Fr. 170.00

Iot Security - Advances in Authentication

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

An up-to-date guide to an overview of authentication in the Internet of Things (IoT)
 
The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.
 
The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:
* Offers an authoritative reference designed for use by all IoT stakeholders
* Includes information for securing devices at the user, device, and network levels
* Contains a classification of existing vulnerabilities
* Written by an international group of experts on the topic
* Provides a guide to the most current information available on IoT security
 
Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

List of contents

About the Editors xiii
 
List of Contributors xvii
 
Preface xxiii
 
Acknowledgments xxix
 
Part I IoT Overview 1
 
1 Introduction to IoT 3
Anshuman Kalla, Pawani Prombage, and Madhusanka Liyanage
 
1.1 Introduction 4
 
1.1.1 Evolution of IoT 4
 
1.2 IoT Architecture and Taxonomy 5
 
1.3 Standardization Efforts 7
 
1.4 IoT Applications 10
 
1.4.1 Smart Home 11
 
1.4.2 Smart City 13
 
1.4.3 Smart Energy 14
 
1.4.4 Healthcare 15
 
1.4.5 IoT Automotive 16
 
1.4.6 Gaming, AR and VR 16
 
1.4.7 Retail 17
 
1.4.8 Wearable 18
 
1.4.9 Smart Agriculture 18
 
1.4.10 Industrial Internet 19
 
1.4.11 Tactile Internet 19
 
1.4.12 Conclusion 20
 
Acknowledgement 20
 
References 20
 
2 Introduction to IoT Security 27
Anca D. Jurcut, Pasika Ranaweera, and Lina Xu
 
2.1 Introduction 27
 
2.2 Attacks and Countermeasures 29
 
2.2.1 Perception Layer 30
 
2.2.2 Network Layer 33
 
2.2.3 Application Layer 34
 
2.3 Authentication and Authorization 41
 
2.3.1 Authentication 42
 
2.3.2 Authorization 42
 
2.3.3 Authentication at IoT Layers 43
 
2.4 Other Security Features and Related Issues 48
 
2.4.1 The Simplified Layer Structure 48
 
2.4.2 The Idea of Middleware 49
 
2.4.3 Cross-Layer Security Problem 50
 
2.4.4 Privacy 50
 
2.4.5 Risk Mitigation 51
 
2.5 Discussion 52
 
2.6 Future Research Directions 54
 
2.6.1 Blockchain 54
 
2.6.2 5G 55
 
2.6.3 Fog and Edge Computing 56
 
2.6.4 Quantum Security, AI, and Predictive Data Analytics 57
 
2.6.5 Network Slicing 57
 
2.7 Conclusions 58
 
References 59
 
Part II IoT Network and Communication Authentication 65
 
3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks 67
An Braeken
 
3.1 Introduction 67
 
3.2 Related Work 69
 
3.3 System Model and Assumptions 70
 
3.3.1 Design Goals 70
 
3.3.2 Setting 70
 
3.3.3 Notations 71
 
3.3.4 Attack Model 71
 
3.4 Scheme in Normal Mode 72
 
3.4.1 Installation Phase 72
 
3.4.2 Group Node Key 73
 
3.4.3 Individual Cluster Key 73
 
3.4.4 Pairwise Key Derivation 74
 
3.4.5 Multicast Key 76
 
3.4.6 Group Cluster Key 76
 
3.5 Authentication 77
 
3.5.1 Authentication by CN 77
 
3.5.2 Authenticated Broadcast by the CH 77
 
3.5.3 Authenticated Broadcast by the BS 78
 
3.6 Scheme in Change Mode 78
 
3.6.1 Capture of CN 78
 
3.6.2 Capture of CH 79
 
3.6.3 Changes for Honest Nodes 79
 
3.7 Security Analysis 80
 
3.7.1 Resistance Against Impersonation Attack 80
 
3.7.2 Resistance Against Node Capture 81
 
3.7.3 Resistance Against Replay Attacks 81
 
3.8 Efficiency 81
 
3.8.1 Number of Communication Phases 81
 
3.8.2 Storage Requirements 82
 
3.8.3 Packet Fragmentation 82
 
3.9 Conclusions 83
 
Acknowledgement 83
 
References 83
 
4 Public Key Based Protocols - EC Crypto 85
Pawani Porambage, An Braeken, and Corinna Schmitt
 
4.1 Introduction to ECC 85
 
4.1.1 Notations 86
 
4.1.2 ECC for Authentication and Key Management 87
 
4.2 ECC Based Implicit Certificates 88
 
4.2.1 Authentication and Key Management Using ECC Implicit Certificates 88
 
4.3 ECC-Based Signc

About the author










MADHUSANKA LIYANAGE, D.Sc (Tech), is Assistant Professor, School of Computer Science, University College Dublin, Ireland; Centre for Wireless Communications, University of Oulu, Finland.
AN BRAEKEN, PHD, is Professor, Industrial Sciences Department, Vrije Universiteit Brussels, Belgium.
PARDEEP KUMAR, PHD, is Lecturer/Assistant Professor, Department of Computer Science, Swansea University, Wales, UK
MIKA YLIANTTILA, D.Sc (Tech), is Associate Professor, Centre for Wireless Communications, University of Oulu, Finland.


Summary

An up-to-date guide to an overview of authentication in the Internet of Things (IoT)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.

The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:
* Offers an authoritative reference designed for use by all IoT stakeholders
* Includes information for securing devices at the user, device, and network levels
* Contains a classification of existing vulnerabilities
* Written by an international group of experts on the topic
* Provides a guide to the most current information available on IoT security

Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.