Atnaujinkite slapukų nuostatas

El. knyga: Security and Privacy Issues in IoT Devices and Sensor Networks

Edited by , Edited by (Research Scholar, Department of Computer Science and Engineering (CSE), Birla Institute of Technology, Mesra, Ranc), Edited by (Professor, Department of Computer Science, Institute of Information Technology & Management, GGSIPU, New Delhi, India)
Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Security and Privacy Issues in IoT Devices and Sensor Networks investigates security breach issues in IoT and sensor networks, exploring various solutions. The book follows a two-fold approach, first focusing on the fundamentals and theory surrounding sensor networks and IoT security. It then explores practical solutions that can be implemented to develop security for these elements, providing case studies to enhance understanding. Machine learning techniques are covered, as well as other security paradigms, such as cloud security and cryptocurrency technologies. The book highlights how these techniques can be applied to identify attacks and vulnerabilities, preserve privacy, and enhance data security.

This in-depth reference is ideal for industry professionals dealing with WSN and IoT systems who want to enhance the security of these systems. Additionally, researchers, material developers and technology specialists dealing with the multifarious aspects of data privacy and security enhancement will benefit from the book's comprehensive information.

  • Provides insights into the latest research trends and theory in the field of sensor networks and IoT security
  • Presents machine learning-based solutions for data security enhancement
  • Discusses the challenges to implement various security techniques
  • Informs on how analytics can be used in security and privacy
Contributors xiii
Chapter 1 Wireless sensor networks: Concepts, components, and challenges
1(28)
Shweta Sinha
Priyanka Makkar
1 Introduction
1(6)
1.1 Network design objective
3(1)
1.2 Technological background
4(1)
1.3 Network architecture
5(2)
1.4 Classification of WSN
7(1)
2 WSN communication pattern
7(7)
2.1 Protocol stack of WSN
7(3)
2.2 Medium access control at data link layer
10(1)
2.3 Network layer
11(2)
2.4 Transport layer
13(1)
3 WSN design challenges
14(3)
4 Comparative analysis of optimized clustering algorithm
17(2)
4.1 Cluster formation scenario
17(1)
4.2 Optimized clustering strategy
18(1)
5 Evaluation of clustering methods for optimization
19(1)
5.1 Modeling of system
20(1)
6 Result and analysis
20(3)
7 Conclusion and future work
23(6)
References
24(5)
Chapter 2 Secure performance of emerging wireless sensor networks relying nonorthogonal multiple access
29(14)
Dinh-Thuan Do
Anh-Tu Le
Narayan C. Debnath
1 Brief history of IoT communications related to multiple access technique
29(2)
2 Basic fundamentals of NOMA
31(1)
3 NOMA and application in cooperation network
32(1)
4 NOMA and cognitive radio-assisted IoT system
32(3)
4.1 System model of IoT relying NOMA and CR
32(2)
4.2 Outage probability analysis in case of partial relay selection
34(1)
5 Improving security at physical layer
35(3)
6 Validating achievable expressions of outage behavior and secure performance via numerical simulation
38(1)
7 Conclusion
38(5)
References
40(3)
Chapter 3 Security and privacy in wireless body sensor networks using lightweight cryptography scheme
43(18)
A. Sivasangari
A. Ananthi
D. Deepa
G. Rajesh
X. Mercilin Raajini
1 Introduction
43(3)
2 Motivation and objective of research
46(1)
3 Related work
47(2)
4 Proposed work
49(6)
4.1 Sensor communication between the sensor nodes
50(3)
4.2 Encryption and decryption
