ebook img

Information Security Handbook (Internet of Everything (IoE)) PDF

271 Pages·2022·16.302 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Information Security Handbook (Internet of Everything (IoE))

INFORMATION SECURITY HANDBOOK Internet of Everything (IoE): Security and Privacy Paradigm Series Editors: Vijender Kumar Solanki, Raghvendra Kumar, and Le Hoang Son Data Security in Internet of Things Based RFID and WSN Systems Applications Edited by Rohit Sharma, Rajendra Prasad Mahapatra, and Korhan Cengiz Securing IoT and Big Data Next Generation Intelligence Edited by Vijayalakshmi Saravanan, Anpalagan Alagan, T. Poongodi, and Firoz Khan Distributed Artificial Intelligence A Modern Approach Edited by Satya Prakash Yadav, Dharmendra Prasad Mahato, and Nguyen Thi Dieu Linh Security and Trust Issues in Internet of Things Blockchain to the Rescue Edited by Sudhir Kumar Sharma, Bharat Bhushan, and Bhuvan Unhelkar Internet of Medical Things Paradigm of Wearable Devices Edited by Manuel N. Cardona, Vijender Kumar Solanki, and Cecilia García Cena Integration of WSNs into Internet of Things A Security Perspective Edited by Sudhir Kumar Sharma, Bharat Bhushan, Raghvendra Kumar, Aditya Khamparia, and Narayan C. Debnath IoT Applications, Security Threats, and Countermeasures Edited by Padmalaya Nayak, Niranjan Ray, and P. Ravichandran Multimodal Biometric Systems Security and Applications Edited by Rashmi Gupta and Manju Khari Smart Healthcare Monitoring Using IoT with 5G Challenges, Directions, and Future Predictions Edited by Meenu Gupta, Gopal Chaudhary, Victor Hugo C. de Albuquerque Information Security Handbook Edited by Noor Zaman, Khalid Hussain, Mamoona Humayun, Azween Bin Abdullah, and João Manuel R.S. Tavares For more information about this series, please visit: https://www.routledge.com/ Internet-of-Everything-IoE/book-series/CRCIOESPP INFORMATION SECURITY HANDBOOK Edited by Noor Zaman Jhanjhi, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun, and João Manuel R.S. Tavares First edition published 2022 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 and by CRC Press 2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN © 2022 Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, LLC Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978- 750-8400. For works that are not available on CCC please contact [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging‑in‑Publication Data Names: Jhanjhi, Noor Zaman, 1972- editor. | Hussain, Khalid, editor. | Humayun, Mamoona, editor. | Abdullah, Azween Bin, 1961- editor. | Tavares, João Manuel R. S., editor. Title: Information security handbook / edited by Noor Zaman Jhanjhi, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun, and João Manuel R.S. Tavares. Description: First edition. | Boca Raton : CRC Press, [2022] | Series: Internet of everything (IoE): security and privacy paradigm | Includes bibliographical references and index. | Summary: “This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together in one resource Information security across multiple domains. Information Security Handbook addresses the knowledge for emerging multidisciplinary research. It explores basic and high-level concepts, serves as a manual for industry, while also helping beginners to understand both basic and advanced aspects in security-related issues. The handbook explores security and privacy issues through IoT ecosystem and implications to the real world and at the same time explains the concepts of IoT- related technologies, trends, and future directions. University graduates and postgraduates, as well as research scholars, developers, and end-users, will find this handbook very useful”‐‐ Provided by publisher. Identifiers: LCCN 2021043552 (print) | LCCN 2021043553 (ebook) | ISBN 9780367365721 (hbk) | ISBN 9781032203751 (pbk) | ISBN 9780367808228 (ebk) Subjects: LCSH: Computer networks‐‐Security measures. Classification: LCC TK5105.59 .I527 2022 (print) | LCC TK5105.59 (ebook) | DDC 005.8‐‐dc23/eng/20211110 LC record available at https://lccn.loc.gov/2021043552 LC ebook record available at https://lccn.loc.gov/2021043553 ISBN: 978-0-367-36572-1 (hbk) ISBN: 978-1-032-20375-1 (pbk) ISBN: 978-0-367-80822-8 (ebk) DOI: 10.1201/9780367808228 Typeset in Times by MPS Limited, Dehradun Contents Preface......................................................................................................................vii Editor Biographies...................................................................................................xv Contributors............................................................................................................xix Chapter 1 SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC Protocol for Wireless Sensor Network.....................................1 Sowjanya Ramisetty, Divya Anand, Kavita, Sahil Verma, and Abdulellah A. Alaboudi Chapter 2 Software-Defined Networking (SDN) Security Concerns...............19 Muhammad Junaid Nazar, Saleem Iqbal, Saud Altaf, Kashif Naseer Qureshi, Khalid Hussain Usmani, and Sobia Wassan Chapter 3 Clustering in Wireless Sensor Networks Using Adaptive Neuro-Fuzzy Inference Logic...........................................................39 Seema Gaba, Radhika Gupta, Sahil Verma, Kavita, and Imran Taj Chapter 4 Security in Big Data..........................................................................55 Mehwish Malik, Hina Umbrin, Nuzhat Akram, Khalid Hussain Usmani, and NZ Jhanjhi Chapter 5 Prevention of DOS/DDOS Attacks Through Expert Honey-Mesh Security Infrastructure.................................................81 Shehneela Khan, Tariq Ali, Umar Draz, Sana Yasin, Muazzam A. Khan, and Amjad Ali Chapter 6 Efficient Feature Grouping for IDS Using Clustering Algorithms in Detecting Known/Unknown Attacks......................103 Ravishanker, Monica Sood, Prikshat Angra, Sahil Verma, Kavita, and NZ Jhanjhi Chapter 7 PDF Malware Classifiers – A Survey, Future Directions, and Recommended Methodology...................................................117 N.S. Vishnu, Sripada Manasa Lakshmi, Kavita, Sahil Verma, and Awadhesh Kumar Shukla v vi Contents Chapter 8 Key Authentication Schemes for Medical Cyber Physical System...............................................................................141 Zia ur Rehman, Saud Altaf, Saleem Iqbal, Khalid Hussain, and Kashif Sattar Chapter 9 Ransomware Attack: Threats & Different Detection Technique........................................................................157 Rakhi Seth, Aakanksha Sharaff, Jyotir Moy Chatterjee, and NZ Jhanjhi Chapter 10 Security Management System (SMS).............................................177 Shahida, Khalid Hussain Usmani, and Mamoona Humayun Chapter 11 Automatic Street Light Control Based on Pedestrian and Automobile Detection..............................................................201 R Sujatha, J Gitanjali, R. Pradeep Kumar, Mustansar Ali, Ghazanfar, Baibhav Pathy, and Jyotir Moy Chatterjee Chapter 12 Cost-Oriented Electronic Voting System Using Hashing Function with Digital Persona..........................................213 Muhammad Talha Saleem, Noor ul-Ain, and Zartaj Tahir Chapter 13 Blockchain-Based Supply Chain System Using Intelligent Chatbot with IoT-RFID.................................................233 Khurram Shahzad, Hasnat Ahmed, Faraz Ahsan, Khalid Hussain, and M N Talib Index......................................................................................................................247 Preface We are living in a time of cutting-edge technology, where the world is receiving several types of challenges day by day. The current COVID-19 pandemic is one of the challenging scenarios, where the entire world is completely dependent on technology for keeping daily routines in action. Technology evolves in each domain of life, from health to education, government to private sectors, business to personal, etc. This huge level of technological involvement everywhere in life raised the demands of safety and security as well. Security gains higher importance now than ever before. Recently, a number of cybersecurity threats were examined globally for several online platforms that are helping to continue daily life during this pandemic. This book is an attempt to collect and publish innovative ideas, emerging trends, implementation experience, and use cases pertaining to different enabling security approaches to keep the current technologies secure. Overall, this book aims to have a collection of ideas related to computer security, cybersecurity, network security, etc., and how this collection can contribute for the researchers and current literature to help to enhance security. The book is organized as follows. The Organization of the Book CHAPTER 1: SC-MCHMP: SCORE-BASED CLUSTER-LEVEL HYBRID MULTI-CHANNEL MAC PROTOCOL FOR WIRELESS SENSOR NETWORK The potential applications of WSN (wireless sensor network) include smart spaces, environmental examininations, robotic study, and medical systems. To design the WSN, efficient energy is considered. Because of data transmission from sensor nodes, the collision occurs in WSNs, and the traffic is higher at SINK nodes owing to the excess data transmission at the sensor nodes. The MAC (medium access control) mechanism manages the important division of resources consumption. The single channel initiates for data transmission using WSNs in an existing MAC protocol. Also, the unexpected variation in the quality of the link in addition to the status of the node are caused by the deployment of WSN within the severe atmospheres. As a result of the changes in the status of the node, in addition to quality of the link, a change occurs in end-to-end delay of every sensor node. However, constrained energy is used to supply the sensor nodes, and it is used in extending the lifetime of the network. A new and simple routing mechanism, Scoreboard Cluster-Level Multi-Channel Hybrid MAC Protocol (SC-MCHMP) is proposed here for dealing with these issues; it utilizes the multi-channel MAC procedure comprising TDMA activity (time division multiple access) sequencing nodes and FDMA (frequency division multiple access) for collision-free exchange and CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) for data transmission. This method minimizes the energy consumption and reduces the nodes’ overhead, achieving the collision-free transmission. The method to calculate vii viii Preface the score and the score-based route selection increases the network lifetime and improves the network performance. CHAPTER 2: SOFTWARE-DEFINED NETWORKING (SDN) SECURITY CONCERNS Software-defined networking (SDN) is an approach of networking to enable network administrators to respond rapidly through a (logically) centralized controller. It may change the limitations of classical network infrastructure. SDN broke the vertical integration and separates the control plane (controller) from the data plane (switches) that forward the traffic. The main idea behind SDN is to decouple the data plane/forwarding plane from the control plane where the controller controls and manages the devices residing in