ebook img

IoT Security: Advances in Authentication PDF

318 Pages·2020·9.511 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview IoT Security: Advances in Authentication

IoTSecurity IoT Security AdvancesinAuthentication Editedby MadhusankaLiyanage SchoolofComputerScience,UniversityCollegeDublin,Ireland CentreforWirelessCommunications,UniversityofOulu,Finland AnBraeken IndustrialEngineering,VrijeUniversiteitBrussels,Belgium PardeepKumar DepartmentofComputerScience,SwanseaUniversity,UK MikaYlianttila CentreforWirelessCommunications,UniversityofOulu,Finland Thiseditionfirstpublished2020 ©2020JohnWiley&SonsLtd Allrightsreserved.Nopartofthispublicationmaybereproduced,storedinaretrievalsystem,or transmitted,inanyformorbyanymeans,electronic,mechanical,photocopying,recordingorotherwise, exceptaspermittedbylaw.Adviceonhowtoobtainpermissiontoreusematerialfromthistitleisavailable athttp://www.wiley.com/go/permissions. TherightofMadhusankaLiyanage,AnBraeken,PardeepKumarandMikaYlianttilatobeidentifiedasthe authorsoftheeditorialmaterialinthisworkhasbeenassertedinaccordancewithlaw. RegisteredOffices JohnWiley&Sons,Inc.,111RiverStreet,Hoboken,NJ07030,USA JohnWiley&SonsLtd,TheAtrium,SouthernGate,Chichester,WestSussex,PO198SQ,UK EditorialOffice TheAtrium,SouthernGate,Chichester,WestSussex,PO198SQ,UK Fordetailsofourglobaleditorialoffices,customerservices,andmoreinformationaboutWileyproducts visitusatwww.wiley.com. Wileyalsopublishesitsbooksinavarietyofelectronicformatsandbyprint-on-demand.Somecontentthat appearsinstandardprintversionsofthisbookmaynotbeavailableinotherformats. LimitofLiability/DisclaimerofWarranty Whilethepublisherandauthorshaveusedtheirbesteffortsinpreparingthiswork,theymakeno representationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkand specificallydisclaimallwarranties,includingwithoutlimitationanyimpliedwarrantiesofmerchantabilityor fitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesrepresentatives,written salesmaterialsorpromotionalstatementsforthiswork.Thefactthatanorganization,website,orproductis referredtointhisworkasacitationand/orpotentialsourceoffurtherinformationdoesnotmeanthatthe publisherandauthorsendorsetheinformationorservicestheorganization,website,orproductmayprovide orrecommendationsitmaymake.Thisworkissoldwiththeunderstandingthatthepublisherisnotengaged inrenderingprofessionalservices.Theadviceandstrategiescontainedhereinmaynotbesuitableforyour situation.Youshouldconsultwithaspecialistwhereappropriate.Further,readersshouldbeawarethat websiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhen itisread.Neitherthepublishernorauthorsshallbeliableforanylossofprofitoranyothercommercial damages,includingbutnotlimitedtospecial,incidental,consequential,orotherdamages. LibraryofCongressCataloging-in-Publicationdataappliedfor HardbackISBN–9781119527923 CoverDesign:Wiley CoverImage:©jamesteohart/Shutterstock Setin10/12ptWarnockProbySPiGlobal,Chennai,India 10 9 8 7 6 5 4 3 2 1 v Contents AbouttheEditors xiii ListofContributors xvii Preface xxiii Acknowledgments xxix PartI IoTOverview 1 1 IntroductiontoIoT 3 AnshumanKalla,PawaniPrombage,andMadhusankaLiyanage 1.1 Introduction 4 1.1.1 EvolutionofIoT 4 1.2 IoTArchitectureandTaxonomy 5 1.3 StandardizationEfforts 7 1.4 IoTApplications 10 1.4.1 SmartHome 11 1.4.2 SmartCity 13 1.4.3 SmartEnergy 14 1.4.4 Healthcare 15 1.4.5 IoTAutomotive 16 1.4.6 Gaming,ARandVR 16 1.4.7 Retail 17 1.4.8 Wearable 18 1.4.9 SmartAgriculture 18 1.4.10 IndustrialInternet 19 1.4.11 TactileInternet 19 1.4.12 Conclusion 20 Acknowledgement 20 References 20 2 IntroductiontoIoTSecurity 27 AncaD.Jurcut,PasikaRanaweera,andLinaXu 2.1 Introduction 27 2.2 AttacksandCountermeasures 29 vi Contents 2.2.1 PerceptionLayer 30 2.2.2 NetworkLayer 33 2.2.3 ApplicationLayer 34 2.3 AuthenticationandAuthorization 41 2.3.1 Authentication 42 2.3.2 Authorization 42 2.3.3 