| About the Editors |
|
xiii | |
|
|
|
xvii | |
| Preface |
|
xxiii | |
| Acknowledgments |
|
xxix | |
|
|
|
1 | (64) |
|
|
|
3 | (24) |
|
|
|
|
|
|
|
|
|
4 | (1) |
|
|
|
4 | (1) |
|
1.2 IoT Architecture and Taxonomy |
|
|
5 | (2) |
|
1.3 Standardization Efforts |
|
|
7 | (3) |
|
|
|
10 | (7) |
|
|
|
11 | (2) |
|
|
|
13 | (1) |
|
|
|
14 | (1) |
|
|
|
15 | (1) |
|
|
|
16 | (1) |
|
|
|
16 | (1) |
|
|
|
17 | (1) |
|
|
|
18 | (1) |
|
|
|
18 | (1) |
|
1.4.10 Industrial Internet |
|
|
19 | (1) |
|
|
|
19 | (1) |
|
|
|
20 | (7) |
|
|
|
20 | (1) |
|
|
|
20 | (7) |
|
2 Introduction to IoT Security |
|
|
27 | (38) |
|
|
|
|
|
|
|
|
|
27 | (2) |
|
2.2 Attacks and Countermeasures |
|
|
29 | (12) |
|
|
|
30 | (3) |
|
|
|
33 | (1) |
|
|
|
34 | (7) |
|
2.3 Authentication and Authorization |
|
|
41 | (7) |
|
|
|
42 | (1) |
|
|
|
42 | (1) |
|
2.3.3 Authentication at IoT Layers |
|
|
43 | (5) |
|
2.4 Other Security Features and Related Issues |
|
|
48 | (4) |
|
2.4.1 The Simplified Layer Structure |
|
|
48 | (1) |
|
2.4.2 The Idea of Middleware |
|
|
49 | (1) |
|
2.4.3 Cross-Layer Security Problem |
|
|
50 | (1) |
|
|
|
50 | (1) |
|
|
|
51 | (1) |
|
|
|
52 | (2) |
|
2.6 Future Research Directions |
|
|
54 | (4) |
|
|
|
54 | (1) |
|
|
|
55 | (1) |
|
2.6.3 Fog and Edge Computing |
|
|
56 | (1) |
|
2.6.4 Quantum Security, AI, and Predictive Data Analytics |
|
|
57 | (1) |
|
|
|
57 | (1) |
|
|
|
58 | (7) |
|
|
|
59 | (6) |
|
Part II IoT Network and Communication Authentication |
|
|
65 | (54) |
|
3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks |
|
|
|
|
|
67 | (1) |
|
|
|
67 | (2) |
|
|
|
69 | (1) |
|
3.3 System Model and Assumptions |
|
|
70 | (2) |
|
|
|
70 | (1) |
|
|
|
70 | (1) |
|
|
|
71 | (1) |
|
|
|
71 | (1) |
|
3.4 Scheme in Normal Mode |
|
|
72 | (5) |
|
|
|
72 | (1) |
|
|
|
73 | (1) |
|
3.4.3 Individual Cluster Key |
|
|
73 | (1) |
|
3.4.4 Pairwise Key Derivation |
|
|
74 | (2) |
|
|
|
76 | (1) |
|
|
|
76 | (1) |
|
|
|
77 | (1) |
|
3.5.1 Authentication by CN |
|
|
77 | (1) |
|
3.5.2 Authenticated Broadcast by the CH |
|
|
77 | (1) |
|
3.5.3 Authenticated Broadcast by the BS |
|
|
78 | (1) |
|
3.6 Scheme in Change Mode |
|
|
78 | (2) |
|
|
|
78 | (1) |
|
|
|
79 | (1) |
|
3.6.3 Changes for Honest Nodes |
|
|
79 | (1) |
|
|
|
80 | (1) |
|
3.7.1 Resistance Against Impersonation Attack |
|
|
80 | (1) |
|
3.7.2 Resistance Against Node Capture |
|
|
81 | (1) |
|
3.7.3 Resistance Against Replay Attacks |
|
|
81 | (1) |
|
|
|
81 | (2) |
|
3.8.1 Number of Communication Phases |
|
|
81 | (1) |
|
3.8.2 Storage Requirements |
|
|
82 | (1) |
|
3.8.3 Packet Fragmentation |
|
|
82 | (1) |
|
|
|
83 | (2) |
|
|
|
83 | (1) |
|
|
|
83 | (2) |
