Muutke küpsiste eelistusi

Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications [Kõva köide]

Edited by , Edited by
  • Formaat: Hardback, 336 pages, kõrgus x laius x paksus: 10x10x10 mm, kaal: 454 g
  • Ilmumisaeg: 04-Jan-2022
  • Kirjastus: Wiley-IEEE Press
  • ISBN-10: 1119607744
  • ISBN-13: 9781119607748
Teised raamatud teemal:
  • Formaat: Hardback, 336 pages, kõrgus x laius x paksus: 10x10x10 mm, kaal: 454 g
  • Ilmumisaeg: 04-Jan-2022
  • Kirjastus: Wiley-IEEE Press
  • ISBN-10: 1119607744
  • ISBN-13: 9781119607748
Teised raamatud teemal:
"The Internet of Things (IoT) is an emerging paradigm due to extensive developments in information and communication technology (ICT). The purpose of IoT is to expand the functions of the first version of the Internet by increasing the ability to connectnumerous objects. The wide facilities offered by IoT and other sensing facilities, have led to a huge amount of data generated from versatile domains, thus, information security has become inevitable requirement not only for personal safety, but also forassuring the sustainability of the IoT paradigm itself"--

SECURITY AND PRIVACY IN THE INTERNET OF THINGS

Provides the authoritative and up-to-date information required for securing IoT architecture and applications

The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers.

The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things:

  • Discusses a broad range of IoT attacks and defense mechanisms
  • Examines IoT security and privacy protocols and approaches
  • Covers both the logical and physical security of IoT devices
  • Addresses IoT security through network traffic modeling
  • Describes privacy preserving techniques in smart cities
  • Explores current threat and vulnerability analyses

Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.

About the Editors xiii
List of Contributors
xv
Preface xix
1 Advanced Attacks and Protection Mechanisms in IoT Devices and Networks
1(30)
Lejla Batina
Nele Mentens
Markus Miettinen
Naita Mukhtar
Thien Due Nguyen
Md Masoom Rabbani
Phillip Rieger
Ahmad-Reza Sadeghi
1.1 Introduction
2(1)
1.2 Physical Security in IoT Devices
3(6)
1.2.1 Physical Attacks
3(1)
1.2.1.1 Side-channel Analysis Attacks
3(1)
1.2.1.2 Fault Analysis Attacks
4(1)
1.2.2 Profiling Attacks
4(1)
1.2.3 Machine Learning and SCA
5(2)
1.2.4 Real-world Attacks
7(1)
1.2.5 Countermeasures
8(1)
1.3 Remote Attestation in IoT Devices
9(6)
1.3.1 Types of Remote Attestation
10(1)
1.3.1.1 Software-based Remote Attestation
10(1)
1.3.1.2 Hardware-based Remote Attestation
11(1)
1.3.1.3 Hybrid Architecture-based Remote Attestation
12(1)
1.3.2 Remote Attestation for Large IoT Networks
12(1)
1.3.2.1 Classical Swarm Attestation Techniques
12(2)
1.3.2.2 Swarm Attestation for IoT Services
14(1)
1.3.3 Future Directions
14(1)
1.3.3.1 Cloud-based RA Techniques
15(1)
1.3.3.2 RA in Novel Internet Technologies
15(1)
1.3.3.3 Blockchain Based RA
15(1)
1.4 Intrusion Detection in IoT Networks
15(16)
1.4.1 IoT Malware
15(1)
1.4.2 Vulnerability Patching
16(1)
1.4.3 Signature- and Anomaly Detection-based Network Intrusion Detection
17(1)
1.4.4 Deep Learning-based Anomaly Detection
17(1)
1.4.4.1 System Overview
18(1)
1.4.4.2 Modeling Packet Sequence Patterns
18(1)
1.4.4.3 Anomalous Packet Detection
19(1)
1.4.5 Federated Deep Learning-based IoT Intrusion Detection System
20(1)
1.4.5.1 Federated Learning
20(1)
1.4.5.2 Federated Self-Learning Anomaly Detection
20(2)
1.4.5.3 Challenges of Federated Learning-based Anomaly Detection System for IoT
22(1)
References
23(8)
2 Human Aspects of IoT Security and Privacy
31(26)
Sune Von Solms
Steven Furnell
2.1 Introduction
31(2)
2.2 An Overview of the Domestic IoT Environment
33(6)
2.3 Security Issues and the IoT Landscape
39(2)
2.4 Human Factors Challenges in IoT Security and Privacy
41(8)
2.4.1 Security Trade-offs for Individuals in IoT
43(1)
2.4.2 Data Ownership and Use
44(2)
2.4.3 Device Management and Administration Responsibilities
46(1)
2.4.4 The Age of Unwanted Intelligence
47(2)
2.5 Toward Improved User-facing Security in the IoT
49(2)
2.6 Conclusion
51(6)
Acknowledgments
51(1)
References
51(6)
3 Applying Zero Trust Security Principles to Defence Mechanisms Against Data Exfiltration Attacks
57(34)
Hugo Egerton
Mohammad Hammoudeh
Devrim Unal
Bamidele Adebisi
3.1 Introduction
57(2)
3.2 Data Exfiltration Types, Attack Mechanisms, and Defence Techniques
59(9)
3.2.1 Types of Data Exfiltration
59(1)
3.2.1.1 Physical
59(1)
3.2.1.2 Remote
60(1)
3.2.2 Data Exfiltration Attack Techniques
60(1)
3.2.2.1 Physical-based
60(1)
3.2.2.2 Remote-based
61(2)
3.2.3 Insider Data Exfiltration Threats
63(1)
3.2.3.1 Types of Insider Threats
63(2)
3.2.4 Approaches to Counter Data Exfiltration
65(1)
3.2.4.1 Preventative
65(1)
3.2.4.2 Detective
66(1)
3.2.4.3 Investigative
66(1)
3.2.5 Mechanisms to Defend Against Physical Data Exfiltration
67(1)
3.2.5.1 Network-based
67(1)
3.2.5.2 Physical-based
67(1)
3.3 A Defence Mechanism for Physical Data Exfiltration Mitigation
68(7)
3.3.1 Confidential Data Identification
68(2)
3.3.2 Endpoint Access Rules
70(2)
3.3.3 Data Fingerprinting
72(1)
3.3.4 Relevance to Physical-Layer Protection
73(1)
3.3.5 Complementing Existing Firewall and Application-based Measures
73(2)
3.4 Implementation and Analysis
75(5)
3.4.1 Experimental Setup
75(2)
3.4.2 Threat Scenario
77(1)
3.4.3 Scenario Execution and Analysis
77(3)
3.5 Evaluation
80(6)
3.5.1 Scenarios
81(1)
3.5.2 Scenario 1
82(1)
3.5.3 Scenario 2
82(1)
3.5.4 Scenario 3
83(1)
3.5.5 Results Analysis and Discussion
84(2)
3.6 Conclusion
86(5)
References
86(5)
4 eSIM-Based Authentication Protocol for UAV Remote Identification
91(32)
Abdulhadi Shoufan
Chan Yeob Yeun
Bilat Taha
4.1 Introduction
91(2)
4.2 Drone Security
93(5)
4.2.1 Drone Security in UTM
93(1)
4.2.1.1 Physical Attacks
94(1)
4.2.1.2 Cyber Attacks
94(1)
4.2.1.3 Cyber-Physical Attacks
94(1)
4.2.2 Security Attacks on Drones
95(1)
4.2.3 Security Attacks from Drones
96(1)
4.2.3.1 Spying and Surveillance
96(1)
4.2.3.2 Smuggling
96(1)
4.2.3.3 Physical Attacks
97(1)
4.2.3.4 Cyber Attacks
97(1)
4.3 Drone Safety
98(2)
4.3.1 Drone Detection and Classification
98(1)
4.3.2 Interdiction Technologies
98(2)
4.4 UAV Remote Identification
100(3)
4.5 Authentication Protocol for Remote Identification
103(14)
4.5.1 Preliminaries
104(1)
4.5.1.1 Assumptions and Notations
104(2)
4.5.2 Registration
106(1)
4.5.3 Secure Communication Protocol
107(1)
4.5.3.1 M1: A Challenge from the Operator (A) to the Drone (B)
108(1)
4.5.3.2 M2: A Response from the Drone (B) to the Operator (A)
109(1)
4.5.3.3 M3: Control Message from the Operator to the Drone
109(1)
4.5.3.4 M4: Drone's Response to the Control Message
110(1)
4.5.3.5 M5: Secure Broadcast of Remote Identification Message
110(1)
4.5.4 Security Analysis
110(2)
4.5.5 Formal Verification
112(1)
4.5.5.1 Declaration of User-Defined Types and Terms
112(1)
4.5.5.2 Declaration of Cryptographic Primitives
113(1)
4.5.5.3 Examples
114(1)
4.5.5.4 Reachability and Secrecy Checking
114(1)
4.5.5.5 Verifying Mutual Authentication
115(2)
4.6 Conclusion
117(6)
References
117(6)
5 Collaborative Intrusion Detection in the Era of IoT: Recent Advances and Challenges
123(28)
Wenjuan Li
Weizhi Meng
5.1 Introduction
123(1)
5.2 Background
124(4)
5.2.1 Background on Intrusion Detection System
124(2)
5.2.2 Collaborative Intrusion Detection Framework
126(2)
5.3 Recent Development of Collaborative Intrusion Detection
128(8)
5.4 Open Challenges and Future Trend
136(5)
5.4.1 Advanced Insider Threats
136(1)
5.4.1.1 Advanced Attacks
136(1)
5.4.1.2 Solutions
137(1)
5.4.2 Open Challenges and Limitations
138(1)
5.4.3 Future Trend
139(2)
5.5 Conclusion
141(10)
References
141(10)
6 Cyber-Securing IoT Infrastructure by Modeling Network Traffic
151(26)
Hassan Habibi Gharakheili
Ayyoob Hamza
Vijay Sivaraman
6.1 Introduction
151(2)
6.2 Cyber-Attacks on IoT Infrastructure
153(9)
6.2.1 Eavesdropping
154(1)
6.2.1.1 Solutions
154(1)
6.2.2 Network Activity Analysis
154(1)
6.2.2.1 Solutions
154(1)
6.2.3 Active Reconnaissance
155(1)
6.2.3.1 Solutions
155(1)
6.2.4 Volumetric Attack
156(1)
6.2.4.1 Solutions
156(1)
6.2.5 Masquerading Attack
157(1)
6.2.5.1 Solutions
157(1)
6.2.6 Access Attack
158(1)
6.2.6.1 Solutions
158(1)
6.2.7 Active Crypto Attack
158(1)
6.2.7.1 Solutions
159(1)
6.2.8 Data Exfiltration
159(1)
6.2.8.1 Solutions
159(1)
6.2.9 Blocking Attack
160(1)
6.2.9.1 Solutions
160(1)
6.2.10 Sleep Deprivation Attack
160(1)
6.2.10.1 Solutions
161(1)
6.2.11 Trigger Action Attack
161(1)
6.2.11.1 Solutions
161(1)
6.3 Network Behavioral Model of IoTs
162(8)
6.3.1 Enforcing MUD Profile to Network
162(2)
6.3.2 MUD Protection Against Attacks
164(2)
6.3.2.1 To Internet
166(1)
6.3.2.2 From Internet
166(2)
6.3.2.3 From/To Local
168(1)
6.3.3 Monitoring MUD Activity
169(1)
6.4 Conclusion
170(7)
References
170(7)
7 Integrity of IoT Network Flow Records in Encrypted Traffic Analytics
177(6)
Aswani Kumar Cherukuri
Ikram Sumaiya Thaseen
Gang Li
Xiao Liu
Vinamra Das
Aditya Raj
7.1 Introduction
177(3)
7.2 Background
180(3)
7.2.1 Encrypted Traffic Analytics (ETA)
180(1)
7.2.2 Techniques for ETA
181(1)
7.2.3 Hashing for Flow Record Authentication
182(1)
73 Flow Based Telemetry
183(24)
7.3.1 Flow Metadata
183(1)
7.3.2 Flow-Based Approaches
183(2)
7.3.3 Threats on Flow Telemetry
185(1)
7.4 Hashing-Based MAC for Telemetry Data
186(3)
7.5 Experimental Analysis
189(10)
7.5.1 Hashed Flow Records
189(3)
7.5.2 Symmetric Encryption with Hashed Flow Records
192(3)
7.5.3 Asymmetric Encryption with Hashed Flow Records
195(4)
7.6 Conclusion
199(8)
List of Abbreviations
200(1)
Acknowledgment
200(1)
References
200(7)
8 Securing Contemporary eHealth Architectures: Techniques and Methods
207(28)
Naeem F. Syed
Zubair Baig
Adnan Anwar
8.1 Introduction
207(1)
8.2 eHealth
208(7)
8.2.1 Why IoT Is Important in eHealth?
209(1)
8.2.2 Fog or Edge Computing for eHealth
210(2)
8.2.3 Cloud Computing for eHealth
212(1)
8.2.4 Applications of IoT in eHealth
212(1)
8.2.4.1 Sleep Monitoring System
212(1)
8.2.4.2 Real Time and Advanced Health Diagnoses
213(1)
8.2.4.3 Emotion Detection
213(1)
8.2.4.4 Nutrition Monitoring System
213(1)
8.2.4.5 Detection of Dyslexia
213(1)
8.2.5 eHealth Security
213(1)
8.2.5.1 Implications of eHealth Security for Smart Cities
214(1)
8.3 eHealth Threat Landscape
215(6)
8.3.1 eHealth Threat Model
215(1)
8.3.1.1 eHealth Assets
216(1)
8.3.1.2 eHealth Attack Agents
216(2)
8.3.2 eHealth IoT Vulnerabilities and Threats
218(1)
8.3.2.1 Attacks in BAN
218(1)
8.3.2.2 Attacks in Communication Layer
219(1)
8.3.2.3 Attacks in Healthcare Provider Layer
219(2)
8.3.3 Real-world Attacks
221(1)
8.4 Countermeasures
221(8)
8.4.1 Patient Data Protection
223(1)
8.4.2 Device and Communication Security Measures
224(1)
8.4.2.1 Securing Communication
225(1)
8.4.3 Adaptive Security Framework
226(2)
8.4.4 Use Cases
228(1)
8.5 Conclusion
229(6)
References
230(5)
9 Security and Privacy of Smart Homes: Issues and Solutions
235(26)
Martin Lundgren
Ali Padyab
9.1 Introduction
235(1)
9.2 State-of-the-Art in Smart Homes' Security and Privacy
236(8)
9.2.1 Smart Home Technologies
236(1)
9.2.2 User-Centric Privacy
237(1)
9.2.3 Consequences of Data Breaches
238(1)
9.2.4 Dimensions of Privacy Concerns
239(1)
9.2.5 Consequences of Information Security
240(2)
9.2.6 A Framework for Security and Privacy Concerns
242(2)
9.3 Privacy Techniques and Mechanisms
244(6)
9.3.1 Cryptography
244(2)
9.3.2 Access Control
246(1)
9.3.3 Privacy Policy
247(1)
9.3.4 Anonymity
248(1)
9.3.5 UI/UX, User Awareness, and Control
249(1)
9.4 Toward Future Solutions
250(1)
9.5 Conclusion
251(10)
References
252(9)
10 IoT Hardware-Based Security: A Generalized Review of Threats and Countermeasures
261(36)
Catherine Higgins
Lucas McDonald
Muhammad Ijaz Ul Haq
Saqib Hakak
10.1 Introduction
261(1)
10.2 Hardware Attacks
262(12)
10.2.1 IoT Devices
262(2)
10.2.1.1 Node-Level Threats
264(2)
10.2.1.2 RFID Technology
266(3)
10.2.2 Hardware Design Threats
269(1)
10.2.2.1 Fake Replica
269(1)
10.2.2.2 Reverse Engineering
269(1)
10.2.2.3 Intellectual Property Hijacking
270(1)
10.2.2.4 Hardware Trojans
270(1)
10.2.3 Side-Channel Attacks
270(1)
10.2.3.1 Types of Side-Channel Attacks
271(3)
10.3 Physical Security Attacks Countermeasures
274(15)
10.3.1 Mitigation Techniques for IoT Hardware Attacks
275(1)
10.3.2 Side-Channel Attacks
275(1)
10.3.2.1 Hardware Trojans
275(4)
10.3.2.2 Power Analysis Attack
279(4)
10.3.2.3 Timing Attacks
283(1)
10.3.2.4 Electromagnetic Analysis Attacks
284(1)
10.3.2.5 Acoustic Crypto-Analysis Attack
285(1)
10.3.3 Integrated Circuits Security
286(1)
10.3.3.1 Countermeasures
286(1)
10.3.4 Radio Frequency Identification
287(1)
10.3.4.1 Physical Unclonable Function-based Authentication
287(1)
10.3.4.2 Preventing Physical Tampering Attacks (Enhancing Physical Security)
287(1)
10.3.4.3 Preventing Information Leakage
288(1)
10.3.4.4 Preventing Relay Attack
288(1)
10.4 Conclusion
289(8)
Acknowledgment
291(1)
References
291(6)
Index 297
ALI ISMAIL AWAD, PhD, is currently an Associate Professor with the College of Information Technology (CIT), United Arab Emirates University (UAEU), Al Ain, United Arab Emirates. He is also an Associate Professor with the Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, Luleå, Sweden. He is an Associate Professor with the Electrical Engineering Department, Faculty of Engineering, Al-Azhar University at Qena, Qena, Egypt. He is also a Visiting Researcher at the University of Plymouth, United Kingdom. Dr. Awad is an Editorial Board Member of the Future Generation Computer Systems Journal, Computers & Security Journal, the Internet of Things, Engineering Cyber Physical Human Systems Journal, Health Information Science and Systems Journal, and IET Image Processing Journal. Dr. Awad is currently an IEEE senior member.

JEMAL H. ABAWAJY, PhD, is a full professor at Faculty of Science, Engineering and Built Environment, Deakin University, Australia. He is a Senior Member of IEEE Society; IEEE Technical Committee on Scalable Computing (TCSC); IEEE Technical Committee on Dependable Computing and Fault Tolerance and IEEE Communication Society. His leadership is extensive spanning industrial, academic and professional areas (e.g., IEEE Technical Committee on Scalable Computing, Academic Board, Faculty Board and Research Integrity Advisory Group). Professor Abawajy is currently the Director of the Distributing System Security (DSS).