Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications
- Length: 238 pages
- Edition: 1
- Language: English
- Publisher: CRC Press
- Publication Date: 2021-09-14
- ISBN-10: 0367702169
- ISBN-13: 9780367702168
- Sales Rank: #24571494 (See Top 100 Books)
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.0 related concerns. This book serves as a useful guide for researchers and industry professionals and will help beginners to learn the basics to the more advanced topics.
Along with exploring security and privacy issues through the IoT ecosystem and examining its implications to the real-world, this book addresses cryptographic tools and techniques and presents the basic and high-level concepts that can serve as guidance for those in the industry as well as help beginners get a handle on both the basic and advanced aspects of security related issues. The book goes on to cover major challenges, issues, and advances in IoT and discusses data processing as well as applications for solutions, and assists in developing self-adaptive cyberphysical security systems that will help with issues brought about by new technologies within IoT and Industry 4.0.
This edited book discusses the evolution of IoT and Industry 4.0 and brings security and privacy related technological tools and techniques onto a single platform so that researchers, industry professionals, graduate, postgraduate students, and academicians can easily understand the security, privacy, challenges and opportunity concepts and make then ready to use for applications in IoT and Industry 4.0.
Cover Half Title Series Page Title Page Copyright Page Dedication Table of Contents Preface Editors Contributors Chapter 1: General and Specific Security Services, Risks, and Their Modeling 1.1 Introduction 1.2 Literature Survey in Security Modeling 1.3 General Security Services 1.3.1 Confidentiality 1.3.2 Data Integrity 1.3.3 Authenticity 1.3.4 Authorization 1.3.5 Non-Repudiation 1.3.6 Support Services 1.3.7 Combinatorial Service 1.3.8 Key Management 1.4 Security Modeling 1.4.1 Bell-LaPadula Model (GeeksforGeeks) 1.4.2 Biba Model (GeeksforGeeks) 1.4.3 Clarke–Wilson Security Model 1.4.4 Graham-Denning Model 1.4.5 Harrison-Ruzzo-Ullman Model 1.4.6 Brewer-Nash Model 1.5 Risks 1.5.1 Improper Platform Usage 1.5.2 Insecure Data Storage 1.5.3 Insecure Communication 1.5.4 Insecure Authentication 1.5.5 Insufficient Cryptography 1.5.6 Insecure Authorization 1.5.7 Client Code Quality 1.5.8 Code Tampering 1.5.9 Reverse Engineering 1.5.10 Extraneous Functionality 1.6 Use Case: Virtual Reality 1.7 Summary References Chapter 2: Vulnerability and Attack Detection Techniques: Intrusion Detection System 2.1 Introduction 2.2 Cybersecurity Services 2.3 Intrusion Detection System (IDS) Software Architecture 2.3.1 IDS 2.3.2 Detection Approach 2.3.2.1 Anomaly Detection Approaches 2.3.2.2 Misuse Detection Approaches 2.3.3 Methodology Approach 2.3.3.1 Signature-Base Detection (SBD) 2.3.3.2 Anomaly-Based Detection (ABD) 2.3.3.3 Stateful Protocol Analysis (SPA) 2.4 Classification of Computer and Network Attacks 2.4.1 Attack Type 2.4.1.1 DoS Attack 2.4.1.2 Probing Attacks 2.4.1.2.1 Compromise 2.4.1.2.2 Worms, Viruses, and Trojans 2.4.1.3 Number of Network Connections Required by the Attacks 2.5 Source of the Attack 2.5.1 Environment 2.5.1.1 Intrusion on Local Host Machine 2.5.1.2 Network Intrusion 2.5.1.3 Intrusion in Wireless Network 2.6 Automated Level 2.6.1 Automation Attacks 2.6.2 Semiautomated 2.6.3 Manual Attacks 2.7 Intrusion Detection System Component 2.7.1 Data Gathering Component 2.7.2 Knowledge-Based Component 2.7.3 Configuration Component 2.7.4 Response Component 2.8 Conclusion 2.9 Future Work References Chapter 3: Digital Rights Management in a Computing Environment 3.1 Introduction to Ethics and Technoethics 3.1.1 Definition of Ethics 3.1.2 Definition of Technoethics 3.1.3 Ethical Challenges in Technology 3.1.4 Current Technoethics Issues 3.2 Cybersecurity and Its Applications 3.2.1 Concepts of Cybersecurity 3.2.2 Threats and Challenges of Cybersecurity 3.2.3 Elements of Cybersecurity 3.2.4 Cybersecurity Applications 3.3 Ethics for Cybersecurity Applications 3.3.1 Privacy 3.3.2 Freedom of Speech 3.3.3 Intellectual Property Rights 3.3.4 Legal Protections and Responsibility for Crimes 3.4 The Ethical Use of Machine Learning in Cybersecurity 3.5 Summary References Chapter 4: Trade-Offs and Vulnerabilities in IoT and Secure Cloud Computing 4.1 Introduction 4.2 History of IoT and Cloud Vulnerabilities 4.3 Literature Survey 4.3.1 Recent Works in Cloud Computing 4.3.2 Recent Works in Internet-of-Things 4.4 IoT and Similar Advancements 4.5 Risks and Breaches of IoT devices 4.5.1 Verification 4.5.2 Cryptography 4.5.3 Modifying Techniques 4.5.4 Physical Permit 4.5.5 System Control 4.6 Cloud Computing 4.7 Vulnerabilities with Cloud Offerings 4.7.1 Lesser Clarity with Control 4.7.2 On-Demand Self-Service 4.7.3 Worldwide Controlling APIs 4.7.4 Multi-Tenant Feature 4.7.5 Information Removal 4.7.6 Stolen User Details 4.7.7 Supplier Commitment 4.7.8 Higher Complexity 4.7.9 Insider Abuse 4.7.10 Lost Information 4.7.11 Provider Supply Chain 4.7.12 Inadequate Due Perseverance 4.8 Secure Cloud Computing Techniques 4.8.1 Infrastructure Security 4.8.1.1 Physical Security 4.8.1.2 Network Security 4.8.2 Remote Security 4.8.3 Host Security 4.8.4 Security for Middlewares 4.8.4.1 Containers 4.8.4.2 Application Programming Interfaces (APIs) 4.8.4.3 Databases 4.8.4.4 Resource Management Platform 4.8.5 Application System Security 4.8.6 Data Security 4.9 Summary References Chapter 5: Location and Availability Protections in Smart Mobility 5.1 Introduction 5.1.1 Key Principles of Smart Mobility 5.1.2 How Does Smart Mobility Connect to Smart City 5.1.3 Smart Mobility and the Role of Data 5.2 Definition of Smart City 5.2.1 Smart Cities: A Futuristic Vision 5.2.2 Need for Smart City 5.2.3 Successful Smart City 5.3 Technology for Smart Mobility 5.3.1 Technical Characteristics of Smart City Services 5.3.2 IoT Device Characteristics 5.3.3 IoT Technology 5.3.4 IoT for Smart City 5.3.5 Examples of IoT Mobility Solutions 5.3.6 Wireless Technology for Smart Cities 5.3.7 Impact of Artificial Intelligence 5.4 Transportation and the Traffic Problem 5.4.1 Services Using Mobility 5.5 Regulatory Characteristics for Smart City 5.5.1 Government Policy and Legal Issues 5.5.2 Common Legal Framework 5.5.3 Government Policy across the Developed Nations 5.5.4 Regulatory Characteristics of Smart City Services 5.6 Ecosystem of Smart City Services 5.7 Mobility as a Service (MaaS) 5.8 Security and Privacy of Data 5.8.1 Four Core Security Objectives 5.8.2 Five Types of Privacy 5.8.3 Building Blocks for Privacy Protection 5.8.4 Privacy Techniques 5.8.4.1 Process-Oriented Privacy Protection 5.8.4.2 Data-Oriented Privacy Protection 5.9 Conclusion References Chapter 6: Digital Forensics Cryptography with Smart Intelligence 6.1 Introduction 6.2 History of Forensics 6.3 Need for Digital Forensics 6.4 Sequence of Steps in Digital Forensics 6.5 Types of Digital Forensics 6.6 The Previous Decade (2001–2011) 6.7 Recent Years (2011–2021) 6.8 Models of Digital Forensics 6.8.1 The Digital Forensic Research Workshop (DFRWS) 2001 6.8.2 Forensic Process Model (2001) 6.8.3 Abstract Digital Forensic Model (2002) 6.8.4 Integrated Digital Investigation Process Model (IDIP) 2003 6.8.5 Enhanced Digital Investigation Process (2004) 6.8.6 Extended Model of Cybercrime Investigation 6.8.7 Case-Relevance Information Investigation (2005) 6.8.8 Digital Forensic Model Based on Malaysian Investigation Process (2009) 6.8.9 Systematic Digital Forensic Investigation Model SRDFIM (2011) 6.9 Real-Time Use Cases of Digital Forensics Application 6.10 Summary of Open Source Tools and Techniques Used in Digital Forensics 6.10.1 San SIFT 6.10.2 ProDiscover Forensic 6.10.3 Volatility Framework 6.10.4 The Sleuth Kit (Autopsy) 6.10.5 Caine 6.10.6 Xplico 6.10.7 X-Ways Forensics 6.11 Short Summary of a Few Other Digital Forensic Tools 6.12 Cryptographic Algorithms in Digital Forensics 6.12.1 File Carving Technique 6.12.2 Reconstructing Compressed Data 6.12.3 Recovering Files 6.12.4 Reverse Engineering 6.12.5 Image Integrity 6.13 Conclusion References Chapter 7: Transmission Modeling on Malware Attack through IoTs 7.1 Introduction 7.1.1 Basic Terminology 7.2 Hypothesis and Mathematical Model Formulation 7.2.1 Mathematical Model Formulation 7.2.2 Mathematical Model Analysis 7.3 Equilibrium Points and Basic Reproduction Number 7.3.1 Existence of Stability of the Equilibrium Points 7.3.2 Local Stability of the Malware-Free Equilibrium Point 7.3.3 Local Stability of the Endemic Equilibrium 7.4 Global Stability of the Equilibrium Points 7.4.1 Global Stability for Endemic Equilibrium Point 7.5 Numerical Simulation and Results 7.6 Conclusion References Chapter 8: Rice Plant Disease Detection Using IoT 8.1 Introduction 8.2 Related Work 8.3 Proposed System Model 8.3.1 Flowchart of the Following System 8.4 Circuit Diagram 8.5 Result 8.6 Conclusion References Chapter 9: Secure Protocols for Biomedical Smart Devices 9.1 Introduction 9.2 Communication Architecture in Smart Devices 9.3 Overview of Biomedical Smart Devices 9.3.1 Health-Oriented Smart Watch 9.3.2 Blood Pressure Monitor 9.3.3 Wireless Smart Glucometer 9.3.4 Brain-Sensing Headband 9.3.5 Smart Temporal Thermometer 9.3.6 Wearable ECG Monitors 9.3.7 Heart Rate Sensors 9.3.8 Pulse Oximeter Sensors 9.3.9 Motion Sensors 9.4 Security Requirements for Communication in Biomedical Smart Devices 9.4.1 Data Confidentiality 9.4.2 Scalability 9.4.3 Data Integrity 9.4.4 Data Authenticity 9.4.5 Data Availability 9.4.6 Data Security 9.4.7 Data Confidentiality 9.4.8 Data Privacy 9.4.9 Data Freshness 9.4.10 Secure Management 9.4.11 Dependability 9.4.12 Secure Localization 9.4.13 Accountability 9.4.14 Flexibility 9.5 Threats and Attacks 9.5.1 Replayed/Spoofed Routing Information 9.5.2 Selective Forwarding 9.5.3 Sinkhole Attacks 9.5.4 Sybil Attacks 9.5.5 Wormholes 9.5.6 HELLO Flood Attacks 9.5.7 Replay Attack 9.5.8 Denial of Service Attack 9.5.9 Man-in-the-Middle Attack 9.5.10 Flooding 9.5.11 Jamming 9.5.12 Tampering 9.6 Application Area for Smart Devices in Medical Health Care System 9.7 Security Protocols for Smart Devices 9.7.1 Robust and Efficient Energy Harvested Aware Routing Protocol [ 11 ] 9.7.2 Lightweight Information Encryption Protocol [ 12 ] 9.7.3 A Secure Protocol for User Authentication and Key Agreement [ 13 ] 9.7.4 Node-to-Node Authentication Protocol by Eliminating the Man-in-Middle Attack [ 14 ] 9.7.5 Lightweight Anonymous Authentication Protocol [ 15 ] 9.7.6 Lightweight Data Confidentiality and