IoT security : advances in authentication / / edited by Madhusanka Liyanage, School of Computer Science, University College, Ireland, Centre for Wireless Communication, University of Oulu, Finland, An Braeken, Industrial Engineering, Vrije Universiteit Brussel, Belgium, Pardeep Kumar, Department of Computer Science, Swansea University, UK, Mika Yliantilla, Centre for Wireless Communication, University of Oulu, Finland |
Autore | Liyanage Madhusanka |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken : , : Wiley, , 2020 |
Descrizione fisica | 1 online resource (318 pages) |
Disciplina | 005.8 |
Soggetto topico | Internet of things - Security measures |
ISBN |
1-119-52794-5
1-119-52796-1 1-119-52797-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Title Page; Copyright; Contents; About the Editors; List of Contributors; Preface; Acknowledgments; Part I IoT Overview; Chapter 1 Introduction to IoT; 1.1 Introduction; 1.1.1 Evolution of IoT; 1.2 IoT Architecture and Taxonomy; 1.3 Standardization Efforts; 1.4 IoT Applications; 1.4.1 Smart Home; 1.4.2 Smart City; 1.4.3 Smart Energy; 1.4.4 Healthcare; 1.4.5 IoT Automotive; 1.4.6 Gaming, AR and VR; 1.4.7 Retail; 1.4.8 Wearable; 1.4.9 Smart Agriculture; 1.4.10 Industrial Internet; 1.4.11 Tactile Internet; 1.4.12 Conclusion; Acknowledgement; References; Chapter 2 Abstract; 2.1 Introduction2.2 Attacks and Countermeasures; 2.2.1 Perception Layer; 2.2.1.1 Perception Nodes; 2.2.1.2 Sensor Nodes; 2.2.1.3 Gateways; 2.2.2 Network Layer; 2.2.2.1 Mobile Communication; 2.2.2.2 Cloud Computing; 2.2.2.3 Internet; 2.2.3 Application Layer; 2.2.3.1 Smart Utilities -- Smart Grids and Smart Metering; 2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine; 2.2.3.3 Intelligent Transportation; 2.2.3.4 Smart Agriculture; 2.2.3.5 Industrial IoT (IIoT); 2.2.3.6 Smart Buildings, Environments, and Cities; 2.3 Authentication and Authorization; 2.3.1 Authentication; 2.3.2 Authorization2.3.3 Authentication at IoT Layers; 2.3.3.1 Perception Layer; 2.3.3.2 Network Layer; 2.3.3.3 Application Layer; 2.4 Other Security Features and Related Issues; 2.4.1 The Simplified Layer Structure; 2.4.2 The Idea of Middleware; 2.4.3 Cross-Layer Security Problem; 2.4.4 Privacy; 2.4.5 Risk Mitigation; 2.5 Discussion; 2.6 Future Research Directions; 2.6.1 Blockchain; 2.6.2 5G; 2.6.3 Fog and Edge Computing; 2.6.4 Quantum Security, AI, and Predictive Data Analytics; 2.6.5 Network Slicing; 2.7 Conclusions; References; Part II IoT Network and Communication Authentication; Chapter 3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks3.1 Introduction; 3.2 Related Work; 3.3 System Model and Assumptions; 3.3.1 Design Goals; 3.3.2 Setting; 3.3.3 Notations; 3.3.4 Attack Model; 3.4 Scheme in Normal Mode; 3.4.1 Installation Phase; 3.4.1.1 Installation of CH; 3.4.1.2 Installation of CN; 3.4.2 Group Node Key; 3.4.3 Individual Cluster Key; 3.4.3.1 CN to CH; 3.4.3.2 CH to CN; 3.4.4 Pairwise Key Derivation; 3.4.5 Multicast Key; 3.4.5.1 Initiation by CH; 3.4.5.2 Derivation by CNs; 3.4.6 Group Cluster Key; 3.5 Authentication; 3.5.1 Authentication by CN3.5.2 Authenticated Broadcast by the CH; 3.5.3 Authenticated Broadcast by the BS; 3.6 Scheme in Change Mode; 3.6.1 Capture of CN; 3.6.2 Capture of CH; 3.6.3 Changes for Honest Nodes; 3.6.3.1 Key Update for Honest Node Replacement; 3.6.3.2 Node Removal and Addition; 3.7 Security Analysis; 3.7.1 Resistance Against Impersonation Attack; 3.7.2 Resistance Against Node Capture; 3.7.3 Resistance Against Replay Attacks; 3.8 Efficiency; 3.8.1 Number of Communication Phases; 3.8.2 Storage Requirements; 3.8.3 Packet Fragmentation; 3.9 Conclusions; Acknowledgement; References; Chapter 4 Public Key Based Protocols -- EC Crypto |
Record Nr. | UNINA-9910555293703321 |
Liyanage Madhusanka | ||
