Muutke küpsiste eelistusi

E-raamat: IoT Security - Advances in Authentication: Advances in Authentication [Wiley Online]

Edited by , Edited by , Edited by , Edited by
  • Formaat: 320 pages
  • Ilmumisaeg: 13-Feb-2020
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 111952797X
  • ISBN-13: 9781119527978
  • Wiley Online
  • Hind: 145,85 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 320 pages
  • Ilmumisaeg: 13-Feb-2020
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 111952797X
  • ISBN-13: 9781119527978

An up-to-date guide to an overview of authentication in the Internet of Things (IoT)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. 

The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:

  • Offers an authoritative reference designed for use by all IoT stakeholders
  • Includes information for securing devices at the user, device, and network levels
  • Contains a classification of existing vulnerabilities
  • Written by an international group of experts on the topic
  • Provides a guide to the most current information available on IoT security 

Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

About the Editors xiii
List of Contributors
xvii
Preface xxiii
Acknowledgments xxix
Part I IoT Overview
1(64)
1 Introduction to IoT
3(24)
Anshuman Kalla
Powani Prombage
Modhusanka Liyanage
1.1 Introduction
4(1)
1.1.1 Evolution of IoT
4(1)
1.2 IoT Architecture and Taxonomy
5(2)
1.3 Standardization Efforts
7(3)
1.4 IoT Applications
10(7)
1.4.1 Smart Home
11(2)
1.4.2 Smart City
13(1)
1.4.3 Smart Energy
14(1)
1.4.4 Healthcare
15(1)
1.4.5 IoT Automotive
16(1)
1.4.6 Gaming, AR and VR
16(1)
14.7 Retail
17(1)
1.4.8 Wearable
18(1)
1.4.9 Smart Agriculture
18(1)
1.4.10 Industrial Internet
19(1)
1.4.11 Tactile Internet
19(1)
14.12 Conclusion
20(7)
Acknowledgement
20(1)
References
20(7)
2 Introduction to IoT Security
27(38)
Anca D. Jurcut
Pasika Ranaweera
Lina Xu
2.1 Introduction
27(2)
2.2 Attacks and Countermeasures
29(12)
2.2.1 Perception Layer
30(3)
2.2.2 Network Layer
33(1)
2.2.3 Application Layer
34(7)
2.3 Authentication and Authorization
41(7)
2.3.1 Authentication
42(1)
2.3.2 Authorization
42(1)
2.3.3 Authentication at IoT Layers
43(5)
2.4 Other Security Features and Related Issues
48(4)
2.4.1 The Simplified Layer Structure
48(1)
2.4.2 The Idea of Middleware
49(1)
2.4.3 Cross-Layer Security Problem
50(1)
2.4.4 Privacy
50(1)
2.4.5 Risk Mitigation
51(1)
2.5 Discussion
52(2)
2.6 Future Research Directions
54(4)
2.6.1 Blockchain
54(1)
2.6.2 5G
55(1)
2.6.3 Fog and Edge Computing
56(1)
2.6.4 Quantum Security, AI, and Predictive Data Analytics
57(1)
2.6.5 Network Slicing
57(1)
2.7 Conclusions
58(7)
References
59(6)
Part II IoT Network and Communication Authentication
65(54)
3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks
An Braeken
67(1)
3.1 Introduction
67(2)
3.2 Related Work
69(1)
3.3 System Model and Assumptions
70(2)
3.3.1 Design Goals
70(1)
3.3.2 Setting
70(1)
3.3.3 Notations
71(1)
3.3.4 Attack Model
71(1)
3.4 Scheme in Normal Mode
72(5)
3.4.1 Installation Phase
