Security and Privacy in the Internet of Things
Home > Computing and Information Technology > Computer hardware > Interrelated smart technologies > Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications
Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications

Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications


     0     
5
4
3
2
1



International Edition


X
About the Book

SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things: Discusses a broad range of IoT attacks and defense mechanisms Examines IoT security and privacy protocols and approaches Covers both the logical and physical security of IoT devices Addresses IoT security through network traffic modeling Describes privacy preserving techniques in smart cities Explores current threat and vulnerability analyses Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.

Table of Contents:
About the Editors xiii List of Contributors xv Preface xix 1 Advanced Attacks and Protection Mechanisms in IoT Devices and Networks 1 Lejla Batina, Nele Mentens, Markus Miettinen, Naila Mukhtar, Thien Duc Nguyen, Md Masoom Rabbani, Phillip Rieger, and Ahmad-Reza Sadeghi 1.1 Introduction 2 1.2 Physical Security in IoT Devices 3 1.2.1 Physical Attacks 3 1.2.1.1 Side-channel Analysis Attacks 3 1.2.1.2 Fault Analysis Attacks 4 1.2.2 Profiling Attacks 4 1.2.3 Machine Learning and SCA 5 1.2.4 Real-world Attacks 7 1.2.5 Countermeasures 8 1.3 Remote Attestation in IoT Devices 9 1.3.1 Types of Remote Attestation 10 1.3.1.1 Software-based Remote Attestation 10 1.3.1.2 Hardware-based Remote Attestation 11 1.3.1.3 Hybrid Architecture-based Remote Attestation 12 1.3.2 Remote Attestation for Large IoT Networks 12 1.3.2.1 Classical Swarm Attestation Techniques 12 1.3.2.2 Swarm Attestation for IoT Services 14 1.3.3 Future Directions 14 1.3.3.1 Cloud-based RA Techniques 15 1.3.3.2 RA in Novel Internet Technologies 15 1.3.3.3 Blockchain Based RA 15 1.4 Intrusion Detection in IoT Networks 15 1.4.1 IoT Malware 15 1.4.2 Vulnerability Patching 16 1.4.3 Signature- and Anomaly Detection-based Network Intrusion Detection 17 1.4.4 Deep Learning-based Anomaly Detection 17 1.4.4.1 System Overview 18 1.4.4.2 Modeling Packet Sequence Patterns 18 1.4.4.3 Anomalous Packet Detection 19 1.4.5 Federated Deep Learning-based IoT Intrusion Detection System 20 1.4.5.1 Federated Learning 20 1.4.5.2 Federated Self-Learning Anomaly Detection 20 1.4.5.3 Challenges of Federated Learning-based Anomaly Detection System for IoT 22 References 23 2 Human Aspects of IoT Security and Privacy 31 Sune Von Solms and Steven Furnell 2.1 Introduction 31 2.2 An Overview of the Domestic IoT Environment 33 2.3 Security Issues and the IoT Landscape 39 2.4 Human Factors Challenges in IoT Security and Privacy 41 2.4.1 Security Trade-offs for Individuals in IoT 43 2.4.2 Data Ownership and Use 44 2.4.3 Device Management and Administration Responsibilities 46 2.4.4 The Age of Unwanted Intelligence 47 2.5 Toward Improved User-facing Security in the IoT 49 2.6 Conclusion 51 Acknowledgments 51 References 51 3 Applying Zero Trust Security Principles to Defence Mechanisms Against Data Exfiltration Attacks 57 Hugo Egerton, Mohammad Hammoudeh, Devrim Unal, and Bamidele Adebisi 3.1 Introduction 57 3.2 Data Exfiltration Types, Attack Mechanisms, and Defence Techniques 59 3.2.1 Types of Data Exfiltration 59 3.2.1.1 Physical 59 3.2.1.2 Remote 60 3.2.2 Data Exfiltration Attack Techniques 60 3.2.2.1 Physical-based 60 3.2.2.2 Remote-based 61 3.2.3 Insider Data Exfiltration Threats 63 3.2.3.1 Types of Insider Threats 63 3.2.4 Approaches to Counter Data Exfiltration 65 3.2.4.1 Preventative 65 3.2.4.2 Detective 66 3.2.4.3 Investigative 66 3.2.5 Mechanisms to Defend Against Physical Data Exfiltration 