Hoboken : , : Wiley, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IoT security : advances in authentication / / edited by Madhusanka Liyanage, School of Computer Science, University College, Ireland, Centre for Wireless Communication, University of Oulu, Finland, An Braeken, Industrial Engineering, Vrije Universiteit Brussel, Belgium, Pardeep Kumar, Department of Computer Science, Swansea University, UK, Mika Yliantilla, Centre for Wireless Communication, University of Oulu, Finland |
Autore | Liyanage Madhusanka |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken : , : Wiley, , 2020 |
Descrizione fisica | 1 online resource (318 pages) |
Disciplina | 005.8 |
Soggetto topico | Internet of things - Security measures |
ISBN |
1-119-52794-5
1-119-52796-1 1-119-52797-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Title Page; Copyright; Contents; About the Editors; List of Contributors; Preface; Acknowledgments; Part I IoT Overview; Chapter 1 Introduction to IoT; 1.1 Introduction; 1.1.1 Evolution of IoT; 1.2 IoT Architecture and Taxonomy; 1.3 Standardization Efforts; 1.4 IoT Applications; 1.4.1 Smart Home; 1.4.2 Smart City; 1.4.3 Smart Energy; 1.4.4 Healthcare; 1.4.5 IoT Automotive; 1.4.6 Gaming, AR and VR; 1.4.7 Retail; 1.4.8 Wearable; 1.4.9 Smart Agriculture; 1.4.10 Industrial Internet; 1.4.11 Tactile Internet; 1.4.12 Conclusion; Acknowledgement; References; Chapter 2 Abstract; 2.1 Introduction2.2 Attacks and Countermeasures; 2.2.1 Perception Layer; 2.2.1.1 Perception Nodes; 2.2.1.2 Sensor Nodes; 2.2.1.3 Gateways; 2.2.2 Network Layer; 2.2.2.1 Mobile Communication; 2.2.2.2 Cloud Computing; 2.2.2.3 Internet; 2.2.3 Application Layer; 2.2.3.1 Smart Utilities -- Smart Grids and Smart Metering; 2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine; 2.2.3.3 Intelligent Transportation; 2.2.3.4 Smart Agriculture; 2.2.3.5 Industrial IoT (IIoT); 2.2.3.6 Smart Buildings, Environments, and Cities; 2.3 Authentication and Authorization; 2.3.1 Authentication; 2.3.2 Authorization2.3.3 Authentication at IoT Layers; 2.3.3.1 Perception Layer; 2.3.3.2 Network Layer; 2.3.3.3 Application Layer; 2.4 Other Security Features and Related Issues; 2.4.1 The Simplified Layer Structure; 2.4.2 The Idea of Middleware; 2.4.3 Cross-Layer Security Problem; 2.4.4 Privacy; 2.4.5 Risk Mitigation; 2.5 Discussion; 2.6 Future Research Directions; 2.6.1 Blockchain; 2.6.2 5G; 2.6.3 Fog and Edge Computing; 2.6.4 Quantum Security, AI, and Predictive Data Analytics; 2.6.5 Network Slicing; 2.7 Conclusions; References; Part II IoT Network and Communication Authentication; Chapter 3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks3.1 Introduction; 3.2 Related Work; 3.3 System Model and Assumptions; 3.3.1 Design Goals; 3.3.2 Setting; 3.3.3 Notations; 3.3.4 Attack Model; 3.4 Scheme in Normal Mode; 3.4.1 Installation Phase; 3.4.1.1 Installation of CH; 3.4.1.2 Installation of CN; 3.4.2 Group Node Key; 3.4.3 Individual Cluster Key; 3.4.3.1 CN to CH; 3.4.3.2 CH to CN; 3.4.4 Pairwise Key Derivation; 3.4.5 Multicast Key; 3.4.5.1 Initiation by CH; 3.4.5.2 Derivation by CNs; 3.4.6 Group Cluster Key; 3.5 Authentication; 3.5.1 Authentication by CN3.5.2 Authenticated Broadcast by the CH; 3.5.3 Authenticated Broadcast by the BS; 3.6 Scheme in Change Mode; 3.6.1 Capture of CN; 3.6.2 Capture of CH; 3.6.3 Changes for Honest Nodes; 3.6.3.1 Key Update for Honest Node Replacement; 3.6.3.2 Node Removal and Addition; 3.7 Security Analysis; 3.7.1 Resistance Against Impersonation Attack; 3.7.2 Resistance Against Node Capture; 3.7.3 Resistance Against Replay Attacks; 3.8 Efficiency; 3.8.1 Number of Communication Phases; 3.8.2 Storage Requirements; 3.8.3 Packet Fragmentation; 3.9 Conclusions; Acknowledgement; References; Chapter 4 Public Key Based Protocols -- EC Crypto |