72(1)
3.4.2 Group Node Key
73(1)
3.4.3 Individual Cluster Key
73(1)
3.4.4 Pairwise Key Derivation
74(2)
3.4.5 Multicast Key
76(1)
3.4.6 Group Cluster Key
76(1)
3.5 Authentication
77(1)
3.5.1 Authentication by CN
77(1)
3.5.2 Authenticated Broadcast by the CH
77(1)
3.5.3 Authenticated Broadcast by the BS
78(1)
3.6 Scheme in Change Mode
78(2)
3.6.1 Capture of CN
78(1)
3.6.2 Capture of CH
79(1)
3.6.3 Changes for Honest Nodes
79(1)
3.7 Security Analysis
80(1)
3.7.1 Resistance Against Impersonation Attack
80(1)
3.7.2 Resistance Against Node Capture
81(1)
3.7.3 Resistance Against Replay Attacks
81(1)
3.8 Efficiency
81(2)
3.8.1 Number of Communication Phases
81(1)
3.8.2 Storage Requirements
82(1)
3.8.3 Packet Fragmentation
82(1)
3.9 Conclusions
83(2)
Acknowledgement
83(1)
References
83(2)
4 Public Key Based Protocols -- EC Crypto
85(16)
Pawani Porambage
An Braeken
Corinna Schmitt
4.1 Introduction to ECC
85(3)
4.1.1 Notations
86(1)
4.1.2 ECC for Authentication and Key Management
87(1)
4.2 ECC Based Implicit Certificates
88(3)
4.2.1 Authentication and Key Management Using ECC Implicit Certificates
88(3)
4.3 ECC-Based Signcryption
91(4)
4.3.1 Security Features
93(1)
4.3.2 Scheme
93(2)
4.4 ECC-Based Group Communication
95(2)
4.4.1 Background and Assumptions
95(1)
4.4.2 Scheme
96(1)
4.5 Implementation Aspects
97(1)
4.6 Discussion
98(3)
References
98(3)
5 Lattice-Based Cryptography and Internet of Things
101(5)
Veronika Kuchta
Gaurav Sharma
5.1 Introduction
101(1)
5.1.1 Organization
102(1)
5.2 Lattice-Based Cryptography
102(4)
5.2.1 Notations
102(1)
5.2.2 Preliminaries
103(1)
5.2.3 Computational Problems
104(1)
5.2.4 State-of-the-Art
105(1)
53 Lattice-Based Primitives
106(13)
5.3.1 One-Way and Collision-Resistant Hash Functions
106(1)
5.3.2 Passively Secure Encryption
106(1)
5.3.3 Actively Secure Encryption
107(1)
5.3.4 Trapdoor Functions
107(1)
5.3.5 Gadget Trapdoor
108(1)
5.3.6 Digital Signatures without Trapdoors
108(1)
5.3.7 Pseudorandom Functions (PRF)
109(1)
5.3.8 Homomorphic Encryption
110(1)
5.3.9 Identity-Based Encryption (IBE)
111(1)
5.3.10 Attribute-Based Encryption
112(1)
5.4 Lattice-Based Cryptography for IoT
113(2)
5.5 Conclusion
115(4)
References
115(4)
Part III IoT User Level Authentication
119(66)
6 Efficient and Anonymous Mutual Authentication Protocol in Multi-Access Edge Computing (MEC) Environments
121(12)
Pardeep Kumar
Madhusanka Uyanage
6.1 Introduction
121(2)
6.2 Related Work
123(1)
6.3 Network Model and Adversary Model
124(1)
6.3.1 Network Model
124(1)
6.3.2 Adversary Model
125(1)
6.4 Proposed Scheme
125(2)
6.4.1 System Setup for the Edge Nodes Registration at the Registration Center
125(1)
6.4.2 User Registration Phase
126(1)
6.4.3 Login and User Authentication Phase
126(1)
6.4.4 Password Update Phase
127(1)
6.5 Security and Performance Evaluation
127(3)
6.5.1 Informal Security Analysis
127(2)
6.5.2 Performance Analysis
129(1)
6.6 Conclusion
130(3)
References
130(3)
7 Biometric-Based Robust Access Control Model for Industrial Internet of Things Applications
133(10)
