<span>This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/futur
Communication Technologies and Security Challenges in IoT: Present and Future (Internet of Things)
â Scribed by Ajay Prasad (editor), Thipendra P. Singh (editor), Samidha Dwivedi Sharma (editor)
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 562
- Edition
- 2024
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/future technological additions like Wi-Fi HaLow (802.11ah), HEW (802.11ax), BLE, NFC, RFID, etc.,) and upcoming changes in communication systems in IoT and its possible security aspects. The book also covers security aspects in communication mechanisms in domain-specific IoT solutions for healthcare, smart cities, smart homes, smart vehicles, etc. The objective of the book is to assist IoT developers to have a good insight into available and upcoming communication technologies so that they can employ the best possible practices while designing and developing IoT solutions.
⊠Table of Contents
Preface
Acknowledgements
Contents
Communication Technologies and Security Challenges in IoT: An Introduction
Introduction
Communication Methodologies and Their Security Challenges
Securing IoT Applications
New Trends in IoT Communication and Related Security Aspects
Conclusion
References
IoT Communication Models and Modes of Connectivity
Introduction
Modes of Communications in IoT
Device-To-Device (D2D) Communication
Device-To-Cloud (D2C) Communication
Device-To-Gateway (D2G) Communication
Models of Communication in IoT
Request-Response (RR) Model
Here's How the Request-Response Model Works
Advantages of the Request-Response Model
Publisher-Subscriber (PS) Model
Here's How the Publisher-Subscriber Model Works
Advantages of the Publisher-Subscriber Model
PushâPull (PP) Model
Here's How the PushâPull Model Works in IoT
Advantages of the PushâPull Model in IoT
Exclusive Pair (EP) Model
Here's How the Exclusive-Pair Communication Model Might Work
Potential Use Cases
Communication Technologies Used in Internet of Things
Current Advances in IoT Communication
Conclusion
References
Challenges and Key Issues in IoT Privacy and Security
Introduction
Related Work
IoT Security Concerns
DOS
Attacks
Password
Attacking with a Spoofing Attempt
Potential Threats to Personal Information from the Internet of Things
Protection
Privacy
Interoperability
Internet of Things Authentication Methods
Using a One-Time Password (OUPA)
Mutual Authentication Using ECC
Using a Username and Password for Authentication
Certificate-Based Authentication
Blockchain
Conclusion
References
Security Challenges in IOT
Introduction
IOT Security Architecture
Components of IoT Security Architecture
Boundaries and Trust Zones for IoT Security Solutions
Security Challenges Facing the IoT Revolution- an Overview
Security Challenges of the IoT Revolution
Vulnerabilities in Devices
Physical Vulnerabilities
Software Vulnerabilities
Network Vulnerabilities
Inadequate Identification, Authentication and Authorization
Lack of Encryption
Environment Constraints
Legislative Issues
Enforcement Mechanisms
Privacy Concerns
Distributed Denial-Of-Service (DDoS) Attacks
Cross-Device Dependencies
Data Theft
Data Tampering
Potential Risks of IoT Devices
Privacy Risks
Financial Risks
Notable Examples of IoT Security Breaches
Physical Risks
Solutions to IoT Security Challenges
Trust Management
Authentication
Privacy Solutions
Policy Enforcement
Fault Tolerance
Secure Communication
Secure Routing
DDoS Protection
Spam Prevention
Secure Software Development
LoT Architectures
Regulatory Solutions
Physical Security
Network Segmentation
Data Anonymization
Behavioral Analytics
Preventing Hacking and Malware Attacks
The Need for Robust IoT Security Measures
Conclusion
References
Survey of IoT Security: Application Areas, Threats and Solutions
Introduction
Critical IoT Security Applications
Smart Cities
Smart Environment
Intelligent Grid and Metering Systems
Security and Emergencies
Smart Retail
Smart Agriculture and Animal Farming
Automation in the Home
Threats to IoT Applications
Problems with Security at the Sensing Layer
Network-Level Security Concerns
Security Problems in the Middleware Layer
Security Issues at Gateways
Aspects of Security at the Application Layer
IoT Security Through the Use of Blockchain
Blockchain for IoT: Benefits
Utilizing FoG Computing for IoT Security
Design of FoG Computing
Benefits of FoG Compared to Cloud
Overcoming IoT Security Threats with the Help of FoG Computing
Machine Learning-Based IoT Security
Threats to Security Are Addressed by ML-Based Solutions
IoT Security Using Edge Computing
See Fig. 5.
