Details

Security and Privacy in the Internet of Things


Security and Privacy in the Internet of Things

Architectures, Techniques, and Applications
1. Aufl.

von: Ali Ismail Awad, Jemal Abawajy

114,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 03.12.2021
ISBN/EAN: 9781119607779
Sprache: englisch
Anzahl Seiten: 336

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>SECURITY AND PRIVACY IN THE INTERNET OF THINGS</b> <p><b>Provides the authoritative and up-to-date information required for securing IoT architecture and applications</b> <p>The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. <i>Security and Privacy in the Internet of Things</i> brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. <p>The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, <i>Security and Privacy in the Internet of Things:</i> <ul><li>Discusses a broad range of IoT attacks and defense mechanisms </li> <li>Examines IoT security and privacy protocols and approaches </li> <li>Covers both the logical and physical security of IoT devices </li> <li>Addresses IoT security through network traffic modeling </li> <li>Describes privacy preserving techniques in smart cities</li> <li>Explores current threat and vulnerability analyses</li></ul> <p><i>Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications</i> is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.
<p>About the Editors xiii</p> <p>List of Contributors xv</p> <p>Preface xix</p> <p><b>1 Advanced Attacks and Protection Mechanisms in IoT Devices and Networks 1<br /></b><i>Lejla Batina, Nele Mentens, Markus Miettinen, Naila Mukhtar, Thien Duc Nguyen, Md Masoom Rabbani, Phillip Rieger, and Ahmad-Reza Sadeghi</i></p> <p>1.1 Introduction 2</p> <p>1.2 Physical Security in IoT Devices 3</p> <p>1.2.1 Physical Attacks 3</p> <p>1.2.1.1 Side-channel Analysis Attacks 3</p> <p>1.2.1.2 Fault Analysis Attacks 4</p> <p>1.2.2 Profiling Attacks 4</p> <p>1.2.3 Machine Learning and SCA 5</p> <p>1.2.4 Real-world Attacks 7</p> <p>1.2.5 Countermeasures 8</p> <p>1.3 Remote Attestation in IoT Devices 9</p> <p>1.3.1 Types of Remote Attestation 10</p> <p>1.3.1.1 Software-based Remote Attestation 10</p> <p>1.3.1.2 Hardware-based Remote Attestation 11</p> <p>1.3.1.3 Hybrid Architecture-based Remote Attestation 12</p> <p>1.3.2 Remote Attestation for Large IoT Networks 12</p> <p>1.3.2.1 Classical Swarm Attestation Techniques 12</p> <p>1.3.2.2 Swarm Attestation for IoT Services 14</p> <p>1.3.3 Future Directions 14</p> <p>1.3.3.1 Cloud-based RA Techniques 15</p> <p>1.3.3.2 RA in Novel Internet Technologies 15</p> <p>1.3.3.3 Blockchain Based RA 15</p> <p>1.4 Intrusion Detection in IoT Networks 15</p> <p>1.4.1 IoT Malware 15</p> <p>1.4.2 Vulnerability Patching 16</p> <p>1.4.3 Signature- and Anomaly Detection-based Network Intrusion Detection 17</p> <p>1.4.4 Deep Learning-based Anomaly Detection 17</p> <p>1.4.4.1 System Overview 18</p> <p>1.4.4.2 Modeling Packet Sequence Patterns 18</p> <p>1.4.4.3 Anomalous Packet Detection 19</p> <p>1.4.5 Federated Deep Learning-based IoT Intrusion Detection System 20</p> <p>1.4.5.1 Federated Learning 20</p> <p>1.4.5.2 Federated Self-Learning Anomaly Detection 20</p> <p>1.4.5.3 Challenges of Federated Learning-based Anomaly Detection System for IoT 22</p> <p>References 23</p> <p><b>2 Human Aspects of