Pardeep Kumar
Gurjot Singh Gaba
7.1 Introduction
133(1)
7.2 Related Work
134(2)
7.3 Network Model, Threat Model and Security Requirements
136(1)
7.3.1 Network Model
136(1)
7.3.2 Threat Model
136(1)
7.3.3 Security Goals
136(1)
7.4 Proposed Access Control Model in IIoT
136(3)
7.4.1 System Setup
137(1)
7.4.2 Authentication and Key Establishment
138(1)
7.5 Security and Performance Evaluations
139(2)
7.5.1 Informal Security Analysis
139(1)
7.5.2 Performance Analysis
140(1)
7.6 Conclusions
141(2)
References
142(1)
8 Gadget Free Authentication
143(16)
Madhusanka Liyanage
An Braeken
Mika Ylianttila
8.1 Introduction to Gadget-Free World
143(3)
8.2 Introduction to Biometrics
146(2)
8.3 Gadget-Free Authentication
148(1)
8.4 Preliminary Aspects
149(1)
8.4.1 Security Requirements
149(1)
8.4.2 Setting
149(1)
8.4.3 Notations
150(1)
8.5 The System
150(3)
8.5.1 Registration Phase
151(1)
8.5.2 Installation Phase
151(1)
8.5.3 Request Phase
151(1)
8.5.4 Answer Phase
152(1)
8.5.5 Update Phase
153(1)
8.6 Security Analysis
153(1)
8.6.1 Accountability
153(1)
8.6.2 Replay Attacks
153(1)
8.6.3 Insider Attacks
153(1)
8.6.4 HW/SW Attacks
154(1)
8.6.5 Identity Privacy
154(1)
8.7 Performance Analysis
154(2)
8.7.1 Timing for Cryptographic/Computational Operation
155(1)
8.7.2 Communication Cost
155(1)
8.8 Conclusions
156(3)
Acknowledgement
156(1)
References
156(3)
9 WebMaDa 2.1 -- A Web-Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel
159(26)
Corinna Schmitt
Dominik Bunzli
Burkhard Stiller
9.1 Introduction
159(1)
9.2 IoT-Related Concerns
160(2)
9.3 Design Decisions
162(1)
9.4 WebMaDa's History
163(3)
9.5 WebMaDa 2.1
166(7)
9.5.1 Email Notifications
166(5)
9.5.2 Data Control Support
171(2)
9.6 Implementation
173(3)
9.6.1 Mailing Functionality
173(2)
9.6.2 Logging Functionality
175(1)
9.6.3 Filtering Functionality
176(1)
9.7 Proof of Operability
176(6)
9.7.1 Automated Request Handling
177(5)
9.7.2 Filtering Functionality Using Logging Solution
182(1)
9.8 Summary and Conclusions
182(3)
References
183(2)
Part IV IoT Device Level Authentication
185(40)
10 PUF-Based Authentication and Key Exchange for Internet of Things
187(18)
An Braeken
10.1 Introduction
187(2)
10.2 Related Work
189(2)
10.2.1 Key Agreement from IoT Device to Server
189(1)
10.2.2 Key Agreement between Two IoT Devices
190(1)
10.3 Preliminaries
191(3)
10.3.1 System Architecture
191(1)
10.3.2 Assumptions
192(1)
10.3.3 Attack Model
192(1)
10.3.4 Cryptographic Operations
193(1)
10.4 Proposed System
194(3)
10.4.1 Registration Phase
195(1)
10.4.2 Security Association Phase
195(1)
10.4.3 Authentication and Key Agreement Phase
195(2)
10.5 Security Evaluation
197(2)
10.6 Performance
199(2)
10.6.1 Computational Cost
199(1)
10.6.2 Communication Cost
200(1)
10.7 Conclusions
201(4)
References
202(3)
11 Hardware-Based Encryption via Generalized Synchronization of Complex Networks
205(20)
Lars Keuninckx
Guy Van der Sande
11.1 Introduction
205(3)
11.2 System Scheme: Synchronization without Correlation
208(9)
11.2.1 The Delay-Filter-Permute Block
211(3)
11.2.2 Steady-State Dynamics of the DFP
