Normal view MARC view ISBD view

IoT security : advances in authentication / edited by Madhusanka Liyanage, School of Computer Science, University College, Ireland, Centre for Wireless Communication, University of Oulu, Finland, An Braeken, Industrial Engineering, Vrije Universiteit Brussel, Belgium, Pardeep Kumar, Department of Computer Science, Swansea University, UK, Mika Yliantilla, Centre for Wireless Communication, University of Oulu, Finland.

Contributor(s): Liyanage, Madhusanka [editor.] | Braeken, An, 1970- [editor.] | Kumar, Pardeep, 1976- [editor.] | Ylianttila, Mika [editor.].
Material type: materialTypeLabelBookPublisher: Hoboken : Wiley, 2019Edition: First edition.Description: 1 online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781119527947; 1119527945; 9781119527961; 1119527961; 9781119527978; 111952797X.Subject(s): Internet of things -- Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: IoT securityDDC classification: 005.8/3 Online resources: Wiley Online Library
Contents:
<P>About the Editors xiii</p> <p>List of Contributors xvii</p> <p>Preface xxiii</p> <p>Acknowledgments xxix</p> <p><b>Part I IoT Overview </b><b>1</b></p> <p><b>1 Introduction to IoT </b><b>3<br /></b><i>Anshuman Kalla, Pawani Prombage, and Madhusanka Liyanage</i></p> <p>1.1 Introduction 4</p> <p>1.1.1 Evolution of IoT 4</p> <p>1.2 IoT Architecture and Taxonomy 5</p> <p>1.3 Standardization Efforts 7</p> <p>1.4 IoT Applications 10</p> <p>1.4.1 Smart Home 11</p> <p>1.4.2 Smart City 13</p> <p>1.4.3 Smart Energy 14</p> <p>1.4.4 Healthcare 15</p> <p>1.4.5 IoT Automotive 16</p> <p>1.4.6 Gaming, AR and VR 16</p> <p>1.4.7 Retail 17</p> <p>1.4.8 Wearable 18</p> <p>1.4.9 Smart Agriculture 18</p> <p>1.4.10 Industrial Internet 19</p> <p>1.4.11 Tactile Internet 19</p> <p>1.4.12 Conclusion 20</p> <p>Acknowledgement 20</p> <p>References 20</p> <p><b>2 Introduction to IoT Security </b><b>27<br /></b><i>Anca D. Jurcut, Pasika Ranaweera, and Lina Xu</i></p> <p>2.1 Introduction 27</p> <p>2.2 Attacks and Countermeasures 29</p> <p>2.2.1 Perception Layer 30</p> <p>2.2.2 Network Layer 33</p> <p>2.2.3 Application Layer 34</p> <p>2.3 Authentication and Authorization 41</p> <p>2.3.1 Authentication 42</p> <p>2.3.2 Authorization 42</p> <p>2.3.3 Authentication at IoT Layers 43</p> <p>2.4 Other Security Features and Related Issues 48</p> <p>2.4.1 The Simplified Layer Structure 48</p> <p>2.4.2 The Idea of Middleware 49</p> <p>2.4.3 Cross-Layer Security Problem 50</p> <p>2.4.4 Privacy 50</p> <p>2.4.5 Risk Mitigation 51</p> <p>2.5 Discussion 52</p> <p>2.6 Future Research Directions 54</p> <p>2.6.1 Blockchain 54</p> <p>2.6.2 5G 55</p> <p>2.6.3 Fog and Edge Computing 56</p> <p>2.6.4 Quantum Security, AI, and Predictive Data Analytics 57</p> <p>2.6.5 Network Slicing 57</p> <p>2.7 Conclusions 58</p> <p>References 59</p> <p><b>Part II IoT Network and Communication Authentication </b><b>65</b></p> <p><b>3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks </b><b>67<br /></b><i>An Braeken</i></p> <p>3.1 Introduction 67</p> <p>3.2 Related Work 69</p> <p>3.3 System Model and Assumptions 70</p> <p>3.3.1 Design Goals 70</p> <p>3.3.2 Setting 70</p> <p>3.3.3 Notations 71</p> <p>3.3.4 Attack Model 71</p> <p>3.4 Scheme