Enhancing IoT Security : A holistic approach to security for connected platforms

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Everything you need to know to secure your IoT devices Key Features ● Identify the security challenges and requirements of the IoT. ● Understand different types of threats and vulnerabilities that can affect IoT devices. ● Implement security measures to protect IoT devices from attack. Description The Internet of Things (IoT) is a rapidly growing network of physical devices that are connected to the internet and can collect and exchange data. It can potentially revolutionize many industries but also raises serious security concerns. This book provides a holistic overview of the security challenges and requirements of IoT. It starts by introducing the fundamentals of IoT security, such as the different types of threats and vulnerabilities. It then discusses the security lifecycle of IoT devices, from design and deployment to operation and maintenance. This book also covers a variety of security technologies and techniques that can be used to protect IoT devices, such as encryption, authentication, and access control. In addition to the technical aspects of IoT security, this book discusses the legal and regulatory landscape that governs IoT devices. Lastly, it focuses on the ethical implications of IoT security, such as the need to protect user privacy. By the end of this book, you will have a thorough understanding of the security challenges and requirements of the IoT. What you will learn ● Understand the challenges and solutions for securing IoT devices, networks, and data. ● Explore different ways to protect IoT devices. ● Get familiar with the security implications of the different layers in the IoT architecture. ● Develop security policies and procedures for IoT deployments. ● Stay up-to-date with the latest IoT security threats and trends. Who this book is for The book is designed for engineering students and researchers who are studying IoT security in graduate and postgraduate courses such as computer science, information technology, electronics and communication, networking applications, and electrical and electronics. The book's content is based on the syllabus of IoT security in major Indian and international universities.

Author(s): Gamini Joshi, Vidushi Sharma
Publisher: BPB Publications
Year: 2023

Language: English
Pages: 748

Cover
Title Page
Copyright Page
Dedication Page
About the Authors
About the Reviewer
Acknowledgements
Preface
Table of Contents
1. The Internet of Things and its Security Requirements
Structure
1.1 Internet of Things - A brief introduction
1.1.1 Growth trends and market opportunity
1.2 Networking in the IoT device - The framework
1.2.1 Identification
1.2.2 Sensing
1.2.3 Communication
1.2.4. Computation
1.2.5 Services
1.2.6 Semantics
1.3 Need to secure IoT - Its limitations
Reason 1 - Constrained system resources
Reason 2 - Device Heterogeneity
Reason 3 - Interoperability in IoT
Reason 4 - Over-the-Air firmware update
1.4 Cyber security versus IoT security and cyber-physical systems
1.5 IoT architecture
Layer 1 - Perception/Sensing layer
Layer 2 - Network layer
Layer 3 - Service/Processing layer
Layer 4 - Application/Interface layer
1.5.1 Security threats in IoT architecture layers
1.5.2 Security requirements in IoT architecture layers
1.6 Authorization and authentication requirement in IoT
1.6.1 Insufficient authentication/authorization in IoT
1.7 Security in enabling technologies behind the Internet of Things
1.7.1 Security in hardware technologies - Identification
1.7.2 Security in software technologies: Integration of WSN and RFID
1.7.3 Security in communication technologies - tracking, monitoring, and communicating28
Security in network technologies: network function
1.8 IoT networking protocols and its security
1.8.1 Application protocol
1.8.2 Network Layer Protocols: 6LoWPAN
1.8.3 Routing /Transport Layer Protocol - RPL
1.8.4 Link Layer Protocol: IEEE 802.15.4
1.8.5 Physical Layer Protocol - LTE-A, Z-Wave
1.9 Domain-specific IoT and its security concerns
1.9.1 Security concerns in SCADA systems
1.9.2 Security concerns in Enterprise Information Systems
1.9.3 Security concerns in home automation
1.9.4 Security concerns in agriculture
1.9.5 Security concerns in smart cities
1.9.6 Security concerns in social IoT
