Vai al contenuto principale della pagina

Internet of things : security and privacy in cyberspace / / edited by Sandeep Saxena and Ashok Kumar Pradhan



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Internet of things : security and privacy in cyberspace / / edited by Sandeep Saxena and Ashok Kumar Pradhan Visualizza cluster
Pubblicazione: Gateway East, Singapore : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (299 pages)
Disciplina: 004.678
Soggetto topico: Internet of things
Persona (resp. second.): SaxenaSandeep
PradhanAshok Kumar
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Contents -- Editors and Contributors -- 1 Pre-requisite Concepts for Security and Privacy -- 1.1 Principles of Cryptography -- 1.1.1 Confidentiality -- 1.1.2 Integrity -- 1.1.3 Availability -- 1.1.4 Non-repudiation -- 1.2 Access Control -- 1.2.1 Identification -- 1.2.2 Authentication -- 1.2.3 Authorization -- 1.2.4 Accountability -- 1.3 Cryptography -- 1.3.1 Symmetric Encryption -- 1.3.2 Asymmetric Encryption/Private Key Cryptography -- References -- 2 Basic Concepts of Cloud and Fog Computing -- 2.1 Cloud Computing and Its Applications -- 2.1.1 Evolution of Cloud Computing -- 2.1.2 Definition of Cloud Computing -- 2.1.3 Essential Characteristics of Cloud Computing -- 2.1.4 Cloud Computing: Layered Architecture -- 2.1.5 Cloud Computing Deployment Model -- 2.1.6 Limitations of Cloud Only Computing: -- 2.2 Fog Computing and Its Applications -- 2.2.1 Definition of the Fog Computing -- 2.2.2 Six-Layered Architecture of Fog Computing -- 2.2.3 Characteristics of the Fog Computing -- 2.2.4 Locations of the Fog Node -- 2.2.5 Application of Fog Computing and Its Role in the Internet of Things -- References -- 3 Access Control and Authentication in IoT -- 3.1 Introduction -- 3.2 Identity Management in IoT -- 3.2.1 Inter-domain Identity Management Architectures -- 3.2.2 Techniques to Build a Coordinating System -- 3.2.3 Single Sign-On Identity Federation -- 3.3 Authentication Mechanisms in IoT -- 3.4 Access Control Models with Examples -- 3.4.1 Open Challenges -- References -- 4 Lightweight Cryptographic Techniques and Protocols for IoT -- 4.1 Introduction -- 4.2 International Bodies for IoT Protocol Development -- 4.2.1 IoT Data Link Protocols -- 4.2.2 Network Layer Routing Protocols -- 4.2.3 Session Layer Protocols -- 4.2.4 IoT Management Protocols -- 4.2.5 Security of IoT Protocols -- 4.2.6 IETF on IoT Security -- 4.3 Various Protocols for IoT.
4.3.1 ZigBee -- 4.3.2 Thread -- 4.3.3 Bluetooth Low Energy (BLE) -- 4.3.4 WirelessHART -- 4.3.5 IP-Smart -- 4.4 Protocols and Its Features -- 4.4.1 Cryptographic Techniques and Features -- 4.5 Lightweight Cryptographic Techniques -- 4.6 Conclusion -- References -- 5 Communication Security in IoT -- 5.1 Different Communication Layer Protocols and Mediums for IoT -- 5.1.1 ZigBee -- 5.1.2 BLE -- 5.1.3 Near-Field Communication -- 5.1.4 6LoWPAN -- 5.1.5 Wi-Fi -- 5.1.6 Sigfox -- 5.2 Communication-Level Attacks -- 5.2.1 Sinkhole Attack -- 5.2.2 Wormhole Attack -- 5.2.3 Black Hole Attack -- 5.2.4 Flood Attack -- 5.2.5 Rank Attack -- 5.2.6 Cryptanalytic Attack -- 5.3 Defense Mechanism -- 5.3.1 Content Chaining Scheme -- 5.3.2 Authentication Defense Mechanism -- 5.3.3 Intrusion Detection System (IDS) -- 5.3.4 End to the End Encryption Method -- 5.4 Network Optimization Techniques -- 5.4.1 Particle Swarm Optimization (PSO) -- 5.4.2 Genetic Algorithm (GA) -- 5.4.3 Heuristic Algorithm -- 5.5 Challenges in Network Optimization -- 5.6 Conclusion and Future Direction -- References -- 6 Intrusion Detection System with Layered Approach to Internet of Things-A Business Paradigm -- 6.1 Introduction -- 6.2 What the IoT Is Made Up Of -- 6.3 Intrusion Detection System -- 6.4 What Is Industrial Revolution 4.0, 3.0, 2.0, and 1.0? -- 6.5 Layered Architecture of IoT -- 6.6 Layer 1: Things Layer or Physical Layer -- 6.7 Layer 2: Communications Network Layer -- 6.8 Layer 3: Applications Layer -- 6.9 Current Security Threats and Challenges in IoT -- 6.10 Conclusions -- References -- 7 Malware Detection in IoT -- 7.1 Malware in IoT Software -- 7.1.1 Botnet -- 7.1.2 Ransomware -- 7.1.3 Rootkit -- 7.1.4 Keylogger -- 7.1.5 Trojan Horse -- 7.1.6 Worm -- 7.2 Malware in IoT Hardware -- 7.2.1 Side-Channel Attacks -- 7.3 IoT Malware Analysis Techniques -- 7.3.1 Static Analysis.