in Normal Mode 72</p> <p>3.4.1 Installation Phase 72</p> <p>3.4.2 Group Node Key 73</p> <p>3.4.3 Individual Cluster Key 73</p> <p>3.4.4 Pairwise Key Derivation 74</p> <p>3.4.5 Multicast Key 76</p> <p>3.4.6 Group Cluster Key 76</p> <p>3.5 Authentication 77</p> <p>3.5.1 Authentication by CN 77</p> <p>3.5.2 Authenticated Broadcast by the CH 77</p> <p>3.5.3 Authenticated Broadcast by the BS 78</p> <p>3.6 Scheme in Change Mode 78</p> <p>3.6.1 Capture of CN 78</p> <p>3.6.2 Capture of CH 79</p> <p>3.6.3 Changes for Honest Nodes 79</p> <p>3.7 Security Analysis 80</p> <p>3.7.1 Resistance Against Impersonation Attack 80</p> <p>3.7.2 Resistance Against Node Capture 81</p> <p>3.7.3 Resistance Against Replay Attacks 81</p> <p>3.8 Efficiency 81</p> <p>3.8.1 Number of Communication Phases 81</p> <p>3.8.2 Storage Requirements 82</p> <p>3.8.3 Packet Fragmentation 82</p> <p>3.9 Conclusions 83</p> <p>Acknowledgement 83</p> <p>References 83</p> <p><b>4 Public Key Based Protocols -- EC Crypto </b><b>85<br /></b><i>Pawani Porambage, An Braeken, and Corinna Schmitt</i></p> <p>4.1 Introduction to ECC 85</p> <p>4.1.1 Notations 86</p> <p>4.1.2 ECC for Authentication and Key Management 87</p> <p>4.2 ECC Based Implicit Certificates 88</p> <p>4.2.1 Authentication and Key Management Using ECC Implicit Certificates 88</p> <p>4.3 ECC-Based Signcryption 91</p> <p>4.3.1 Security Features 93</p> <p>4.3.2 Scheme 93</p> <p>4.4 ECC-Based Group Communication 95</p> <p>4.4.1 Background and Assumptions 95</p> <p>4.4.2 Scheme 96</p> <p>4.5 Implementation Aspects 97</p> <p>4.6 Discussion 98</p> <p>References 98</p> <p><b>5 Lattice-Based Cryptography and Internet of Things </b><b>101<br /></b><i>Veronika Kuchta and Gaurav Sharma</i></p> <p>5.1 Introduction 101</p> <p>5.1.1 Organization 102</p> <p>5.2 Lattice-Based Cryptography 102</p> <p>5.2.1 Notations 102</p> <p>5.2.2 Preliminaries 103</p> <p>5.2.3 Computational Problems 104</p> <p>5.2.4 State-of-the-Art 105</p> <p>5.3 Lattice-Based Primitives 106</p> <p>5.3.1 One-Way and Collision-Resistant Hash Functions 106</p> <p>5.3.2 Passively Secure Encryption 106</p> <p>5.3.3 Actively Secure Encryption 107</p> <p>5.3.4 Trapdoor Functions 107</p> <p>5.3.5 Gadget Trapdoor 108</p> <p>5.3.6 Digital Signatures without Trapdoors 108</p> <p>5.3.7 Pseudorandom Functions (PRF) 109</p> <p>5.3.8 Homomorphic Encryption 110</p> <p>5.3.9 Identity-Based Encryption (IBE) 111</p> <p>5.3.10 Attribute-Based Encryption 112</p> <p>5.4 Lattice-Based Cryptography for IoT 113</p> <p>5.5 Conclusion 115</p> <p>References 115</p> <p><b>Part III IoT User Level Authentication </b><b>119</b></p> <p><b>6 Efficient and Anonymous Mutual Authentication Protocol in Multi-Access Edge Computing (MEC) Environments </b><b>121<br /></b><i>Pardeep Kumar and Madhusanka Liyanage</i></p> <p>6.1 Introduction 121</p> <p>6.2 Related Work 123</p> <p>6.3 Network Model and Adversary Model 124</p> <p>6.3.1 Network Model 124</p> <p>6.3.2 Adversary Model 125</p> <p>6.4 Proposed Scheme 125</p> <p>6.4.1 System Setup for the Edge Nodes Registration at the Registration Center 125</p> <p>6.4.2 User Registration Phase 126</p> <p>6.4.3 Login and User Authentication Phase 126</p> <p>6.4.4 Password Update Phase 127</p> <p>6.5 