53(1)
4.3 Secure communication between sensor head to remote server
53(1)
4.4 Secure data access in cloud server
54(1)
5 Performance analysis
55(3)
6 Summary
58(3)
References
58(3)
Chapter 4 Impact of thermal effects on wireless body area networks and routing strategies
61(26)
B. Banuselvasaraswathy
Vimalathithan Rathinasabapathy
1 Introduction
62(1)
2 Thermal-aware routing protocols
63(6)
2.1 Thermal-aware routing algorithm (TARA)
63(1)
2.2 Least temperature rise (LTR)
64(1)
2.3 Least total route temperature (LTRT)
65(1)
2.4 Hotspot preventing routing (HPR)
65(1)
2.5 RAIN
66(1)
2.6 Thermal-aware shortest hop routing protocol (TSHR)
66(1)
2.7 M-ATTEMPT
66(1)
2.8 TMQoS
67(1)
2.9 RE-ATTEMPT
67(1)
2.10 M2E2 multihop routing protocol
67(1)
2.11 Thermal aware-localized QoS routing protocol
68(1)
2.12 Trust and thermal-aware routing protocol
68(1)
2.13 Self-healing thermal-aware RPL routing protocol
68(1)
2.14 Multipath ring routing protocol
68(1)
3 Introduction about the thermal influence on medical WSN
69(6)
3.1 Problems faced by recent scenario
69(3)
3.2 Thermal influence on human tissue
72(1)
3.3 Wireless communication technologies for data transfer in WBAN
73(1)
3.4 Sources of energy consumption
74(1)
3.5 Specific absorption rate (SAR)
74(1)
4 Proposed protocol (OPOTRP)
75(3)
4.1 OPOTRP functional procedure
76(2)
4.2 Optimal temperature selection
78(1)
5 Results and discussion
78(5)
5.1 Simulation parameters
78(1)
5.2 Variation in temperature at different times
78(2)
5.3 Average power consumption
80(1)
5.4 Network lifetime analysis
80(1)
5.5 Different data priority signal
81(1)
5.6 Heating ratio
81(2)
5.7 Data delivery delay
83(1)
6 Conclusion
83(4)
References
84(3)
Chapter 5 Four-way binary tree-based data gathering model for WSN
87(18)
Gaurav Bathla
Rohit Kumar
Rajneesh Randhawa
1 Introduction
87(1)
2 Literature survey
88(2)
3 Network model
90(7)
3.1 Energy dissipation radio model
90(1)
3.2 Network characteristics
91(1)
3.3 Proposed (virtual 4-way full binary tree) structure
91(2)
3.4 Setup of the network
93(1)
3.5 Working of the proposed scheme
93(3)
3.6 Flowcharts
96(1)
4 Result analysis
97(1)
5 Advantages of the proposed scheme
97(4)
6 Conclusion
101(4)
References
101(4)
Chapter 6 Routing protocols: Key security issues and challenges in IoT, ad hoc, and sensor network
105(28)
Chanchal Kumar
Shiv Prakash
1 Introduction
106(1)
2 The security issues, challenges and requirements
107(1)
2.1 Network security and requirements
107(1)
2.2 Security issues and challenges
108(1)
3 Classification of attacks
108(1)
3.1 Based on the attacker's location
109(1)
3.2 Based on tempering with data
109(1)
4 Attacks and countermeasures on different layers
109(3)
4.1 Physical-layer attacks
109(1)
4.2 Data-link layer attacks
110(1)
4.3 Networks layer attacks
110(1)
4.4 Transport layer attacks
111(1)
4.5 Application layer attacks
111(1)
4.6 Multilayer attacks
112(1)
4.7 Denial of service (DoS) attacks
112(1)
5 Survey of security issues, threats and defense mechanisms in IoT
112(5)
5.1 Wormhole attack and it's counter measure
113(1)
5.2 Classification of wormhole attacks
113(1)
5.3 Wormhole detecting and avoiding models
114(3)
6 Proposed solutions and analysis
117(6)
6.1 Transmission time-based wormhole detection
117(3)
6.2 TTWD model
120(3)
7 Computation of RTT in TTWD
123(1)
8 Simulation and experimental evaluation
124(5)
8.1 Simulation environment
124(1)
8.2 Network simulator parameters
124(1)
8.3 Simulation results
125(4)
9 Conclusion and future directions
129(4)
References
130(3)
Chapter 7 Fault tolerance of cluster-based nodes in IoT sensor networks with periodic mode of operation