1.9.7 Security concerns in IoT-based healthcare
1.10 IoT supporting technologies
1.10.1 Big Data analytics
1.10.2 Cloud computing
1.10.3 Edge computing
1.10.4 Fog computing
Conclusion
1.11 Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords(†)
References
Things to check before moving to next chapter
2. IoT Security - Vulnerabilities, Attacks, and Countermeasures
Introduction
Structure
2.1 Information Assurance: components
2.2 Threats
Associated terms
Threat classification
2.3 Vulnerabilities
2.4 Risk
2.5 Insecure Access control
2.5.1 Access Control List-Based Systems or Discretionary Access control
2.5.2 Role-Based Access control
2.5.3 Capability-Based Access control or Key-based Access control system
2.5.4 Challenges in Access control
2.5.5 Threats to Access control, privacy, and availability
2.6 Attacks: types, composition, and tools
2.6.1 Types of attacks
2.6.2 Tools for attack identification
2.7 Threat modeling for IoT systems
Conclusion
2.8 Questionnaire
Multiple choice questions
Answer key
Long answer question
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
3. Security Engineering for IoT Development
Introduction
Structure
3.1 Building Security into design and development
3.1.1 Managing security requirement
3.1.2 Managing security in IoT when in operation
3.2 The IoT security life cycle: Secure design
Phase 1: Secure design
3.2.1 Safety and security design
3.2.2 Processes and Agreements
3.2.3 Technology selection: Security products and services
Conclusion
3.3 Questionnaire
Multiple choice questions
Answer key
Long answer question
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
4. IoT Security Lifecycle
Structure
4.1 Introduction
4.2 Phase 2: Implementation and Integration
4.2.1 IoT Security CONOPS document
4.2.2 Network implementation and security integration
4.2.3 System security verification and validation (V&V)
4.2.4 Security training
4.2.5 Secure configurations
4.3 Phase 3: Operations and maintenance
4.3.1 Managing identities, roles, and credentials
4.3.2 Security monitoring
4.3.3 Penetration testing
4.3.4 Asset and configuration management
4.3.5 Incident management
4.3.6 Forensics
4.4 Phase 4: Dispose
4.4.1 Secure device disposal and zeroization
4.4.2 Data purging
4.4.3 Inventory control
4.4.4 Data archiving and records management
Conclusion
4.5 Questionnaire
Multiple choice questions
Answer key
Long answer question
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
5. IoT as Interconnection of Threats
Structure
5.1 Sybil Attack Detection in Vehicular Network
5.1.1 Concept of a Vehicular Network or a Vehicular Ad-Hoc Network
5.1.2 Challenges and Attacks in Vehicular Network
5.1.3 Consequences of a Sybil attack
5.1.4 Sybil Attack Detection Schemes in a VANET Network
5.2 Malware Propagation and control in Internet of Things
5.2.1 Malware in Internet of Things
5.2.1 Modeling of malware propagation
5.2.3 Malware control strategy
5.3 Solution-based analysis of attack vectors on smart home systems
5.3.1 Concept of a Smart Home System with an example of digitalSTROM
Technical Structure of digitalSTROM(dS)
5.3.2 Attack vectors on SHS
Central digitalSTROM Server
Smart control devices
Smart home communication bus
Remote third-party services
5.3.3 SHS Hardening
Hardening of Central digitalSTROM server
Hardening of Smart Control Devices
Hardening of Smart Communication Bus
Hardening of remote third-party services
5.3.4 Attack scenario and its solution analysis
Attack 1
Attack 2
5.4. Network robustness of the Internet of Things
5.4.1 Network Robustness using Game-Theoretic analysis
Conclusion
5.5 Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
6. Crypto Foundations I
Structure
6.1 Cryptography and its role in securing the IoT
6.2 Cryptography and its primitives in the IoT
Cryptographic primitives
6.3 Secrecy and secret-key capacity in IoT
Secret key capacity
6.4 Encryption and decryption
6.4.1 Symmetric key encryption algorithm
Substitution technique
Transposition technique
Electronic Code Book
Cipher Block Chaining Mode
Cipher Feedback Mode
Output Feedback Mode
Counter Mode
6.4.2 Asymmetric key encryption algorithm
Conclusion
6.5 Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
7. Crypto Foundations II
Structure
7.1 Message integrity- Hash functions and their security
7.1.1 Properties and applications of Hash functions
Applications of the Hash function
7.1.2 Popular Hash function
