Security Challenges and Approaches in Internet of Things (eBook)

eBook Download: PDF
2016 | 1st ed. 2017
VI, 107 Seiten
Springer International Publishing (Verlag)
978-3-319-44230-3 (ISBN)

Lese- und Medienproben

Security Challenges and Approaches in Internet of Things - Sridipta Misra, Muthucumaru Maheswaran, Salman Hashmi
Systemvoraussetzungen
58,84 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT. The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.



Sridipta Misra is a software engineer at Ericsson Canada. Currently working with the Authentication and Digital Identity development unit of Ericsson, he is engaged in research and development of security in cellular mobile computing systems. He completed his Master of Science degree from the School of Computer Science, at McGill University, Canada. As part of his thesis research, he investigated the security and privacy issues in the Internet of Things.

Muthucumaru Maheswaran is an associate professor in the School of Computer Science and the Department of Electrical and Computer Engineering at McGill University. He received a PhD in Electrical and Computer Engineering from Purdue University in 1998. He is carrying out research in the areas of cloud computing, Internet of Things, and social computing. In particular, he is interested in various aspects including security, privacy, and governance of Internet-scale distributed systems. He has published more than 120 papers and supervised the completion of 7 PhD students and more than 35 MSc thesis students in research projects in the above areas.

Salman Hashmi is researcher in the Networks Lab in the School of Computer Science. He received a BSc degree in Electrical Engineering from McGill University. His research interests are in security and privacy of Internet of Things.

Sridipta Misra is a software engineer at Ericsson Canada. Currently working with the Authentication and Digital Identity development unit of Ericsson, he is engaged in research and development of security in cellular mobile computing systems. He completed his Master of Science degree from the School of Computer Science, at McGill University, Canada. As part of his thesis research, he investigated the security and privacy issues in the Internet of Things. Muthucumaru Maheswaran is an associate professor in the School of Computer Science and the Department of Electrical and Computer Engineering at McGill University. He received a PhD in Electrical and Computer Engineering from Purdue University in 1998. He is carrying out research in the areas of cloud computing, Internet of Things, and social computing. In particular, he is interested in various aspects including security, privacy, and governance of Internet-scale distributed systems. He has published more than 120 papers and supervised the completion of 7 PhD students and more than 35 MSc thesis students in research projects in the above areas. Salman Hashmi is researcher in the Networks Lab in the School of Computer Science. He received a BSc degree in Electrical Engineering from McGill University. His research interests are in security and privacy of Internet of Things.

Contents 6
1 Introduction 8
2 System Model for the Internet of Things 11
2.1 The Concept of the ``Internet of Things'' 11
2.2 Evolution of the Networks 12
2.3 Vision of the Internet of Things 15
2.3.1 Large Scale Ubiquitous and Pervasive Connectivity 15
2.3.2 Context-Aware Computing 16
2.3.3 Seamless Connectivity and Interoperability 16
2.3.4 Network Neutrality 17
2.4 Applications of the Internet of Things 17
2.5 Challenges 20
3 Vulnerable Features and Threats 24
3.1 Vulnerable Features of the Internet of Things 24
3.2 Threat Taxonomy 29
3.2.1 Definition of Threat 29
3.2.2 Proposed Taxonomy 30
3.2.3 System Security Threats 30
3.2.4 Privacy Threats 37
3.2.5 Reflective Trust and Reputation Threats 41
4 Securing the Internet of Things 44
4.1 Making the IoT More Secure and Private 44
4.1.1 Protocol and Network Security 45
4.1.2 Data and Privacy 47
4.1.3 Identity Management 49
4.1.4 Trust Management 51
4.1.5 Fault Tolerance 51
4.2 Standardization 52
4.3 Governance 53
4.4 Social Awareness 55
5 Social Governance 57
5.1 Evolution of Network Management and Social Governance 57
5.2 The Framework 58
5.2.1 The Hierarchical Distributed Policy Management System 59
5.2.2 Policy Compliant Smart Devices 61
5.2.3 HDPMS and PCSDs in Action 63
5.2.4 Communications in HDPMS-PCSDs Setup 67
5.2.5 Policy Resolution in the HDPMS 71
5.2.6 Local Consent Polling Mechanism 72
5.2.7 Trusted Computing Base in the IoT 73
5.2.8 Social Governance for Policy Makers 74
5.2.9 Social Governance for Innovators/Manufacturers 76
5.2.10 Social Governance for Users 77
5.3 Example of Utility 78
6 Case Studies of Selected IoT Deployments 80
6.1 Connected Vehicles 80
6.1.1 Significance of Connected Vehicles 81
6.1.2 Background on Vehicular Networks 82
6.1.3 Attacks Classification with Selected Countermeasures 84
6.2 eHealth 86
6.2.1 Security and Privacy Significance 87
6.2.2 Risks, Vulnerabilities, and Threats Classification 89
6.2.3 Security Requirements and Attack Scenarios 91
6.2.4 Selected eHealth Security Models 93
6.3 The Smart Grid 95
6.3.1 Selected Cases of Security Incidents 95
6.3.2 Further Reading 97
7 Conclusions and Future Work 98
7.1 Conclusions 98
7.2 Future Work 99
References 100

Erscheint lt. Verlag 3.9.2016
Reihe/Serie SpringerBriefs in Electrical and Computer Engineering
Zusatzinfo VI, 107 p. 27 illus., 23 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Elektrotechnik / Energietechnik
Schlagworte connected cars • Lightweight Encryption • Smart Buildings • smart cities • Smart Grids • Smart Health • Threat models
ISBN-10 3-319-44230-9 / 3319442309
ISBN-13 978-3-319-44230-3 / 9783319442303
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 3,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90