Edge Computing for IoT Security and Improvement
Conclusion
References
Security and Privacy Issues in Cloud and IoT Technology and Their Countermeasures
Introduction
Security in IOT Technology
Security Importance in Cloud
Related Work
Steganography
Least Significant Bit (Steganography)
Steganography Techniques
DCT
DWT
Hashing
RSA Algorithm
AES Algorithm
Literature Review
Proposed Work
Results and Discussion
Conclusion and Future Work
References
Security Threats in IOT and Their Prevention
Introduction
Challenges in Internet of Things (IoT)
Addressing the Vulnerabilities
Security Threats in Perception Layer (PL)
Security Challenges in Network Layer (NL)
Security Threats in Processing Layer
Security Threats in Application Layer
Preventive Measures Taken to Protect the IOT Layers
Protective Measures for Perception Layer
Preventive Measures for Network Layer
Preventive Measures for Processing Layer
Preventive Measures for Application Layer
Security Threats in Traditional Network vs Internet of Things (IOT)
Resources
Data Formats
Communication Ways
Risk Factors
Conclusion
References
IPV6: Strengths and Limitations
Introduction
History of IPv6
Ipv6 Usage
IPV6 Supporting Devices.
Assigning IPV6 Prefixes and Addresses to CPEs
IPV6 Prefix and Address Assignment for MBB UEs
IPV6 Prefix and Address Assignment for FBB RGs
IPV6 Prefix and Address Assignment for Enterprise CPEs
IPv6 Transitioning Solutions
IPv6 Introduction Stage
IPv6-Only Service Delivery
How NAT64 and DNS64 Work
IPv6 Deployment and Transitioning Strategies
Challenges of Transitioning from IPV4 to IPV6
IPv6 Network Operations
Limitations of IPV6
Benefits of IPV6
How to Use IPV6 More Effectively
Advantages of Using IPV6
Disadvantages of Using IPV6
ETSI IPv6 Enhanced Innovation
IPv6 and Protocol Innovation
IPv6 and Artificial Intelligence (AI)
Conclusion
References
A Survey: Internet of Things (IoTs) Technologies, Embedded Systems and Sensors
Introduction
Applıcatıon Areas of IoT
Transportation/Mobility
Manufacturing/Industrial
Energy
Retail
Smart Cities
Healtcare
Agriculture
Supply Chain
Wearable Technologies
Technologies and Protocols Using IOT
RFID
IPv6
6LoWPAN
IEEE 802.15.4
Wi-Fi
ZigBee
Bluetooth
LoRaWAN
Z-Wave
NFC
Sigfox
MQTT
CoAP
Embedded Systems Used with IOT
FPGA
Raspberry Pi
Zynq
STM32
PSoC
IoT Sensors
Conclusion
References
Non-IP Based Communication in IoT: Handling Security Challenges
Introduction
Non-IP Based Communication in IoT
Advantages and Disadvantages of Non-IP Based Communication
Security Challenges in Non-IP Based Communication in the IoT
Threats to Non-IP Based Communication in the IoT
Mitigating Security Challenges in Non-IP Based Communication
Non-IP Based Communication Technologies in IoT
Comparison of Non-IP Based Communication Technologies
Security Considerations, Challenges and Solutions for Non-IP Based Communication Technologies
Case Studies on Non-IP Based Communication Security in IoT
Mathematical Models for Non-IP Based Communication and Security Challenges in IoT Devices
Popular Algorithms for Non-IP Based Protocol Security
Security Challenges and Solutions for Low-Power Wide Area Networks (LPWANs)
Over-The-Air (OTA) Updates for Non-IP Based Communication Protocols
Implementing Secure Boot and Firmware Updates in Non-IP Based Communication Protocols
Security Standards and Best Practices for Non-IP Based Communication in IoT
Conclusion
References
Security Challenges to IOT and Cloud-Based Systems in the Era of Quantum Attacks
Introduction
Post-Quantum Cryptography
Quantum Key Exchange Technique
Implementation/Experimentation in QKD
Commercial Quantum Key Distributions
Quantum Key Distribution Networks
Future Outlook
QKD Challenges
Techniques to Mitigate QKD Challenges
Conclusion and Research Directions
References
Overview of Internet of Things-Based Smart Logistics Systems
Introduction
Statistical Evaluation
Smart Logistics Powered By IoT Intelligent Cargo Transportation
Actual Issues of Rfid Technical Glitches
Research Requirements Iot Technology Advancement
Advanced Management and Collaborative Development of Many Technologies Computing in the Cloud