7.1.3 Merkle tree
Significance of the Merkle tree
7.2 Message authentication
7.2.1 Message Authentication Code
7.2.2 Authenticated encryption
7.3 Random number generation
7.4 Cipher suites
7.5 Signature algorithm means of IoT node authentication
7.5.1 Types of signatures
7.5.1 Digital signature schemes
7.6 Cryptographic key management
7.6.1 Key management fundamentals
7.6.2 Diffe-Hellman key exchange
Algorithm
7.6.3 Elliptic Curve Cryptography
Background explanation of ECC
ECC algorithm for key-exchange
ECC Algorithm for encryption and decryption
7.6.4 Public Key Infrastructure
PKIX Model
PKIX Management function
7.7. Examining cryptographic controls for IoT protocols
7.7.1. Cryptographic controls built into IoT communication protocols
ZigBee
Bluetooth-LE
Near Field Communication
7.7.2 Cryptographic controls built into IoT messaging protocols
7.8 Transport encryption
7.8.1 Transport Layer Security
7.8.2 Secure Sockets Layer
7.8.3 HTTPS
Conclusion
7.9 Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
8. Privacy Preservation for the Internet of Things
Structure
8.1. Privacy preservation
8.2. Classification of privacy threats in IoT
8.2.1. Content-oriented privacy threats
8.2.2. Contextual-oriented privacy threats
8.3. Privacy preservation techniques
8.3.1. Cryptographic techniques
8.3.2. Anonymization techniques
K-anonymity
L diversity
8.3.3. Dynamic data masking
8.4. Futuristic approach of privacy preservation data dissemination
8.4.1. Pre-requirements of the approach
Network model
Threat model
Resolution of uncertainty
The objective of the FDD approach
8.4.2. Implementation of the privacy preservation data dissemination approach
SPG-based data dissemination
8.5. Privacy preservation for IoT used in smart buildings- A case study
8.5.1. The concept of smart buildings
Smart Building Subsystems
IoT Technologies used in smart buildings
8.5.2. Privacy threats in smart buildings
8.5.3 Privacy-preserving approaches in smart buildings
Wireless LAN privacy-preserving approaches
RFID privacy-preserving approaches
Video surveillance privacy-preserving approaches
Conclusion
8.6 Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
9. Location Privacy Enhancement in the Internet of Vehicles
Structure
9.1. Location privacy and its requirements in IoV
9.1.1. Location-privacy requirements
9.2. Traditional location-privacy preservation solutions
9.2.1. Pseudonyms
9.2.2. Mix-Zone
9.2.3. Group signature
9.2.4. Silent period
9.3. A new location-privacy preservation scheme: A MixGroup approach
9.3.1. Pre-requirements of the MixGroup approach
Network model
Social model
Threat model
Characteristics of the vehicular social network
Some observations from the traces of vehicles
Theory of MixGroup
9.3.2. Process of MixGroup
System initialization and key generation
Group join
Pseudonym exchange
RSU signing protocol
Group leaving
Revocation protocol
9.3.3. Security analysis
Conditional tracking
Attack and defense analysis
Entropy optimal pseudonym exchange
9.3.4. Experimental analysis of the MixGroup approach
Conclusion
9.4. Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
10. Privacy Protection in Key Personal IoT Applications
Structure
10.1. Concept of personal IoT
10.1.1. Mobile WBSN
Architecture of WBSN
Issues in mobile WBSN
10.1.2. Participatory sensing
Architecture of Participatory Sensing
Issues in participatory sensing
10.2. Security aspect of personal IoT
10.2.1. Lightweight and robust schemes for protecting privacy in Mobile WBSN
10.2.1.1. One Time Mask scheme
10.2.1.2. One Time Permutation scheme
10.2.1.3. Comparative analysis of OTM and OTP
10.2.2. Lightweight and robust scheme for privacy protection in participatory sensing
10.2.2.1. The LRTP scheme
Conclusion
10.3 Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
11. Trust and Trust Models for the IoT
Structure
11.1. Concept of trust and its role in securing IoT
11.2. A brief study on Trust Management System
11.2.1. Information gathering
11.2.2. Trust computation
11.2.3. Trust propagation
11.2.4. Trust update
11.3. Classification of Trust Management Systems in IoT network
11.3.1. Layered architecture
a. Device layer
b. Support layer
c. Other layers
11.3.2. Propagational architecture
a. Distributed architecture
b. Centralized architecture
11.3.3. Conceptual architecture
a. Direct trust model
b. Indirect trust model
11.4. Challenges in existing trustable IoT techniques
