Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications
- Length: 336 pages
- Edition: 1
- Language: English
- Publisher: Wiley-IEEE Press
- Publication Date: 2021-12-29
- ISBN-10: 1119607744
- ISBN-13: 9781119607748
- Sales Rank: #4879332 (See Top 100 Books)
SECURITY AND PRIVACY IN THE INTERNET OF THINGS
Provides the authoritative and up-to-date information required for securing IoT architecture and applications
The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers.
The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things:
- Discusses a broad range of IoT attacks and defense mechanisms
- Examines IoT security and privacy protocols and approaches
- Covers both the logical and physical security of IoT devices
- Addresses IoT security through network traffic modeling
- Describes privacy preserving techniques in smart cities
- Explores current threat and vulnerability analyses
Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.
Cover Title Page Copyright Contents About the Editors List of Contributors Preface Chapter 1 Advanced Attacks and Protection Mechanisms in IoT Devices and Networks 1.1 Introduction 1.2 Physical Security in IoT Devices 1.2.1 Physical Attacks 1.2.1.1 Side‐channel Analysis Attacks 1.2.1.2 Fault Analysis Attacks 1.2.2 Profiling Attacks 1.2.3 Machine Learning and SCA 1.2.4 Real‐world Attacks 1.2.5 Countermeasures 1.3 Remote Attestation in IoT Devices 1.3.1 Types of Remote Attestation 1.3.1.1 Software‐based Remote Attestation 1.3.1.2 Hardware‐based Remote Attestation 1.3.1.3 Hybrid Architecture‐based Remote Attestation 1.3.2 Remote Attestation for Large IoT Networks 1.3.2.1 Classical Swarm Attestation Techniques 1.3.2.2 Swarm Attestation for IoT Services 1.3.3 Future Directions 1.3.3.1 Cloud‐based RA Techniques 1.3.3.2 RA in Novel Internet Technologies 1.3.3.3 Blockchain Based RA 1.4 Intrusion Detection in IoT Networks 1.4.1 IoT Malware 1.4.2 Vulnerability Patching 1.4.3 Signature‐ and Anomaly Detection‐based Network Intrusion Detection 1.4.4 Deep Learning‐based Anomaly Detection 1.4.4.1 System Overview 1.4.4.2 Modeling Packet Sequence Patterns 1.4.4.3 Anomalous Packet Detection 1.4.5 Federated Deep Learning‐based IoT Intrusion Detection System 1.4.5.1 Federated Learning 1.4.5.2 Federated Self‐Learning Anomaly Detection 1.4.5.3 Challenges of Federated Learning‐based Anomaly Detection System for IoT References Chapter 2 Human Aspects of IoT Security and Privacy 2.1 Introduction 2.2 An Overview of the Domestic IoT Environment 2.3 Security Issues and the IoT Landscape 2.4 Human Factors Challenges in IoT Security and Privacy 2.4.1 Security Trade‐offs for Individuals in IoT 2.4.2 Data Ownership and Use 2.4.3 Device Management and Administration Responsibilities 2.4.4 The Age of Unwanted Intelligence 2.5 Toward Improved User‐facing Security in the IoT 2.6 Conclusion Acknowledgments References Chapter 3 Applying Zero Trust Security Principles to Defence Mechanisms Against Data Exfiltration Attacks 3.1 Introduction 3.2 Data Exfiltration Types, Attack Mechanisms, and Defence Techniques 3.2.1 Types of Data Exfiltration 3.2.1.1 Physical 3.2.1.2 Remote 3.2.2 Data Exfiltration Attack Techniques 3.2.2.1 Physical‐based 3.2.2.2 Remote‐based 3.2.3 Insider Data Exfiltration Threats 3.2.3.1 Types of Insider Threats 3.2.4 