<span>This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. This book offers a wide range of theoretical and technical solutions to address these challenges. Topics covered in this book include; IoT, privacy, ethics and security, the use of mac
Privacy, Security And Forensics in The Internet of Things (IoT)
β Scribed by Reza Montasari (editor), Fiona Carroll (editor), Ian Mitchell (editor), Sukhvinder Hara (editor), Rachel Bolton-King (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 219
- Edition
- 1st ed. 2022
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. ThisΒ book offers a wide range of theoretical and technical solutions to address these challenges. Topics covered in this book include; IoT, privacy, ethics and security, the use of machine learning algorithms in classifying malicious websites, investigation of cases involving cryptocurrency, the challenges police and law enforcement face in policing cyberspace, the use of the IoT in modern terrorism and violent extremism, the challenges of the IoT in view of industrial control systems, and the impact of social media platforms on radicalisation to terrorism and violent extremism.
This book also focuses on the ethical design of the IoT and the large volumes of data being collected and processed in an attempt to understand individualsβ perceptions of data and trust. A particular emphasis is placed on data ownership and perceived rights online. It examines cyber security challenges associated with the IoT, by making use of Industrial Control Systems, using an example with practical real-time considerations. Furthermore, this book compares and analyses different machine learning techniques, i.e., Gaussian Process Classification, Decision Tree Classification, and Support Vector Classification, based on their ability to learn and detect the attributes of malicious web applications. The data is subjected to multiple steps of pre-processing including; data formatting, missing value replacement, scaling and principal component analysis.Β This book has a multidisciplinary approach.Β Researchers working within security, privacy, technical and legal challenges in the IoT environments and advanced-level students majoring in computer science will find this book useful as a reference. Professionals working within this related field will also want to purchase this book.
β¦ Table of Contents
Introduction: Critical Analysis of the Challenges Police and Law Enforcement Face in Policing Cyberspace
Introduction
Challenges
Legislation
Jurisdiction
Anonymity
Reporting
Future Direction
Legistlation Reform
Multi-Agency Response
Evidence-Based Policing and Training
Public Awareness
Conclusions and Recommendations
References
Contents
Part I Privacy, Security and Challenges in the IoT
Ethics and the Internet of Everything: A Glimpse into People's Perceptions of IoT Privacy and Security