11.4.1. Naming and name resolution
11.4.2. Identifier/locator splitting
11.4.3. Availability of resources and services
11.4.4. Security and privacy
11.5. Introducing Nova-Genesis as an IoT architecture
11.5.1. Naming and name resolution
11.5.2. Identifier/locator splitting
11.5.3. Availability of resources and services
11.5.4. Security and privacy
Conclusion
11.6. Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
12. Framework for Privacy and Trust in IoT
Structure
12.1. The concept of user-centric Internet of Things
12.1.1. Internet of People
12.1.2. Social Internet of Things
Basic components of SIoT
12.1.3. Physical Cyber Social Computing
12.1.4. People as a Service
12.1.5. Advantages of user-centric Internet of Things
12.2. Issues in user-centric Internet of Things
12.2.1. Utility and usability
12.2.2. Fault tolerance
12.2.3. Interoperability, data-models, and nomenclatures
12.2.4. Big data (graph) analysis
12.2.5. Trust and privacy
12.3. SocIoTal- A socially aware citizen-centric Internet of Things
12.3.1. Classical IoT-architectural framework
Core component
12.3.2. SocIoTal security framework
12.3.2.1. Authentication
12.3.2.2. Trust and reputation
12.3.2.3. Key-exchange management
12.3.2.4. Context manager
12.3.2.5. Identity management
12.3.2.6. Authorization
12.3.2.7. Group manager
Conclusion
12.4. Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
13. Preventing Unauthorized Access to Sensor Data and Authentication in IoT
Structure
13.1 The idea of cooperation in IoT
13.1.1. Cooperative communication
13.1.2. Cooperative authentication
13.1.3. Cooperative incentive
13.1.4. Conflict balancing
13.2. The practical implementation of cooperative authentication
13.3. Bargaining-based dynamic game model for cooperative authentication
13.3.1. The pre-requisite of the cooperative authenticated bargaining system
13.3.1.1. Factors affecting the price
13.3.1.2. Bargaining-based price
13.3.1.3. Bargaining procedure
13.3.2. The dynamic game
Players
Strategy
Utility function
Performance of the bargaining-based dynamic game model for cooperative authentication
13.3.3.1. Location privacy leakage
13.3.3.2. Energy consumption
13.3.3.3. Network survivability
13.4. Analysis of dynamic game model for cooperative authentication
13.4.1. Dynamic game with complete information
13.4.2. Dynamic game with incomplete information
13.5. Variants of entity authentication
a. Reputation
b. Vote
c. Abstinence
d. Police
13.5.1. Performance analysis of the variants of entity authentication
a. Average vulnerability time
b. Average risks
13.6. Message authentication: content delivery in VANET
13.6.1. Voting on reputation for VANET(VOR4VANET)
Conclusion
13.7. Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
14. Computational Security for the IoT and Beyond
Structure
14.1. An introduction to computational models and their security
14.1.1. Need for computational security in the Internet of Things
14.2. Complex systems
14.2.1. Characteristics of complex systems
IoT as a complex system
14.2.2. Security challenges in complex systems
14.3. Examples of complex systems with their security characteristics
14.3.1. Wireless networks
14.3.2. Social networks
a. Multimedia content threats
b. Traditional threats
c. Social threats
14.3.3. Economic networks
14.3.4. Computer networks
14.4. Computational tools for complex systems
14.4.1. Signal processing tools
14.4.2. Network science tools
14.4.3. Controllability and observability of networks
14.4.4. Network tomography
14.5. Future scope
Conclusion
14.6 Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
15. Identity and Access Management Solutions for the IoT
Structure
15.1. Introduction to identity and access management for the IoT
Implementation of IAM for the development of IoT application
a. Default password risks
b. Cross-domain IoT
c. Credential abuse
d. Virtual Eavesdropping
15.2. The identity lifecycle
15.2.1. Identity establishment with unique requirements
Identity of IoT devices
15.2.2. Secure bootstrap
Bootstrapping using PKI
15.2.3. Credential and attribute provisioning
15.2.4. Account monitoring and control
15.2.5. Account updates
15.2.6. Account suspension
15.2.7. Account/credential deactivation/deletion
15.3. Authentication credentials
15.3.1. Usernames and passwords
15.3.2. Symmetric keys
15.3.3. Certificates
X.509
IEEE 1609.2
15.3.4. Biometrics