Conclusions
References
Fault Sensor Detection and Authentication Mechanism for Improving Quality of Services in Smart Homes
Introduction
Literature Review
Proposed Methodology
Ultrasonic Sensor
IR Sensor
LDR Sensor
NodeMCU
IoT Remote App
Result and Discussion
Conclusion
References
Security in IOT-Enabled Smart Agriculture Systems
Introduction
Benefits of Smart Agriculture
IoT Device
IoT Applications in Agriculture
Networking Technology
Related Works
Architecture
IoT-Based Farming
Security Protocols
Cyber-Physical Searching
Data Confidentiality and Privacy
Access Control
Data Management
Solution and Challenges
Attacks in Agriculture
Threat Model
Enhanced Security, Assaults, and Countermeasures in Smart Agriculture
Secure Communication
Authentication Protocols in Smart Agriculture
Conclusion
References
Comprehensive Study of Intelligent Transference System in a Contemporary IoT Commuting Environment
Introduction
Characteristics of VANET
Vanet Directing Protocols
Routing Simulators
Recent Trends of Routing Protocol Simulation
Simulation Strategy
IoT in VANET
Vanet Security Challenges
Conclusion and Future Scope
References
Redefining Urban Development: Technology and Automation in India
Introduction
Problem Statement
Objectives of the Chapter
Technology and Automation in Urban Planning
Geospatial Technology and GIS Mapping
Smart City Concepts and Applications
Exploratory Data Analysis (EDA) and Modelling for Prediction
Metaverse in Urban Design
Transforming Urban Infrastructure
Intelligent Transportation Systems(ITS)
Smart Grids and Energy Management
Energy Management Systems (EMS)
Waste Management and Recycling Technologies
Technology-Enabled Governance and Citizen Services
E-Governance and Online Service Delivery
Digital Platforms for Citizen Engagement
Real-Time Monitoring and Decision Support Systems
Transparent and Efficient Urban Administration
Ensuring Sustainable Urban Development
Green Building Technologies
Smart Irrigation and Green Spaces
Urban Green Spaces and Urban Forestry
Climate Change Adaptation and Mitigation
Challenges and Opportunities
Technological Barriers and Infrastructure Gaps
Data Privacy and Security Concerns
Capacity Building and Skill Development
Collaboration and Stakeholder Engagement
Success Stories in Indian Cities
Surat: Intelligent Traffic Management System
Pune: Integrated Command and Control Center (ICCC)
Bangalore: Smart Waste Management System
Indore: Smart Parking Solutions
Path Towards Smart and Sustainable Urban Development
Conclusions
References
Trust-Free Homes: The Zero-Trust Paradigm in a Smart Home Setting
Introduction
Literary Presence of Zero-Trust
The Zero-Trust Paradigm
Securing IoT
Central Sensor Hub (CSH)
The Main Server
Central Actuator Hub (CAH)
Simulations
Physical Network Implementation
Security of Implementation
Suggested Improvements
Intrusion Detection and Prevention Systems
Demilitarised Zones
Firewall
Antivirus
Conclusion
References
Security Challenges of IoT-Enabled Vehicular Communications and Their Countermeasures
Introduction
Architecture of Vehicular Communication
Deployed Vehicular Technologies
Applications of Vehicular Networking
Security Implications
State of the Art Vehicular Communication Technologies
Key Elements of IoT-Enabled Vehicular Communication
Need for Security in Vehicular Communication Systems
Security Challenges and Their Countermeasures in IoT-Enabled Vehicular Communication
Conclusion
References
Industrial IoT Security Infrastructures and Threats
Introduction
Related Works
IIoT Security Threats
IoT Architecture
IoT Security Issues
Proposed Scheme
Conclusion
References
Industrial IOT: Security Threats and Counter Measures
Introduction
Background and Motivation
Problem Statement and Study Objectives
Fundamentals of Industrial IoT
Security Threats and Countermeasures
Key Components and Architecture Requirements
Key Components of Industrial IoT Security Architecture
Architecture for Industrial IoT Security
Importance of Security in Industrial IoT
The Common Security Threats and Countermeasures Are
Security Challenges in Industrial IoT