Security and Performance Evaluation 127</p> <p>6.5.1 Informal Security Analysis 127</p> <p>6.5.2 Performance Analysis 129</p> <p>6.6 Conclusion 130</p> <p>References 130</p> <p><b>7 Biometric-Based Robust Access Control Model for Industrial Internet of Things Applications </b><b>133<br /></b><i>Pardeep Kumar and Gurjot Singh Gaba</i></p> <p>7.1 Introduction 133</p> <p>7.2 Related Work 134</p> <p>7.3 Network Model, Threat Model and Security Requirements 136</p> <p>7.3.1 Network Model 136</p> <p>7.3.2 Threat Model 136</p> <p>7.3.3 Security Goals 136</p> <p>7.4 Proposed Access Control Model in IIoT 136</p> <p>7.4.1 System Setup 137</p> <p>7.4.2 Authentication and Key Establishment 138</p> <p>7.5 Security and Performance Evaluations 139</p> <p>7.5.1 Informal Security Analysis 139</p> <p>7.5.2 Performance Analysis 140</p> <p>7.6 Conclusions 141</p> <p>References 142</p> <p><b>8 Gadget Free Authentication </b><b>143<br /></b><i>Madhusanka Liyanage, An Braeken, and Mika Ylianttila</i></p> <p>8.1 Introduction to Gadget-Free World 143</p> <p>8.2 Introduction to Biometrics 146</p> <p>8.3 Gadget-Free Authentication 148</p> <p>8.4 Preliminary Aspects 149</p> <p>8.4.1 Security Requirements 149</p> <p>8.4.2 Setting 149</p> <p>8.4.3 Notations 150</p> <p>8.5 The System 150</p> <p>8.5.1 Registration Phase 151</p> <p>8.5.2 Installation Phase 151</p> <p>8.5.3 Request Phase 151</p> <p>8.5.4 Answer Phase 152</p> <p>8.5.5 Update Phase 153</p> <p>8.6 Security Analysis 153</p> <p>8.6.1 Accountability 153</p> <p>8.6.2 Replay Attacks 153</p> <p>8.6.3 Insider Attacks 153</p> <p>8.6.4 HW/SW Attacks 154</p> <p>8.6.5 Identity Privacy 154</p> <p>8.7 Performance Analysis 154</p> <p>8.7.1 Timing for Cryptographic/Computational Operation 155</p> <p>8.7.2 Communication Cost 155</p> <p>8.8 Conclusions 156</p> <p>Acknowledgement 156</p> <p>References 156</p> <p><b>9 WebMaDa 2.1 -- A Web-Based Framework for Handling User Requests Automatically and Address
Summary: "The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- Provided by publisher.
    average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- Provided by publisher.

Description based upon online resource; title from PDF title page (viewed March 2, 2020).

<P>About the Editors xiii</p> <p>List of Contributors xvii</p> <p>Preface xxiii</p> <p>Acknowledgments xxix</p> <p><b>Part I IoT Overview </b><b>1</b></p> <p><b>1 Introduction to IoT </b><b>3<br /></b><i>Anshuman Kalla, Pawani Prombage, and Madhusanka Liyanage</i></p> <p>1.1 Introduction 4</p> <p>1.1.1 Evolution of IoT 4</p> <p>1.2 IoT Architecture and Taxonomy 5</p> <p>1.3 Standardization Efforts 7</p> <p>1.4 IoT Applications 10</p> <p>1.4.1 Smart Home 11</p> <p>1.4.2 Smart City 13</p> <p>1.4.3 Smart Energy 14</p> <p>1.4.4 Healthcare 15</p> <p>1.4.5 IoT Automotive 16</p> <p>1.4.6 Gaming, AR and VR 16</p> <p>1.4.7 Retail 17</p> <p>1.4.8 Wearable 18</p> <p>1.4.9 Smart Agriculture 18</p> <p>1.4.10 Industrial Internet 19</p> <p>1.4.11 Tactile Internet 19</p> <p>1.4.12 Conclusion 20</p> <p>Acknowledgement 20</p> <p>References 20</p> <p><b>2 Introduction to IoT Security </b><b>27<br /></b><i>Anca D. Jurcut, Pasika Ranaweera, and Lina Xu</i></p> <p>2.1 Introduction 27</p> <p>2.2 Attacks and Countermeasures 29</p> <p>2.2.1 Perception Layer 30</p> <p>2.2.2 Network Layer 33</p> <p>2.2.3 Application Layer 34</p> <p>2.3 Authentication and Authorization 41</p> <p>2.3.1 Authentication 42</p> <p>2.3.2 Authorization 42</p> <p>2.3.3 Authentication at IoT Layers 43</p> <p>2.4 Other Security Features and Related Issues 48</p> <p>2.4.1 The Simplified Layer Structure 48</p> <p>2.4.2 The Idea of Middleware 49</p> <p>2.4.3 Cross-Layer Security Problem 50</p> <p>2.4.4 Privacy 50</p> <p>2.4.5 Risk Mitigation 51</p> <p>2.5 Discussion 52</p> <p>2.6 Future Research Directions 54</p> <p>2.6.1 Blockchain 54</p> <p>2.6.2 5G 55</p> <p>2.6.3 Fog and Edge Computing 56</p> <p>2.6.4 Quantum Security, AI, and Predictive Data Analytics 57</p> <p>2.6.5 Network Slicing 57</p> <p>2.7 Conclusions 58</p> <p>References 59</p> <p><b>Part II IoT Network and Communication Authentication </b><b>65</b></p> <p><b>3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks </b><b>67<br /></b><i>An Braeken</i></p> <p>3.1 Introduction 67</p> <p>3.2 Related Work 69</p> <p>3.3 System Model and Assumptions 70</p> <p>3.3.1 Design Goals 70</p> <p>3.3.2 Setting 70</p> <p>3.3.3 Notations 71</p> <p>3.3.4 Attack Model 71</p> <p>3.4 Scheme in Normal Mode 72</p> <p>3.4.1 Installation Phase 72</p> <p>3.4.2 Group Node Key 73</p> <p>3.4.3 Individual Cluster Key 73</p> <p>3.4.4 Pairwise Key Derivation 74</p> <p>3.4.5 Multicast Key 76</p> <p>3.4.6 Group Cluster Key 76</p> <p>3.5 Authentication 77</p> <p>3.5.1 Authentication by CN 77</p> <p>3.5.2 Authenticated Broadcast by the CH 77</p> <p>3.5.3 Authenticated Broadcast by the BS 78</p> <p>3.6 Scheme in Change Mode 78</p> <p>3.6.1 Capture of CN 78</p> <p>3.6.2 Capture of CH 79</p> <p>3.6.3 Changes for Honest Nodes 79</p> <p>3.7 Security Analysis 80</p> <p>3.7.1 Resistance Against Impersonation Attack 80</p> <p>3.7.2 Resistance Against Node Capture 81</p> <p>3.7.3 Resistance Against Replay Attacks 81</p> <p>3.8 Efficiency 81</p> <p>3.8.1 Number of Communication Phases 81</p> <p>3.8.2 Storage Requirements 82</p> <p>3.8.3 Packet Fragmentation 82</p> <p>3.9 Conclusions 83</p> <p>Acknowledgement 83</p> <p>References 83</p> <p><b>4 Public Key Based Protocols -- EC Crypto </b><b>85<br /></b><i>Pawani Porambage, An Braeken, and Corinna Schmitt</i></p> <p>4.1 Introduction to ECC 85</p> <p>4.1.1 Notations 86</p> <p>4.1.2 ECC for Authentication and Key Management 87</p> <p>4.2 ECC Based Implicit Certificates 88</p> <p>4.2.1 Authentication and Key Management Using ECC Implicit Certificates 88</p> <p>4.3 ECC-Based Signcryption 91</p> <p>4.3.1 Security Features 93</p> <p>4.3.2 Scheme 93</p> <p>4.4 ECC-Based Group Communication 95</p> <p>4.4.1 Background and Assumptions 95</p> <p>4.4.2 Scheme 96</p> <p>4.5 Implementation Aspects 97</p> <p>4.6 Discussion 98</p> <p>References 98</p> <p><b>5 Lattice-Based Cryptography and Internet of Things </b><b>101<br /></b><i>Veronika Kuchta and Gaurav Sharma</i></p> <p>5.1 Introduction 101</p> <p>5.1.1 Organization 102</p> <p>5.2 Lattice-Based Cryptography 102</p> <p>5.2.1 Notations 102</p> <p>5.2.2 Preliminaries 103</p> <p>5.2.3 Computational Problems 104</p> <p>5.2.4 State-of-the-Art 105</p> <p>5.3 Lattice-Based Primitives 106</p> <p>5.3.1 One-Way and Collision-Resistant Hash Functions 106</p> <p>5.3.2 Passively Secure Encryption 106</p> <p>5.3.3 Actively Secure Encryption 107</p> <p>5.3.4 Trapdoor Functions 107</p> <p>5.3.5 Gadget Trapdoor 108</p> <p>5.3.6 Digital Signatures without Trapdoors 108</p> <p>5.3.7 Pseudorandom Functions (PRF) 109</p> <p>5.3.8 Homomorphic Encryption 110</p> <p>5.3.9 Identity-Based Encryption (IBE) 111</p> <p>5.3.10 Attribute-Based Encryption 112</p> <p>5.4 Lattice-Based Cryptography for IoT 113</p> <p>5.5 Conclusion 115</p> <p>References 115</p> <p><b>Part III IoT User Level Authentication </b><b>119</b></p> <p><b>6 Efficient and Anonymous Mutual Authentication Protocol in Multi-Access Edge Computing (MEC) Environments </b><b>121<br /></b><i>Pardeep Kumar and Madhusanka Liyanage</i></p> <p>6.1 Introduction 121</p> <p>6.2 Related Work 123</p> <p>6.3 Network Model and Adversary Model 124</p> <p>6.3.1 Network Model 124</p> <p>6.3.2 Adversary Model 125</p> <p>6.4 Proposed Scheme 125</p> <p>6.4.1 System Setup for the Edge Nodes Registration at the Registration Center 125</p> <p>6.4.2 User Registration Phase 126</p> <p>6.4.3 Login and User Authentication Phase 126</p> <p>6.4.4 Password Update Phase 127</p> <p>6.5 Security and Performance Evaluation 127</p> <p>6.5.1 Informal Security Analysis 127</p> <p>6.5.2 Performance Analysis 129</p> <p>6.6 Conclusion 130</p> <p>References 130</p> <p><b>7 Biometric-Based Robust Access Control Model for Industrial Internet of Things Applications </b><b>133<br /></b><i>Pardeep Kumar and Gurjot Singh Gaba</i></p> <p>7.1 Introduction 133</p> <p>7.2 Related Work 134</p> <p>7.3 Network Model, Threat Model and Security Requirements 136</p> <p>7.3.1 Network Model 136</p> <p>7.3.2 Threat Model 136</p> <p>7.3.3 Security Goals 136</p> <p>7.4 Proposed Access Control Model in IIoT 136</p> <p>7.4.1 System Setup 137</p> <p>7.4.2 Authentication and Key Establishment 138</p> <p>7.5 Security and Performance Evaluations 139</p> <p>7.5.1 Informal Security Analysis 139</p> <p>7.5.2 Performance Analysis 140</p> <p>7.6 Conclusions 141</p> <p>References 142</p> <p><b>8 Gadget Free Authentication </b><b>143<br /></b><i>Madhusanka Liyanage, An Braeken, and Mika Ylianttila</i></p> <p>8.1 Introduction to Gadget-Free World 143</p> <p>8.2 Introduction to Biometrics 146</p> <p>8.3 Gadget-Free Authentication 148</p> <p>8.4 Preliminary Aspects 149</p> <p>8.4.1 Security Requirements 149</p> <p>8.4.2 Setting 149</p> <p>8.4.3 Notations 150</p> <p>8.5 The System 150</p> <p>8.5.1 Registration Phase 151</p> <p>8.5.2 Installation Phase 151</p> <p>8.5.3 Request Phase 151</p> <p>8.5.4 Answer Phase 152</p> <p>8.5.5 Update Phase 153</p> <p>8.6 Security Analysis 153</p> <p>8.6.1 Accountability 153</p> <p>8.6.2 Replay Attacks 153</p> <p>8.6.3 Insider Attacks 153</p> <p>8.6.4 HW/SW Attacks 154</p> <p>8.6.5 Identity Privacy 154</p> <p>8.7 Performance Analysis 154</p> <p>8.7.1 Timing for Cryptographic/Computational Operation 155</p> <p>8.7.2 Communication Cost 155</p> <p>8.8 Conclusions 156</p> <p>Acknowledgement 156</p> <p>References 156</p> <p><b>9 WebMaDa 2.1 -- A Web-Based Framework for Handling User Requests Automatically and Address

There are no comments for this item.

Log in to your account to post a comment.