AuthenticationatIoTLayers 43 2.4 OtherSecurityFeaturesandRelatedIssues 48 2.4.1 TheSimplifiedLayerStructure 48 2.4.2 TheIdeaofMiddleware 49 2.4.3 Cross-LayerSecurityProblem 50 2.4.4 Privacy 50 2.4.5 RiskMitigation 51 2.5 Discussion 52 2.6 FutureResearchDirections 54 2.6.1 Blockchain 54 2.6.2 5G 55 2.6.3 FogandEdgeComputing 56 2.6.4 QuantumSecurity,AI,andPredictiveDataAnalytics 57 2.6.5 NetworkSlicing 57 2.7 Conclusions 58 References 59 PartII IoTNetworkandCommunicationAuthentication 65 3 SymmetricKey-BasedAuthenticationwithanApplicationtoWireless SensorNetworks 67 AnBraeken 3.1 Introduction 67 3.2 RelatedWork 69 3.3 SystemModelandAssumptions 70 3.3.1 DesignGoals 70 3.3.2 Setting 70 3.3.3 Notations 71 3.3.4 AttackModel 71 3.4 SchemeinNormalMode 72 3.4.1 InstallationPhase 72 3.4.2 GroupNodeKey 73 3.4.3 IndividualClusterKey 73 3.4.4 PairwiseKeyDerivation 74 3.4.5 MulticastKey 76 3.4.6 GroupClusterKey 76 3.5 Authentication 77 3.5.1 AuthenticationbyCN 77 3.5.2 AuthenticatedBroadcastbytheCH 77 3.5.3 AuthenticatedBroadcastbytheBS 78 Contents vii 3.6 SchemeinChangeMode 78 3.6.1 CaptureofCN 78 3.6.2 CaptureofCH 79 3.6.3 ChangesforHonestNodes 79 3.7 SecurityAnalysis 80 3.7.1 ResistanceAgainstImpersonationAttack 80 3.7.2 ResistanceAgainstNodeCapture 81 3.7.3 ResistanceAgainstReplayAttacks 81 3.8 Efficiency 81 3.8.1 NumberofCommunicationPhases 81 3.8.2 StorageRequirements 82 3.8.3 PacketFragmentation 82 3.9 Conclusions 83 Acknowledgement 83 References 83 4 PublicKeyBasedProtocols–ECCrypto 85 PawaniPorambage,AnBraeken,andCorinnaSchmitt 4.1 IntroductiontoECC 85 4.1.1 Notations 86 4.1.2 ECCforAuthenticationandKeyManagement 87 4.2 ECCBasedImplicitCertificates 88 4.2.1 AuthenticationandKeyManagementUsingECCImplicitCertificates 88 4.3 ECC-BasedSigncryption 91 4.3.1 SecurityFeatures 93 4.3.2 Scheme 93 4.4 ECC-BasedGroupCommunication 95 4.4.1 BackgroundandAssumptions 95 4.4.2 Scheme 96 4.5 ImplementationAspects 97 4.6 Discussion 98 References 98 5 Lattice-BasedCryptographyandInternetofThings 101 VeronikaKuchtaandGauravSharma 5.1 Introduction 101 5.1.1 Organization 102 5.2 Lattice-BasedCryptography 102 5.2.1 Notations 102 5.2.2 Preliminaries 103 5.2.3 ComputationalProblems 104 5.2.4 State-of-the-Art 105 5.3 Lattice-BasedPrimitives 106 5.3.1 One-WayandCollision-ResistantHashFunctions 106 5.3.2 PassivelySecureEncryption 106 5.3.3 ActivelySecureEncryption 107 5.3.4 TrapdoorFunctions 107 viii Contents 5.3.5 GadgetTrapdoor 108 5.3.6 DigitalSignatureswithoutTrapdoors 108 5.3.7 PseudorandomFunctions(PRF) 109 5.3.8 HomomorphicEncryption 110 5.3.9 Identity-BasedEncryption(IBE) 111 5.3.10 Attribute-BasedEncryption 112 5.4 Lattice-BasedCryptographyforIoT 113 5.5 Conclusion 115 References 115 PartIII IoTUserLevelAuthentication 119 6 EfficientandAnonymousMutualAuthenticationProtocolin Multi-AccessEdgeComputing(MEC)Environments 121 PardeepKumarandMadhusankaLiyanage 6.1 Introduction 121 6.2 RelatedWork 123 6.3 NetworkModelandAdversaryModel 124 6.3.1 NetworkModel 124 6.3.2 AdversaryModel 125 6.4 ProposedScheme 125 6.4.1 SystemSetupfortheEdgeNodesRegistrationattheRegistration Center 125 6.4.2 UserRegistrationPhase 126 6.4.3 LoginandUserAuthenticationPhase 126 6.4.4 PasswordUpdatePhase 127 6.5 SecurityandPerformanceEvaluation 127 6.5.1 InformalSecurityAnalysis 127 6.5.2 PerformanceAnalysis 129 6.6 Conclusion 130 References 130 7 Biometric-BasedRobustAccessControlModelforIndustrialInternet ofThingsApplications 133 PardeepKumarandGurjotSinghGaba 7.1 Introduction 133 7.2 RelatedWork 134 7.3 NetworkModel,ThreatModelandSecurityRequirements 136 7.3.1 NetworkModel 136 7.3.2 ThreatModel 136 7.3.3 SecurityGoals 136 7.4 ProposedAccessControlModelinIIoT 136 7.4.1 SystemSetup 137 7.4.2 AuthenticationandKeyEstablishment 138 7.5 SecurityandPerformanceEvaluations 139 7.5.1 InformalSecurityAnalysis 139

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.