Overview of Security Threats and Vulnerabilities
Physical Security Considerations
Communication Security Issues
Authentication and Access Control Challenges
Data Integrity and Confidentiality Concerns
Attack Vectors in Industrial IoT
Some of the Common Attack Vectors in Industrial IoT Security Include
Different Countermeasures Can Be Used to Address These Attack Routes and Improve IIoT Security, Such As
Device-Level Attacks (e.g., Firmware Attacks, Physical Tampering)
Software Vulnerabilities and Malware Threats
Social Engineering and Human Factors
Risk Assessment and Threat Modeling
Importance of Risk Assessment in Industrial IoT
Threat Modeling Techniques and Methodologies
Identifying Critical Assets and Potential Vulnerabilities
Impact Analysis and Risk Prioritization
Conclusion
References
Internet-of-Things Enabled Smart Health Monitoring System Using AutoAI: A Graphical Tool of IBM Watson Studio
Introduction
Literature Survey
Background
An Overview of Big Data Approaches
Evaluation of Bioinformatics
Proposed System
Data Acquisition Layer
Data Storage
Data Processing Layer
Visualization Layer
Implementation Process for Detecting Emergency Cases
Challenges
Case Study
Future Perspective
Conclusion
References
Phase Noise Performance of MIMOâGFDM Systems for Millimeter Wave 5G Technology
Introduction
Related Works
GFDM-MIMO System
Results and Discussion
Conclusion
References
Credit Card Fraud Detection Using Deep Learning for Internet-of-Things Enabled Smart Digital Financial System
Introduction
Literature Review
Overview of Fraud Detection Techniques
Proposed Methodology
Result Analysis
Case Study: HSBC
Challenges
Future Perspective
Conclusion
References
Development of a Secure and Transparent Blockchain for Electricity Bill Management in Smart Cities Using Enhanced Proof of Energy Consumption
Introduction
Literature Review
Proposed System
Smart Meters and Clouds
System Implementations
Conclusion and Future Scope
References
A Comparative Study of Threat Detection for IoT Devices Using Machine Learning Techniques
Introduction
Literature Review
IoT Device Security: Protecting Against Cyber Threats
ML for IoT Security
MalwareâAÂ Common Threat
Types of Malware
Malware Analysis Techniques
Exploring Malware Detection
Detecting Malware Using ML
ML Algorithms
Steps for Performing Malware Detection
Conclusion
References
Exhaustive Theoretical Study of Practical Free Space Optical Cooperative Relaying Technology: New Trends in IoT Communication
Background
Free Space Optical Communication (Overview)
Optical Wireless Transmission Systems
Types of FSO Systems
Transmission Schemes
Challenges in FSO Systems
Mitigation Techniques
Cooperative Relaying Technology
Asymmetric Mixed RF/FSO Relaying Schemes
Mixed RF/Optical Wireless Relaying as Backhaul Networks
Optical Wireless Relaying Systems
Interference in Combined RF/FSO Systems
Impact of Hardware Impairment
Future Scope and Relevance to IoT
Conclusion
References
đ SIMILAR VOLUMES
<p><p>This book presents methods for advancing green IoT sensor networks and IoT devices. Three main methods presented are: a standalone system to support IoT devices that is informed by the amount of energy the solar array system can produce; a model of securing a building's main power supply again
<P>The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the potential to impact everything from new product opportunities to shop floor optimization to factory worker efficiency gains, that will power top-line and bottom-line gains. As IoT technology is being p
This volume deals with the processes involved in surpassing diversified architecture, protocol, communications, integrity and security along with ubiquitous data collection, potential for unexpected uses of consumer data and heightened security risks. The basic objective of the proposed volume is f
This volume deals with the processes involved in surpassing diversified architecture, protocol, communications, integrity and security along with ubiquitous data collection, potential for unexpected uses of consumer data and heightened security risks. The basic objective of the proposed volume is f