15.3.5. New work in authorization for the IoT
15.4. IoT IAM infrastructure
15.4.1. PKI for the IoT IAM
Revocation support
15.5. Authorization and access control
15.5.1. OAuth 2.0
OAuth2.0 components
Working of OAuth2.0
15.5.2. Access controls within publish/subscribe protocols
15.5.3. Access controls within communication protocols
Conclusion
15.6. Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
16. Privacy-Preserving Time Series Data Aggregation for IoT
Structure
16.1 Data aggregation on IoT system
16.1.1 Data aggregation mechanisms on IoT system
16.1.1.1 Client-server-based data aggregation mechanisms
16.1.1.2 Mobile-agent-based data aggregation mechanisms
16.1.1.3 Time-series-based data aggregation mechanisms
16.2 Time-series data aggregation privacy preservation scheme
16.2.1 Prerequisites
IoT scenario
Security consideration and design goals
Properties of the Group Z*p2
16.2.2 The actual scheme
System settings
Data encryption at nodes
Data aggregation at gateways
Aggregated data decryption at the control center
Privacy maintenance during node joining and leaving
16.2.3 Computational cost of time series data aggregation privacy preservation scheme
Conclusion
16.3 Questionnaire
Multiple choice questions
Answer key
Long answer question
Short answer question
Keywords (†)
References
Things to check before moving to the next chapter
17. Path Generation Scheme for Real-Time Green IoT
Structure
17.1 Green Internet of Things: An introduction
17.1.1 GIoT components
a. Green hardware
b. Green software
c. Green communication
d. Green architecture
17.1.2 Green IoT technologies
Green tags
Green sensing networks
Green cloud computing
Green coding
Green data centers
Green M2M
17.1.3 Contribution toward Green IoT
17.1.4 GIoT open issues
a. Technical challenges
b. Standardization
c. Security and privacy
17.2 Real-time GIOT and its issues
17.3 Real-time query processing in the Green Internet of Things
17.3.1 Query processing in the green Internet of Things
Mathematical representation of query processing
17.3.2 Secure path generation scheme
Procedure for the generation of GIoT secured path
Example: Derivation of Query Execution Path
Conclusion
17.4 Questionnaire
Multiple choice questions
Answer key
Long answer question
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
18. Security Protocols for IoT Access Networks and Their Impact on Mobile Networks
Structure
18.1. Existing security features of IoT protocols
18.2. Futuristic security protocol/algorithm for IoT network
18.2.1. Time-based secure key generation and renewal
a. Security protocol for unidirectional data transmissions
b. Security protocol for bidirectional data transmissions
18.2.2 Cognitive security
18.3 Impact of IoT security on mobile networks
Cost of mobile network
The risk and complexity of mobile networks
Delay in mobile network
Scope restriction of mobile network
Conclusion
18.4 Questionnaire
Multiple choice questions
Answer key
Long answer question
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
19. Cloud Security for the IoT
Structure
19.1. Cloud services and the IoT
19.1.1. Samples of IoT cloud services
a. Asset/inventory management
b. Service provisioning, billing, and entitlement management
c. Real-time monitoring
d. Sensor coordination
e. Customer intelligence and marketing
f. Information sharing
g. Message transport/broadcast
19.2. IoT threats from the perspective of cloud security
19.3. Exploring cloud service provider IoT offerings
19.3.1. AWS IoT
a. Kinesis
b. Amazon Lambda
c. Simple storage service (S3)
d. CloudWatch
e. DynamoDB
f. AWS Thing Shadow
19.3.2. Microsoft Azure IoT suite
19.3.3. Cisco fog computing
19.3.4. IBM Watson IoT platform
19.4. Cloud IoT security controls
19.4.1. Authentication and authorization
Authentication mechanisms in Amazon AWS
Authentication mechanisms in Microsoft Azure
19.4.2. Software/firmware updates
19.4.3. End-to-end security recommendations
19.4.4. Maintain data integrity
19.4.5. Secure bootstrap and enrollment of IoT devices
19.4.6. Security monitoring
19.5. An enterprise IoT cloud security architecture
19.6. New directions in cloud-enabled IOT computing
19.6.1. IoT-enablers of the cloud
Software defined networking
Data services
Container for secure development and deployment of IoT environments
Microservices
19.6.2. Cloud-enabled directions
On-demand computing and the IoT
Cognitive IoT