IoT Security and Privacy 31<br /></b><i>Sune Von Solms and Steven Furnell</i></p> <p>2.1 Introduction 31</p> <p>2.2 An Overview of the Domestic IoT Environment 33</p> <p>2.3 Security Issues and the IoT Landscape 39</p> <p>2.4 Human Factors Challenges in IoT Security and Privacy 41</p> <p>2.4.1 Security Trade-offs for Individuals in IoT 43</p> <p>2.4.2 Data Ownership and Use 44</p> <p>2.4.3 Device Management and Administration Responsibilities 46</p> <p>2.4.4 The Age of Unwanted Intelligence 47</p> <p>2.5 Toward Improved User-facing Security in the IoT 49</p> <p>2.6 Conclusion 51</p> <p>Acknowledgments 51</p> <p>References 51</p> <p><b>3 Applying Zero Trust Security Principles to Defence Mechanisms Against Data Exfiltration Attacks 57<br /></b>Hugo Egerton, Mohammad Hammoudeh, Devrim Unal, and Bamidele Adebisi</p> <p>3.1 Introduction 57</p> <p>3.2 Data Exfiltration Types, Attack Mechanisms, and Defence Techniques 59</p> <p>3.2.1 Types of Data Exfiltration 59</p> <p>3.2.1.1 Physical 59</p> <p>3.2.1.2 Remote 60</p> <p>3.2.2 Data Exfiltration Attack Techniques 60</p> <p>3.2.2.1 Physical-based 60</p> <p>3.2.2.2 Remote-based 61</p> <p>3.2.3 Insider Data Exfiltration Threats 63</p> <p>3.2.3.1 Types of Insider Threats 63</p> <p>3.2.4 Approaches to Counter Data Exfiltration 65</p> <p>3.2.4.1 Preventative 65</p> <p>3.2.4.2 Detective 66</p> <p>3.2.4.3 Investigative 66</p> <p>3.2.5 Mechanisms to Defend Against Physical Data Exfiltration 67</p> <p>3.2.5.1 Network-based 67</p> <p>3.2.5.2 Physical-based 67</p> <p>3.3 A Defence Mechanism for Physical Data Exfiltration Mitigation 68</p> <p>3.3.1 Confidential Data Identification 68</p> <p>3.3.2 Endpoint Access Rules 70</p> <p>3.3.3 Data Fingerprinting 72</p> <p>3.3.4 Relevance to Physical-Layer Protection 73</p> <p>3.3.5 Complementing Existing Firewall and Application-based Measures 73</p> <p>3.4 Implementation and Analysis 75</p> <p>3.4.1 Experimental Setup 75</p> <p>3.4.2 Threat Scenario 77</p> <p>3.4.3 Scenario Execution and Analysis 77</p> <p>3.5 Evaluation 80</p> <p>3.5.1 Scenarios 81</p> <p>3.5.2 Scenario 1 82</p> <p>3.5.3 Scenario 2 82</p> <p>3.5.4 Scenario 3 83</p> <p>3.5.5 Results Analysis and Discussion 84</p> <p>3.6 Conclusion 86</p> <p>References 86</p> <p><b>4 eSIM-Based Authentication Protocol for UAV Remote Identification 91<br /></b>Abdulhadi Shoufan, Chan Yeob Yeun, and Bilal Taha</p> <p>4.1 Introduction 91</p> <p>4.2 Drone Security 93</p> <p>4.2.1 Drone Security in UTM 93</p> <p>4.2.1.1 Physical Attacks 94</p> <p>4.2.1.2 Cyber Attacks 94</p> <p>4.2.1.3 Cyber-Physical Attacks 94</p> <p>4.2.2 Security Attacks on Drones 95</p> <p>4.2.3 Security Attacks from Drones 96</p> <p>4.2.3.1 Spying and Surveillance 96</p> <p>4.2.3.2 Smuggling 96</p> <p>4.2.3.3 Physical Attacks 97</p> <p>4.2.3.4 Cyber Attacks 97</p> <p>4.3 Drone Safety 98</p> <p>4.3.1 Drone Detection and Classification 98</p> <p>4.3.2 Interdiction Technologies 98</p> <p>4.4 UAV Remote Identification 100</p> <p>4.5 Authentication Protocol for Remote Identification 103</p> <p>4.5.1 Preliminaries 104</p> <p>4.5.1.1 Assumptions and Notations 104</p> <p>4.5.2 Registration 106</p> <p>4.5.3 Secure Communication Protocol 107</p> <p>4.5.3.1 M1: A Challenge from the Operator (A) to the Drone (B) 108</p> <p>4.5.3.2 M2: A Response from the Drone (B) to the Operator (A) 109</p> <p>4.5.3.3 M3: Control Message from the Operator to the Drone 109</p> <p>4.5.3.4 M4: Drone’s Response to the Control Message 110</p> <p>4.5.3.5 M5: Secure Broadcast of Remote Identification Message 110</p> <p>4.5.4 Security Analysis 110</p> <p>4.5.5 Formal Verification 112</p> <p>4.5.5.1 Declaration of User-Defined Types and Terms 112</p> <p>4.5.5.2 Declaration of Cryptographic Primitives 113</p> <p>4.5.5.3 Examples 114</p> <p>4.5.5.4 Reachability and Secrecy Checking 114</p> <p>4.5.5.5 Verifying Mutual Authentication 115</p> <p>4.6 Conclusion 117</p> <p>References 117</p> <p><b>5 Collaborative Intrusion Detection in the Era of IoT: Recent Advances and Challenges 123</b><br /><i>Wenjuan Li and Weizhi Meng</i></p> <p>5.1 Introduction 123</p> <p>5.2 Background 124</p> <p>5.2.1 Background on Intrusion Detection System 124</p> <p>5.2.2 Collaborative Intrusion Detection Framework 126</p> <p>5.3 Recent Development of Collaborative Intrusion Detection 128</p> <p>5.4 Open Challenges and Future Trend 136</p> <p>5.4.1 Advanced Insider Threats 136</p> <p>5.4.1.1 Advanced Attacks 136</p> <p>5.4.1.2 Solutions 137</p> <p>5.4.2 Open Challenges and Limitations 138</p> <p>5.4.3 Future Trend 139</p> <p>5.5 Conclusion 141</p> <p>References 141</p> <p><b>6 Cyber-Securing IoT Infrastructure by Modeling Network Traffic 151<br /></b><i>Hassan Habibi Gharakheili, Ayyoob Hamza, and Vijay Sivaraman</i></p> <p>6.1 Introduction 151</p> <p>6.2 Cyber-Attacks on IoT Infrastructure 153</p> <p>6.2.1 Eavesdropping 154</p> <p>6.2.1.1 Solutions 154</p> <p>6.2.2 Network Activity Analysis 154</p> <p>6.2.2.1 Solutions 154</p> <p>6.2.3 Active Reconnaissance 155</p> <p>6.2.3.1 Solutions 155</p> <p>6.2.4 Volumetric Attack 156</p> <p>6.2.4.1 Solutions 156</p> <p>6.2.5 Masquerading Attack 157</p> <p>6.2.5.1 Solutions 157</p> <p>6.2.6 Access Attack 158</p> <p>6.2.6.1 Solutions 158</p> <p>6.2.7 Active Crypto Attack 158</p> <p>6.2.7.1 Solutions 159</p> <p>6.2.8 Data Exfiltration 159</p> <p>6.2.8.1 Solutions 159</p> <p>6.2.9 Blocking Attack 160</p> <p>6.2.9.1 Solutions 160</p> <p>6.2.10 Sleep Deprivation Attack 160</p> <p>6.2.10.1 Solutions 161</p> <p>6.2.11 Trigger Action Attack 161</p> <p>6.2.11.1 Solutions 161</p> <p>6.3 Network Behavioral Model of IoTs 162</p> <p>6.3.1 Enforcing MUD Profile to Network 162</p> <p>6.3.2 MUD Protection Against Attacks 164</p> <p>6.3.2.1 To Internet 166</p> <p>6.3.2.2 From Internet 166</p> <p>6.3.2.3 From/To Local 168</p> <p>6.3.3 Monitoring MUD Activity 169</p> <p>6.4 Conclusion 170</p> <p>References 170</p> <p><b>7 Integrity of IoT Network Flow Records in Encrypted Traffic Analytics 177<br /></b><i>Aswani Kumar Cherukuri, Ikram Sumaiya Thaseen, Gang Li, Xiao Liu, Vinamra Das, and Aditya Raj</i></p> <p>7.1 Introduction 177</p> <p>7.2 Background 180</p> <p>7.2.1 Encrypted Traffic Analytics (ETA) 180</p> <p>7.2.2 Techniques for ETA 181</p> <p>7.2.3 Hashing for Flow Record Authentication 182</p> <p>7.3 Flow Based Telemetry 183</p> <p>7.3.1 Flow Metadata 183</p> <p>7.3.2 Flow-Based Approaches 183</p> <p>7.3.3 Threats on Flow Telemetry 185</p> <p>7.4 Hashing-Based MAC for Telemetry Data 186</p> <p>7.5 Experimental Analysis 189</p> <p>7.5.1 Hashed Flow Records 189</p> <p>7.5.2 Symmetric Encryption with Hashed Flow Records 192</p> <p>7.5.3 Asymmetric Encryption with Hashed Flow Records 195</p> <p>7.6 Conclusion 199</p> <p>List of Abbreviations 200</p> <p>Acknowledgment 200</p> <p>References 200</p> <p><b>8 Securing Contemporary eHealth Architectures: Techniques and Methods 207</b><br /><i>Naeem F. Syed, Zubair Baig, and Adnan Anwar</i></p> <p>8.1 Introduction 207</p> <p>8.2 eHealth 208</p> <p>8.2.1 Why IoT Is Important in eHealth? 