Record Nr. | UNINA-9910815693703321 |
Liyanage Madhusanka | ||
Hoboken : , : Wiley, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The smart cyber ecosystem for sustainable development / / edited by Pardeep Kumar, Vishal Jain, Vasaki Ponnusamy |
Pubbl/distr/stampa | Hoboken, NJ : , : John Wiley & Sons, Inc., , [2021] |
Descrizione fisica | 1 online resource (480 pages) |
Disciplina | 006.3 |
Soggetto topico |
Artificial intelligence
Internet of things Computer networks - Social aspects |
ISBN |
1-119-76166-2
1-119-76165-4 1-119-76167-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910554856203321 |
Hoboken, NJ : , : John Wiley & Sons, Inc., , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The smart cyber ecosystem for sustainable development / / edited by Pardeep Kumar, Vishal Jain, Vasaki Ponnusamy |
Pubbl/distr/stampa | Hoboken, NJ : , : John Wiley & Sons, Inc., , [2021] |
Descrizione fisica | 1 online resource (480 pages) |
Disciplina | 006.3 |
Soggetto topico |
Artificial intelligence
Internet of things Computer networks - Social aspects |
ISBN |
1-119-76166-2
1-119-76165-4 1-119-76167-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Part 1: INTERNET OF THINGS -- 1 Voyage of Internet of Things in the Ocean of Technology -- 1.1 Introduction -- 1.1.1 Characteristics of IoT -- 1.1.2 IoT Architecture -- 1.1.3 Merits and Demerits of IoT -- 1.2 Technological Evolution Toward IoT -- 1.3 IoT-Associated Technology -- 1.4 Interoperability in IoT -- 1.5 Programming Technologies in IoT -- 1.5.1 Arduino -- 1.5.2 Raspberry Pi -- 1.5.3 Python -- 1.6 IoT Applications -- Conclusion -- References
2 AI for Wireless Network Optimization: Challenges and Opportunities -- 2.1 Introduction to AI -- 2.2 Self-Organizing Networks -- 2.2.1 Operation Principle of Self-Organizing Networks -- 2.2.2 Self-Configuration -- 2.2.3 Self-Optimization -- 2.2.4 Self-Healing -- 2.2.5 Key Performance Indicators -- 2.2.6 SON Functions -- 2.3 Cognitive Networks -- 2.4 Introduction to Machine Learning -- 2.4.1 ML Types -- 2.4.2 Components of ML Algorithms -- 2.4.3 How do Machines Learn? -- 2.4.4 ML and Wireless Networks -- 2.5 Software-Defined Networks -- 2.5.1 SDN Architecture -- 2.5.2 The OpenFlow Protocol 2.5.3 SDN and ML -- 2.6 Cognitive Radio Networks -- 2.6.1 Sensing Methods -- 2.7 ML for Wireless Networks: Challenges and Solution Approaches -- 2.7.1 Cellular Networks -- 2.7.2 Wireless Local Area Networks -- 2.7.3 Cognitive Radio Networks -- References -- 3 An Overview on Internet of Things (IoT) Segments and Technologies -- 3.1 Introduction -- 3.2 Features of IoT -- 3.3 IoT Sensor Devices -- 3.4 IoT Architecture -- 3.5 Challenges and Issues in IoT -- 3.6 Future Opportunities in IoT -- 3.7 Discussion -- 3.8 Conclusion -- References -- 4 The Technological Shift: AI in Big Data and IoT 4.1 Introduction -- 4.2 Artificial Intelligence -- 4.2.1 Machine Learning -- 4.2.2 Further Development in the Domain of Artificial Intelligence -- 4.2.3 Programming Languages for Artificial Intelligence -- 4.2.4 Outcomes of Artificial Intelligence -- 4.3 Big Data -- 4.3.1 Artificial Intelligence Methods for Big Data -- 4.3.2 Industry Perspective of Big Data -- 4.4 Internet of Things -- 4.4.1 Interconnection of IoT With AoT -- 4.4.2 Difference Between IIoT and IoT -- 4.4.3 Industrial Approach for IoT -- 4.5 Technical Shift in AI, Big Data, and IoT 4.5.1 Industries Shifting to AI-Enabled Big Data Analytics -- 4.5.2 Industries Shifting to AI-Powered IoT Devices -- 4.5.3 Statistical Data of These Shifts -- 4.6 Conclusion -- References -- 5 IoT's Data Processing Using Spark -- 5.1 Introduction -- 5.2 Introduction to Apache Spark -- 5.2.1 Advantages of Apache Spark -- 5.2.2 Apache Spark's Components -- 5.3 Apache Hadoop MapReduce -- 5.3.1 Limitations of MapReduce -- 5.4 Resilient Distributed Dataset (RDD) -- 5.4.1 Features and Limitations of RDDs -- 5.5 DataFrames -- 5.6 Datasets -- 5.7 Introduction to Spark SQL -- 5.7.1 Spark SQL Architecture |
