Evolution of Smart Sensing Ecosystems with Tamper Evident Security

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues. The mission of this book is to explain the evolution of techniques and strategies in securing information transfer and storage thus facilitating a digital transition towards the modern tamper evident systems. The goal is also to aid business organizations that are dependent on the analysis of the large volumes of generated data in securing and addressing the associated growing threat of attackers relentlessly waging attacks and the challenges in protecting the confidentiality, integrity and provenance of data. The book also provides a comprehensive insight into the secure communication techniques and tools that have evolved and the impact they have had in supporting and flourishing the business through the cyber era. This book also includes chapters that discuss the most primitive encryption schemes to the most recent use of homomorphism in ensuring the privacy of the data thus leveraging greater use of new technologies like cloud computing and others.

 

Author(s): Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani
Publisher: Springer
Year: 2021

Language: English
Pages: 174
City: Cham

Foreword
Preface
Acknowledgments
Contents
Acronyms
Part I Growth of Sensory Devices and Their Proliferation into Daily Life
1 Introduction
1.1 Sensing and Classification
1.2 Growth of Wireless Sensor Networks
1.3 Smart Sensing Devices: Why Do We Need Them?
1.4 Automation of Processes: Aided by Sensors
1.5 Final Remarks
Reference
2 Smart Objects in Cyber-Physical Systems
2.1 Cyber Physical Systems (CPS)
2.2 The Internet-of-Things (IoT) Paradigm
2.3 The Boom of Wearables, Handhelds, and Smart Devices
2.4 Services Regalia: Touching the Lives of Millions
2.5 Volumes of Data Generation: Boon or Bane?
2.6 Final Remarks
References
3 IoT Security
3.1 Why Do We Need to Secure Smart Devices?
3.1.1 Device Bootstrapping
3.1.2 Authentication
3.1.3 Access Control
3.2 Challenges to Securing Smart Devices
3.3 Can IoT Devices Be Used to Wage Attacks: The Riseof Botnets
3.4 Techniques to Protect Devices
3.5 Concluding Remarks
References
Part II Securing the Internet-of-Things Enabled Smart Environments
4 Understanding the Smart Systems: IoT Protocol Stack
4.1 Introduction
4.2 Current Internet Protocols: Can They Survive the Meteoric Rise of IoT Device Adoption?
4.3 Available Standards
4.4 The Six Layers in IoT Security
4.4.1 Securing the Network of Operation
4.4.2 Authentication Requirements of Devices
4.4.3 Encrypting Data to Prevent Leakage of Information in Clear Text
4.4.4 Storage Solutions
4.4.5 Device Lifecycle Management
4.4.6 Interface or API Protection
4.5 Concluding Remarks
References
5 Onboarding New IoT Devices
5.1 Talking to the Correct Device/Network?: The Need for Device Bootstrapping
5.2 Taxonomy of Out-of-Band (OOB) Approaches
5.2.1 Bluetooth Low Energy (BLE)
5.2.2 Haptics/Touch
5.2.3 Magnetic Field Technique
5.2.4 Visual Techniques
5.2.5 Audio Techniques
5.2.6 Vibration Techniques
5.3 Existing Bootstrapping Techniques
5.4 Concluding Remarks
References
Part III Cryptosystems: Foundations and the Current State-of-the-Art
6 Introduction
6.1 Motivation
6.2 Cryptographic Solutions to Secure Information
6.3 History of Cryptography
6.4 Current State-of-the-Art
6.5 Issues with Existing Techniques
6.6 Do We Have a Solution?
6.7 Final Remarks
References
7 Symmetric Key Cryptography
7.1 Applications and Advantages
7.2 Stream Ciphers
7.3 Block Ciphers
7.3.1 Initialization Vectors
7.4 Major Disadvantages of Symmetric Key Cryptosystems
7.5 Cryptographic Attacks on Symmetric Key Cryptosystems
7.5.1 Key Search (Brute Force) Attacks
7.5.2 Cryptanalysis
7.5.2.1 Known Plaintext Attack
7.5.2.2 Differential Cryptanalysis
7.5.2.3 Differential Power Analysis
7.5.3 Systems Based Attack
7.6 Final Remarks
References
8 Asymmetric Key Cryptography
8.1 What Is Public Key Cryptosystem?
8.2 Advantages of Asymmetric Key Cryptosystems
8.3 Drawbacks of PKI
8.4 Concluding Remarks
Part IV Modern Encryption Schemes
9 Homomorphic Encryption
9.1 Applications of Homomorphic Encryption
9.1.1 Data Security in the Cloud
9.1.2 Support to Data Analysis
9.1.3 Enhancing Secure Ballot and Electoral Systems
9.2 Classification of Homomorphic Encryption: Examples
9.2.1 Partially Homomorphic Encryption (PHE)
9.2.2 Somewhat Homomorphic Encryption (SHE)
9.2.3 Fully Homomorphic Encryption (FHE)
9.3 Problems of Importance in the Public Key Infrastructure
9.4 Concluding Remarks
References
10 Popular Homomorphic Encryption Schemes
10.1 Goldwasser–Micali Method (GM Method)
10.1.1 Encryption
10.1.2 Decryption
10.2 Paillier Encryption Scheme
10.2.1 Benefits of the Additive Homomorphic Encryption
10.3 ElGamal Encryption Scheme
10.4 RSA Cryptosystem
10.5 Concluding Remarks
References
11 Industrial Involvement in the Use of Homomorphic Encryption
11.1 IBM's HElib
11.2 Microsoft SEAL
11.3 Other Homomorphic Encryption Library
11.4 Final Remarks
References
Part V Creating a Tamper Evident System for the Cyber Era
12 Introduction
12.1 Limitations of Existing Public Key Encryption Techniques
12.1.1 Major Limitations
12.1.2 Can a Shift from Deterministic to Probabilistic Approaches Provide a Better Outcome?
12.2 Motivation: Our Major Proposition
12.3 Tamper Evident Solutions
12.3.1 Working of the Proposed Scheme
12.3.2 Advantages of TEDSP
12.4 Impact on Information Storage and Retrieval Applications
12.5 Final Remarks
Part VI Feasibility and Performance Analysis
13 Implementation Details
13.1 Details of the Code Implemented
13.2 Comparison of Performance
13.3 Evaluation
13.4 Final Remarks
Part VII Future Directions
14 Quantum Cryptography
14.1 Prolegomenous on Quantum Key Distribution (QKD)
14.2 A Primer on Quantum Information Processing
14.3 QKD Based on Polarized Single Photon
14.4 QKD Based on Entangled Photon Pairs
14.5 Final Remarks
References
15 Quantum Tools
15.1 Quantum Entanglement
15.2 Quantum Teleportation
15.3 Modern Version of QKD Based on Entangled Photon Pairs
15.4 Virtual Entanglement Procedure
15.5 Quantum Internet
15.5.1 Entanglement Swapping for Quantum Repeaters
15.5.2 Quantum Repeaters for Quantum Internet
15.5.3 Quantum Memories for Buffering
15.6 Final Remarks
References
16 Applications
16.1 Quantum Internet of Things (QIoT)
16.2 Quantum Blockchain
16.3 Quantum Money and Quantum Cheque
16.4 Quantum Security of Confidential Documents
16.5 Quantum Radar
16.6 Quantum Medical Imagery
16.7 Final Remarks
Index