Approaches to Counter Data Exfiltration 3.2.4.1 Preventative 3.2.4.2 Detective 3.2.4.3 Investigative 3.2.5 Mechanisms to Defend Against Physical Data Exfiltration 3.2.5.1 Network‐based 3.2.5.2 Physical‐based 3.3 A Defence Mechanism for Physical Data Exfiltration Mitigation 3.3.1 Confidential Data Identification 3.3.2 Endpoint Access Rules 3.3.3 Data Fingerprinting 3.3.4 Relevance to Physical‐Layer Protection 3.3.5 Complementing Existing Firewall and Application‐based Measures 3.4 Implementation and Analysis 3.4.1 Experimental Setup 3.4.2 Threat Scenario 3.4.3 Scenario Execution and Analysis 3.5 Evaluation 3.5.1 Scenarios 3.5.2 Scenario 1 3.5.3 Scenario 2 3.5.4 Scenario 3 3.5.5 Results Analysis and Discussion 3.6 Conclusion References Chapter 4 eSIM‐Based Authentication Protocol for UAV Remote Identification 4.1 Introduction 4.2 Drone Security 4.2.1 Drone Security in UTM 4.2.1.1 Physical Attacks 4.2.1.2 Cyber Attacks 4.2.1.3 Cyber‐Physical Attacks 4.2.2 Security Attacks on Drones 4.2.3 Security Attacks from Drones 4.2.3.1 Spying and Surveillance 4.2.3.2 Smuggling 4.2.3.3 Physical Attacks 4.2.3.4 Cyber Attacks 4.3 Drone Safety 4.3.1 Drone Detection and Classification 4.3.2 Interdiction Technologies 4.4 UAV Remote Identification 4.5 Authentication Protocol for Remote Identification 4.5.1 Preliminaries 4.5.1.1 Assumptions and Notations 4.5.2 Registration 4.5.3 Secure Communication Protocol 4.5.3.1 M1: A Challenge from the Operator (A) to the Drone (B) 4.5.3.2 M2: A Response from the Drone (B) to the Operator (A) 4.5.3.3 M3: Control Message from the Operator to the Drone 4.5.3.4 M4: Drone's Response to the Control Message 4.5.3.5 M5: Secure Broadcast of Remote Identification Message 4.5.4 Security Analysis 4.5.5 Formal Verification 4.5.5.1 Declaration of User‐Defined Types and Terms 4.5.5.2 Declaration of Cryptographic Primitives 4.5.5.3 Examples 4.5.5.4 Reachability and Secrecy Checking 4.5.5.5 Verifying Mutual Authentication 4.6 Conclusion References Chapter 5 Collaborative Intrusion Detection in the Era of IoT: Recent Advances and Challenges 5.1 Introduction 5.2 Background 5.2.1 Background on Intrusion Detection System 5.2.2 Collaborative Intrusion Detection Framework 5.3 Recent Development of Collaborative Intrusion Detection 5.4 Open Challenges and Future Trend 5.4.1 Advanced Insider Threats 5.4.1.1 Advanced Attacks 5.4.1.2 Solutions 5.4.2 Open Challenges and Limitations 5.4.3 Future Trend 5.5 Conclusion References Chapter 6 Cyber‐Securing IoT Infrastructure by Modeling Network Traffic 6.1 Introduction 6.2 Cyber‐Attacks on IoT Infrastructure 6.2.1 Eavesdropping 6.2.1.1 Solutions 6.2.2 Network Activity Analysis 6.2.2.1 Solutions 6.2.3 Active Reconnaissance 6.2.3.1 Solutions 6.2.4 Volumetric Attack 6.2.4.1 Solutions 6.2.5 Masquerading Attack 6.2.5.1 Solutions 6.2.6 Access Attack 6.2.6.1 Solutions 6.2.7 Active Crypto Attack 6.2.7.1 Solutions 6.2.8 Data Exfiltration 6.2.8.1 Solutions 6.2.9 Blocking Attack 6.2.9.1 Solutions 6.2.10 Sleep Deprivation Attack 6.2.10.1 Solutions 6.2.11 Trigger Action Attack 6.2.11.1 Solutions 6.3 Network Behavioral Model of IoTs 6.3.1 Enforcing MUD Profile to Network 6.3.2 MUD Protection Against Attacks 6.3.2.1 To Internet 6.3.2.2 From Internet 6.3.2.3 From/To Local 6.3.3 Monitoring MUD Activity 6.4 Conclusion References