Read more
An up-to-date guide to an overview of authentication in the Internet of Things (IoT)
The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.
The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:
* Offers an authoritative reference designed for use by all IoT stakeholders
* Includes information for securing devices at the user, device, and network levels
* Contains a classification of existing vulnerabilities
* Written by an international group of experts on the topic
* Provides a guide to the most current information available on IoT security
Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.
List of contents
About the Editors xiii
List of Contributors xvii
Preface xxiii
Acknowledgments xxix
Part I IoT Overview 1
1 Introduction to IoT 3
Anshuman Kalla, Pawani Prombage, and Madhusanka Liyanage
1.1 Introduction 4
1.1.1 Evolution of IoT 4
1.2 IoT Architecture and Taxonomy 5
1.3 Standardization Efforts 7
1.4 IoT Applications 10
1.4.1 Smart Home 11
1.4.2 Smart City 13
1.4.3 Smart Energy 14
1.4.4 Healthcare 15
1.4.5 IoT Automotive 16
1.4.6 Gaming, AR and VR 16
1.4.7 Retail 17
1.4.8 Wearable 18
1.4.9 Smart Agriculture 18
1.4.10 Industrial Internet 19
1.4.11 Tactile Internet 19
1.4.12 Conclusion 20
Acknowledgement 20
References 20
2 Introduction to IoT Security 27
Anca D. Jurcut, Pasika Ranaweera, and Lina Xu
2.1 Introduction 27
2.2 Attacks and Countermeasures 29
2.2.1 Perception Layer 30
2.2.2 Network Layer 33
2.2.3 Application Layer 34
2.3 Authentication and Authorization 41
2.3.1 Authentication 42
2.3.2 Authorization 42
2.3.3 Authentication at IoT Layers 43
2.4 Other Security Features and Related Issues 48
2.4.1 The Simplified Layer Structure 48
2.4.2 The Idea of Middleware 49
2.4.3 Cross-Layer Security Problem 50
2.4.4 Privacy 50
2.4.5 Risk Mitigation 51
2.5 Discussion 52
2.6 Future Research Directions 54
2.6.1 Blockchain 54
2.6.2 5G 55
2.6.3 Fog and Edge Computing 56
2.6.4 Quantum Security, AI, and Predictive Data Analytics 57
2.6.5 Network Slicing 57
2.7 Conclusions 58
References 59
Part II IoT Network and Communication Authentication 65
3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks 67
An Braeken
3.1 Introduction 67
3.2 Related Work 69
3.3 System Model and Assumptions 70
3.3.1 Design Goals 70
3.3.2 Setting 70
3.3.3 Notations 71
3.3.4 Attack Model 71
3.4 Scheme in Normal Mode 72
3.4.1 Installation Phase 72
3.4.2 Group Node Key 73
3.4.3 Individual Cluster Key 73
3.4.4 Pairwise Key Derivation 74
3.4.5 Multicast Key 76
3.4.6 Group Cluster Key 76
3.5 Authentication 77
3.5.1 Authentication by CN 77
3.5.2 Authenticated Broadcast by the CH 77
3.5.3 Authenticated Broadcast by the BS 78
3.6 Scheme in Change Mode 78
3.6.1 Capture of CN 78
3.6.2 Capture of CH 79
3.6.3 Changes for Honest Nodes 79
3.7 Security Analysis 80
3.7.1 Resistance Against Impersonation Attack 80
3.7.2 Resistance Against Node Capture 81
3.7.3 Resistance Against Replay Attacks 81
3.8 Efficiency 81
3.8.1 Number of Communication Phases 81
3.8.2 Storage Requirements 82
3.8.3 Packet Fragmentation 82
3.9 Conclusions 83
Acknowledgement 83
References 83
4 Public Key Based Protocols - EC Crypto 85
Pawani Porambage, An Braeken, and Corinna Schmitt
4.1 Introduction to ECC 85
4.1.1 Notations 86
4.1.2 ECC for Authentication and Key Management 87
4.2 ECC Based Implicit Certificates 88
4.2.1 Authentication and Key Management Using ECC Implicit Certificates 88
4.3 ECC-Based Signc
About the author
MADHUSANKA LIYANAGE, D.Sc (Tech), is Assistant Professor, School of Computer Science, University College Dublin, Ireland; Centre for Wireless Communications, University of Oulu, Finland.
AN BRAEKEN, PHD, is Professor, Industrial Sciences Department, Vrije Universiteit Brussels, Belgium.
PARDEEP KUMAR, PHD, is Lecturer/Assistant Professor, Department of Computer Science, Swansea University, Wales, UK
MIKA YLIANTTILA, D.Sc (Tech), is Associate Professor, Centre for Wireless Communications, University of Oulu, Finland.
Summary
An up-to-date guide to an overview of authentication in the Internet of Things (IoT)
The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.
The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:
* Offers an authoritative reference designed for use by all IoT stakeholders
* Includes information for securing devices at the user, device, and network levels
* Contains a classification of existing vulnerabilities
* Written by an international group of experts on the topic
* Provides a guide to the most current information available on IoT security
Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.