|
4 Public Key Based Protocols -- EC Crypto |
|
|
85 | (16) |
|
|
|
|
|
|
|
|
|
85 | (3) |
|
|
|
86 | (1) |
|
4.1.2 ECC for Authentication and Key Management |
|
|
87 | (1) |
|
4.2 ECC Based Implicit Certificates |
|
|
88 | (3) |
|
4.2.1 Authentication and Key Management Using ECC Implicit Certificates |
|
|
88 | (3) |
|
4.3 ECC-Based Signcryption |
|
|
91 | (4) |
|
|
|
93 | (1) |
|
|
|
93 | (2) |
|
4.4 ECC-Based Group Communication |
|
|
95 | (2) |
|
4.4.1 Background and Assumptions |
|
|
95 | (1) |
|
|
|
96 | (1) |
|
4.5 Implementation Aspects |
|
|
97 | (1) |
|
|
|
98 | (3) |
|
|
|
98 | (3) |
|
5 Lattice-Based Cryptography and Internet of Things |
|
|
101 | (5) |
|
|
|
|
|
|
|
101 | (1) |
|
|
|
102 | (1) |
|
5.2 Lattice-Based Cryptography |
|
|
102 | (4) |
|
|
|
102 | (1) |
|
|
|
103 | (1) |
|
5.2.3 Computational Problems |
|
|
104 | (1) |
|
|
|
105 | (1) |
|
53 Lattice-Based Primitives |
|
|
106 | (13) |
|
5.3.1 One-Way and Collision-Resistant Hash Functions |
|
|
106 | (1) |
|
5.3.2 Passively Secure Encryption |
|
|
106 | (1) |
|
5.3.3 Actively Secure Encryption |
|
|
107 | (1) |
|
|
|
107 | (1) |
|
|
|
108 | (1) |
|
5.3.6 Digital Signatures without Trapdoors |
|
|
108 | (1) |
|
5.3.7 Pseudorandom Functions (PRF) |
|
|
109 | (1) |
|
5.3.8 Homomorphic Encryption |
|
|
110 | (1) |
|
5.3.9 Identity-Based Encryption (IBE) |
|
|
111 | (1) |
|
5.3.10 Attribute-Based Encryption |
|
|
112 | (1) |
|
5.4 Lattice-Based Cryptography for IoT |
|
|
113 | (2) |
|
|
|
115 | (4) |
|
|
|
115 | (4) |
|
Part III IoT User Level Authentication |
|
|
119 | (66) |
|
6 Efficient and Anonymous Mutual Authentication Protocol in Multi-Access Edge Computing (MEC) Environments |
|
|
121 | (12) |
|
|
|
|
|
|
|
121 | (2) |
|
|
|
123 | (1) |
|
6.3 Network Model and Adversary Model |
|
|
124 | (1) |
|
|
|
124 | (1) |
|
|
|
125 | (1) |
|
|
|
125 | (2) |
|
6.4.1 System Setup for the Edge Nodes Registration at the Registration Center |
|
|
125 | (1) |
|
6.4.2 User Registration Phase |
|
|
126 | (1) |
|
6.4.3 Login and User Authentication Phase |
|
|
126 | (1) |
|
6.4.4 Password Update Phase |
|
|
127 | (1) |
|
6.5 Security and Performance Evaluation |
|
|
127 | (3) |
|
6.5.1 Informal Security Analysis |
|
|
127 | (2) |
|
6.5.2 Performance Analysis |
|
|
129 | (1) |
|
|
|
130 | (3) |
|
|
|
130 | (3) |
|
7 Biometric-Based Robust Access Control Model for Industrial Internet of Things Applications |
|
|
133 | (10) |
|
|
|
|
|
|
|
133 | (1) |
|
|
|
134 | (2) |
|
7.3 Network Model, Threat Model and Security Requirements |
|
|
136 | (1) |
|
|
|
136 | (1) |
|
|
|
136 | (1) |
|
|
|
136 | (1) |
|
7.4 Proposed Access Control Model in IIoT |
|
|
136 | (3) |
|
|
|
