT-platform, normalize them, and usually enrich them by data stored in a UDP database. For example, a Connector can receive a message with an IoT-device-ID and a date – in this case, the message on the output of the Connector is extended with the geo-location of the IoT-device. In some cases, the IoT-devices are connected directly to the UDP and are managed by an IoT-module on the UDP. From the Connectors the data is send via a message bus to the storage and to a Complex Event Processing engine (CEP), which applies rules on the events and produces new messages. By doing this, the CEP can be considered as a virtual sensor and the new produced messages are stored in the belonging Storage as well. The Analytics module combines analytics services and libraries. The analytics services are often machine learning/AI based services, e.g. for predictions.
- APP/APIs: The UDP is connected to many APPs or provides outbound APIs. Dashboards or Cockpits are the most used APPs and provide information to users. Data Laboratories are using Analytics services of the UDP and enable experts to perform sophisticated analytics. Marketplaces are used to provide data. Other data are provided by Open APIs on the outbound layer of the UDP/OUP.
1.3. Smart City Data based Services
- Smart Government: The key difference between e-government and smart government is the use of intelligently networked objects and cyber-physical systems [24]. Structures such as big data and open data are included in the development strategy. The change relates either to the resulting product, the process, or the prerequisites for the creation of the administrative service in question. Smart government therefore provides the means towards a data-driven digital administration [24].
- Smart Economy: Within Smart Economy, cities are able to provide important data for new business models and to create conditions for economic development.
- Smart Environment: City data and their analytics provide new terms and conditions for environmental support. Within a large number of governmental tasks - like waste monitoring or energy efficiency in case of street lighting – data analytics can help to reduce CO²-Emissons and even provide an improved habitat for animals and humans.
- Smart Urban Society: Smart Urban Society addresses - in a data-based context - topics like digital collective urban living and social interaction. Therefore, new incentives to live in a city can be developed and the social exchange can be supported. Topics like Smart Health and Education could also be the focus of this field and can be supported, e.g. through city-data and self-sovereign identities.
- Smart Mobility: Smart Mobility increases the use of environmental-friendly mobility options. Here, data is used to give users more information about the possibilities and benefits of using cheaper, faster and environmental-friendly mobility solutions.
1.4. Contribution
- Propose an integrated methodology for setting up and continuously improving cybersecurity solutions in urban IoT networks
- Provide an overview of potential attacks on Smart City IoT networks as a motivation for the above-mentioned integrated methodology
- Exemplify parts of the integrated methodology on an urban IoT network instance, which is simulated together with industrial partners and a municipality in Germany
1.5. Structure of the Presentation
2. Problem Statement
2.1. General Hazardous Situation
2.2. Potential Attacks in Urban IoT Networks
3. Discussion and Classification of IoT Attacks and Countermeasures
3.1. IoT Attacks
-
Application Layer: The application layer serves as an interface between the end users and a given platform or service [1,2]. It provides functionalities such as authentication, authorization, data overview, and data access [2]. For this reason, the most common security vulnerabilities exploited at this layer are related to data theft and privacy violations [1]. For instance, some of the attacks performed at the application layer include:
- Data theft [1,2]: IoT devices are utilized in a wide range of use cases and, therefore, are involved in generating, processing, and transferring variety of data. As pointed out by Hassija et al. [1], data that is being transferred is more vulnerable to attacks and consequently it can be stolen. At the same time, some of this data might include sensitive or private information. Therefore, if the end users cannot trust the IoT platform’s privacy preserving capabilities, they are unlikely to store their data on this platform [2]. Some of the common approaches for providing security guarantees against data thefts is using data encryption, isolation, and network authentication [1].
- Sniffing attacks [2] occur when an attacker monitors the network traffic in an attempt to acquire sensitive user data [1]. The attack is executed by an attacker that uses a malicious software to intercept and read confidential data flowing through the IoT network [2]. Similar to data theft, the prevention against such attacks includes the utilization of secure data transfer protocols [2].
- Malicious code and database injections describe attacks that are performed with the help of malicious user inputs such as scripts and code snippets. These attacks are possible due to insufficient code checks or lack thereof [1]. The standard attack procedure includes an attacker finding a vulnerable entry point in the application layer and injecting harmful piece of code that compromises the system [2]. Some of the common examples for such attacks include the SQL injection [5] and the cross-site scripting (XSS) attack [1,6].
-
Network Layer: The main responsibility of the network layer is to handle the transmission of data coming from the physical layer across the IoT network [2]. Some examples for common network layer attacks include:
- Distributed denial of service (DDoS) is an attack that uses multiple devices or systems to flood a target service with unwanted traffic [1,13]. The main goal of the attack is to generate a massive number of requests which will either disrupt the normal functioning of the service or will completely shut it down. As pointed out by Liang and Kim [2], DDoS attacks are not specific to IoT networks. However, the large number of poorly secured IoT devices can become an easy victim to a motivated perpetrator who can add the devices as a part of a botnet, (e.g. Mirai [4]) [2] [5].
- Spoofing attacks take place when an adversary tries to fake its identity and impersonate a legitimate device or a user (e.g. by spoofing an IP address). This can give the adversary unauthorized access to certain resources or can allow them to observe and collect sensitive data transmitted over the network [1].
- Man-in-the-middle (MitM) is an attack during which an adversary is able to insert itself between two nodes in the IoT network. Consequently, the attacker is able to intercept, capture, modify, and relay data flowing between the two nodes without their knowledge [2]. More specifically, from the nodes’ perspective it seems as if they are directly communicating with each other.
-
Perception/Physical/Sensing Layer: The perception layer is also known as sensing [1] or physical layer since it is responsible for handling the physical IoT sensors and actuators. This layer is responsible for collecting data from the end devices and forwarding it to the network layer [2]. Some examples for devices that operate here include smoke detectors, camera sensors, and humidity sensors [1]. Exploiting these devices opens up opportunities for physical layer IoT attacks such as:
- Tampering refers to a physical intervention on the IoT device, through which the perpetrator modifies the hardware in a way that allows them to obtain sensitive information such as credentials, encryption keys, etc. [2].
- Node Jamming or radio frequency interference occurs when an attacker is near the location of the end devices and prevents them from successfully communicating with other devices on the IoT network [5]. This is achieved by sending noise signals that disrupt the wireless communication between the IoT devices [8].
- Sleep deprivation or Denial of Sleep (DoSL) is an attack during which the perpetrator targets low-powered IoT devices and tries to increase their power consumption, in order to shut them down [1,7]. This is a form of DoS attack that can be achieved by injecting infinite (communication and computational) loops or modifying the hardware of the IoT device [7].
3.2. Defenses and Countermeasures
- Edge and fog computing are terms commonly used to describe two additional computational layers in the context of the cloud computing paradigm as described in Figure 3. Edge computing refers to computations taking place at the edge of the network - at the data source or very close to it instead of executing them in the cloud [13]. The main idea of edge computing is to reduce the data transfer between the cloud and the end devices. Instead, since the edge layer is in a very close proximity to and could even include IoT devices, there are faster data transfer times, low transmission costs, and near real-time communication. This is essential for the implementation of well-established security best practices [1,12]. In addition, as pointed out by K. Sha et al. [12] the edge layer has more computational resources than the IoT end devices, which allows the utilization of more computationally expensive security mechanisms. This includes not only encryption mechanisms such as homomorphic encryption, but also the implementation of firewalls, intrusion detection and intrusion prevention systems at the edge layer, which can analyze and block the incoming malicious traffic [12].
-
Machine Learning and Deep Learning: In recent years, the Machine Learning (ML) and Deep Learning (DL) domains have experienced a significant growth and advancement and have become an integral part in a wide variety of industries. The IoT domain is no exception and ML/DL-based approaches can be applied for preventing and mitigating attacks, as well as for improving the security and privacy of IoT-based networks [1,6,14,31,32,33]. According to a comprehensive study presented by Al- Garadi et al. [6], some of the ML/DL-based methods most commonly used in the research literature can be classified as supervised, unsupervised, semi-supervised, and reinforcement learning methods (RL) [6]. These can be summarized as follows:
- Supervised learning algorithms are trained on data samples which are labeled and provide a mapping between inputs and outputs. The most widely used supervised learning methods for IoT security include Decision Trees, Support Vector Machines, Naive Bayes, K-Nearest Neighbors, Random Forest, Deep Neural Networks (DNN), Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), etc. [6]
- Unsupervised learning approaches try to identify patterns (typically by clustering) within an unlabeled data set. Common unsupervised learning methods used for improving the security in IoT networks include K-Means Clustering, Principal Component Analysis, Deep Autoencoders (AEs), Restricted Boltzmann Machines (RBM) and Deep Belief Networks (DBN) [6].
- Semi-supervised learning methods utilize a data set which typically contains low volume of labeled and large volume of unlabeled data points. Semi-supervised algorithms use both portions of the data for training, which places them in-between supervised and unsupervised learning [14]. The main advantage of these methods is that they can have an improved accuracy due to the usage of the small number of labeled samples, while simultaneously being trained on large volume of cheap, unlabeled data. Some of the semi-supervised methods used for IoT security include Generative Adversarial Networks (GANs) and ensemble of DNNs [6].