1 Introduction
2 The Ethics of IoT
2.1 Ownership
2.2 Trust
2.3 Accountability
2.4 Privacy and Security
3 Studies
3.1 Study 1: Investigating People's Perceptions of Their Online Experience
3.2 Study 2: The Digital Community's Perception to the Security in IoT
4 Discussion
5 Conclusion
References
Covid-19 Era: Trust, Privacy and Security
1 Introduction
2 Previous Work
2.1 Coopetition, Information and Trust
2.2 General Data Protection Regulations
2.3 Contact Tracing
3 Research Challenges and Open Problems
3.1 Artificial Intelligence
3.2 Big Data
3.3 Internet of Things
3.4 Cloud Computing
3.5 Edge Computing
3.6 5G Networks
4 How Can We Use These New Applications During COVID-19 Whilst Being Complied to GDPR?
4.1 Coopetition
4.2 GDPR
4.3 Blockchain (BC)
4.4 Cloud Computing
5 Conclusion
6 Recommendations
References
Privacy and Security Challenges and Opportunities for IoT Technologies During and Beyond COVID-19
1 Introduction
1.1 IoT Role During COVID-19 Pandemic
Affected Industries
IoT Solutions
1.2 Privacy and Security Concerns of IoT
1.3 Study Methodology
1.4 Structure of the Chapter
2 Data Protection vs. IoT
2.1 Usefulness and Security of Big Data Generated by IoT
2.2 Big Data Protection Challenges
2.3 Emerging Laws and Regulations of Data Protection in IoT
2.4 Policies and Standards Landscape for IoT
3 Security Challenges and Opportunities for IoT Solutions
3.1 Security Challenges
3.2 Proposed Secure IoT Architectures
4 Future Privacy and Security Landscape of IoT (Post-COVID-19)
5 Conclusion
References
The Challenges of the Internet of Things Considering Industrial Control Systems
1 Introduction
1.1 Internet of Things
1.2 Industrial Control System
2 Industrial Control Systems
2.1 Operational Technology
2.2 Information Technology
2.3 Functions of ICS
2.4 Physical Components of Industrial Control Systems
2.5 Commonalities Between ICS and IOT
2.6 Other Components of Industrial Control Systems
3 Challenges in Industrial Control Systems
3.1 People
Susceptibility
Awareness
Motivation
3.2 Physical
Legacy
Maintenance
Cost
Commercial Off the Shelf (COTS)
Mitigation of Risk
3.3 Security
CIA/AIC Triad Model
Challenges of OT Security
3.4 Organization Structures
4 Conclusion and Future Work
References
Part II Digital Forensics and Machine Learning in the IoT
An Introduction to Cryptocurrency Investigations
1 Cryptocurrencies
1.1 An Introduction
1.2 A Brief History of Bitcoin
1.3 Cryptocurrency Operations
1.4 Cryptocurrency Transactions
2 Attribution and Clustering of Cryptocurrency Transactions
2.1 Attribution of Cryptocurrency Transactions
2.2 Clustering of Cryptocurrency Transactions
2.3 Open-Source Intelligence
2.4 Clustering Tools
3 The Cryptocurrency Economy
4 Conclusion
References
The Application of Machine Learning Algorithms in Classification of Malicious Websites
1 Introduction
2 The Dataset
3 Data Preparation
3.1 Data Analysis
3.2 Data Formatting and Conversion
Numerical Attributes
Categorical Attributes
Timestamp Attributes
3.3 Random Under Sampling
3.4 Scaling
3.5 Dimensionality Reduction
Principal Component Analysis
4 Classification Methods
4.1 Gaussian Process Classification (Binary)
4.2 Decision Tree Classification
4.3 Support Vector Machine Classification
5 Results
5.1 Gaussian Process Classification Results
5.2 Decision Tree Classification Results
5.3 Support Vector Classification Results
6 Discussion and Conclusion
References
Part III Cyber Terrorism and Violent Extremism in the IoT
The Use of the Internet and the Internet of Things in Modern Terrorism and Violent Extremism
1 Introduction
2 Definitions
3 The Evolution of the Internet and Academic Debate
4 Pathways to Violent Extremism in the Digital Age
5 Radicalisation and Identity Negotiation
6 Radicalisation and Online Social Networks
7 Convergence of the Offline and Online Worlds of Violent Extremists
8 The Birth of the Internet of Things and Terrorism
9 Conclusion
References
The Impact of the Internet and Social Media Platforms on Radicalisation to Terrorism and Violent Extremism
1 Introduction
2 Definitions
2.1 Violent Extremism
2.2 Radicalisation
3 Discussion of Supporting Evidence
3.1 Echo Chambers
3.2 Anonymity
3.3 Youth and Identity Construction
4 Discussion of Opposing Evidence
4.1 Offline Persuasion
4.2 False Dichotomy
5 Conclusion
References
The Internet, Social Media and the Internet of Things in Radicalisation to Terrorism and Violent Extremism
1 Introduction
2 Terrorism as a Process
3 Phases of Radicalisation
4 Phases of Online Terrorism
5 Social Media Platforms and Terrorism
6 The Internet of Things and Radicalisation
7 The Internet of Things Moderating Online Terrorism
8 Conclusion
References
The Internet of Things and Terrorism: A Cause for Concern
1 Introduction
2 Trends in Terrorism
3 Apocalyptic Aspects of New Terrorism
4 Bloodier Terrorism
5 Decentralisation
6 Discussion
7 Conclusion
References
Index
π SIMILAR VOLUMES
<P>The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. <B>Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations</B> brings together some of the top IoT security
<p><strong><em>IOT: Security and Privacy Paradigm</em></strong> covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to thi
<p><span>This book covers major areas of device and data security and privacy related to the Internet of Things (IoT). It also provides an overview of light-weight protocols and cryptographic mechanisms to achieve security and privacy in IoT applications. Besides, the book also discusses intrusion d
<p><span>The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity a