Title Internet of Things Security
Subtitle Fundamentals, Techniques and Applications (River Publishers Series in Security & Digital Forensics)
Author Shishir K. Shandilya, Soon Ae Chun, Smita Shandilya, Edgar Weippl
ISBN 9788793609532
List price USD 124.00
Price outside India Available on Request
Original price
Binding Hardbound
No of pages 250
Book size 152 x 228 mm
Publishing year 2018
Original publisher River Publishers (Eurospan Group)
Published in India by .
Exclusive distributors Viva Books Private Limited
Sales territory India, Sri Lanka, Bangladesh, Pakistan, Nepal, .
Status New Arrival
About the book Send Enquiry
  
 
Description:

Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design.

To improve security, an IoT device that needs to be directly accessible over the Internet should be segmented into its own network, and have general network access restricted. The network segment should be monitored to identify potential anomalous traffic, and action should be taken if a problem arises. This has generated an altogether new area of research, which seeks possible solutions for securing the devices, and communication amongst them.

Internet of Things Security: Fundamentals, Techniques and Applications provides a comprehensive overview of the overall scenario of IoT Security whilst highlighting recent research and applications in the field. Technical topics discussed in the book include:

Machine-to-Machine Communications

IoT Architecture

Identity of Things

Block Chain

Parametric Cryptosystem

Software and Cloud Components


Contents:

Foreword

Preface

List of Contributors

List of Figures

List of Tables

List of Abbreviations

Chapter 1: IoT Security: An Introduction (Shishir Kumar Shandilya, Soon Ae Chun, Smita Shandilya and
Edgar Weippl)
• Introduction • Security: A Major Concern • Confidentiality • Authentication • Data Integrity • Cyber Threats and Their Detection • Threat Mitigation • Malware Resistance • Business Aspects in IoT • Industrial IoT (lIoT) • Security Requirements in lloT • Vehicular Sensor Networks (VANETs) • Sensors in VANET • Security in VANET • IoT-Enabled Wearable Devices • IoT in Smart Homes/Cities • Green IoT • Video Streaming and Data Security from Cameras • IoT Security Activities • Device Manipulation • Risk Management • Elements under risk management • Steps for risk management • Loopholes of current risk management techniques • IoT risk management for data and privacy • Machine Learning in IoT • Need • Levels of IoT Security • Device • Communication • Cloud • Life cycle • Automation of Security Mechanisms • Device-based solutions • Network-based solutions • Classification of IoT Security Techniques • Network security • Authentication • Encryption • Analytics • Conclusions

Chapter 2: Internet of Things Privacy, Security, and Governance (Gianmarco Baldini, Trevor Peirce,
Marcus Handte, Domenico Rotondi, Sergio Gusmeroli, Salvatore Piccione, Bertrand Copigneaux, Franck Le Gall, Foued Melakessou, Philippe Smadja, Alexandru Serbanati, and Julinda Stefa)
• Introduction • Overview of Activity Chain 05 — Governance, Privacy, and Security Issues • Contribution from FP7 Projects • FP7 iCore Access Framework (iCore Contribution) • IoT@Work Capability-based Access Control System (IoT@Work Contribution) • GAMBAS Adaptive Middleware (GAMBAS Contribution) • IoT-A Architecture (IoT-A Contribution) • Governance, Security, and Privacy in the Butler Project (Butler Contribution) • Conclusions • References

Chapter 3: IoT Data Processing: The Different Archetypes and Their Security and Privacy Assessment (Pijush Kanti Dutta Pramanik and
Prasenjit Choudhury)
• Introduction • Properties of IoT Data • Challenges in IoT Data Processing • IoT Data Processing Architectures • Grid Computing • Cloud Computing • Fog Computing • Mobile-edge Computing • Cloudlets • On-site Processing • In-memory Computing • Security and Privacy Issues Involved in Each Archetype • A General Discussion on the Security and Privacy Issues in IoT • An Off-the-wall Outlook on Security and Privacy Concerns for IoT • Conclusion • References

Chapter 4: Safeguarding the Connected Future: Security in Internet of Things (IoT) (Priti Maheshwary and Timothy Malche) • Introduction • Need for Security • Security Challenges in IoT • Vulnerability points • Privacy • Authentication and authorization • Transport encryption • User interface • Firmware update • Confidentiality, Integrity, and Availability • Confidentiality • Integrity • Availability • Non-repudiation • IoT Architecture • Device-to-Device Communication • Device-to-Cloud Communication • Device-to-Gateway • Back-end Data-sharing • IoT Protocols • Link Layer • Network Layer • Transport Layer • Application Layer • Security Classification and Access Control • Data Classification • Attack Surface in IoT • Interfaces • Software and Cloud Components • Radio Communication • Security Features • TLS/SSL • MQTT (Message Queuing Telemetry Transport) • DTLS (Datagram Transport Layer Security) • CoAP (Constrained Application Protocol) • XMPP (Extensible Messaging and Presence Protocol) • Security Management • Identity and Access Management (IAM) • Key Management • IoT-based Smart Home and Security Issues • Conclusion • References

Chapter 5: Role of Blockchain in IoT Security (Tasneem Jahan and Imran An Khan) • Introduction • Current Trends and Their Challenges • Blockchain Technology • Functioning of Blockchain • Construction of Blocks • Bitcoin and Blockchain • Transaction Fees • Security Aspects of Blockchain • Evaluating Blockchain • Blockchain in Business • Benefits of Blockchain • Challenges of Blockchain in IoT • Application of Blockchain in IoT Smart Devices • Summary • References

Chapter 6: Cryptic Mining for AVK-based IoT Cryptosystem and Client-side Encryption Perspective (Shaligram Prajapat) • Introduction • The Classical Model of Automatic Variable Key (AVK) • Mechanism of Variation in Key of Automatic Variable Key (AVK) Framework • Apriori Approach for Parameter Prediction • Phase-1: Computation of Frequent Set • Phase-2: Computation of Association Rule 1 • Experimental Analysis of Parametric Cryptosystem • Features of Automatic Variable Key • Experimental Setup for Association Rule Analysis • Frequent Patterns Generated for Parametric AVK Model • Analysis of Cryptic Mining Results of Parametric Model • Observation for Association Rules Mining (ARM) • Conclusion • References

Index

Glossary

About the Editors

 

About the Editors:

Shishir K. Shandilya, Vellore Insitute of Technology, VIT Bhopal University, India

Soon Ae Chun, City University of New York, USA

Smita Shandilya, Sagar Institute of Research, Technology and Science, India

Edgar Weippl, SBA Research, Austria.


Target Audience:

This book is useful for students and academicians of Computer Security and Digital Forensics. It is also of use to people dealing with Smart devices, Machine to Machine Communication, Machine Learning, Next and Future Generation Internet, Internet of Things.

 
Special prices are applicable to the authorised sales territory only.
Prices are subject to change without prior notice.