67 3.2.5.1 Network-based 67 3.2.5.2 Physical-based 67 3.3 A Defence Mechanism for Physical Data Exfiltration Mitigation 68 3.3.1 Confidential Data Identification 68 3.3.2 Endpoint Access Rules 70 3.3.3 Data Fingerprinting 72 3.3.4 Relevance to Physical-Layer Protection 73 3.3.5 Complementing Existing Firewall and Application-based Measures 73 3.4 Implementation and Analysis 75 3.4.1 Experimental Setup 75 3.4.2 Threat Scenario 77 3.4.3 Scenario Execution and Analysis 77 3.5 Evaluation 80 3.5.1 Scenarios 81 3.5.2 Scenario 1 82 3.5.3 Scenario 2 82 3.5.4 Scenario 3 83 3.5.5 Results Analysis and Discussion 84 3.6 Conclusion 86 References 86 4 eSIM-Based Authentication Protocol for UAV Remote Identification 91 Abdulhadi Shoufan, Chan Yeob Yeun, and Bilal Taha 4.1 Introduction 91 4.2 Drone Security 93 4.2.1 Drone Security in UTM 93 4.2.1.1 Physical Attacks 94 4.2.1.2 Cyber Attacks 94 4.2.1.3 Cyber-Physical Attacks 94 4.2.2 Security Attacks on Drones 95 4.2.3 Security Attacks from Drones 96 4.2.3.1 Spying and Surveillance 96 4.2.3.2 Smuggling 96 4.2.3.3 Physical Attacks 97 4.2.3.4 Cyber Attacks 97 4.3 Drone Safety 98 4.3.1 Drone Detection and Classification 98 4.3.2 Interdiction Technologies 98 4.4 UAV Remote Identification 100 4.5 Authentication Protocol for Remote Identification 103 4.5.1 Preliminaries 104 4.5.1.1 Assumptions and Notations 104 4.5.2 Registration 106 4.5.3 Secure Communication Protocol 107 4.5.3.1 M1: A Challenge from the Operator (A) to the Drone (B) 108 4.5.3.2 M2: A Response from the Drone (B) to the Operator (A) 109 4.5.3.3 M3: Control Message from the Operator to the Drone 109 4.5.3.4 M4: Drone’s Response to the Control Message 110 4.5.3.5 M5: Secure Broadcast of Remote Identification Message 110 4.5.4 Security Analysis 110 4.5.5 Formal Verification 112 4.5.5.1 Declaration of User-Defined Types and Terms 112 4.5.5.2 Declaration of Cryptographic Primitives 113 4.5.5.3 Examples 114 4.5.5.4 Reachability and Secrecy Checking 114 4.5.5.5 Verifying Mutual Authentication 115 4.6 Conclusion 117 References 117 5 Collaborative Intrusion Detection in the Era of IoT: Recent Advances and Challenges 123 Wenjuan Li and Weizhi Meng 5.1 Introduction 123 5.2 Background 124 5.2.1 Background on Intrusion Detection System 124 5.2.2 Collaborative Intrusion Detection Framework 126 5.3 Recent Development of Collaborative Intrusion Detection 128 5.4 Open Challenges and Future Trend 136 5.4.1 Advanced Insider Threats 136 5.4.1.1 Advanced Attacks 136 5.4.1.2 Solutions 137 5.4.2 Open Challenges and Limitations 138 5.4.3 Future Trend 139 5.5 Conclusion 141 References 141 6 Cyber-Securing IoT Infrastructure by Modeling Network Traffic 151 Hassan Habibi Gharakheili, Ayyoob Hamza, and Vijay Sivaraman 6.1 Introduction 151 6.2 Cyber-Attacks on IoT Infrastructure 153 6.2.1 Eavesdropping 154 6.2.1.1 Solutions 154 6.2.2 Network Activity Analysis 154 6.2.2.1 Solutions 154 6.2.3 Active Reconnaissance 155 6.2.3.1 Solutions 155 6.2.4 Volumetric Attack 156 6.2.4.1 Solutions 156 6.2.5 Masquerading Attack 157 6.2.5.1 Solutions 157 6.2.6 Access Attack 158 6.2.6.1 Solutions 158 6.2.7 Active Crypto Attack 158 6.2.7.1 Solutions 159 6.2.8 Data Exfiltration 159 6.2.8.1 Solutions 159 6.2.9 Blocking Attack 160 6.2.9.1 Solutions 160 6.2.10 Sleep Deprivation Attack 160 6.2.10.1 Solutions 161 6.2.11 Trigger Action Attack 161 6.2.11.1 Solutions 161 6.3 Network Behavioral Model of IoTs 162 6.3.1 Enforcing MUD Profile to Network 162 6.3.2 MUD Protection Against Attacks 164 6.3.2.1 To Internet 166 6.3.2.2 From Internet 166 6.3.2.3 From/To Local 168 6.3.3 Monitoring MUD Activity 169 6.4 Conclusion 170 References 170 7 Integrity of IoT Network Flow Records in Encrypted Traffic Analytics 177 Aswani Kumar Cherukuri, Ikram