137 | (1) |
|
7.4.2 Authentication and Key Establishment |
|
|
138 | (1) |
|
7.5 Security and Performance Evaluations |
|
|
139 | (2) |
|
7.5.1 Informal Security Analysis |
|
|
139 | (1) |
|
7.5.2 Performance Analysis |
|
|
140 | (1) |
|
|
|
141 | (2) |
|
|
|
142 | (1) |
|
8 Gadget Free Authentication |
|
|
143 | (16) |
|
|
|
|
|
|
|
8.1 Introduction to Gadget-Free World |
|
|
143 | (3) |
|
8.2 Introduction to Biometrics |
|
|
146 | (2) |
|
8.3 Gadget-Free Authentication |
|
|
148 | (1) |
|
|
|
149 | (1) |
|
8.4.1 Security Requirements |
|
|
149 | (1) |
|
|
|
149 | (1) |
|
|
|
150 | (1) |
|
|
|
150 | (3) |
|
|
|
151 | (1) |
|
|
|
151 | (1) |
|
|
|
151 | (1) |
|
|
|
152 | (1) |
|
|
|
153 | (1) |
|
|
|
153 | (1) |
|
|
|
153 | (1) |
|
|
|
153 | (1) |
|
|
|
153 | (1) |
|
|
|
154 | (1) |
|
|
|
154 | (1) |
|
|
|
154 | (2) |
|
8.7.1 Timing for Cryptographic/Computational Operation |
|
|
155 | (1) |
|
|
|
155 | (1) |
|
|
|
156 | (3) |
|
|
|
156 | (1) |
|
|
|
156 | (3) |
|
9 WebMaDa 2.1 -- A Web-Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel |
|
|
159 | (26) |
|
|
|
|
|
|
|
|
|
159 | (1) |
|
|
|
160 | (2) |
|
|
|
162 | (1) |
|
|
|
163 | (3) |
|
|
|
166 | (7) |
|
9.5.1 Email Notifications |
|
|
166 | (5) |
|
9.5.2 Data Control Support |
|
|
171 | (2) |
|
|
|
173 | (3) |
|
9.6.1 Mailing Functionality |
|
|
173 | (2) |
|
9.6.2 Logging Functionality |
|
|
175 | (1) |
|
9.6.3 Filtering Functionality |
|
|
176 | (1) |
|
|
|
176 | (6) |
|
9.7.1 Automated Request Handling |
|
|
177 | (5) |
|
9.7.2 Filtering Functionality Using Logging Solution |
|
|
182 | (1) |
|
9.8 Summary and Conclusions |
|
|
182 | (3) |
|
|
|
183 | (2) |
|
Part IV IoT Device Level Authentication |
|
|
185 | (40) |
|
10 PUF-Based Authentication and Key Exchange for Internet of Things |
|
|
187 | (18) |
|
|
|
|
|
187 | (2) |
|
|
|
189 | (2) |
|
10.2.1 Key Agreement from IoT Device to Server |
|
|
189 | (1) |
|
10.2.2 Key Agreement between Two IoT Devices |
|
|
190 | (1) |
|
|
|
191 | (3) |
|
10.3.1 System Architecture |
|
|
191 | (1) |
|
|
|
192 | (1) |
|
|
|
192 | (1) |
|
10.3.4 Cryptographic Operations |
|
|
193 | (1) |
|
|
|
194 | (3) |
|
10.4.1 Registration Phase |
|
|
195 | (1) |
|
10.4.2 Security Association Phase |
|
|
195 | (1) |
|
10.4.3 Authentication and Key Agreement Phase |
|
|
195 | (2) |
|
|
|
197 | (2) |
|
|
|
199 | (2) |
|
10.6.1 Computational Cost |
|
|
199 | (1) |
|
10.6.2 Communication Cost |
|
|
200 | (1) |
|
|
|
201 | (4) |
|
|
|
202 | (3) |
|
11 Hardware-Based Encryption via Generalized Synchronization of Complex Networks |
|
|
205 | (20) |
|
|
|
|
|
|
|
205 | (3) |
|
11.2 System Scheme: Synchronization without Correlation |
|
|
208 | (9) |
|
11.2.1 The Delay-Filter-Permute Block |
|
|
211 | (3) |
|
11.2.2 Steady-State Dynamics of the DFP |
|
|
214 | (1) |
|
11.2.3 DFP-Bitstream Generation |
|
|
214 | (1) |
|
11.2.4 Sensitivity to Changes in the Permutation Table |
|
|
215 | (2) |
|
11.3 The Chaotic Followers |
|
|
217 | (3) |
|
11.3.1 The Permute-Filter Block |
|
|
217 | (2) |
|
11.3.2 Brute Force Attack |
|
|
219 | (1) |
|
11.3.3 PF-Bitstream Generation |
|
|
219 | (1) |
|
|
|
220 | (2) |
|
11.4.1 Image Encryption Example |
|
|
220 | (1) |
|
11.4.2 Usage for Authentication |
|
|
221 | (1) |
|
11.5 Conclusions and Outlook |
|
|
222 | (3) |
|
|
|
223 | (1) |
|
Author Contributions Statement |
|
|
223 | (1) |
|
|
|
223 | (1) |
|
|
|
223 | (2) |
|
Part V IoT Use Cases and Implementations |
|
|
225 | (54) |
|
12 IoT Use Cases and Implementations: Healthcare |
|
|
227 | (20) |
|
|
|
|
|
|
|
|
|
|
|
227 | (1) |
|
12.2 Remote Patient Monitoring Architecture |
|
|
228 | (1) |
|
12.3 Security Related to eHealth |
|
|
229 | (5) |
|
12.3.1 IoT Authentication |
|
|
231 | (3) |
|
12.4 Remote Patient Monitoring Security |
|
|
234 | (8) |
|
12.4.1 Mobile Application Security |
|
|
234 | (1) |
|
12.4.2 Communication Security |
|
|
235 | (1) |
|
|
|
235 | (1) |
|
|
|
235 | (1) |
|
|
|
236 | (1) |
|
12.4.6 Intrusion Detection Module |
|
|
236 | (4) |
|
12.4.7 Authentication Architecture |
|
|
240 | (2) |
|
12.4.8 Attacks on Remote Patient Monitoring Platform |
|
|
242 | (1) |
|
|
|
242 | (5) |
|
|
|
244 | (3) |
|
13 Secure and Efficient Privacy-preserving Scheme in Connected Smart Grid Networks |
|
|
247 | (18) |
|
|
|
|
|
|
|
247 | (4) |
|
|
|
249 | (1) |
|
|
|
250 | (1) |
|
13.1.3 Structure of Chapter |
|
|
251 | (1) |
|
|
|
251 | (2) |
|
|
|
251 | (1) |
|
13.2.2 Security Requirements |
|
|
251 | (1) |
|
13.2.3 Cryptographic Operations and Notations |
|
|
252 | (1) |
|
|
|
253 | (2) |
|
13.3.1 Initialisation Phase |
|
|
253 | (1) |
|
13.3.2 Smart Meter Registration Phase |
|
|
253 | (1) |
|
13.3.3 Secure Communication Between Smart Meter and Aggregator |
|
|
254 | (1) |
|
|
|
255 | (5) |
|
|
|
255 | (3) |
|
13.4.2 Informal Discussion |
|
|
258 | (2) |
|
13.5 Performance Analysis |
|
|
260 | (2) |
|
|
|
260 | (1) |
|
13.5.2 Communication Costs |
|
|
261 | (1) |
|
|
|
262 | (3) |
|
|
|
262 | (3) |
|
14 Blockchain-Based Cyber Physical Trust Systems |
|
|
265 | (14) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
265 | (3) |
|
|
|
268 | (1) |
|
14.3 Overview of Use-Cases and Security Goals |
|
|
269 | (1) |
|
|
|
269 | (1) |
|
|
|
270 | (1) |
|
|
|
270 | (2) |
|
|
|
272 | (4) |
|
|
|
272 | (1) |
|
|
|
273 | (3) |
|
|
|
276 | (3) |
|
|
|
276 | (3) |
| Index |
|
279 | |