7.3.2 Dynamic Analysis -- 7.3.3 Hybrid Analysis -- 7.4 IoT Malware Detection Techniques -- 7.4.1 Signature Based -- 7.4.2 Heuristic Based -- 7.4.3 Specification Based -- 7.4.4 Static and Dynamic Detection -- 7.5 Use Case Example -- 7.5.1 Mirai Malware -- 7.5.2 Reaper -- 7.5.3 Echobot -- 7.5.4 Other Potential Attacks -- 7.5.5 Pegasus (2021) -- 7.6 Research Opportunities in Malware -- 7.6.1 Advanced Machine Learning (AML) -- 7.6.2 Mobile Device Malwares -- 7.6.3 Graph-Based Malware Analysis -- 7.6.4 Defense in Depth Malware -- 7.6.5 Bio-Inspired Malware -- 7.6.6 Malware Education -- 7.6.7 Big Data Malware Analysis -- 7.6.8 Deception Antimalware Techniques -- 7.6.9 Botnet Countermeasures -- 7.6.10 Malware Advertisements Learning -- References -- 8 IoT Network Used in Fog and Cloud Computing -- 8.1 Introduction -- 8.1.1 Internet of Things (IoT) -- 8.1.2 IoT Networks and Architectures -- 8.1.3 Cloud Computing and Its Integration with IoT -- 8.1.4 Fog Computing and Its Integration with IoT -- 8.1.5 Comparison Between Fog Computing and Cloud Computing Paradigms -- 8.2 Implementation of Fog Computing and Cloud Computing Using IoT -- 8.2.1 IoT Networks Used in Cloud Computing -- 8.2.2 IoT Networks Used in Fog Computing -- 8.3 Security Issues, Threats, and Concerns -- 8.4 IoT Network Protocols -- 8.5 Case Studies -- 8.6 Conclusion -- References -- 9 Internet of Vehicles: Features, Architecture, Privacy, and Security Issues -- 9.1 Introduction -- 9.2 Applications of Internet of Vehicles -- 9.3 Interaction Model in IoV -- 9.4 Literature Review -- 9.5 Challenges in IoV -- 9.6 Architecture of IοV -- 9.7 Security Aspect of IoV -- 9.8 Requirements of Security in IoV -- 9.9 Security Challenges in IoV -- 9.10 Future Direction of IoV -- 9.11 Conclusion -- References -- 10 Cybersecurity and Ethics for IoT System: A Massive Analysis -- 10.1 Introductıon.
10.2 Frequently used to Attack Official or Employment Agencies -- 10.3 Taking Advantage of Known Flaws -- 10.3.1 Equipment -- 10.3.2 Errors in Software -- 10.3.3 Security Vulnerability in Internet Services and Protocols -- 10.4 Threats Are Already on the Rise -- 10.4.1 Use of Social Media -- 10.4.2 Data Storage System -- 10.4.3 Thoughtful Cell Phones -- 10.4.4 High-Value and Mission-Critical System -- 10.4.5 Energy Efficiency, Transportation Sustainability, Climate Change, and Affordable Housing -- References -- 11 Blockchain for Enhancing Security of IoT Devices -- 11.1 Introduction -- 11.1.1 IoT Challenges -- 11.1.2 Mapping of IoT Vulnerabilities from High-Level to Low-Level, Indications and Solutions -- 11.2 Blockchain Overview -- 11.2.1 Types of Blockchain -- 11.2.2 Public and Private Key -- 11.2.3 Digital Signature -- 11.2.4 Smart Contract -- 11.2.5 Consensus Algorithm -- 11.2.6 Cryptography and Hashing -- 11.2.7 Identity Management -- 11.3 Introduction to IoT and Blockchain -- 11.3.1 Real-Life Applications of IoT Devices -- 11.3.2 Real-Life Applications of Integration of IoT and Blockchain -- 11.3.3 IoT Device Identity Management Through Blockchain -- 11.4 Integration of IoT and Blockchain -- 11.4.1 Device Identity Approach -- 11.4.2 Device Gateway Communication Through Blockchain -- 11.4.3 Peer-To-Peer IoT Blockchain-Based Integration Model -- 11.4.4 Hybrid Approach -- 11.4.5 Advantages of Integration of IoT and Blockchain -- 11.5 Challenges of Integration of IoT and Blockchain -- 11.6 IoT-Based Blockchain Applications -- 11.6.1 Healthcare Industry -- 11.6.2 Supply Chain Management -- 11.6.3 Smart Energy Grids -- 11.7 Smart Home Security -- 11.7.1 Typical Smart Home Security Tips -- 11.7.2 Smart Home Security Solution with Blockchain -- 11.8 Blockchain for Healthcare Industry -- 11.9 Results -- 11.10 Discussion -- 11.11 Conclusion.
References -- 12 Challenges and Trends on Post-Quantum Cryptography -- 12.1 Introduction -- 12.2 Challenges Due to Shor's Algorithm -- 12.2.1 Shor's Algorithm -- 12.2.2 Experimental Implementation -- 12.3 Post-Quantum Algorithm -- 12.3.1 BB84 Protocol -- 12.3.2 BB84 Protocol Description -- 12.3.3 BB84 Protocols Workout Example -- 12.3.4 BB84 Protocol Implementation Using IBMQ -- 12.4 Teleportation -- 12.4.1 Teleportation Implementation Using IBMQ -- 12.5 Quantum Cheque Algorithm -- 12.5.1 Generation Algorithm -- 12.5.2 Sign Algorithm -- 12.6 Conclusion -- References.
Titolo autorizzato: Internet of things  Visualizza cluster
ISBN: 981-19-1585-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910574065403321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Transactions on Computer Systems and Networks