0%

Book Description

An up-to-date guide to an overview of authentication in the Internet of Things (IoT)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. 

The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:

  • Offers an authoritative reference designed for use by all IoT stakeholders
  • Includes information for securing devices at the user, device, and network levels
  • Contains a classification of existing vulnerabilities
  • Written by an international group of experts on the topic
  • Provides a guide to the most current information available on IoT security 

Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

Table of Contents

  1. Cover
  2. About the Editors
  3. List of Contributors
  4. Preface
    1. IoT
    2. The Need for Security
    3. The Need for Authentication
    4. Intended Audience
    5. Book Organization
  5. Acknowledgments
  6. Part I: IoT Overview
    1. 1 Introduction to IoT
      1. 1.1 Introduction
      2. 1.2 IoT Architecture and Taxonomy
      3. 1.3 Standardization Efforts
      4. 1.4 IoT Applications
      5. Acknowledgement
      6. References
    2. 2 Introduction to IoT Security
      1. 2.1 Introduction
      2. 2.2 Attacks and Countermeasures
      3. 2.3 Authentication and Authorization
      4. 2.4 Other Security Features and Related Issues
      5. 2.5 Discussion
      6. 2.6 Future Research Directions
      7. 2.7 Conclusions
      8. References
  7. Part II: IoT Network and Communication Authentication
    1. 3 Symmetric Key‐Based Authentication with an Application to Wireless Sensor Networks
      1. 3.1 Introduction
      2. 3.2 Related Work
      3. 3.3 System Model and Assumptions
      4. 3.4 Scheme in Normal Mode
      5. 3.5 Authentication
      6. 3.6 Scheme in Change Mode
      7. 3.7 Security Analysis
      8. 3.8 Efficiency
      9. 3.9 Conclusions
      10. Acknowledgement
      11. References
    2. 4 Public Key Based Protocols – EC Crypto
      1. 4.1 Introduction to ECC
      2. 4.2 ECC Based Implicit Certificates
      3. 4.3 ECC‐Based Signcryption
      4. 4.4 ECC‐Based Group Communication
      5. 4.5 Implementation Aspects
      6. 4.6 Discussion
      7. References
    3. 5 Lattice‐Based Cryptography and Internet of Things
      1. 5.1 Introduction
      2. 5.2 Lattice‐Based Cryptography
      3. 5.3 Lattice‐Based Primitives
      4. 5.4 Lattice‐Based Cryptography for IoT
      5. 5.5 Conclusion
      6. References
  8. Part III: IoT User Level Authentication
    1. 6 Efficient and Anonymous Mutual Authentication Protocol in Multi‐Access Edge Computing (MEC) Environments
      1. 6.1 Introduction
      2. 6.2 Related Work
      3. 6.3 Network Model and Adversary Model
      4. 6.4 Proposed Scheme
      5. 6.5 Security and Performance Evaluation
      6. 6.6 Conclusion
      7. References
    2. 7 Biometric‐Based Robust Access Control Model for Industrial Internet of Things Applications
      1. 7.1 Introduction
      2. 7.2 Related Work
      3. 7.3 Network Model, Threat Model and Security Requirements
      4. 7.4 Proposed Access Control Model in IIoT
      5. 7.5 Security and Performance Evaluations
      6. 7.6 Conclusions
      7. References
    3. 8 Gadget Free Authentication
      1. 8.1 Introduction to Gadget‐Free World
      2. 8.2 Introduction to Biometrics
      3. 8.3 Gadget‐Free Authentication
      4. 8.4 Preliminary Aspects
      5. 8.5 The System
      6. 8.6 Security Analysis
      7. 8.7 Performance Analysis
      8. 8.8 Conclusions
      9. Acknowledgement
      10. References
    4. 9 WebMaDa 2.1 – A Web‐Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel
      1. 9.1 Introduction
      2. 9.2 IoT‐Related Concerns
      3. 9.3 Design Decisions
      4. 9.4 WebMaDa's History
      5. 9.5 WebMaDa 2.1
      6. 9.6 Implementation
      7. 9.7 Proof of Operability
      8. 9.8 Summary and Conclusions
      9. References
      10. Notes
  9. Part IV: IoT Device Level Authentication
    1. 10 PUF‐Based Authentication and Key Exchange for Internet of Things
      1. 10.1 Introduction
      2. 10.2 Related Work
      3. 10.3 Preliminaries
      4. 10.4 Proposed System
      5. 10.5 Security Evaluation
      6. 10.6 Performance
      7. 10.7 Conclusions
      8. References
    2. 11 Hardware‐Based Encryption via Generalized Synchronization of Complex Networks
      1. 11.1 Introduction
      2. 11.2 System Scheme: Synchronization without Correlation
      3. 11.3 The Chaotic Followers
      4. 11.4 The Complete System
      5. 11.5 Conclusions and Outlook
      6. Acknowledgements
      7. Author Contributions Statement
      8. Additional Information
      9. References
  10. Part V: IoT Use Cases and Implementations
    1. 12 IoT Use Cases and Implementations: Healthcare
      1. 12.1 Introduction
      2. 12.2 Remote Patient Monitoring Architecture
      3. 12.3 Security Related to eHealth
      4. 12.4 Remote Patient Monitoring Security
      5. 12.5 Conclusion
      6. References
    2. 13 Secure and Efficient Privacy‐preserving Scheme in Connected Smart Grid Networks
      1. 13.1 Introduction
      2. 13.2 Preliminaries
      3. 13.3 Proposed Scheme
      4. 13.4 Security Analysis
      5. 13.5 Performance Analysis
      6. 13.6 Conclusions
      7. References
    3. 14 Blockchain‐Based Cyber Physical Trust Systems
      1. 14.1 Introduction
      2. 14.2 Related Work
      3. 14.3 Overview of Use‐Cases and Security Goals
      4. 14.4 Proposed Approach
      5. 14.5 Evaluation Results
      6. 14.6 Conclusion
      7. References
      8. Notes
  11. Index
  12. End User License Agreement
44.202.128.177