Conclusion
19.7. Questionnaire
Multiple choice questions
Answer key
Long answer question
Short answer questions
Keywords (†)
References
Things to check before moving to the upcoming chapter
20. Policy-Based Approaches for Informed Consent in IoT
Structure
20.1 Informed consent
20.1.1. Informed consent in Internet of Things
20.1.2. Implementation challenges of informed consent in IoT
20.2. A policy-based solution for informed consent in IoT
20.2.1. Policy-based framework
Steps for the specification of informed consent (metamodeling)
20.2.2. Policy enforcement component
20.2.3. Implementation of the SecKit to IoT for informed consent
Conclusion
20.3 Questionnaire
Multiple choice questions
Answer key
Long answer question
Short answer question
Keywords (†)
References
Things to check before moving to the next chapter
21. Blockchains for Internet of Things
Structure
21.1. Blockchain technology: The introduction
21.1.1. Issues with the current banking system and its solutions
21.1.2. Architecture of the blockchain
Components of block
Formation of blockchain
21.1.3. Features of blockchain
a. Public distributed ledger
b. Encryption
c. Mining and Proof of Work
d. Incentives of mining
21.1.4. Use-case of Blockchain technology
21.2. Crypto-currencies
21.2.1. Cryptocurrency examples
Bitcoins
Ether
21.3. Bitcoin P2P network
21.4. Distributed consensus
21.4.1. Types of consensus algorithms
a. Proof of work
b. Proof of Stake
c. Byzantine Fault Tolerance
d. Proof of Burn
e. Proof of Capacity
f. Proof of Elapsed Time
21.5. Smart contracts
21.6. Blockchain wallets
21.6.1. Types of Blockchain wallets
a. Classification based on a private key
b. Classification based on application
21.7. Altcoins
21.8. Anonymity
Conclusion
21.9. Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
References
Keywords (†)
Things to check before moving to the next chapter
22. Game Theory Foundation
Structure
22.1. Introduction to Game-Theoretic approach
22.1.1. Useful terms in Game Theory
Market game
Political game
Wireless communication game
Auction game
22.1.2. Example 1- Prisoner’s Dilemma Game
Mathematical formulation of the Prisoner’s Dilemma Game
22.2. Best response and Nash equilibrium
22.2.1. Example 2- market game
22.3. Mixed-strategy or randomized-strategy
22.3.1. Example 3- Matching pennies game
22.3.2. Example 4- Paying taxes game
Mixed strategy of paying tax game
22.4. Repeated games
22.4.1. Example 5- Finitely repeated Prisoner’s Dilemma Game
Nash-equilibrium and game table of twice repeated Prisoner’s Dilemma Game
22.4.2. Example 6- Finitely repeated games having multiple equilibrium
22.4.3. Infinitely repeated games
22.4.4. Example 7- Infinitely repeated Prisoner’s Dilemma Game
Calculus of infinitely repeated triggering strategy
Calculus of infinitely repeated Prisoner’s Dilemma Game
22.5. Bayesian games
22.5.1. Example 8- Battle of sexes game
Analysis of the Bayesian game
22.6. Coalitional games
22.6.1. Coalitional games with transferable utility
22.6.1.1. Example 9- Voting game
22.6.2. Outcome of coalitional games
22.6.3. Classes of coalitional games
Relationship between the different classes of games
22.6.4. Analyzing coalitional games
Payoffs division methods
The Shapley value
The core
Conclusion
22.7. Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
References
Things to check before moving to the next chapter
23. Security Products
Structure
23.1. Existing IoT security products
a. AWS IoT device defender
b. Microsoft Defender for IoT
c. McAfee embedded control
d. Entrust IoT security
e. IoT security
f. Cybeats
g. KeyScaler
h. Memfault
i. Quantum edge
j. Spartan
23.2. Testbed on security and privacy of IoTs
a. Smart campus Testbed
b. Supersensor testbed
c. MakeSense testbed
d. INternational Future INdustrial Internet testbed
e. SmartSantander testbed
f. ASSET testbed
g. Stanfords testbed
h. Siboni’s security testbed for IoT devices
23.3. IoT databases and its security
23.3.1 Threats and challenges of IoT databases with their feasible solutions
a. Data privacy and compliance
b. Data quality and integrity
c. Data security and resilience
d. Data governance and ethics
e. Data innovation and collaboration
f. Data skills and awareness
Conclusion
23.4. Questionnaire
Multiple choice questions
Answer key
Long answer question
Short answer questions
References
Keywords (†)
Things to check before moving to the next chapter
Index