209</p> <p>8.2.2 Fog or Edge Computing for eHealth 210</p> <p>8.2.3 Cloud Computing for eHealth 212</p> <p>8.2.4 Applications of IoT in eHealth 212</p> <p>8.2.4.1 Sleep Monitoring System 212</p> <p>8.2.4.2 Real Time and Advanced Health Diagnoses 213</p> <p>8.2.4.3 Emotion Detection 213</p> <p>8.2.4.4 Nutrition Monitoring System 213</p> <p>8.2.4.5 Detection of Dyslexia 213</p> <p>8.2.5 eHealth Security 213</p> <p>8.2.5.1 Implications of eHealth Security for Smart Cities 214</p> <p>8.3 eHealth Threat Landscape 215</p> <p>8.3.1 eHealth Threat Model 215</p> <p>8.3.1.1 eHealth Assets 216</p> <p>8.3.1.2 eHealth Attack Agents 216</p> <p>8.3.2 eHealth IoT Vulnerabilities and Threats 218</p> <p>8.3.2.1 Attacks in BAN 218</p> <p>8.3.2.2 Attacks in Communication Layer 219</p> <p>8.3.2.3 Attacks in Healthcare Provider Layer 219</p> <p>8.3.3 Real-world Attacks 221</p> <p>8.4 Countermeasures 221</p> <p>8.4.1 Patient Data Protection 223</p> <p>8.4.2 Device and Communication Security Measures 224</p> <p>8.4.2.1 Securing Communication 225</p> <p>8.4.3 Adaptive Security Framework 226</p> <p>8.4.4 Use Cases 228</p> <p>8.5 Conclusion 229</p> <p>References 230</p> <p><b>9 Security and Privacy of Smart Homes: Issues and Solutions 235<br /></b><i>Martin Lundgren and Ali Padyab</i></p> <p>9.1 Introduction 235</p> <p>9.2 State-of-the-Art in Smart Homes’ Security and Privacy 236</p> <p>9.2.1 Smart Home Technologies 236</p> <p>9.2.2 User-Centric Privacy 237</p> <p>9.2.3 Consequences of Data Breaches 238</p> <p>9.2.4 Dimensions of Privacy Concerns 239</p> <p>9.2.5 Consequences of Information Security 240</p> <p>9.2.6 A Framework for Security and Privacy Concerns 242</p> <p>9.3 Privacy Techniques and Mechanisms 244</p> <p>9.3.1 Cryptography 244</p> <p>9.3.2 Access Control 246</p> <p>9.3.3 Privacy Policy 247</p> <p>9.3.4 Anonymity 248</p> <p>9.3.5 UI/UX, User Awareness, and Control 249</p> <p>9.4 Toward Future Solutions 250</p> <p>9.5 Conclusion 251</p> <p>References 252</p> <p><b>10 IoT Hardware-Based Security: A Generalized Review of Threats and Countermeasures 261<br /></b><i>Catherine Higgins, Lucas McDonald, Muhammad Ijaz Ul Haq, and Saqib Hakak</i></p> <p>10.1 Introduction 261</p> <p>10.2 Hardware Attacks 262</p> <p>10.2.1 IoT Devices 262</p> <p>10.2.1.1 Node-Level Threats 264</p> <p>10.2.1.2 RFID Technology 266</p> <p>10.2.2 Hardware Design Threats 269</p> <p>10.2.2.1 Fake Replica 269</p> <p>10.2.2.2 Reverse Engineering 269</p> <p>10.2.2.3 Intellectual Property Hijacking 270</p> <p>10.2.2.4 Hardware Trojans 270</p> <p>10.2.3 Side-Channel Attacks 270</p> <p>10.2.3.1 Types of Side-Channel Attacks 271</p> <p>10.3 Physical Security Attacks Countermeasures 274</p> <p>10.3.1 Mitigation Techniques for IoT Hardware Attacks 275</p> <p>10.3.2 Side-Channel Attacks 275</p> <p>10.3.2.1 Hardware Trojans 275</p> <p>10.3.2.2 Power Analysis Attack 279</p> <p>10.3.2.3 Timing Attacks 283</p> <p>10.3.2.4 Electromagnetic Analysis