Security, Trust and Privacy Models, and Architectures in IoT Environments

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The authors aim to capture the latest research and contributions from academy, industry, and other stakeholders on new security models, architectures, protocols, and standards for ensuring security, privacy, and trustworthiness to IoT systems. The authors discuss the convergence of IoT, software agents, and edge computing to introduce social features into IoT systems, combining trustworthiness and reputation information collected by agents at the edge with security and privacy mechanisms. They also cover experimental and simulated campaigns that evaluate strategies to improve the security and privacy of the IoT world, and at the same time the ability to prevent and deter deceptive behaviors. The book is relevant for researchers, professionals, academics, and students.

Author(s): Lidia Fotia, Fabrizio Messina, Domenico Rosaci, Giuseppe M.L. Sarné
Series: Internet of Things
Publisher: Springer
Year: 2023

Language: English
Pages: 185
City: Cham

Preface
Contents
IoT Network Administration by Intelligent Decision Support Based on Combined Neural Networks
1 Introduction
2 Related Work
3 Problem Statement
4 Architecture
4.1 General Architecture of the Analytical Unit
4.2 Data Normalization Module
4.3 Artificial Neural Networks Module
4.4 Results Analysis Module
5 Implementation, Experiments, and Discussion
5.1 Implementation
5.2 Experiments on Training Error Evaluation
5.3 Experiments on Compatible Evaluation of Training Methods
5.4 Experiments on Combined ANN Testing
5.5 Common Discussion
6 Conclusion
References
A Novel Privacy-Preserving Framework Based on Blockchain Technology to Secure Industrial IoT Data
1 Introduction
2 Background and Related Works
2.1 Background
2.1.1 Blockchain Technology
2.1.2 Consensus Protocol
2.1.3 Access Control
2.2 Related Works
3 Methodology
3.1 Intrusion Detection and Its Protection
4 Results
4.1 Discussion and Analysis
5 Conclusion
References
Detecting Collusive Agents by Trust Measures in Social IoT Environments: A Novel Reputation Model
1 Introduction
2 Related Work
3 The IoT Agent-Based Reference Scenario
4 The Proposed Reputation Model
5 Two Cases Study
5.1 Case Study 1
5.2 Case Study 2
6 Conclusions
References
An Adaptive Blurring Routing Protocol for Delay-Tolerant Networks in IoT Environments
1 Introduction
2 Related Works
3 Innovation from Natural Context and Proposed Solution: Privacy Preserving Delay-Tolerant Network (PPDTN)
4 Protocol Description
5 Experimental Results
6 Conclusions
References
Modeling and Detection of Denial-of-Sleep Attacks on Autonomous IoT Devices in Wireless Sensor Networks
1 Introduction
2 Related Work
3 Application Scenario
4 Attack Modeling
5 Development of the Detection Mechanism and Experiments
6 Discussion
7 Conclusions
References
Machine Learning Methodologies for Preventing MalwareObfuscation
1 Introduction
2 Machine Learning Methods for Malware Classification
2.1 Traditional Machine Learning Methods
2.2 Image-Based Malware Detection
3 Experiments
3.1 Malware Dataset
3.2 Generating Obfuscated Samples
3.3 Training
3.4 Results
4 Conclusions
References
Formation of Reliable Composite Teams for Collaborative Environmental Surveillance of Ecosystems
1 Introduction
2 The Framework
3 The Trust Model
4 Experiments
4.1 Experimental Settings
4.2 Results
5 Related Work
6 Conclusions
References
Accountability of IoT Devices
1 Introduction
2 Related Work
3 Key Technologies
3.1 Blockchain
3.2 Physical Unclonable Functions
4 IoT Accountability Infrastructure
4.1 Architecture
4.1.1 Accountability Node
4.1.2 Central Node
4.1.3 Miners
4.1.4 Authentication Provider
5 Conclusions
References
Digital Twin Through Physical Assets Tokenization in Blockchain
1 Introduction
2 Related Work
3 State of the Art
3.1 Token
3.2 Token Classification
3.2.1 ERC-20 Fungible Token
3.2.2 ERC-721 Non-fungible Token
3.2.3 NFT Limitations and Opportunities
3.3 ERC-998 Composable NFT
3.3.1 ERC-1155 Multi-class Token
4 On-Chain vs Off-Chain
5 Concept Architecture to Establish Digital Twin on Physical Asset Tokenization
5.1 Phase 1
5.2 Phase 2
5.3 Phase 3
5.4 Limitations
6 Conclusions
References
Security in Home Automation
1 Introduction
2 Technology and Features
2.1 Off the Shelf
2.2 Do-It-Yourself (DIY)
2.3 Hybrid
3 Advantages and Limitations
4 Literature Review
5 Conclusions
References
Index