the forwarding plane. The centrally controlled control plane benefits the SDN for being flexible and programmable with the control over the network traffic flows. The control and data plane are decoupled, and that could understood by way of a programming interface among SDN controller and switches. The network administrator can manage and control the network and packet-processing functions through his own program. CHAPTER 3: CLUSTERING IN WIRELESS SENSOR NETWORKS USING ADAPTIVE NEURO-FUZZY INFERENCE LOGIC Wireless sensor networks are powerful categories of mobile ad hoc networks that provide easy and efficient communication of technology and human. Wireless sensor networks are widely used for the results they provide, which include the reduction in human work. Sensors are deployed in groups in required areaa where nodes collect data from the surroundings and send it to the sink node through multi-node communication. This process involves lots of energy dissipation of nodes at individual levels, leading to the early fall of the network. To solve this problem, the concept of clustering was given in hierarchical routing protocols. The clustering process also lacks efficiency as cluster heads are selected randomly. Appropriate selection of cluster heads may prove to be an effective and logical way to regulate energy consumption and increase network life. This paper proposes an efficient neuro-fuzzy logic-based technique to improve energy consumption and network performance. The wise selection of cluster head will aid in data-transmission efficiency, increasing functioning to ensure network life in emergencies. Adaptive neuro-fuzzy logic helps in training the parameters to meet the requirements of becoming cluster heads. The candidate cluster heads parameters are tested against the training data, and the appropriate one is selected as head. The proposed technique is tested for different network cases and has shown good results in case of packet delivery ratio. CHAPTER 4: SECURITY IN BIG DATA Big data has gained popularity in recent decades, and it contributed to several application domains, where it changes the shape of existing business; each and every thing related to the analysis was brought in before us in different ways. For Preface ix ages, individuals have used Google to ask questions, such as applications of big data in businesses to prosper, how it can assist an organization with succeeding, which technologies of big data are favored for this purpose, and several other related questions. A great deal has been said and written already about big data, however, the term itself stays unexplained. To be fair, we haven’t established a prevalent definition of it, such as: Big data means it’s big in this idea brings up another query of how big it is, how to measure it; is it in a terabyte, petabyte or even more? So, to resolve this ambiguity, a need to define big data arises. The hype of big data applications is based on its applications and providing solutions to different complex issues. However, the security remains always a major concern, especially in case of data. The organizations also are concerned for the security issues in the big data, as well. This chapter will elaborate the security concerns with big data. CHAPTER 5: PREVENTION OF DOS/DDOS ATTACKS THROUGH EXPERT HONEY-MESH SECURITY INFRASTRUCTURE Today, denial of service (DOS) and distributed denial of service (DDOS) attacks are rapidly increasing on the internet. DDOS attacks are used to overload the network infrastructure and services. Such kinds of attacks lead to the unavailability of services across networks. Honey pots can be used to ensure the continuous availability of services across networks. Honey pot is defined as a trap that mimics, notices, and records overall activities of the attacker and prevents attacks efficiently. In this way, malicious data will not route toward the production servers. The main purpose of this paper is to prevent DOS/DDOS attacks through expert honey-mesh security infrastructure. In this paper, software simulation tool DDOSSim is used to identify and simulate DDOS attacks via defense mechanisms. CHAPTER 6: EFFICIENT FEATURE GROUPING FOR IDS USING CLUSTERING ALGORITHMS IN DETECTING KNOWN/UNKNOWN ATTACKS In this paper, various feature grouping techniques are analyzed, using various machine- learning approaches to investigate their accuracy. Real-time traffic can be monitored for network attacks, which can be used in monitoring both the extrusion as well as the intrusion traffic. The main aim is to identify network attacks for providing future-proof software solutions, such that false alarms could be reduced and a more secure network could be made. The extrusion traffic detects attacks within the network and movement of data out from the network, whereas the intrusion detection system will monitor the incoming packets of data in the network, thus monitoring all the traffic inside as well as outside and providing a better solution to the existing system. The rules in the snort would also be optimized for better detection purposes. In this paper, an algorithm is proposed to enhance the chances to detect intrusion and will perform efficient and optimized data delivery in internal and external network. The proposed work will add a trust parameter to IDS by learning attack patterns in the future. This work can further be extended to application levels where decentralized nodes can be added to blockchain techniques to add trust among the newly connected and adjoining nodes.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.