Internet of Things and Secure Smart Environments: Successes and Pitfalls

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research.

Features:

  • Presents cutting edge topics and research in IoT
  • Includes contributions from leading worldwide researchers
  • Focuses on IoT architectures for smart environments
  • Explores security, privacy, and trust
  • Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments

This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.

Author(s): Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
Series: Chapman & Hall/CRC Big Data Series
Publisher: CRC Press
Year: 2020

Language: English
Pages: 512
City: Boca Raton

Cover
Half Title
Series Page
Title Page
Copyright Page
Dedication
Table of Contents
List of Figures
List of Tables
Preface
Acknowledgement
Editors
Contributors
Chapter 1 Wireless Localization for Smart Indoor Environments
1.1 Introduction
1.2 Positioning Methods
1.2.1 Transmission
1.2.1.1 Time
1.2.1.2 Direction
1.2.1.3 Phase
1.2.2 Characteristics
1.2.2.1 Strength
1.2.2.2 Channel
1.2.3 Critique
1.3 Positioning Technologies
1.3.1 Radio Waves
1.3.2 Sound
1.3.3 Magnetic Field
1.3.4 Visible Light
1.3.5 Vibration
1.3.6 Evaluation Metrics
1.3.7 Critique
1.4 A View for Research Prospects
1.5 Conclusion
Note
Bibliography
Chapter 2 An Approach towards GIS Application in Smart City Urban Planning
2.1 Introduction
2.1.1 Objectives
2.1.2 Contribution
2.1.3 GIS in Urban Planning
2.1.4 GIS as an Integrated System for Smart Cities
2.1.4.1 GIS Applications for Smart Cities
2.1.5 GIS Software Types
2.1.6 GIS Websites
2.2 GIS in Transportation Analysis and Planning
2.2.1 Applications of GIS in Transportation Planning
2.2.2 Internet GIS and Its Applications in Transportation
2.2.3 GIS-T Analysis and Modeling
2.3 GIS in Waste Management Planning
2.3.1 Waste Storage System
2.3.2 Elements of Solid Waste Management
2.3.3 Significance of GIS in Waste Management
2.3.4 GIS for Sustainable Waste Management
2.3.5 GIS Modeling for the Optimization of Waste Collection and Transport
2.3.6 Application of GIS Technology in Waste Management
2.4 Regional Planning
2.5 GIS in Resource Management
2.5.1 The Role of GIS in the Management of Natural Resources
2.5.2 Use of Remote Sensing and GIS in Natural Resource Management
2.5.3 Application of GIS in Natural Resource Management
2.5.3.1 Hazard and Risk Assessment
2.5.3.2 Change Detection
2.5.3.3 Natural Resource Inventory
2.5.3.4 Environmental Monitoring
2.6 GIS in Environmental Monitoring and Assessment
2.6.1 Monitoring Systems in General
2.6.2 Examples of Monitoring Systems
2.6.2.1 Real-Time Monitoring
2.6.2.2 Local Area Monitoring
2.6.3 Role of Remote Sensing and GIS in EIA
2.6.4 Advantages of Using GIS for EIA
2.6.5 Disadvantages in Using GIS for EIA
2.7 GIS in Socio-Economic Development
2.7.1 Methodological Issues of Socio-Economic Data Integration in GIS Applications
2.7.2 Use of GIS by Economic Development Professionals
2.7.3 Advantage of GIS in Economic Development Planning
2.7.4 Disadvantage of GIS in Economic Development Planning
2.8 GIS in Emergency Management
2.8.1 Implementing the Mission with GIS
2.8.2 Emergency Operations Plan
2.9 GIS in Education
2.9.1 Trials and Tribulations of GIS in K-12 Education
2.10 ML in GIS applications
2.11 Cybersecurity in GIS
2.12 Conclusion
References
Chapter 3 A Review of Checkpointing and Rollback Recovery Protocols for Mobile Distributed Computing Systems
3.1 Introduction
3.2 The System Model
3.3 Background and Definitions
3.4 Checkpointing Techniques
3.4.1 Checkpoint-Based
3.4.1.1 Uncoordinated Checkpointing
3.4.1.2 Coordinated Checkpointing
3.4.1.3 Communication-Induced Checkpointing
3.4.2 Log-Based
3.5 Literature Survey – Early Stage to Current Trend
3.6 Classification of the Protocols
3.7 Conclusions
References
Chapter 4 Softwarized Network Function Virtualization for 5G: Challenges and Opportunities
4.1 Introduction
4.2 Background
4.2.1 An Overview of SDN
4.2.2 Basic SDN Architecture
4.2.2.1 SDN Control Plane Architecture
4.2.2.2 SDN Application Plane Architecture
4.2.2.3 Operating Principle of SDN
4.2.3 An Overview of NFV
4.2.3.1 Background and Motivation for NFV
4.3 The Relationship of SDN/NFV with 5G
4.3.1 Basic 5G Network Architecture
4.3.1.1 The Core Network Architecture of 5G
4.3.1.2 5G Geographical Architecture Adoption
4.3.2 SDN-/NFV-Enabled 5G Architecture
4.3.3 Fundamental Overview of Network Architecture
4.4 Major Challenges for NFV in 5G
4.5 Opportunities for NFV in 5G
4.6 Conclusion and Future Works
Bibliography
Chapter 5 An Effective Deployment of SDN Controller in Smart City Renovation
5.1 Introduction
5.1.1 SDN Overview
5.1.2 Satellite Communication
5.2 Background Study
5.2.1 Satellite Communication Using Traditional Network
5.2.2 Satellite Communication Using SDN Framework
5.2.3 Application Deployment of SDN
5.3 Proposed SDN Controller Deployed Design Framework
5.3.1 Data Retrieval
5.3.2 Computation
5.3.3 Verification of Design Constraints
5.3.4 Information Circulation
5.4 NF Virtualization for Energy-Efficient Traffic Dissemination
5.4.1 Network Packet Scheduler
5.4.2 Network Functions
5.5 Mapping of Traffic Control Flow to SDN Virtualization
5.6 Implementation of SDN Deployed Design Framework in Smart City
5.6.1 Experimental Setup
5.6.2 Performance Evaluation
5.6.3 Discussion
5.7 Conclusion
References
Chapter 6 Flying Ad Hoc Networks: Security, Authentication Protocols, and Future Directions
6.1 Introduction
6.1.1 An Overview of FANET
6.1.1.1 5G- and Blockchain-Enabled FANET
6.1.2 UAV Subsystems
6.1.3 Applications
6.2 Vulnerabilities and Attacks
6.3 Security Requirements in FANET
6.4 Authentication Mechanisms in FANET
6.4.1 Mutual Authentication
6.4.2 User Authentication and Key Agreement Protocols
6.4.3 Drone Authentication
6.4.4 Operator Authentication
6.4.5 Tools and Techniques
6.5 Recent Trends and Future Directions
6.5.1 AI-Enabled Authentication
6.5.1.1 Physical Attribute-Based Authentication
6.5.2 PUF-Based Authentication
6.5.3 Hardware Implementation of Authentication Protocols
6.5.4 Chaos-Based Mutual Authentication
6.5.5 Quantum Authentication
6.5.6 Quantum Chaos Authentication
6.6 Conclusion
Bibliography
Chapter 7 Investigating Traffic of Smart Speakers and IoT Devices: Security Issues and Privacy Threats
7.1 Introduction
7.2 Smart Speakers: Architecture and Threat Model
7.2.1 Threat Model
7.2.2 Machine Learning Techniques for Attacking the IoT Ecosystem
7.2.2.1 k-Nearest Neighbors (kNN)
7.2.2.2 Decision Tree (DT)
7.2.2.3 Adaptive Boosting – AdaBoost (AB)
7.2.2.4 Random Forest
7.2.2.5 Support Vector Machine (SVM)
7.2.2.6 Neural Networks
7.2.2.7 K-Fold Cross-Validation
7.3 Experimental Test Bed
7.3.1 Data Handling
7.4 Numerical Results
7.4.1 Dataset Overview
7.4.2 Classifying the State of the Smart Speaker
7.4.3 Analysis of the Training Time
7.5 Development of Countermeasures
7.6 Conclusions and Future Works
Notes
Bibliography
Chapter 8 Hardware Security in the Context of Internet of Things: Challenges and Opportunities
8.1 Introduction
8.1.1 Motivational Example
8.1.2 Contributions and Organization of This Chapter
8.2 Threats on IoT Implementation
8.2.1 HTH and Countermeasures
8.2.1.1 Modern Integrated Circuit Design and Manufacturing Practices
8.2.2 HTH Classification Based on Triggering Mechanism
8.2.3 Impact of Undetected HTH Insertion
8.2.3.1 Trojans on IoT Infrastructure
8.2.4 Countermeasures against HTHs
8.2.4.1 HTH Attack Models and Countermeasure Classification
8.2.5 Countermeasures in Malicious Foundry Model
8.2.5.1 Destructive Detection Approaches
8.2.5.2 Non-Destructive Detection Approaches
8.2.5.3 DFT Insertion Approaches
8.2.5.4 Runtime Monitoring Approaches
8.2.5.5 Other Emerging Detection Approaches
8.2.6 Countermeasures in 3PIP Model
8.2.7 Counterfeit ICs
8.2.8 Counterfeit IC Detection
8.2.9 Trends of HTH and Counterfeit Electronics Research
8.3 PUFs for IoT Security
8.3.1 Physically Unclonable Function (PUF)
8.3.1.1 PUF Classification
8.3.2 Attacks on PUFs
8.3.2.1 Modeling Attacks on Delay PUF Variants
8.3.2.2 Cryptanalytic Attacks on Delay PUFs
8.3.3 Attacks on PUF Protocols
8.3.4 Philosophy Behind Modeling Resistant Strong PUF Designs
8.3.5 Application of PUF for IoT Security
8.4 Open Research Issues and Future Research Directions
8.5 Conclusions
Bibliography
Chapter 9 Security Challenges in Hardware Used for Smart Environments
9.1 Introduction to IoT and Hardware Security Issues
9.1.1 Hardware Issues with Real-Time Examples and Their Countermeasures
9.2 Security Challenges in IoT Devices
9.3 Overview of Hardware Attacks and Threat Models
9.3.1 Hardware Trojans
9.3.2 Hidden Back Door
9.3.3 IP/IC Piracy
9.3.4 IC Overproduction & Cloning
9.3.5 Reverse Engineering
9.4 Security Challenges of Hardware Trojans at IoT Devices
9.5 Countermeasures against Hardware Trojan
9.5.1 Trojan Detection and Diagnosis
9.5.2 Online-Monitoring HT Detection
9.5.3 Trojan Prevention
9.6 Conclusion
Bibliography
Chapter 10 Blockchain for Internet of Battlefield Things: A Performance and Feasibility Study
10.1 Introduction
10.2 Challenges of IoBT: An Overview
10.2.1 Security and Trustworthiness
10.2.2 Communication
10.2.3 Node Location
10.3 Related Works
10.4 Blockchain Use Cases for Tactical Networks
10.4.1 Permission-Less Variants
10.4.2 Permissioned Variants
10.5 Evaluation
10.5.1 Setup
10.5.2 Substituting Unlimited Term
10.5.3 Network Maintenance
10.5.4 Data Throughput
10.5.4.1 Topology
10.5.4.2 Bandwidth
10.5.5 Successfully Validated Transactions
10.5.5.1 100 Mbps Bandwidth
10.5.5.2 64 Kbps Bandwidth
10.5.6 Edge-Based Simulation
10.5.7 Findings
10.5.8 Other Factors
10.6 Conclusion
Bibliography
Chapter 11 Internet of Things in 5G Cellular Networks: Radio Resource Perspective
11.1 Introduction
11.2 Narrow Band and Codec Scheme for IoT-enabled 5G
11.2.1 Narrow-Band IoT
11.2.2 Adaptive Modulation and Codec Schemes
11.3 Capacity Estimation of 5G Networks
11.3.1 Resource Allocation Procedure
11.3.2 Theoretical Capacity Analysis of Cellular 5G Networks
11.3.3 Traffic Model of Tasks
11.3.4 Estimation of Task Blocking Performances Based on M/M/m/m Model
11.4 Performance Study
11.4.1 Performance Values
11.4.2 Obtained Results and Discussions
11.5 Conclusion
Bibliography
Chapter 12 An SDN-IoT–Based Framework for Future Smart Cities: Addressing Perspective
12.1 Introduction
12.2 Background
12.2.1 An Overview of SDN
12.2.2 An Overview of IoT and Smart Cities
12.2.3 An Overview of IPv6 Addressing
12.3 Related Works
12.4 The Proposed SDN-IoT–Based Smart City Framework
12.4.1 The Proposed Addressing Scheme
12.4.2 Performance Evaluation
12.5 Conclusion
Bibliography
Index