214(1)
11.2.3 DFP-Bitstream Generation
214(1)
11.2.4 Sensitivity to Changes in the Permutation Table
215(2)
11.3 The Chaotic Followers
217(3)
11.3.1 The Permute-Filter Block
217(2)
11.3.2 Brute Force Attack
219(1)
11.3.3 PF-Bitstream Generation
219(1)
11.4 The Complete System
220(2)
11.4.1 Image Encryption Example
220(1)
11.4.2 Usage for Authentication
221(1)
11.5 Conclusions and Outlook
222(3)
Acknowledgements
223(1)
Author Contributions Statement
223(1)
Additional Information
223(1)
References
223(2)
Part V IoT Use Cases and Implementations
225(54)
12 IoT Use Cases and Implementations: Healthcare
227(20)
Mehrnoosh Monshizadeh
Vikramajeet Khatri
Oskari Koskimies
Mauri Honkanen
12.1 Introduction
227(1)
12.2 Remote Patient Monitoring Architecture
228(1)
12.3 Security Related to eHealth
229(5)
12.3.1 IoT Authentication
231(3)
12.4 Remote Patient Monitoring Security
234(8)
12.4.1 Mobile Application Security
234(1)
12.4.2 Communication Security
235(1)
12.4.3 Data Integrity
235(1)
12.4.4 Cloud Security
235(1)
12.4.5 Audit Logs
236(1)
12.4.6 Intrusion Detection Module
236(4)
12.4.7 Authentication Architecture
240(2)
12.4.8 Attacks on Remote Patient Monitoring Platform
242(1)
12.5 Conclusion
242(5)
References
244(3)
13 Secure and Efficient Privacy-preserving Scheme in Connected Smart Grid Networks
247(18)
An Braeken
Pardeep Kumar
13.1 Introduction
247(4)
13.1.1 Related Work
249(1)
13.1.2 Our Contributions
250(1)
13.1.3 Structure of
Chapter
251(1)
13.2 Preliminaries
251(2)
13.2.1 System Model
251(1)
13.2.2 Security Requirements
251(1)
13.2.3 Cryptographic Operations and Notations
252(1)
13.3 Proposed Scheme
253(2)
13.3.1 Initialisation Phase
253(1)
13.3.2 Smart Meter Registration Phase
253(1)
13.3.3 Secure Communication Between Smart Meter and Aggregator
254(1)
13.4 Security Analysis
255(5)
13.4.1 Formal Proof
255(3)
13.4.2 Informal Discussion
258(2)
13.5 Performance Analysis
260(2)
13.5.1 Computation Costs
260(1)
13.5.2 Communication Costs
261(1)
13.6 Conclusions
262(3)
References
262(3)
14 Blockchain-Based Cyber Physical Trust Systems
265(14)
Arnold Beckmann
Alex Milne
Jean Jose Razafindrakoto
Pardeep Kumar
Michael Breach
Norbert Preining
14.1 Introduction
265(3)
14.2 Related Work
268(1)
14.3 Overview of Use-Cases and Security Goals
269(1)
14.3.1 Use-Cases
269(1)
14.3.2 Security Goals
270(1)
14.4 Proposed Approach
270(2)
14.5 Evaluation Results
272(4)
14.5.1 Security Features
272(1)
14.5.2 Testbed Results
273(3)
14.6 Conclusion
276(3)
References
276(3)
Index 279
MADHUSANKA LIYANAGE, D.Sc (Tech), is Assistant Professor, School of Computer Science, University College Dublin, Ireland; Centre for Wireless Communications, University of Oulu, Finland.

AN BRAEKEN, PHD, is Professor, Industrial Sciences Department, Vrije Universiteit Brussels, Belgium.

PARDEEP KUMAR, PHD, is Lecturer/Assistant Professor, Department of Computer Science, Swansea University, Wales, UK

MIKA YLIANTTILA, D.Sc (Tech), is Associate Professor, Centre for Wireless Communications, University of Oulu, Finland.