Authentication Protocols (2012) [ 16 ] 9.7.7 A Trust Key Management Protocol [ 17 ] 9.7.8 Physiological-Signal-Based Key Agreement Protocol [ 18 ] 9.7.9 Localized Encryption and Authentication Protocol (LEAP) [ 19 ] 9.7.10 Random Key Predistribution Schemes [ 22 ] 9.8 Other Security Mechanisms for Smart Devices 9.9 Conclusion References Chapter 10: Access Control Mechanism in Health Care Information System 10.1 Introduction 10.2 Access Control Mechanism 10.2.1 Discretionary Access Control (DAC) 10.2.2 Mandatory Access Control (MAC) 10.2.3 Role-Based Access Control (RBAC) 10.3 Access Control Solutions Associated with Health Care System 10.3.1 Privacy-Aware Role-Based Access Control (P-RBAC)—[ 14 ] 10.3.2 Personalized Access Control 10.3.3 Context-Related Access Control 10.3.4 Audit-Based Access Control 10.3.5 Behavior-Based Access Control 10.3.6 Rule-Based Access Control Approach 10.3.7 OASIS Role-Based Access Control 10.3.8 XACML-Based Access Control 10.3.9 Cryptography-Based Access Control [ 14 ] 10.4 Directions of Access Control Mechanism for Health Care Systems 10.4.1 Process-Based Access Control 10.4.2 Access Control for Patient-Controlled Electronic Health Records 10.5 Evaluation Criteria 10.6 Conclusion References Chapter 11: Privacy Preservation Tools and Techniques in Artificial Intelligence 11.1 Introduction 11.2 Related Work 11.3 Particle Swarm Optimization (PSO) 11.4 Datasets 11.5 Evaluation Measures 11.6 Machine Learning Techniques with PSO 11.6.1 Support Vector Machine (SVM) 11.6.2 Random Forest (RF) 11.6.3 Neural Network (NN) 11.6.4 k-Nearest Neighbor (k-NN) 11.6.5 Other Related Techniques Available 11.6.6 Discussion and Recommendations 11.7 Conclusion and Future Work References Chapter 12: Web Security Vulnerabilities: Identification, Exploitation, and Mitigation 12.1 Introduction 12.2 Introduction to Important Web Vulnerabilities 12.3 Injection 12.3.1 Types of Injections and Their Working Details 12.4 Identification of SQL Injection Vulnerabilities 12.5 Mitigation of Injection Vulnerabilities 12.6 Broken Authentication and Session Management 12.6.1 Exploitation of Broken Authentication Vulnerability 12.6.2 Mitigation of Broken Authentication and Session Management 12.7 Sensitive Data Exposure 12.7.1 Identification of Sensitive Data Exposure Vulnerability 12.7.2 Mitigation of Sensitive Data Exposure Vulnerability 12.8 External Entities of XML (XXE) 12.8.1 Identification of XML External Entities Vulnerability 12.8.2 Mitigation of XML External Entities 12.9 Broken Access Control 12.9.1 Identification of Broken Access Control Vulnerability 12.9.2 Prevent and Mitigate Broken Access Control 12.10 Misconfiguration of Security Options 12.10.1 Identification of Security Misconfiguration Vulnerabilities 12.10.2 Identification and Mitigation of Cross-Site Scripting (XSS) 12.10.3 Mitigation and Prevention of XSS Vulnerability 12.10.4 Identification and Mitigation of Insecure Deserialization 12.11 Identification of Insecure deserialization 12.11.1 Prevention of Insecure Deserialization 12.11.2 Identification and Mitigation of Using Components with Known Vulnerabilities 12.11.3 Identification of Components with Known Vulnerabilities 12.11.4 Mitigation of Components with Known Vulnerabilities 12.12 Insufficient Logging and Monitoring Vulnerabilities 12.12.1 Identification of Insufficient Logging and Monitoring Vulnerabilities 12.12.2 Insufficient Logging and Monitoring Vulnerabilities 12.13 Web Security Standards 12.14 Conclusion References Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.