Security and Privacy Issues in IoT Devices and Sensor Networks

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Security and Privacy Issues in IoT Devices and Sensor Networks investigates security breach issues in IoT and sensor networks, exploring various solutions. The book follows a two-fold approach, first focusing on the fundamentals and theory surrounding sensor networks and IoT security. It then explores practical solutions that can be implemented to develop security for these elements, providing case studies to enhance understanding. Machine learning techniques are covered, as well as other security paradigms, such as cloud security and cryptocurrency technologies. The book highlights how these techniques can be applied to identify attacks and vulnerabilities, preserve privacy, and enhance data security.

This in-depth reference is ideal for industry professionals dealing with WSN and IoT systems who want to enhance the security of these systems. Additionally, researchers, material developers and technology specialists dealing with the multifarious aspects of data privacy and security enhancement will benefit from the book's comprehensive information.

Author(s): Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath
Series: Advances in Ubiquitous Sensing Applications for Healthcare
Publisher: Academic Press
Year: 2020

Language: English
Pages: 334
City: London

Front-Matter_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Netw
Front Matter
Copyright_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Network
Copyright
Contributors_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Netw
Contributors
Chapter-1---Wireless-sensor-networks--C_2021_Security-and-Privacy-Issues-in-
Wireless sensor networks: Concepts, components, and challenges
Introduction
Network design objective
Technological background
Network architecture
Classification of WSN
WSN communication pattern
Protocol stack of WSN
Medium access control at data link layer
Network layer
Routing protocol
Transport layer
WSN design challenges
Comparative analysis of optimized clustering algorithm
Cluster formation scenario
Optimized clustering strategy
Evaluation of clustering methods for optimization
Modeling of system
Result and analysis
Conclusion and future work
References
Chapter-2---Secure-performance-of-emerging-wi_2021_Security-and-Privacy-Issu
Secure performance of emerging wireless sensor networks relying nonorthogonal multiple access
Brief history of IoT communications related to multiple access technique
Basic fundamentals of NOMA
NOMA and application in cooperation network
NOMA and cognitive radio-assisted IoT system
System model of IoT relying NOMA and CR
Outage probability analysis in case of partial relay selection
Performance analysis of the first user
Outage probability at D2
Improving security at physical layer
Validating achievable expressions of outage behavior and secure performance via numerical simulation
Conclusion
References
Chapter-3---Security-and-privacy-in-wireless_2021_Security-and-Privacy-Issue
Security and privacy in wireless body sensor networks using lightweight cryptography scheme
Introduction
Motivation and objective of research
Related work
Proposed work
Sensor communication between the sensor nodes
Encryption and decryption
Secure communication between sensor head to remote server
Secure data access in cloud server
Performance analysis
Summary
References
Chapter-4---Impact-of-thermal-effects-on-w_2021_Security-and-Privacy-Issues-
Impact of thermal effects on wireless body area networks and routing strategies
Introduction
Thermal-aware routing protocols
Thermal-aware routing algorithm (TARA)
Least temperature rise (LTR)
Least total route temperature (LTRT)
Hotspot preventing routing (HPR)
RAIN
Thermal-aware shortest hop routing protocol (TSHR)
M-ATTEMPT
TMQoS
RE-ATTEMPT
M2E2 multihop routing protocol
Thermal aware-localized QoS routing protocol
Trust and thermal-aware routing protocol
Self-healing thermal-aware RPL routing protocol
Multipath ring routing protocol
Introduction about the thermal influence on medical WSN
Problems faced by recent scenario
Thermal influence on human tissue
Wireless communication technologies for data transfer in WBAN
Sources of energy consumption
Specific absorption rate (SAR)
Proposed protocol (OPOTRP)
OPOTRP functional procedure
Initialization stage
Relay node selection
Assigning priority level for data in sensor node
Alternative relay node selection
Optimal temperature selection
Results and discussion
Simulation parameters
Variation in temperature at different times
Average power consumption
Network lifetime analysis
Different data priority signal
Heating ratio
Data delivery delay
Conclusion
References
Chapter-5---Four-way-binary-tree-base_2021_Security-and-Privacy-Issues-in-Io
Four-way binary tree-based data gathering model for WSN
Introduction
Literature survey
Network model
Energy dissipation radio model
Network characteristics
Proposed (virtual 4-way full binary tree) structure
Setup of the network
Working of the proposed scheme
Initial phase
Active phase
Dying phase
Flow charts
Result analysis
Advantages of the proposed scheme
Conclusion
References
Chapter-6---Routing-protocols--Key-security-_2021_Security-and-Privacy-Issue
Routing protocols: Key security issues and challenges in IoT, ad hoc, and sensor networks
Introduction
The security issues, challenges and requirements
Network security and requirements
Security issues and challenges
Classification of attacks
Based on the attackers location
Based on tempering with data
Attacks and countermeasures on different layers
Physical-layer attacks
Data-link layer attacks
Networks layer attacks
Transport layer attacks
Application layer attacks
Multilayer attacks
Denial of service (DoS) attacks