133(20)
Igor Kabashkin
1 Introduction
133(3)
2 Related works
136(4)
3 Mathematical background and main symbols and definitions
140(1)
4 Models formulation and solution
141(6)
4.1 Model
1. Sensor with diagnostics in active mode
141(1)
4.2 Model
2. Sensor with diagnostics in active mode and periodical diagnostics in the sleep mode
142(3)
4.3 Model
3. Sensors with mix architecture of backup batteries
145(2)
5 Results and discussions
147(2)
6 Conclusions
149(4)
References
150(3)
Chapter 8 Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks
153(34)
Pulkit Singh
Bibhudendra Acharya
Rahul Kumar Chaurasiya
1 Introduction
154(2)
1.1 Methodology
155(1)
1.2
Chapter Organization
156(1)
2 Related work
156(1)
3 Preliminaries
157(5)
3.1 Resource constrained environment-internet of things (IoT)
157(3)
3.2 Implementation of lightweight block ciphers for IoT applications
160(2)
4 Lightweight cryptographic primitives
162(7)
4.1 Lightweight block ciphers
164(1)
4.2 Lightweight stream ciphers
165(2)
4.3 Lightweight hash functions
167(1)
4.4 Lightweight message authentication codes
168(1)
5 Proposed methodology
169(10)
5.1 Hardware analysis metrics
169(2)
5.2 Algorithm of KLEIN lightweight block cipher
171(3)
5.3 Simulation results
174(1)
5.4 Results and discussions
174(5)
6 Performance comparison of conventional and lightweight cryptographic algorithms for IoT
179(1)
7 Conclusion
180(7)
References
180(7)
Chapter 9 EELC: Energy-efficient lightweight cryptography for IoT networks
187(24)
G. Rajesh
X. Mercilin Raajini
K. Martin Sagayam
A. Sivasangari
Lawrence Henesey
1 Introduction---IoTSec
188(3)
1.1 Cyberattacks
188(1)
1.2 Security challenges in IoT
189(2)
2 Literature survey
191(1)
3 Energy-efficient lightweight cryptography (EELC) architecture
192(12)
3.1 Energy efficient subkey generation
193(3)
3.2 LMGF algorithm
196(1)
3.3 Mathematical model for MAC
197(2)
3.4 Flow of OMGF
199(1)
3.5 Hardware requirement
200(1)
3.6 Robustness of OMGF
201(1)
3.7 Energy efficient encryption
202(1)
3.8 Working of EEE
203(1)
3.9 Energy efficient decryption
204(1)
4 Performance evaluation
204(3)
4.1 Time complexity analysis
204(1)
4.2 Analysis based on energy
204(2)
4.3 Security attacks
206(1)
5 Conclusion
207(4)
Further reading
207(4)
Chapter 10 Blockchain as a solution for security attacks in named data networking of things
211(34)
Sukriti Goyal
Nikhil Sharma
Ha Kaushik
Bharat Bhushan
1 Introduction
211(2)
2 Security attacks in NDN of things (NDNoT)
213(3)
2.1 Cache misappropriation
213(1)
2.2 Interest flooding
214(1)
2.3 Selfish irruption
215(1)
2.4 Data phishing
215(1)
2.5 Miscellaneous irruptions
216(1)
3 Blockchain in NDNoT
216(5)
3.1 Blockchain basics
216(1)
3.2 Blockchain architecture
217(3)
3.3 Key features of design of blockchain
220(1)
4 Security investigation of NDN blockchain of things
221(7)
4.1 AES128 algorithm
227(1)
5 Types of blockchain
228(3)
6 The need for using a Blockchain in IoT
231(2)
7 BIoT applications
233(1)
8 Existing issues of applications of blockchain IoT
234(4)
9 Further issues and recommendations of blockchain in IoT
238(1)
10 Conclusion
239(6)
References
239(6)
Chapter 11 A novel privacy-preserving healthcare information sharing platform using blockchain
245(18)
Mohammad Jaber
Amin Fakhereldine
Mahdi Dhaini
Ramzi A. Haraty
1 Introduction
245(2)
2 Literature review
247(1)
3 Overview of blockchain
248(2)
4 System model
250(7)
4.1 Overview
250(2)
4.2 Patient uploading medical data
252(1)
4.3 Provider uploading medical data of his/her patient
253(1)
4.4 Provider sharing medical data with another provider
254(1)
4.5 Provider querying medical data of patient
255(1)
