IoT
eBook - ePub

IoT

Security and Privacy Paradigm

Souvik Pal, Vicente García Díaz, Dac-Nhuong Le, Souvik Pal, Vicente García Díaz, Dac-Nhuong Le

Compartir libro
  1. 381 páginas
  2. English
  3. ePUB (apto para móviles)
  4. Disponible en iOS y Android
eBook - ePub

IoT

Security and Privacy Paradigm

Souvik Pal, Vicente García Díaz, Dac-Nhuong Le, Souvik Pal, Vicente García Díaz, Dac-Nhuong Le

Detalles del libro
Vista previa del libro
Índice
Citas

Información del libro

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues.

This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT.

This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues.

Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics.

Vicente García-Díaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas.

Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.

Preguntas frecuentes

¿Cómo cancelo mi suscripción?
Simplemente, dirígete a la sección ajustes de la cuenta y haz clic en «Cancelar suscripción». Así de sencillo. Después de cancelar tu suscripción, esta permanecerá activa el tiempo restante que hayas pagado. Obtén más información aquí.
¿Cómo descargo los libros?
Por el momento, todos nuestros libros ePub adaptables a dispositivos móviles se pueden descargar a través de la aplicación. La mayor parte de nuestros PDF también se puede descargar y ya estamos trabajando para que el resto también sea descargable. Obtén más información aquí.
¿En qué se diferencian los planes de precios?
Ambos planes te permiten acceder por completo a la biblioteca y a todas las funciones de Perlego. Las únicas diferencias son el precio y el período de suscripción: con el plan anual ahorrarás en torno a un 30 % en comparación con 12 meses de un plan mensual.
¿Qué es Perlego?
Somos un servicio de suscripción de libros de texto en línea que te permite acceder a toda una biblioteca en línea por menos de lo que cuesta un libro al mes. Con más de un millón de libros sobre más de 1000 categorías, ¡tenemos todo lo que necesitas! Obtén más información aquí.
¿Perlego ofrece la función de texto a voz?
Busca el símbolo de lectura en voz alta en tu próximo libro para ver si puedes escucharlo. La herramienta de lectura en voz alta lee el texto en voz alta por ti, resaltando el texto a medida que se lee. Puedes pausarla, acelerarla y ralentizarla. Obtén más información aquí.
¿Es IoT un PDF/ePUB en línea?
Sí, puedes acceder a IoT de Souvik Pal, Vicente García Díaz, Dac-Nhuong Le, Souvik Pal, Vicente García Díaz, Dac-Nhuong Le en formato PDF o ePUB, así como a otros libros populares de Computer Science y Computer Science General. Tenemos más de un millón de libros disponibles en nuestro catálogo para que explores.

Información

Editorial
CRC Press
Año
2020
ISBN
9781000058611
Edición
1

1 Intrusion Detection and Avoidance for Home and Smart City Automation in Internet of Things

M. Gowtham, H. B. Pramod, M. K. Banga, and Mallanagouda Patil
Contents
1.1 Introduction
1.2 Key Modules and Components of an IoT Scenario
1.3 Global Scenario
1.4 Prominent Search Engines for Indexing IoT Devices
1.5 Shodan: An IoT Search Engine
1.5.1 Key Points of Shodan
1.5.2 Data Extraction Using Shodan
1.5.3 Searching Web Cams at Traffic Lights, Airports, Homes, and Offices
1.6 Attacks on IoT Environments
1.6.1 Open Source Frameworks for Monitoring and Programming of IoT Scenarios
1.7 IoT-Integrated Secured Telemedicine Delivery in Smart Cities
1.7.1 Advantages of the Secured Telemedicine Framework
1.8 Blockchain-Based Secured Mechanisms for Security with Home Automations and Smart Cities
1.8.1 Key Aspects of Blockchain
1.8.2 Usage Aspects of Blockchain for Smart Cities and Home Automations
1.8.3 Generation of Hash Values Using Blockchain Implementation
1.8.4 IoT-Enabled Blockchain for Secured Scenarios
1.9 Conclusion
References

1.1 Introduction

With the huge escalation in the deployments and adoption of smart gadgets, devices in the wireless environment are vulnerable to huge security issues and lack mechanisms against hacking (Cui and Moran, 2016; Wortmann and Flüchter, 2015; Islam et al., 2015). Nowadays, almost every person has at least one smart gadget whether it is a smart phone, smart health gadget or any other (Dastjerdi and Buyya, 2016). These devices are quite open to the Internet of Things (IoT) search engines and need to be enforced with a higher degree of security (Al-Fuqaha et al., 2015; Li et al., 2015; Wortmann and Flüchter, 2015).
Figure 1.1 depicts the key perspectives for the deployment of an IoT-based city environment with automation and effectual outcomes for the assorted domains. The following includes the key implementation perspectives:
Images
FIGURE 1.1 Key perspectives for deployment of IoT-based smart city.
  • Smart city
    • Smart roads
    • Smart traffic lights
  • Industrial applications
    • Ozone presence
    • Smart grids
    • Industrial disaster prediction
  • Smart home
    • Wearables
  • Smart water
    • Chemical leakage detection
    • Portable water monitoring
    • Pollution-level analysis
    • River floods
  • Retail
    • Industrial control systems
  • Environment protection with sustainable resources
    • Sea-based disaster prediction
    • Air pollutions
    • Forest fire detection
    • Avalanche and landslide prevention
    • Earthquake detection
    • Snow-level monitoring
  • Digital health and telemedicine
    • Ultraviolet radiation
    • Patient surveillance
  • Smart agriculture
    • Soil quality measurement

1.2 Key Modules and Components of an IoT Scenario

The key components of an IoT scenario includes the following:
  • Cloud
  • Things or devices or gadgets
  • User interface
  • Gateway
  • Interfacing modules
  • Networks
  • Storage panel
  • Security mechanisms
  • Communication platform

1.3 Global Scenario

Following are excerpts from assorted research datasets available on different analytics patterns. Statista is one of the prominent research portals in which the authenticated datasets and evaluations are presented.
From the extracts of Statista, Figure 1.2 presents the huge usage of IoT-based deployments and it is rapidly increasing because of the usage patterns in assorted domains.
Images
FIGURE 1.2 Installed Internet of Things (IoT) scenarios from year 2014 to 2020 in billions.
Figure 1.3 depicts usage patterns of tablets in assorted locations from the year 2014 to the year 2019, and the figures are elevating. Because of these figures, it becomes necessary to enforce security mechanisms for IoT- and wireless-based environments.

1.4 Prominent Search Engines for Indexing IoT Devices

Following are key Internet of Things Search Engines (IoTSE) used by enormous organizations and the hacker loopholes in web cams with other IP-based devices. These portals index smart gadgets, servers, web cams and many other devices.
  • shodan.io/
  • iotcentral.io
  • censys.io/
  • thingful.net/
  • iotcrawler.eu/
  • iotscanner.bullguard.com/
  • um.es/iotcrawler/

1.5 Shodan: An IoT Search Engine

Shodan (McMahon et al., 2017; Samtani et al., 2018; Arnaert et al., 2016; Wright, 2016) is one of the key IoT search engines that is widely used to identify and recognize open systems in IoT scenarios. Using Shodan, as in Figure 1.4, any web cam o...

Índice