Survey of security issues, threats and defense mechanisms in IoT
Wormhole attack and its counter measure
Classification of wormhole attacks
Wormhole detecting and avoiding models
Proposed solutions and analysis
Transmission time-based wormhole detection
Route reply by the destination
RTT calculations
TTWD model
TTWD algorithm
Route discovery
Computation of RTT in TTWD
Simulation and experimental evaluation
Simulation environment
Network simulator parameters
Simulation results
Simulation-scenario 1
Simulation-scenario 2
Simulation-scenario 3
Simulation-scenario 4
Conclusion and future directions
References
Chapter-7---Fault-tolerance-of-cluster-based-_2021_Security-and-Privacy-Issu
Fault tolerance of cluster-based nodes in IoT sensor networks with periodic mode of operation
Introduction
Related works
Mathematical background and main symbols and definitions
Models formulation and solution
Model 1. Sensor with diagnostics in active mode
Model 2. Sensor with diagnostics in active mode and periodical diagnostics in the sleep mode
Numerical example
Model 3. Sensors with mix architecture of backup batteries
Results and discussions
Conclusions
References
Chapter-8---Lightweight-cryptographic-algorit_2021_Security-and-Privacy-Issu
Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks
Introduction
Methodology
Chapter organization
Related work
Preliminaries
Resource constrained environment- internet of things (IoT)
Phases of IoT system
Architectural layers of IoT
Implementation of lightweight block ciphers for IoT applications
Lightweight cryptographic primitives
Lightweight block ciphers
Lightweight stream ciphers
Lightweight hash functions
Lightweight message authentication codes
Proposed methodology
Hardware analysis metrics
Algorithm of KLEIN lightweight block cipher
Pipelined architecture of KLEIN lightweight block cipher
Parallel architecture of KLEIN lightweight block cipher
Unrolled architecture of KLEIN lightweight block cipher
Simulation results
Results and discussions
Performance comparison of conventional and lightweight cryptographic algorithms for IoT
Conclusion
References
Chapter-9---EELC--Energy-efficient-ligh_2021_Security-and-Privacy-Issues-in-
EELC: Energy-efficient lightweight cryptography for IoT networks
Introduction-IoTSec
Cyberattacks
Security challenges in IoT
Literature survey
Energy-efficient lightweight cryptography (EELC) architecture
Energy efficient subkey generation
LMGF algorithm
Algorithm
Mathematical model for MAC
Flow of OMGF
Hardware requirement
Robustness of OMGF
Energy efficient encryption
Working of EEE
Energy efficient decryption
Performance evaluation
Time complexity analysis
Analysis based on energy
Security attacks
Brute force attack
Cryptanalysis
Conclusion
Further reading
Chapter-10---Blockchain-as-a-solution-for-_2021_Security-and-Privacy-Issues-
Blockchain as a solution for security attacks in named data networking of things
Introduction
Security attacks in NDN of things (NDNoT)
Cache misappropriation
Interest flooding
Selfish irruption
Data phishing
Miscellaneous irruptions
Blockchain in NDNoT
Blockchain basics
Blockchain architecture
Key features of design of blockchain
Security investigation of NDN blockchain of things
AES128 algorithm
Types of blockchain
The need for using a Blockchain in IoT
BIoT applications
Existing issues of applications of blockchain IoT
Further issues and recommendations of blockchain in IoT
Conclusion
References
Chapter-11---A-novel-privacy-preserving-hea_2021_Security-and-Privacy-Issues
A novel privacy-preserving healthcare information sharing platform using blockchain
Introduction
Literature review
Overview of blockchain
System model
Overview
Patient uploading medical data
Provider uploading medical data of his/her patient
Provider sharing medical data with another provider
Provider querying medical data of patient
Patient updating access given to provider
Analysis
Conclusion
References
Chapter-12---Computational-intelligent-techniq_2021_Security-and-Privacy-Iss
Computational intelligent techniques for prediction of environmental attenuation of millimeter waves
Introduction
Atmosphere
Composition of atmosphere
Terrestrial and satellite links
Attenuation due to gas
Attenuation caused by snow
Attenuation due to hail
Attenuation due to dust
Attenuation due to scintillation
Cloud attenuation
Cloud attenuation model
Work done by other researchers
Rain attenuation
ITU-R model
Simple attenuation model
García-López method
Model proposed by Brazil
RAL model
Rain attenuation in terrestrial links
Implementation results of rain model
Issues related to machine learning
Conclusion
References
Chapter-13---The-role-of-IoT-in-smart-cities--C_2021_Security-and-Privacy-Is
The role of IoT in smart cities: Challenges of air quality mass sensor technology for sustainable solutions
Introduction
Background of air quality monitoring sensors in urban environments
Regulation-based air quality monitoring
Ambient particulate monitoring
Ambient gas monitoring
IoT-based air quality monitoring
MSU and LCS monitoring
Crowdsourcing and citizen science
Evaluation of regulation- and IoT-based air quality sensor technology
Applications of urban air quality data
Challenges of air quality monitoring and management in urban environments
Lack of spatial variability
Environmental challenges
Crowdsourcing and citizen science challenges
Lack of transparency
IoT-based air quality monitoring trial programs
Applications, initiatives, and future direction
Integration of sensor data and passive crowdsourced data
Air quality data application framework
Practical applications
Strategic applications
Legislative application
Smart city digital twinning
Discussion and findings
Conclusion
References
Index_2021_Security-and-Privacy-Issues-in-IoT-Devices-and-Sensor-Networks
Index