4.6 Patient updating access given to provider
256(1)
5 Analysis
257(1)
6 Conclusion
258(5)
References
259(4)
Chapter 12 Computational intelligent techniques for prediction of environmental attenuation of millimeter waves
263(22)
Hitesh Singh
Vivek Kumar
Kumud Saxena
Boncho Bonev
1 Introduction
264(1)
1.1 Atmosphere
264(1)
1.2 Composition of atmosphere
265(1)
2 Terrestrial and satellite links
265(4)
2.1 Attenuation due to gas
266(1)
2.2 Attenuation caused by snow
267(1)
2.3 Attenuation due to hail
268(1)
2.4 Attenuation due to dust
268(1)
2.5 Attenuation due to scintillation
269(1)
3 Cloud attenuation
269(3)
3.1 Cloud attenuation model
269(2)
3.2 Work done by other researchers
271(1)
4 Rain attenuation
272(4)
4.1 ITU-R model
273(1)
4.2 Simple attenuation model
274(1)
4.3 Garcia-Lopez method
274(1)
4.4 Model proposed by Brazil
275(1)
4.5 RAL model
275(1)
5 Rain attenuation in terrestrial links
276(3)
6 Implementation results of rain model
279(1)
7 Issues related to machine learning
280(1)
8 Conclusion
281(4)
References
281(4)
Chapter 13 The role of IoT in smart cities: Challenges of air quality mass sensor technology for sustainable solutions
285(24)
Wok Pradhan
Bhuvan Unhelkar
1 Introduction
285(2)
2 Background of air quality monitoring sensors in urban environments
287(7)
2.1 Regulation-based air quality monitoring
288(2)
2.2 IoT-based air quality monitoring
290(2)
2.3 Evaluation of regulation- and IoT-based air quality sensor technology
292(1)
2.4 Applications of urban air quality data
293(1)
3 Challenges of air quality monitoring and management in urban environments
294(4)
3.1 Lack of spatial variability
295(1)
3.2 Environmental challenges
295(1)
3.3 Crowdsourcing and citizen science challenges
296(1)
3.4 Lack of transparency
297(1)
4 Applications, initiatives, and future direction
298(6)
4.1 Integration of sensor data and passive crowdsourced data
298(2)
4.2 Air quality data application framework
300(3)
4.3 Smart city digital twinning
303(1)
5 Discussion and findings
304(1)
6 Conclusion
304(5)
References
305(4)
Subject Index 309
Dr. Sudhir Kumar Sharma is a Professor in the Department of Computer Science, Institute of Information Technology & Management affiliated to GGSIPU, New Delhi, India. He has extensive experience with over 19 years in the field of Computer Science and Engineering. He obtained his Ph.D. degree in Information Technology from USICT, GGSIPU, New Delhi, India. Dr. Sharma obtained his M. Tech degree in Computer Science & Engineering in 1999 from the Guru Jambheshwar University, Hisar, India and M.Sc. degree in Physics from the University of Roorkee (now IIT Roorkee), Roorkee, in 1997. His research interests include Machine Learning, Data Mining, and Security. He has published a number of research papers in various prestigious International Journals and International Conferences. He is a life member of CSI and IETE. Dr. Sharma is an Associate Editor of the International Journal of End-User Computing and Development (IJEUCD), IGI Global, USA. He is a convener of ICETIT-2019. Dr. Bharat Bhushan is an Assistant Professor of the Department of Computer Science and Engineering (CSE) at the School of Engineering and Technology, Sharda University, Greater Noida, in India. He is an alumnus of Birla Institute of Technology, Mesra, Ranchi, India. He received his Undergraduate Degree (B-Tech in Computer Science and Engineering) with Distinction in 2012, received his Postgraduate Degree (M-Tech in Information Security) with Distinction in 2015 and Doctorate Degree (Ph.D. Computer Science and Engineering) in 2021 from Birla Institute of Technology, Mesra, India. He earned numerous