Sumaiya Thaseen, Gang Li, Xiao Liu, Vinamra Das, and Aditya Raj 7.1 Introduction 177 7.2 Background 180 7.2.1 Encrypted Traffic Analytics (ETA) 180 7.2.2 Techniques for ETA 181 7.2.3 Hashing for Flow Record Authentication 182 7.3 Flow Based Telemetry 183 7.3.1 Flow Metadata 183 7.3.2 Flow-Based Approaches 183 7.3.3 Threats on Flow Telemetry 185 7.4 Hashing-Based MAC for Telemetry Data 186 7.5 Experimental Analysis 189 7.5.1 Hashed Flow Records 189 7.5.2 Symmetric Encryption with Hashed Flow Records 192 7.5.3 Asymmetric Encryption with Hashed Flow Records 195 7.6 Conclusion 199 List of Abbreviations 200 Acknowledgment 200 References 200 8 Securing Contemporary eHealth Architectures: Techniques and Methods 207 Naeem F. Syed, Zubair Baig, and Adnan Anwar 8.1 Introduction 207 8.2 eHealth 208 8.2.1 Why IoT Is Important in eHealth? 209 8.2.2 Fog or Edge Computing for eHealth 210 8.2.3 Cloud Computing for eHealth 212 8.2.4 Applications of IoT in eHealth 212 8.2.4.1 Sleep Monitoring System 212 8.2.4.2 Real Time and Advanced Health Diagnoses 213 8.2.4.3 Emotion Detection 213 8.2.4.4 Nutrition Monitoring System 213 8.2.4.5 Detection of Dyslexia 213 8.2.5 eHealth Security 213 8.2.5.1 Implications of eHealth Security for Smart Cities 214 8.3 eHealth Threat Landscape 215 8.3.1 eHealth Threat Model 215 8.3.1.1 eHealth Assets 216 8.3.1.2 eHealth Attack Agents 216 8.3.2 eHealth IoT Vulnerabilities and Threats 218 8.3.2.1 Attacks in BAN 218 8.3.2.2 Attacks in Communication Layer 219 8.3.2.3 Attacks in Healthcare Provider Layer 219 8.3.3 Real-world Attacks 221 8.4 Countermeasures 221 8.4.1 Patient Data Protection 223 8.4.2 Device and Communication Security Measures 224 8.4.2.1 Securing Communication 225 8.4.3 Adaptive Security Framework 226 8.4.4 Use Cases 228 8.5 Conclusion 229 References 230 9 Security and Privacy of Smart Homes: Issues and Solutions 235 Martin Lundgren and Ali Padyab 9.1 Introduction 235 9.2 State-of-the-Art in Smart Homes’ Security and Privacy 236 9.2.1 Smart Home Technologies 236 9.2.2 User-Centric Privacy 237 9.2.3 Consequences of Data Breaches 238 9.2.4 Dimensions of Privacy Concerns 239 9.2.5 Consequences of Information Security 240 9.2.6 A Framework for Security and Privacy Concerns 242 9.3 Privacy Techniques and Mechanisms 244 9.3.1 Cryptography 244 9.3.2 Access Control 246 9.3.3 Privacy Policy 247 9.3.4 Anonymity 248 9.3.5 UI/UX, User Awareness, and Control 249 9.4 Toward Future Solutions 250 9.5 Conclusion 251 References 252 10 IoT Hardware-Based Security: A Generalized Review of Threats and Countermeasures 261 Catherine Higgins, Lucas McDonald, Muhammad Ijaz Ul Haq, and Saqib Hakak 10.1 Introduction 261 10.2 Hardware Attacks 262 10.2.1 IoT Devices 262 10.2.1.1 Node-Level Threats 264 10.2.1.2 RFID Technology 266 10.2.2 Hardware Design Threats 269 10.2.2.1 Fake Replica 269 10.2.2.2 Reverse Engineering 269 10.2.2.3 Intellectual Property Hijacking 270 10.2.2.4 Hardware Trojans 270 10.2.3 Side-Channel Attacks 270 10.2.3.1 Types of Side-Channel Attacks 271 10.3 Physical Security Attacks Countermeasures 274 10.3.1 Mitigation Techniques for IoT Hardware Attacks 275 10.3.2 Side-Channel Attacks 275 10.3.2.1 Hardware Trojans 275 10.3.2.2 Power Analysis Attack 279 10.3.2.3 Timing Attacks 283 10.3.2.4 Electromagnetic Analysis Attacks 284 10.3.2.5 Acoustic Crypto-Analysis Attack 285 10.3.3 Integrated Circuits Security 286 10.3.3.1 Countermeasures 286 10.3.4 Radio Frequency Identification 287 10.3.4.1 Physical Unclonable Function-based Authentication 287 10.3.4.2 Preventing Physical Tampering Attacks (Enhancing Physical Security) 287 10.3.4.3 Preventing Information Leakage 288 10.3.4.4 Preventing Relay Attack 288 10.4 Conclusion 289 Acknowledgment 291 References 291 Index 297

