Security and Privacy in the Internet of Things
eBook - ePub

Security and Privacy in the Internet of Things

  1. 200 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

About this book

This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy.

• Covers all aspects of security

• Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions

• Discusses ways for achieving better access control and trust in the IoT ecosystem

• Contributes exhaustive strategic plans to deal with security issues of IoT

• Gathers contributions from leading-edge researchers from academia and industry

Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.

Trusted by 375,005 students

Access to over 1.5 million titles for a fair monthly price.

Study more efficiently using our study tools.

Information

Year
2020
eBook ISBN
9781000286328

1

Intrinsic Security and Privacy Vulnerabilities in the Internet of Things

Syed Rameem Zahra

Contents

1.1 Introduction
1.2 Security Issues Arising from Inherent IoT Features
1.3 Enabling Technologies of IoT and Their S&P Issues
1.3.1 Radio Frequency Identification (RFID)
1.3.2 Near Field Communication (NFC)
1.3.2.1 Wireless Sensor Networks (WSN)
1.3.3 Machine to Machine Communication (M2M)
1.3.4 Vehicle to Vehicle Communication (V2V)
1.3.5 Low Rate Wireless Personal Area Network
1.4 Infrastructure Protocols of IoT and Their S&P Issues
1.4.1 Routing Protocol for Low-power and Lossy Networks (RPL)
1.4.2 6LoWPAN
1.4.3 IEEE 802.15.4
1.5 Conclusion
Notes
References

1.1Introduction

The Internet of Things (IoT) has, over the last few years, significantly revolutionized many different facets of life.
IoT depends on combinations of different procedures; for example, identification, detection, networking, and calculation. It empowers large-scale developments in technology, and value-added services which customize clients' communication with different “things”. Its spectrum of application spans from monitoring the dampness in crops to monitoring the movement of enemies in war zones. However, regardless of such colossal achievements, the near future does not guarantee an ideal abode for IoT (Zahra, S and Chishti, M, 2019a). This statement is based on the grounds that enough attention is not given to the security of IoT. Recent attacks are transforming the way companies view the S&P of IoT as even a tiny IoT device that has minimal capabilities presents significant hazards to the network's entire security infrastructure when its protection is violated. That is because by linking anything to the Internet, IoT provides a large attack surface for rogue players. They can easily exploit the weak points and confidential data. It is therefore imperative that our outlook toward S&P of IoT changes to make it a necessity of the design process.
IoT depends on coordination of different protocols and enabling technologies. However, the differences between benchmarks, the fragmentation of standards, and the range of enabling technologies used, produce huge difficulties in giving full availability of everything. Security issues among the enabling technologies further complicate matters.
This chapter is structured as follows: Section 1.2 identifies the inherent features of IoT that mark its uniqueness, and differentiate it from other paradigms. It also explains how the features which bring about the success of IoT become a threat to its S&P. Section 1.3 describes major enabling technologies of IoT, and visualizes them from various security aspects like authorization, access control, trust, etc. Section 1.4 describes the protocols used to cater to the unique characteristics of IoT, and their S&P issues. Section 1.5 concludes the chapter.

1.2Security Issues Arising from Inherent IoT Features

Features like low battery backup, constrained storage capacity, and minimal processing ability, define IoT devices (Zahra, S and Chishti, M, 2019b). As such, “constrained” comes as one of the inherent features of these devices. Apart from being constrained, the versatility of IoT devices comes from features like: interdependence, heterogeneity, plurality, and mobility (Wei Zhou et al., 2019). Table 1.1 describes these intrinsic features along with their security aspects. It also sketches out the research opportunities for researchers.
TABLE 1.1
Inherent Features of IoT and Their Security Aspects
image
image

1.3Enabling Technologies of IoT and Their S&P Issues

With the advent of IoT, sensors started to communicate over the Internet. To slash the cabling costs required for interconnecting billions of IoT devices, wireless communication must be preferred in sensors. Also, low power communication standards, emerging technologies, as well as service applications, need to develop harmoniously to match market demands to client needs. This section elaborates various enabling technologies that are of paramount importance to IoT, with special mention to their secur...

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Table of Contents
  6. Abbreviations
  7. Preface
  8. Editors
  9. Contributors
  10. Chapter 1: Intrinsic Security and Privacy Vulnerabilities in the Internet of Things
  11. Chapter 2: Loopholes in IoT Security Services
  12. Chapter 3: Physical Layer Security for Energy-Efficient IoT with Information and Power Transfer
  13. Chapter 4: Blockchain Architecture for Securing the IoT
  14. Chapter 5: Reliable Data Transmission Using Biometric Authentication Methodology in IoT
  15. Chapter 6: Novel Method for Detecting DDoS Attacks to Make Robust IoT Systems
  16. Chapter 7: Machine Learning for Enhancement of Security in Internet of Things Based Applications
  17. Chapter 8: Open-Source Tools for IoT Security
  18. Chapter 9: A Boolean Approach for Computational Design of Ethics
  19. Chapter 10: Security Solutions for Threats in IoT-Based Smart Vehicles
  20. Chapter 11: “Alexa, What about LGPD?”: The Brazilian Data Protection Regulation in the Context of the Mediatization of Virtual Assistants
  21. Chapter 12: Improving the Security of Data in the Internet of Things by Performing Data Aggregation Using Neural Network-Based Autoencoders
  22. Appendices
  23. Index

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.5M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1.5 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access Security and Privacy in the Internet of Things by Syed Rameem Zahra, Mohammad Ahsan Chishti, Syed Rameem Zahra,Mohammad Ahsan Chishti in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Engineering. We have over 1.5 million books available in our catalogue for you to explore.