international certifications such as CCNA, MCTS, MCITP, RHCE and CCNP. In the last three years, he has published more than 80 research papers in various renowned International conferences and SCI indexed journals including Wireless Networks (Springer), Wireless Personal Communications (Springer), Sustainable Cities and Society (Elsevier) and Emerging Transactions on Telecommunications (Wiley). He has contributed more than 25 book chapters in various books and has edited 11 books from the most famed publishers like Elsevier, IGI Global, and CRC Press. He has served as a Reviewer/Editorial Board Member for several reputed international journals. In the past, he worked as an assistant professor at the HMR Institute of Technology and Management, New Delhi and Network Engineer in HCL Infosystems Ltd., Noida. He has qualified GATE exams for successive years and gained the highest percentile of 98.48 in GATE 2013. He is also a member of numerous renowned bodies including IEEE, IAENG, CSTA, SCIEI, IAE and UACEE. Professor Dr. Narayan C. Debnath is currently the Founding Dean of the School of Computing and Information Technology and Head of the Department of Software Engineering at Eastern International University, Vietnam. Dr. Debnath has been the Director of the International Society for Computers and their Applications (ISCA) since 2014, and a member of the ISCA Board of Directors since 2001. Formerly, Dr. Debnath served as a Full Professor of Computer Science at Winona State University, Minnesota, USA for 28 years (1989-2017). He was elected as the Chairperson of the Computer Science Department at Winona State University for 3 consecutive terms and assumed the role of the Chairperson of the Computer Science Department at Winona State University for 7 years (2010-2017). Dr. Debnath earned a Doctor of Science (D.Sc.) degree in Computer Science and also a Doctor of Philosophy (Ph.D.) degree in Physics. In the past, he served as the elected President for 2 separate terms, Vice President, and Conference Coordinator of the International Society for Computers and their Applications. Dr. Debnath received numerous honors and awards while serving as a Professor of Computer Science, including the Best Paper Award in the field of Networking at the 2008 IEEE International Symposium on Computers and Communications. Professor Debnath has made significant contributions in teaching, research, and services across the academic and professional communities. He has made original research contributions in Software Engineering Models, Metrics and Tools, Software Testing, Software Management, and Information Science, Technology and Engineering. Dr. Debnath is an author or co-author of over 425 publications in numerous refereed journals and conference proceedings in Computer Science, Information Science, Information Technology, System Sciences, Mathematics, and Electrical Engineering. Professor Debnath has made numerous teaching and research presentations at various national and international conferences, industries, and institutions in Africa, Asia, Australia, Europe, North America, and South America. He has offered courses and workshops on Software Engineering and Software Testing at universities in Asia, Africa, Middle East, and South America. Dr. Debnath has been a visiting professor at universities in Argentina, China, India, Sudan, and Taiwan and has maintained an active research and professional collaboration with many universities, scholars and practitioners across the globe. Dr. Debnath has been an active member of the ACM, IEEE Computer Society, Arab Computer Society, and a senior member of the ISCA.