- Reinforcement learning methods train an agent which is supposed to make decisions based on the conditions present in a given environment. The agent is trained by interacting with the environment and receiving rewards proportional to the “accuracy” of its decision. Based on examples from research literature provided by Al-Garadi et al. [6], in the context of IoT security RL methods (e.g. Q-learning [1,6]) are used primarily for preventing signal jamming attacks.
- Blockchain: The Blockchain [29] is a decentralized ledger that stores data entries in a tamper-proof manner. It consists of blocks that are uniquely identified by the so-called “hashes” and linked with each other with hash pointers. Therefore, modifying information inside the block (e.g. a transaction) changes its hash identifier, which invalidates all blocks in the chain that come after. In traditional Blockchain implementation, new blocks are added to the chain by solving a resource-intensive cryptographic challenge called “proof-of-work”. Since solving the challenge is computationally expensive and the blocks are secured with cryptographic hash functions, it is very unlikely that an adversary will be able to tamper with data stored in the Blockchain. Additionally, each block stored in the chain is verified by all participants in the network and there is no central authority that can single-handedly alter the transaction history or prevent transactions from executing. This set of properties makes the Blockchain a compelling solution for some of the security challenges present in the IoT domain [31].
- The Blockchain can serve as a secure distributed data storage. The data stored in the Blockchain is secured against tampering with the help of cryptographic hashing algorithms, and there is a guaranteed data redundancy due to the absence of a single point of failure in the Blockchain network.
- Nodes in the network are registered on the Blockchain and therefore can be authenticated and identified, which prevents spoofing attacks.
- The Blockchain serves as a decentralized alternative to the traditional cloud servers. Centralized storage of information is a major target for perpetrators that want to steal sensitive data. Given that the cloud services provide shared infrastructure to many users at the same time, cloud storage can be compromised more easily compared to alternative Blockchain-based approaches. Additionally, the data stored in the Blockchain is distributed across all nodes in the network and signed (often also encrypted), which makes data theft attacks more difficult.
4. Methodology and Toolchain
4.1. Requirements Analysis and Risk Identification
4.2. Network Modelling (e.g. WoT Modelling)
4.3. Security Rules and Constraints: Access Control List Generation
4.4. Protocol-Analysis for Intrusion Detection
4.5. Network Simulation and Testbed Evaluation
4.6. Real-world Deployment and Feedback
5. Demonstrating the Methodology
5.1. Simulation Setup
5.2. Attack Setup
5.3. Intrusion Detection
5.4. Overall Demonstrator
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
| 1 | [ui!] is the abbreviation for Urban Instutute GmbH – this is the industrial partner, with whom the case studies are being investigated and researched. |
| 2 | Linking attacks try to identify users within an anonymous environment by combining partial identifiers (e.g. zip code, gender, etc.) in an attempt to infer the complete user identity. |
| 3 | KIVEP stands for „Kompromittierungen von IoT-Geräten vorbeugen und erkennen durch Protokoll-Anomalie-Erkennung“ |
| 4 | This means that the “normal“ sensors are sending out IEEE 802.15.4 frames on a standard rates, whilst the corrupted sensors are generating IEEE 802.15.4 frames on an extremely high rate within the OMNET++ simulation. This leads to the IoT gateway loosing a lot of energy and eventually failing to perform its tasks. |
References
- Vikas Hassija, Vinay Chamola, Vikas Saxena, Divyansh Jain, Pranav Goyal, Biplab Sikdar: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 7: 82721-82743 (2019).
- Xingwei Liang, Yoohwan Kim: A Survey on Security Attacks and Solutions in the IoT Network. CCWC 2021: 853-859.
- Fadele Ayotunde Alaba, Mazliza Othman, Ibrahim Abaker Targio Hashem, Faiz Alotaibi: Internet of Things security: A survey. J. Netw. Comput. Appl. 88: 10-28 (2017).
- Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., & Zhou, Y. (2017). Understanding the mirai botnet. In 26th USENIX security symposium (USENIX Security 17) (pp. 1093-1110).
- Rizvi, S., Kurtz, A., Pfeffer, J., & Rizvi, M. (2018, August). Securing the internet of things (IoT): A security taxonomy for IoT. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 163-168). IEEE.
- Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., Ali, I., & Guizani, M. (2020). A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Communications Surveys & Tutorials, 22 (3), 1646-1685.
- Abosata, N., Al-Rubaye, S., Inalhan, G., & Emmanouilidis, C. (2021). Internet of things for system integrity: a comprehensive survey on security, attacks and countermeasures for industrial applications. Sensors, 21 (11), 3654.
- Deogirikar, J., & Vidhate, A. (2017, February). Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 32-37). IEEE.
- Dorri, S. S. Kanhere, R. Jurdak and P. Gauravaram, "Blockchain for IoT security and privacy: The case study of a smart home," 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2017, pp. 618-623. [CrossRef]
- Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future generation computer systems, 82, 395-411.