About the Author :
ALI ISMAIL AWAD, PhD, is currently an Associate Professor with the College of Information Technology (CIT), United Arab Emirates University (UAEU), Al Ain, United Arab Emirates. He is also an Associate Professor with the Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, Luleå, Sweden. He is an Associate Professor with the Electrical Engineering Department, Faculty of Engineering, Al-Azhar University at Qena, Qena, Egypt. He is also a Visiting Researcher at the University of Plymouth, United Kingdom. Dr. Awad is an Editorial Board Member of the Future Generation Computer Systems Journal, Computers & Security Journal, the Internet of Things, Engineering Cyber Physical Human Systems Journal, Health Information Science and Systems Journal, and IET Image Processing Journal. Dr. Awad is currently an IEEE senior member. JEMAL H. ABAWAJY, PhD, is a full professor at Faculty of Science, Engineering and Built Environment, Deakin University, Australia. He is a Senior Member of IEEE Society; IEEE Technical Committee on Scalable Computing (TCSC); IEEE Technical Committee on Dependable Computing and Fault Tolerance and IEEE Communication Society. His leadership is extensive spanning industrial, academic and professional areas (e.g., IEEE Technical Committee on Scalable Computing, Academic Board, Faculty Board and Research Integrity Advisory Group). Professor Abawajy is currently the Director of the Distributing System Security (DSS).


Best Sellers


Product Details
  • ISBN-13: 9781119607748
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-IEEE Press
  • Height: 10 mm
  • No of Pages: 336
  • Returnable: N
  • Sub Title: Architectures, Techniques, and Applications
  • Width: 10 mm
  • ISBN-10: 1119607744
  • Publisher Date: 04 Jan 2022
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 10 mm
  • Weight: 454 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications
John Wiley & Sons Inc -
Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!