Cargando…

IoT security : advances in authentication /

"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Liyanage, Madhusanka (Editor ), Braeken, An, 1970- (Editor ), Kumar, Pardeep, 1976- (Editor ), Ylianttila, Mika (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ : John Wiley & Sons, Inc., 2020.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1195817311
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 190712s2020 nju ob 001 0 eng
010 |a  2019029943 
040 |a DLC  |b eng  |e rda  |c DLC  |d EBLCP  |d CNCGM  |d N$T  |d SFB  |d OCLCO  |d UMI  |d WAU  |d OCLCO  |d K6U  |d OCLCQ 
019 |a 1130030084  |a 1224862693 
020 |a 9781119527947  |q (epub) 
020 |a 1119527945 
020 |a 9781119527961  |q (adobe pdf) 
020 |a 1119527961 
020 |z 9781119527923  |q (hardback) 
029 1 |a AU@  |b 000068857374 
029 1 |a AU@  |b 000072393992 
035 |a (OCoLC)1195817311  |z (OCoLC)1130030084  |z (OCoLC)1224862693 
037 |a CL0501000169  |b Safari Books Online 
042 |a pcc 
050 0 0 |a TK5105.8857 
082 0 0 |a 005.8/3  |2 23 
049 |a UAMI 
245 0 0 |a IoT security :  |b advances in authentication /  |c edited by Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila. 
264 1 |a Hoboken, NJ :  |b John Wiley & Sons, Inc.,  |c 2020. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a "The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"--  |c Provided by publisher. 
588 |a Description based on print version record and CIP data provided by publisher. 
505 0 |a Cover; Title Page; Copyright; Contents; About the Editors; List of Contributors; Preface; Acknowledgments; Part I IoT Overview; Chapter 1 Introduction to IoT; 1.1 Introduction; 1.1.1 Evolution of IoT; 1.2 IoT Architecture and Taxonomy; 1.3 Standardization Efforts; 1.4 IoT Applications; 1.4.1 Smart Home; 1.4.2 Smart City; 1.4.3 Smart Energy; 1.4.4 Healthcare; 1.4.5 IoT Automotive; 1.4.6 Gaming, AR and VR; 1.4.7 Retail; 1.4.8 Wearable; 1.4.9 Smart Agriculture; 1.4.10 Industrial Internet; 1.4.11 Tactile Internet; 1.4.12 Conclusion; Acknowledgement; References; Chapter 2 Abstract 
505 8 |a 2.1 Introduction2.2 Attacks and Countermeasures; 2.2.1 Perception Layer; 2.2.1.1 Perception Nodes; 2.2.1.2 Sensor Nodes; 2.2.1.3 Gateways; 2.2.2 Network Layer; 2.2.2.1 Mobile Communication; 2.2.2.2 Cloud Computing; 2.2.2.3 Internet; 2.2.3 Application Layer; 2.2.3.1 Smart Utilities -- Smart Grids and Smart Metering; 2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine; 2.2.3.3 Intelligent Transportation; 2.2.3.4 Smart Agriculture; 2.2.3.5 Industrial IoT (IIoT); 2.2.3.6 Smart Buildings, Environments, and Cities; 2.3 Authentication and Authorization; 2.3.1 Authentication 
505 8 |a 2.3.2 Authorization2.3.3 Authentication at IoT Layers; 2.3.3.1 Perception Layer; 2.3.3.2 Network Layer; 2.3.3.3 Application Layer; 2.4 Other Security Features and Related Issues; 2.4.1 The Simplified Layer Structure; 2.4.2 The Idea of Middleware; 2.4.3 Cross-Layer Security Problem; 2.4.4 Privacy; 2.4.5 Risk Mitigation; 2.5 Discussion; 2.6 Future Research Directions; 2.6.1 Blockchain; 2.6.2 5G; 2.6.3 Fog and Edge Computing; 2.6.4 Quantum Security, AI, and Predictive Data Analytics; 2.6.5 Network Slicing; 2.7 Conclusions; References; Part II IoT Network and Communication Authentication 
505 8 |a Chapter 3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks3.1 Introduction; 3.2 Related Work; 3.3 System Model and Assumptions; 3.3.1 Design Goals; 3.3.2 Setting; 3.3.3 Notations; 3.3.4 Attack Model; 3.4 Scheme in Normal Mode; 3.4.1 Installation Phase; 3.4.1.1 Installation of CH; 3.4.1.2 Installation of CN; 3.4.2 Group Node Key; 3.4.3 Individual Cluster Key; 3.4.3.1 CN to CH; 3.4.3.2 CH to CN; 3.4.4 Pairwise Key Derivation; 3.4.5 Multicast Key; 3.4.5.1 Initiation by CH; 3.4.5.2 Derivation by CNs; 3.4.6 Group Cluster Key; 3.5 Authentication 
505 8 |a 3.5.1 Authentication by CN3.5.2 Authenticated Broadcast by the CH; 3.5.3 Authenticated Broadcast by the BS; 3.6 Scheme in Change Mode; 3.6.1 Capture of CN; 3.6.2 Capture of CH; 3.6.3 Changes for Honest Nodes; 3.6.3.1 Key Update for Honest Node Replacement; 3.6.3.2 Node Removal and Addition; 3.7 Security Analysis; 3.7.1 Resistance Against Impersonation Attack; 3.7.2 Resistance Against Node Capture; 3.7.3 Resistance Against Replay Attacks; 3.8 Efficiency; 3.8.1 Number of Communication Phases; 3.8.2 Storage Requirements; 3.8.3 Packet Fragmentation; 3.9 Conclusions; Acknowledgement; References 
505 8 |a Chapter 4 Public Key Based Protocols -- EC Crypto 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Internet of things  |x Security measures. 
650 6 |a Internet des objets  |x Sécurité  |x Mesures. 
700 1 |a Liyanage, Madhusanka,  |e editor. 
700 1 |a Braeken, An,  |d 1970-  |e editor. 
700 1 |a Kumar, Pardeep,  |d 1976-  |e editor. 
700 1 |a Ylianttila, Mika,  |e editor. 
776 0 8 |i Print version:  |t IoT security  |b First edition.  |d Hoboken : Wiley, 2019.  |z 9781119527923  |w (DLC) 2019029942 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119527923/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5988985 
938 |a EBSCOhost  |b EBSC  |n 2322777 
994 |a 92  |b IZTAP