ebook img

Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations PDF

586 Pages·2016·11.92 MB·English
by  Fei Hu
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations

Security and Privacy in Internet of Things (IoTs) Models, Algorithms, and Implementations OTHER BOOKS BY FEI HU Associate Professor Department of Electrical and Computer Engineering The University of Alabama Cognitive Radio Networks with Yang Xiao ISBN 978-1-4200-6420-9 Wireless Sensor Networks: Principles and Practice with Xiaojun Cao ISBN 978-1-4200-9215-8 Socio-Technical Networks: Science and Engineering Design with Ali Mostashari and Jiang Xie ISBN 978-1-4398-0980-8 Intelligent Sensor Networks: The Integration of Sensor Networks, Signal Processing and Machine Learning with Qi Hao ISBN 978-1-4398-9281-7 Network Innovation through OpenFlow and SDN: Principles and Design ISBN 978-1-4665-7209-6 Cyber-Physical Systems: Integrated Computing and Engineering Design ISBN 978-1-4665-7700-8 Multimedia over Cognitive Radio Networks: Algorithms, Protocols, and Experiments with Sunil Kumar ISBN 978-1-4822-1485-7 Wireless Network Performance Enhancement via Directional Antennas: Models, Protocols, and Systems with John D. Matyjas and Sunil Kumar ISBN 978-1-4987-0753-4 Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations ISBN 978-1-4987-2318-3 Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security with John D. Matyjas and Sunil Kumar ISBN 978-1-4987-2635-1 Big Data: Storage, Sharing, and Security ISBN 978-1-4987-3486-8 Opportunities in 5G Networks: A Research and Development Perspective ISBN 978-1-4987-3954-2 Security and Privacy in Internet of Things (IoTs) Models, Algorithms, and Implementations Fei Hu Edited by MATLAB® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks does not warrant the accuracy of the text or exercises in this book. This book’s use or discussion of MAT- LAB® software or related products does not constitute endorsement or sponsorship by The MathWorks of a particular pedagogical approach or particular use of the MATLAB® software. CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2016 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20160216 International Standard Book Number-13: 978-1-4987-2319-0 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro- vides licenses and registration for a variety of users. For organizations that have been granted a photo- copy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com For Fang, Gloria, Edwin, and Edward ... TThhiiss ppaaggee iinntteennttiioonnaallllyy lleefftt bbllaannkk Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii SECTION I: THREATS ANDATTACKS 1 1 InternetofThings(IoT)asInterconnectionofThreats(IoT) . . . 3 N.Jeyanthi 2 Attack,Defense,andNetworkRobustnessofInternet ofThings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Pin-YuChen 3 SybilAttackDetectioninVehicularNetworks . . . . . . . . . . . . 35 BharatJayaraman,JineshM.Kannimoola,andKrishnashreeAchuthan 4 MalwarePropagationandControlinInternetofThings . . . . . . 53 Shin-MingCheng,Pin-YuChen,andKwang-ChengChen 5 ASolution-BasedAnalysisofAttackVectorsonSmart HomeSystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 AndreasBrauchliandDepengLi vii viii (cid:4) Contents SECTION II: PRIVACYPRESERVATION 107 6 PrivacyPreservationDataDissemination . . . . . . . . . . . . . . 109 MiaoXu,WenyuanXu,andJasonM.O’Kane 7 PrivacyPreservationforIoTUsedinSmartBuildings . . . . . . . 135 NicoSaputro,AliIhsanYurekli,KemalAkkaya,and ArifSelcukUluagac 8 ExploitingMobilitySocialFeaturesforLocationPrivacy EnhancementinInternetofVehicles . . . . . . . . . . . . . . . . . 167 XuminHuang,JiawenKang,RongYu,andXiangChen 9 LightweightandRobustSchemesforPrivacyProtection inKeyPersonalIoTApplications:MobileWBSNand ParticipatorySensing . . . . . . . . . . . . . . . . . . . . . . . . . 205 WeiRen,LiangliMa,andYiRen SECTION III: TRUST AND AUTHENTICATION 235 10 TrustandTrustModelsfortheIoT. . . . . . . . . . . . . . . . . . 237 MichaelSchukat,PabloCortijoCastilla,andHughMelvin 11 Trustable Fellowships of Self-Organizing “Things” and Their SoftwareRepresentatives:AnEmergingArchitectureModelforIoT SecurityandPrivacy . . . . . . . . . . . . . . . . . . . . . . . . . 269 AntonioMarcosAlberti,EdielsonPrevatoFrigieri,and RodrigodaRosaRighi 12 PreventingUnauthorizedAccesstoSensorData . . . . . . . . . . 299 LiuLicai,YinLihua,GuoYunchuan,andFangBingxing 13 AuthenticationinIoT . . . . . . . . . . . . . . . . . . . . . . . . . 327 HongLiu SECTION IV: IOTDATA SECURITY 353 14 ComputationalSecurityfortheIoTandBeyond . . . . . . . . . . 355 PavelLoskot 15 Privacy-PreservingTimeSeriesDataAggregationfor InternetofThings . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 RongxingLu,XiaodongLin,ChengHuang,andHaiyongBao Contents (cid:4) ix 16 ASecurePathGenerationSchemeforReal-TimeGreenInternet ofThings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 Yung-FengLuandChin-FuKuo 17 SecurityProtocolsforIoTAccessNetworks . . . . . . . . . . . . . 461 RomeoGiuliano,FrancoMazzenga,AlessandroNeri,and AnnaMariaVegni SECTION V: SOCIALAWARENESS 475 18 AUser-CentricDecentralisedGovernanceFramework forPrivacyandTrustinIoT . . . . . . . . . . . . . . . . . . . . . 477 JorgeBernalBernabe,JoseLuisHernandez,MaraVictoriaMoreno, AntonioSkarmeta,NiklasPalaghias,MicheleNati,and KlausMoessner 19 APolicy-BasedApproachforInformedConsentinInternet ofThings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521 RicardoNeisse,BertrandCopigneaux,AbdurRahimBiswas, RangaRaoVenkateshaPrasad,andGianmarcoBaldini 20 SecurityandImpactoftheInternetofThings(IoT)onMobile Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545 RogerPiquerasJover Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565

Description:
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts f
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.