- Atlam HF, Walters RJ, Wills GB. Fog Computing and the Internet of Things: A Review. Big Data and Cognitive Computing. 2018; 2(2):10. [CrossRef]
- Sha, K., Yang, T. A., Wei, W., & Davari, S. (2020). A survey of edge computing- based designs for IoT security. Digital Communications and Networks, 6(2), 195-202.
- Y. Xiao, Y. Jia, C. Liu, X. Cheng, J. Yu and W. Lv, "Edge Computing Security: State of the Art and Challenges," in Proceedings of the IEEE, vol. 107, no. 8, pp.1608-1631, Aug. 2019. [CrossRef]
- Hussain, F., Hussain, R., Hassan, S. A., & Hossain, E. (2020). Machine learning in IoT security: Current solutions and future challenges. IEEE Communications Surveys & Tutorials, 22(3), 1686-1721.
- Alrawais, A. Alhothaily, C. Hu and X. Cheng, "Fog Computing for the Internet of Things: Security and Privacy Issues," in IEEE Internet Computing, vol. 21, no. 2, pp. 34-42, Mar.-Apr. 2017. [CrossRef]
- Shi, C., Liu, J., Liu, H., & Chen, Y. (2017, July). Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing (pp. 1-10).
- Yousefi-Azar, M., Varadharajan, V., Hamey, L., & Tupakula, U. (2017, May). Autoencoder-based feature learning for cyber security applications. In 2017 International joint conference on neural networks (IJCNN) (pp. 3854-3861). IEEE.
- Cil, A. E., Yildiz, K., & Buldu, A. (2021). Detection of DDoS attacks with feed forward based deep neural network model. Expert Systems with Applications, 169, 114520.
- McLaughlin, N., Martinez del Rincon, J., Kang, B., Yerima, S., Miller, P., Sezer, S., ... & Joon Ahn, G. (2017, March). Deep android malware detection. In Proceedings of the seventh ACM on conference on data and application security and privacy (pp. 301-308).
- Yadav, S., & Subramanian, S. (2016, March). Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder. In 2016 international conference on computational techniques in information and communication technologies (icctict) (pp. 361-366). IEEE.
- Narrowband – Internet of Things (NB-IoT). [Online]. https://www.gsma.com/iot/narrow-band-internet-of-things-nb-iot/ [Accessed: 26.08.22].
- UrbanPulse platform: https://www.ui.city/en/solutions [Accessed: 26.08.22].
- Bee Smart City Indicators: https://hub.beesmart.city/en/smart-city-indicators, [Accessed: 28.12.22].
- Lucke, J., (2015), Smart Government - Wie uns die intelligente Vernetzung zum Leitbild „Verwaltung 4.0“und einem smarten Regierungs- und Verwaltungshandeln führt, Friedrichshafen: The Open Government Institute.
- KIVEP Project: https://www.forschung-it-sicherheit-kommunikationssysteme.de/projekte/kivep, [Accessed: 28.12.22].
- INET Framework: https://inet.omnetpp.org/, [Accessed: 28.12.22].
- scikit-learn: https://scikit-learn.org/stable/, [Accessed: 28.12.22].
- DIN SPEC 91357, Reference Architecture Model Open Urban Platform (OUP). https://www.din.de/en/wdc-beuth:din21:281077528, [Accessed: 28.12.22].
- Copigneaux B. et al. Blockchain for supply chains and international trade. Brussels: European Parliamentary Research Service, 2020. [CrossRef]
- Y. Yuan, L. Wu and X. Zhang, "Gini-Impurity Index Analysis," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3154-3169, 2021. [CrossRef]
- Jin Ho Park, Sushil Kumar Singh, Mikail Mohammed Salim, Abir EL Azzaoui, Jong Hyuk Park, "Ransomware-based Cyber Attacks: A Comprehensive Survey," Journal of Internet Technology, vol. 23, no. 7 , pp. 1557-1564, Dec. 2022.
- Keegan, N., Ji, SY., Chaudhary, A. et al. A survey of cloud-based network intrusion detection analysis. Hum. Cent. Comput. Inf. Sci. 6, 19 (2016). [CrossRef]
- Jose Costa Sapalo Sicato, S. K. S., Shailendra Rathore, and Jong Hyuk Park. (2020). A Comprehensive Analyses of Intrusion Detection System for IoT Environment. Journal of Information Processing Systems, 16(4), 975–990. [CrossRef]
- Niclas Kullig, Philipp Lämmel, Nikolay Tcholtchev, "Prototype Implementation and Evaluation of a Blockchain Component on IoT Devices", Procedia Computer Science, Volume 175, 2020, Pages 379-386, ISSN 1877-0509. [CrossRef]








![]() |
![]() |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).

