𝔖 Scriptorium
✦   LIBER   ✦

📁

Internet of Things Security and Data Protection

✍ Scribed by Ziegler, Sébastien


Publisher
Springer Nature
Year
2019
Tongue
English
Series
Internet of things.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Intro
About this Book
Contents
List of Figures
List of Tables
Chapter 1: Internet of Things Cybersecurity Paradigm Shift, Threat Matrix and Practical Taxonomy
1.1 Cybersecurity Threats Taxonomy for the Internet of Things
1.2 Traditional Cybersecurity Threat Matrix
1.3 Internet of Things Cybersecurity Paradigm Shift
1.3.1 Internet of Things Proxy Attacks
1.3.2 Internet of Things Target Attacks
1.4 New Cybersecurity Threat Matrix
1.5 Conclusion
Chapter 2: Privacy and Security Threats on the Internet of Things
2.1 New Perspective on Protection of IoT Systems
2.2 Related Work 2.3 New Security and Privacy Threats in IoT2.4 Cyberthreat Analysis
2.4.1 Life Cycle of Cyberattacks
2.4.2 Security Objectives for IoT/CPS
2.4.3 Threat Actors
2.4.4 Attack Patterns
2.4.5 Major Security Vulnerabilities
2.4.6 Main Threats in IoT/CPS
2.4.7 Security Threats on Physical Layer
2.4.8 Security Threats of Network Layer
2.4.9 Security Threats of Application Layer
2.5 Common Countermeasures to Mitigate Threats in IoT/ CPS
2.6 Major Privacy Threats in IoT
2.7 Related Security Frameworks
2.7.1 OWASP IoT
2.7.2 oneM2M
2.7.3 GSMA IoT Security Guidelines 2.7.4 ANASTACIA Project Security Framework2.7.5 ARMOUR Project Framework
2.8 Conclusion
References
Chapter 3: End-Node Security
3.1 Introduction
3.2 Security Bootstrapping and Commissioning
3.2.1 What is Bootstrapping
3.2.2 IoT Device Life Cycle
3.2.3 Generic Bootstrapping Framework
3.3 Setting the Bases for Secure Communications
3.3.1 Authentication, Authorisation and Accounting (AAA)
3.3.2 Extensible Authentication Protocol (EAP)
3.3.3 Transporting EAP in IoT
Protocol for Carrying Authentication for Network Access (PANA)
CoAP-EAP
3.4 Instantiating Bootstrapping in IoT 3.4.1 After the Bootstrapping: The Operational Phase of the IoT Device3.4.2 Enabling Security Association Protocols (SAPs)
3.4.3 Communication Between IoT Devices
3.4.4 Evaluation of EAP Lower Layers PANA and CoAP-EAP
Overhead as EAP Lower Layer
Time, Success Ratio and Energy Consumption
3.4.5 Conclusions About Security Bootstrapping and Commissioning
3.5 Intrusion Detection Systems for the Internet of Things
3.5.1 Introduction of the Challenge
3.5.2 IoT Environment and the Need for IDS
Shortcomings of Prevention Systems in the IoT World IoT-Induced Challenges for the Development of IoT-Specific IDSsLimitations of the Existing Art
Synthesis
3.5.3 Architectural Solution
Probes Location
Security Enforcement
Detection Methods
Signature-Based Detection
Behavioural Analysis Detection
3.5.4 Reaction Systems
Passive Reaction Subsystems
Active Reaction Subsystems
3.5.5 Deployment Scenario and Validation
3.5.6 Conclusion
References
Chapter 4: IoT and Cloud Computing: Specific Security and Data Protection Issues
4.1 Introduction
4.2 Cloud Computing
4.2.1 Subjects of the Cloud Computing

✦ Subjects


Data protection;Software protection;Information technology;Information services industry -- Security measures;COMPUTERS / Information Technology


📜 SIMILAR VOLUMES


Internet of Things Security and Data Pro
✍ Ziegler, Sébastien 📂 Library 📅 2019 🏛 Springer Nature 🌐 English

<p><p>This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security thre

Secure and Privacy-Preserving Data Commu
✍ Xu, Chang;Zhang, Zijian;Zhu, Liehuang 📂 Library 📅 2017 🏛 Springer Singapore;Springer Nature 🌐 English

Focuses on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, the authors categorize and introduce a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: w

Secure and privacy-preserving data commu
✍ Xu, Chang;Zhang, Zijian;Zhu, Liehuang 📂 Library 📅 2017 🏛 Springer Nature 🌐 English

Focuses on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, the authors categorize and introduce a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: w

Secure and Privacy-Preserving Data Commu
✍ Liehuang Zhu, Zijian Zhang, Chang Xu (auth.) 📂 Library 📅 2017 🏛 Springer Singapore 🌐 English

<p><br>This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three tr

Internet of Things for Smart Cities: Tec
✍ Waleed Ejaz, Alagan Anpalagan 📂 Library 📅 2019 🏛 Springer International Publishing 🌐 English

<p><p></p><p>This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) fo