Record Nr. | UNINA-9910676561303321 |
Hoboken, NJ : , : John Wiley & Sons, Inc., , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The smart cyber ecosystem for sustainable development / / edited by Pardeep Kumar, Vishal Jain, Vasaki Ponnusamy |
Pubbl/distr/stampa | Hoboken, NJ : , : John Wiley & Sons, Inc., , [2021] |
Descrizione fisica | 1 online resource (480 pages) |
Disciplina | 006.3 |
Soggetto topico |
Artificial intelligence
Internet of things Computer networks - Social aspects |
ISBN |
1-119-76166-2
1-119-76165-4 1-119-76167-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Part 1: INTERNET OF THINGS -- 1 Voyage of Internet of Things in the Ocean of Technology -- 1.1 Introduction -- 1.1.1 Characteristics of IoT -- 1.1.2 IoT Architecture -- 1.1.3 Merits and Demerits of IoT -- 1.2 Technological Evolution Toward IoT -- 1.3 IoT-Associated Technology -- 1.4 Interoperability in IoT -- 1.5 Programming Technologies in IoT -- 1.5.1 Arduino -- 1.5.2 Raspberry Pi -- 1.5.3 Python -- 1.6 IoT Applications -- Conclusion -- References
2 AI for Wireless Network Optimization: Challenges and Opportunities -- 2.1 Introduction to AI -- 2.2 Self-Organizing Networks -- 2.2.1 Operation Principle of Self-Organizing Networks -- 2.2.2 Self-Configuration -- 2.2.3 Self-Optimization -- 2.2.4 Self-Healing -- 2.2.5 Key Performance Indicators -- 2.2.6 SON Functions -- 2.3 Cognitive Networks -- 2.4 Introduction to Machine Learning -- 2.4.1 ML Types -- 2.4.2 Components of ML Algorithms -- 2.4.3 How do Machines Learn? -- 2.4.4 ML and Wireless Networks -- 2.5 Software-Defined Networks -- 2.5.1 SDN Architecture -- 2.5.2 The OpenFlow Protocol 2.5.3 SDN and ML -- 2.6 Cognitive Radio Networks -- 2.6.1 Sensing Methods -- 2.7 ML for Wireless Networks: Challenges and Solution Approaches -- 2.7.1 Cellular Networks -- 2.7.2 Wireless Local Area Networks -- 2.7.3 Cognitive Radio Networks -- References -- 3 An Overview on Internet of Things (IoT) Segments and Technologies -- 3.1 Introduction -- 3.2 Features of IoT -- 3.3 IoT Sensor Devices -- 3.4 IoT Architecture -- 3.5 Challenges and Issues in IoT -- 3.6 Future Opportunities in IoT -- 3.7 Discussion -- 3.8 Conclusion -- References -- 4 The Technological Shift: AI in Big Data and IoT 4.1 Introduction -- 4.2 Artificial Intelligence -- 4.2.1 Machine Learning -- 4.2.2 Further Development in the Domain of Artificial Intelligence -- 4.2.3 Programming Languages for Artificial Intelligence -- 4.2.4 Outcomes of Artificial Intelligence -- 4.3 Big Data -- 4.3.1 Artificial Intelligence Methods for Big Data -- 4.3.2 Industry Perspective of Big Data -- 4.4 Internet of Things -- 4.4.1 Interconnection of IoT With AoT -- 4.4.2 Difference Between IIoT and IoT -- 4.4.3 Industrial Approach for IoT -- 4.5 Technical Shift in AI, Big Data, and IoT 4.5.1 Industries Shifting to AI-Enabled Big Data Analytics -- 4.5.2 Industries Shifting to AI-Powered IoT Devices -- 4.5.3 Statistical Data of These Shifts -- 4.6 Conclusion -- References -- 5 IoT's Data Processing Using Spark -- 5.1 Introduction -- 5.2 Introduction to Apache Spark -- 5.2.1 Advantages of Apache Spark -- 5.2.2 Apache Spark's Components -- 5.3 Apache Hadoop MapReduce -- 5.3.1 Limitations of MapReduce -- 5.4 Resilient Distributed Dataset (RDD) -- 5.4.1 Features and Limitations of RDDs -- 5.5 DataFrames -- 5.6 Datasets -- 5.7 Introduction to Spark SQL -- 5.7.1 Spark SQL Architecture |
Record Nr. | UNINA-9910824961003321 |
Hoboken, NJ : , : John Wiley & Sons, Inc., , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|