Internet of Things: Security and Privacy in Cyberspace

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book covers major areas of device and data security and privacy related to the Internet of Things (IoT). It also provides an overview of light-weight protocols and cryptographic mechanisms to achieve security and privacy in IoT applications. Besides, the book also discusses intrusion detection and firewall mechanisms for IoT. The book also covers topics related to embedded security mechanisms and presents suitable malware detection techniques for IoT. The book also contains a unique presentation on heterogeneous device and data management in IoT applications and showcases the major communication-level attacks and defense mechanisms related to IoT.

Author(s): Sandeep Saxena, Ashok Kumar Pradhan
Series: Transactions on Computer Systems and Networks
Publisher: Springer
Year: 2022

Language: English
Pages: 298
City: Singapore

Contents
Editors and Contributors
1 Pre-requisite Concepts for Security and Privacy
1.1 Principles of Cryptography
1.1.1 Confidentiality
1.1.2 Integrity
1.1.3 Availability
1.1.4 Non-repudiation
1.2 Access Control
1.2.1 Identification
1.2.2 Authentication
1.2.3 Authorization
1.2.4 Accountability
1.3 Cryptography
1.3.1 Symmetric Encryption
1.3.2 Asymmetric Encryption/Private Key Cryptography
References
2 Basic Concepts of Cloud and Fog Computing
2.1 Cloud Computing and Its Applications
2.1.1 Evolution of Cloud Computing
2.1.2 Definition of Cloud Computing
2.1.3 Essential Characteristics of Cloud Computing
2.1.4 Cloud Computing: Layered Architecture
2.1.5 Cloud Computing Deployment Model
2.1.6 Limitations of Cloud Only Computing:
2.2 Fog Computing and Its Applications
2.2.1 Definition of the Fog Computing
2.2.2 Six-Layered Architecture of Fog Computing
2.2.3 Characteristics of the Fog Computing
2.2.4 Locations of the Fog Node
2.2.5 Application of Fog Computing and Its Role in the Internet of Things
References
3 Access Control and Authentication in IoT
3.1 Introduction
3.2 Identity Management in IoT
3.2.1 Inter-domain Identity Management Architectures
3.2.2 Techniques to Build a Coordinating System
3.2.3 Single Sign-On Identity Federation
3.3 Authentication Mechanisms in IoT
3.4 Access Control Models with Examples
3.4.1 Open Challenges
References
4 Lightweight Cryptographic Techniques and Protocols for IoT
4.1 Introduction
4.2 International Bodies for IoT Protocol Development
4.2.1 IoT Data Link Protocols
4.2.2 Network Layer Routing Protocols
4.2.3 Session Layer Protocols
4.2.4 IoT Management Protocols
4.2.5 Security of IoT Protocols
4.2.6 IETF on IoT Security
4.3 Various Protocols for IoT
4.3.1 ZigBee
4.3.2 Thread
4.3.3 Bluetooth Low Energy (BLE)
4.3.4 WirelessHART
4.3.5 IP-Smart
4.4 Protocols and Its Features
4.4.1 Cryptographic Techniques and Features
4.5 Lightweight Cryptographic Techniques
4.6 Conclusion
References
5 Communication Security in IoT
5.1 Different Communication Layer Protocols and Mediums for IoT
5.1.1 ZigBee
5.1.2 BLE
5.1.3 Near-Field Communication
5.1.4 6LoWPAN
5.1.5 Wi-Fi
5.1.6 Sigfox
5.2 Communication-Level Attacks
5.2.1 Sinkhole Attack
5.2.2 Wormhole Attack
5.2.3 Black Hole Attack
5.2.4 Flood Attack
5.2.5 Rank Attack
5.2.6 Cryptanalytic Attack
5.3 Defense Mechanism
5.3.1 Content Chaining Scheme
5.3.2 Authentication Defense Mechanism
5.3.3 Intrusion Detection System (IDS)
5.3.4 End to the End Encryption Method
5.4 Network Optimization Techniques
5.4.1 Particle Swarm Optimization (PSO)
5.4.2 Genetic Algorithm (GA)
5.4.3 Heuristic Algorithm
5.5 Challenges in Network Optimization
5.6 Conclusion and Future Direction
References
6 Intrusion Detection System with Layered Approach to Internet of Things—A Business Paradigm
6.1 Introduction
6.2 What the IoT Is Made Up Of
6.3 Intrusion Detection System
6.4 What Is Industrial Revolution 4.0, 3.0, 2.0, and 1.0?
6.5 Layered Architecture of IoT
6.6 Layer 1: Things Layer or Physical Layer
6.7 Layer 2: Communications Network Layer
6.8 Layer 3: Applications Layer
6.9 Current Security Threats and Challenges in IoT
6.10 Conclusions
References
7 Malware Detection in IoT
7.1 Malware in IoT Software
7.1.1 Botnet