Attacks 284</p> <p>10.3.2.5 Acoustic Crypto-Analysis Attack 285</p> <p>10.3.3 Integrated Circuits Security 286</p> <p>10.3.3.1 Countermeasures 286</p> <p>10.3.4 Radio Frequency Identification 287</p> <p>10.3.4.1 Physical Unclonable Function-based Authentication 287</p> <p>10.3.4.2 Preventing Physical Tampering Attacks (Enhancing Physical Security) 287</p> <p>10.3.4.3 Preventing Information Leakage 288</p> <p>10.3.4.4 Preventing Relay Attack 288</p> <p>10.4 Conclusion 289</p> <p>Acknowledgment 291</p> <p>References 291</p> <p>Index 297</p>
<p> <b>ALI ISMAIL AWAD,</b> PhD, is currently an Associate Professor with the College of Information Technology (CIT), United Arab Emirates University (UAEU), Al Ain, United Arab Emirates. He is also an Associate Professor with the Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, Luleå, Sweden. He is an Associate Professor with the Electrical Engineering Department, Faculty of Engineering, Al-Azhar University at Qena, Qena, Egypt. He is also a Visiting Researcher at the University of Plymouth, United Kingdom. Dr. Awad is an Editorial Board Member of the Future Generation Computer Systems Journal, Computers & Security Journal, the Internet of Things, Engineering Cyber Physical Human Systems Journal, Health Information Science and Systems Journal, and IET Image Processing Journal. Dr. Awad is currently an IEEE senior member.</p> <p><b>JEMAL H. ABAWAJY,</b> PhD, is a full professor at Faculty of Science, Engineering and Built Environment, Deakin University, Australia. He is a Senior Member of IEEE Society; IEEE Technical Committee on Scalable Computing (TCSC); IEEE Technical Committee on Dependable Computing and Fault Tolerance and IEEE Communication Society. His leadership is extensive spanning industrial, academic and professional areas (e.g., IEEE Technical Committee on Scalable Computing, Academic Board, Faculty Board and Research Integrity Advisory Group). Professor Abawajy is currently the Director of the Distributing System Security (DSS).
<p><b>Provides the authoritative and up-to-date information required for securing IoT architecture and applications</b></p> <p>The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. <i>Security and Privacy in the Internet of Things</i> brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. <p>The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, <i>Security and Privacy in the Internet of Things:</i> <ul><li>Discusses a broad range of IoT attacks and defense mechanisms </li> <li>Examines IoT security and privacy protocols and approaches </li> <li>Covers both the logical and physical security of IoT devices </li> <li>Addresses IoT security through network traffic modeling </li> <li>Describes privacy preserving techniques in smart cities</li> <li>Explores current threat and vulnerability analyses</li></ul> <p><i>Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications</i> is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.

Diese Produkte könnten Sie auch interessieren:

Classification, Parameter Estimation and State Estimation
Classification, Parameter Estimation and State Estimation
von: Bangjun Lei, Guangzhu Xu, Ming Feng, Yaobin Zou, Ferdinand van der Heijden, Dick de Ridder, David M. J. Tax
PDF ebook
101,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €