000 06894nam a2200637 i 4500
001 9116617
003 IEEE
005 20220712211833.0
006 m o d
007 cr |n|||||||||
008 200729s2020 mau ob 001 eng d
010 _z 2019029943 (print)
015 _zGBC038236 (print)
015 _zGBC041813 (print)
016 _z019656282 (print)
019 _a1131862599
020 _a1119527945
020 _a9781119527961
_qadobe electronic book
020 _z9781119527947
_qelectronic publication
020 _a1119527961
020 _z9781119527923
_qhardcover
020 _z9781119527978
_qelectronic book
020 _z111952797X
_qelectronic book
020 _z1119527929
024 7 _a10.1002/9781119527978
_2doi
035 _a(CaBNVSL)mat09116617
035 _a(IDAMS)0b0000648cc0b2ff
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aTK5105.8857
_b.I58 2019eb
082 0 0 _a005.8/3
_223
245 0 0 _aIoT security :
_badvances in authentication /
_cedited by Madhusanka Liyanage, School of Computer Science, University College, Ireland, Centre for Wireless Communication, University of Oulu, Finland, An Braeken, Industrial Engineering, Vrije Universiteit Brussel, Belgium, Pardeep Kumar, Department of Computer Science, Swansea University, UK, Mika Yliantilla, Centre for Wireless Communication, University of Oulu, Finland.
250 _aFirst edition.
264 1 _aHoboken :
_bWiley,
_c2019.
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2019]
300 _a1 PDF.
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aCover; Title Page; Copyright; Contents; About the Editors; List of Contributors; Preface; Acknowledgments; Part I IoT Overview; Chapter 1 Introduction to IoT; 1.1 Introduction; 1.1.1 Evolution of IoT; 1.2 IoT Architecture and Taxonomy; 1.3 Standardization Efforts; 1.4 IoT Applications; 1.4.1 Smart Home; 1.4.2 Smart City; 1.4.3 Smart Energy; 1.4.4 Healthcare; 1.4.5 IoT Automotive; 1.4.6 Gaming, AR and VR; 1.4.7 Retail; 1.4.8 Wearable; 1.4.9 Smart Agriculture; 1.4.10 Industrial Internet; 1.4.11 Tactile Internet; 1.4.12 Conclusion; Acknowledgement; References; Chapter 2 Abstract; 2.1 Introduction2.2 Attacks and Countermeasures; 2.2.1 Perception Layer; 2.2.1.1 Perception Nodes; 2.2.1.2 Sensor Nodes; 2.2.1.3 Gateways; 2.2.2 Network Layer; 2.2.2.1 Mobile Communication; 2.2.2.2 Cloud Computing; 2.2.2.3 Internet; 2.2.3 Application Layer; 2.2.3.1 Smart Utilities -- Smart Grids and Smart Metering; 2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine; 2.2.3.3 Intelligent Transportation; 2.2.3.4 Smart Agriculture; 2.2.3.5 Industrial IoT (IIoT); 2.2.3.6 Smart Buildings, Environments, and Cities; 2.3 Authentication and Authorization; 2.3.1 Authentication; 2.3.2 Authorization2.3.3 Authentication at IoT Layers; 2.3.3.1 Perception Layer; 2.3.3.2 Network Layer; 2.3.3.3 Application Layer; 2.4 Other Security Features and Related Issues; 2.4.1 The Simplified Layer Structure; 2.4.2 The Idea of Middleware; 2.4.3 Cross-Layer Security Problem; 2.4.4 Privacy; 2.4.5 Risk Mitigation; 2.5 Discussion; 2.6 Future Research Directions; 2.6.1 Blockchain; 2.6.2 5G; 2.6.3 Fog and Edge Computing; 2.6.4 Quantum Security, AI, and Predictive Data Analytics; 2.6.5 Network Slicing; 2.7 Conclusions; References; Part II IoT Network and Communication Authentication; Chapter 3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks3.1 Introduction; 3.2 Related Work; 3.3 System Model and Assumptions; 3.3.1 Design Goals; 3.3.2 Setting; 3.3.3 Notations; 3.3.4 Attack Model; 3.4 Scheme in Normal Mode; 3.4.1 Installation Phase; 3.4.1.1 Installation of CH; 3.4.1.2 Installation of CN; 3.4.2 Group Node Key; 3.4.3 Individual Cluster Key; 3.4.3.1 CN to CH; 3.4.3.2 CH to CN; 3.4.4 Pairwise Key Derivation; 3.4.5 Multicast Key; 3.4.5.1 Initiation by CH; 3.4.5.2 Derivation by CNs; 3.4.6 Group Cluster Key; 3.5 Authentication; 3.5.1 Authentication by CN3.5.2 Authenticated Broadcast by the CH; 3.5.3 Authenticated Broadcast by the BS; 3.6 Scheme in Change Mode; 3.6.1 Capture of CN; 3.6.2 Capture of CH; 3.6.3 Changes for Honest Nodes; 3.6.3.1 Key Update for Honest Node Replacement; 3.6.3.2 Node Removal and Addition; 3.7 Security Analysis; 3.7.1 Resistance Against Impersonation Attack; 3.7.2 Resistance Against Node Capture; 3.7.3 Resistance Against Replay Attacks; 3.8 Efficiency; 3.8.1 Number of Communication Phases; 3.8.2 Storage Requirements; 3.8.3 Packet Fragmentation; 3.9 Conclusions; Acknowledgement; References; Chapter 4 Public Key Based Protocols -- EC Crypto
506 _aRestricted to subscribers or individual electronic text purchasers.
520 _a"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"--
_cProvided by publisher.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
650 0 _aInternet of things
_xSecurity measures.
_96353
655 4 _aElectronic books.
_93294
700 1 _aLiyanage, Madhusanka,
_eeditor.
_931468
700 1 _aBraeken, An,
_d1970-
_eeditor.
_931469
700 1 _aKumar, Pardeep,
_d1976-
_eeditor.
_931470
700 1 _aYlianttila, Mika,
_eeditor.
_930745
710 2 _aIEEE Xplore (Online Service),
_edistributor.
_931471
710 2 _aWiley,
_epublisher.
_931472
776 0 8 _iPrint version:
_tIoT security
_bFirst edition.
_dHoboken : Wiley, 2019.
_z9781119527923
_w(DLC) 2019029942
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=9116617
942 _cEBK
999 _c75073
_d75073