7.1.2 Ransomware
7.1.3 Rootkit
7.1.4 Keylogger
7.1.5 Trojan Horse
7.1.6 Worm
7.2 Malware in IoT Hardware
7.2.1 Side-Channel Attacks
7.3 IoT Malware Analysis Techniques
7.3.1 Static Analysis
7.3.2 Dynamic Analysis
7.3.3 Hybrid Analysis
7.4 IoT Malware Detection Techniques
7.4.1 Signature Based
7.4.2 Heuristic Based
7.4.3 Specification Based
7.4.4 Static and Dynamic Detection
7.5 Use Case Example
7.5.1 Mirai Malware
7.5.2 Reaper
7.5.3 Echobot
7.5.4 Other Potential Attacks
7.5.5 Pegasus (2021)
7.6 Research Opportunities in Malware
7.6.1 Advanced Machine Learning (AML)
7.6.2 Mobile Device Malwares
7.6.3 Graph-Based Malware Analysis
7.6.4 Defense in Depth Malware
7.6.5 Bio-Inspired Malware
7.6.6 Malware Education
7.6.7 Big Data Malware Analysis
7.6.8 Deception Antimalware Techniques
7.6.9 Botnet Countermeasures
7.6.10 Malware Advertisements Learning
References
8 IoT Network Used in Fog and Cloud Computing
8.1 Introduction
8.1.1 Internet of Things (IoT)
8.1.2 IoT Networks and Architectures
8.1.3 Cloud Computing and Its Integration with IoT
8.1.4 Fog Computing and Its Integration with IoT
8.1.5 Comparison Between Fog Computing and Cloud Computing Paradigms
8.2 Implementation of Fog Computing and Cloud Computing Using IoT
8.2.1 IoT Networks Used in Cloud Computing
8.2.2 IoT Networks Used in Fog Computing
8.3 Security Issues, Threats, and Concerns
8.4 IoT Network Protocols
8.5 Case Studies
8.6 Conclusion
References
9 Internet of Vehicles: Features, Architecture, Privacy, and Security Issues
9.1 Introduction
9.2 Applications of Internet of Vehicles
9.3 Interaction Model in IoV
9.4 Literature Review
9.5 Challenges in IoV
9.6 Architecture of IοV
9.7 Security Aspect of IoV
9.8 Requirements of Security in IoV
9.9 Security Challenges in IoV
9.10 Future Direction of IoV
9.11 Conclusion
References
10 Cybersecurity and Ethics for IoT System: A Massive Analysis
10.1 Introductıon
10.2 Frequently used to Attack Official or Employment Agencies
10.3 Taking Advantage of Known Flaws
10.3.1 Equipment
10.3.2 Errors in Software
10.3.3 Security Vulnerability in Internet Services and Protocols
10.4 Threats Are Already on the Rise
10.4.1 Use of Social Media
10.4.2 Data Storage System
10.4.3 Thoughtful Cell Phones
10.4.4 High-Value and Mission-Critical System
10.4.5 Energy Efficiency, Transportation Sustainability, Climate Change, and Affordable Housing
References
11 Blockchain for Enhancing Security of IoT Devices
11.1 Introduction
11.1.1 IoT Challenges
11.1.2 Mapping of IoT Vulnerabilities from High-Level to Low-Level, Indications and Solutions
11.2 Blockchain Overview
11.2.1 Types of Blockchain
11.2.2 Public and Private Key
11.2.3 Digital Signature
11.2.4 Smart Contract
11.2.5 Consensus Algorithm
11.2.6 Cryptography and Hashing
11.2.7 Identity Management
11.3 Introduction to IoT and Blockchain
11.3.1 Real-Life Applications of IoT Devices
11.3.2 Real-Life Applications of Integration of IoT and Blockchain
11.3.3 IoT Device Identity Management Through Blockchain
11.4 Integration of IoT and Blockchain
11.4.1 Device Identity Approach
11.4.2 Device Gateway Communication Through Blockchain
11.4.3 Peer-To-Peer IoT Blockchain-Based Integration Model
11.4.4 Hybrid Approach
11.4.5 Advantages of Integration of IoT and Blockchain
11.5 Challenges of Integration of IoT and Blockchain
11.6 IoT-Based Blockchain Applications
11.6.1 Healthcare Industry
11.6.2 Supply Chain Management
11.6.3 Smart Energy Grids
11.7 Smart Home Security
11.7.1 Typical Smart Home Security Tips
11.7.2 Smart Home Security Solution with Blockchain
11.8 Blockchain for Healthcare Industry
11.9 Results
11.10 Discussion
11.11 Conclusion
References
12 Challenges and Trends on Post-Quantum Cryptography
12.1 Introduction
12.2 Challenges Due to Shor’s Algorithm
12.2.1 Shor’s Algorithm
12.2.2 Experimental Implementation
12.3 Post-Quantum Algorithm
12.3.1 BB84 Protocol
12.3.2 BB84 Protocol Description
12.3.3 BB84 Protocols Workout Example
12.3.4 BB84 Protocol Implementation Using IBMQ
12.4 Teleportation
12.4.1 Teleportation Implementation Using IBMQ
12.5 Quantum Cheque Algorithm
12.5.1 Generation Algorithm
12.5.2 Sign Algorithm
12.6 Conclusion
References