Chapter 7 Integrity of IoT Network Flow Records in Encrypted Traffic Analytics 7.1 Introduction 7.2 Background 7.2.1 Encrypted Traffic Analytics (ETA) 7.2.2 Techniques for ETA 7.2.3 Hashing for Flow Record Authentication 7.3 Flow Based Telemetry 7.3.1 Flow Metadata 7.3.2 Flow‐Based Approaches 7.3.3 Threats on Flow Telemetry 7.4 Hashing‐Based MAC for Telemetry Data 7.5 Experimental Analysis 7.5.1 Hashed Flow Records 7.5.2 Symmetric Encryption with Hashed Flow Records 7.5.3 Asymmetric Encryption with Hashed Flow Records 7.6 Conclusion List of Abbreviations Acknowledgment References Chapter 8 Securing Contemporary eHealth Architectures: Techniques and Methods 8.1 Introduction 8.2 eHealth 8.2.1 Why IoT Is Important in eHealth? 8.2.2 Fog or Edge Computing for eHealth 8.2.3 Cloud Computing for eHealth 8.2.4 Applications of IoT in eHealth 8.2.4.1 Sleep Monitoring System 8.2.4.2 Real Time and Advanced Health Diagnoses 8.2.4.3 Emotion Detection 8.2.4.4 Nutrition Monitoring System 8.2.4.5 Detection of Dyslexia 8.2.5 eHealth Security 8.2.5.1 Implications of eHealth Security for Smart Cities 8.3 eHealth Threat Landscape 8.3.1 eHealth Threat Model 8.3.1.1 eHealth Assets 8.3.1.2 eHealth Attack Agents 8.3.2 eHealth IoT Vulnerabilities and Threats 8.3.2.1 Attacks in BAN 8.3.2.2 Attacks in Communication Layer 8.3.2.3 Attacks in Healthcare Provider Layer 8.3.3 Real‐world Attacks 8.4 Countermeasures 8.4.1 Patient Data Protection 8.4.2 Device and Communication Security Measures 8.4.2.1 Securing Communication 8.4.3 Adaptive Security Framework 8.4.4 Use Cases 8.5 Conclusion References Chapter 9 Security and Privacy of Smart Homes: Issues and Solutions 9.1 Introduction 9.2 State‐of‐the‐Art in Smart Homes' Security and Privacy 9.2.1 Smart Home Technologies 9.2.2 User‐Centric Privacy 9.2.3 Consequences of Data Breaches 9.2.4 Dimensions of Privacy Concerns 9.2.5 Consequences of Information Security 9.2.6 A Framework for Security and Privacy Concerns 9.3 Privacy Techniques and Mechanisms 9.3.1 Cryptography 9.3.2 Access Control 9.3.3 Privacy Policy 9.3.4 Anonymity 9.3.5 UI/UX, User Awareness, and Control 9.4 Toward Future Solutions 9.5 Conclusion References Chapter 10 IoT Hardware‐Based Security: A Generalized Review of Threats and Countermeasures 10.1 Introduction 10.2 Hardware Attacks 10.2.1 IoT Devices 10.2.1.1 Node‐Level Threats 10.2.1.2 RFID Technology 10.2.2 Hardware Design Threats 10.2.2.1 Fake Replica 10.2.2.2 Reverse Engineering 10.2.2.3 Intellectual Property Hijacking 10.2.2.4 Hardware Trojans 10.2.3 Side‐Channel Attacks 10.2.3.1 Types of Side‐Channel Attacks 10.3 Physical Security Attacks Countermeasures 10.3.1 Mitigation Techniques for IoT Hardware Attacks 10.3.2 Side‐Channel Attacks 10.3.2.1 Hardware Trojans 10.3.2.2 Power Analysis Attack 10.3.2.3 Timing Attacks 10.3.2.4 Electromagnetic Analysis Attacks 10.3.2.5 Acoustic Crypto‐Analysis Attack 10.3.3 Integrated Circuits Security 10.3.3.1 Countermeasures 10.3.4 Radio Frequency Identification 10.3.4.1 Physical Unclonable Function‐based Authentication 10.3.4.2 Preventing Physical Tampering Attacks (Enhancing Physical Security) 10.3.4.3 Preventing Information Leakage 10.3.4.4 Preventing Relay Attack 10.4 Conclusion Acknowledgment References Index EULA
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.