IoT Security
eBook - ePub

IoT Security

Advances in Authentication

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

IoT Security

Advances in Authentication

Book details
Book preview
Table of contents
Citations

About This Book

An up-to-date guide to an overview of authentication in the Internet of Things (IoT)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.

The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:

  • Offers an authoritative reference designed for use by all IoT stakeholders
  • Includes information for securing devices at the user, device, and network levels
  • Contains a classification of existing vulnerabilities
  • Written by an international group of experts on the topic
  • Provides a guide to the most current information available on IoT security

Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access IoT Security by Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila in PDF and/or ePUB format, as well as other popular books in Technology & Engineering & Electrical Engineering & Telecommunications. We have over one million books available in our catalogue for you to explore.

Part I
IoT Overview

1
Introduction to IoT

Anshuman Kalla Pawani Prombage and Madhusanka Liyanage

Abstract

The successful existence of the Internet, its proven potential to cater to day‐to‐day needs of people from all walks of life and its indispensability to society at large, together have propelled the evolution of the current Internet to the next level termed as the Internet of Things (IoT). As a witness to the dawn of IoT revolution, what we are experiencing (and will continue in to do so in the near future at an exponential and astonishing rate) is the intelligent presence and communication of the physical objects or things around us with themselves (M2M) and/or with humans (M2H). Emergence of such a kind of pervasive inter‐networking ecosystem has enormous scope in terms of market growth and applications which have (to some extent) and will prove with greater force its efficacy to improve quality of life. Though it is bit early to precisely define the depth of coverage and the long‐term impact of IoT applications, nevertheless particularly in domains like healthcare, agriculture, city and home/office automation, industrial and energy management, etc. the immediate applications of IoT are easily conceivable. For realization and rapid development of such IoT applications, formal establishment of IoT architecture and standardization of related protocol suites are vital as they ensure co‐existence and co‐operation of cross‐vendor devices as well as applications. Nevertheless, as with any other hyped research area, IoT has also become victim of its own success and hitherto no one architecture is globally accepted with a common consensus.
In the midst of this, this chapter intends to introduce IoT in a pedagogical manner to the readers. More specifically, the chapter guides the reader through the evolution of IoT, discusses the pertinent taxonomy and proposed architectures, probes the various efforts for standardization of IoT and illustrates some of the popular applications of IoT. While dealing with promising IoT applications, the chapter presents a comprehensive view comprised of the constituent components and major stakeholders to fit‐in, characteristics and key factors to focus, enabling technologies to leverage and categorize each application to understand the various viewpoints.

1.1 Introduction

The evolution towards 5G is widely characterized by exponential growth in the number of computing devices embedded in everyday objects and interconnected over the Internet. Over 50 billion devices are expected on the cellular networks by the year 2020, compared to 12.5 billion devices in 2010 [41] and about 28 billion devices estimated in 2017 [6]. This massive interconnection of proliferating heterogeneous physical objects is technically termed as the Internet of Things (IoT). Such a kind of networking ecosystem enables communication‐capable resource‐constrained heterogeneous objects or devices to be connected over the Internet, in addition to the interconnections of computationally resourceful devices like computers, smartphones, PDA, etc. Thus, IoT renders the entire Internet space as the working area for such devices. In other words, the IoT paradigm begins to facilitate devices to acquire smartness by performing all sorts of operations (monitor, exchange, process, compute, make decisions indigenously or collaboratively) and accordingly take the required actions, based on the information being sensed anywhere across the globe. IoT system is poised to generate a significant surge in demand for data, computing resources, as well as networking infrastructures in order to accommodate these myriads of interconnected devices. Meeting these stringent demands necessitates appropriate improvisations to existing network infrastructures as well as computing technologies; one of such alterations is Multi‐Access Edge Computing (MEC) formerly know as Mobile Edge Computing [55]. Analogically, IoT can be viewed as the sensory and nervous system of the future Information and Communication Technology (ICT) whereas the brain's inherent capabilities to store, process and take decisions would be furnished by technologies like cloud computing, mobile edge computing, parallel computing as well as the sciences of big data analytics, artificial intelligence, machine learning, etc. Ensuring synergy between these technologies is the key to success.

1.1.1 Evolution of IoT

Initially, computer networking began with the aim of economic and efficient sharing (or accessing) of scarce and expensive (computing) resources. Soon, the development of TCP/IP protocol suites fueled the growth and lead to the advent of the global networking facility known as the Internet. Since then, the Internet has evolved tremendously and has achieved several decades of a successful existence. The years of maturity of the current Internet and the advancements in relevant underlying technologies have paved the way for the emergence of IoT. As shown in [63], the evolution of the Internet consists of five phases (Figure 1.1). Initial phase dealt with connecting together computers followed with the second phase that gave rise to the World Wide Web which connected a large number of computers as a web. Then, the mobile‐Internet came into picture which enabled mobile devices to be connected to the Internet and later peoples' identities also stepped in and joined the Internet by the means of social networks. Finally, the present phase nurtures the advent of IoT that envisions the connection of day‐to‐day physical objects to the Internet.
Illustration of the evolution of IoT, from computer-to-computer local network (Phase 1), to the Internet and WWW (Phase 2), to mobile Internet (Phase 3), to mobile Internet and social networks (Phase 4), to IoT (Phase 5).
Figure 1.1 Evolution of IoT.
Similar to that of the Internet, IoT also has its own journey; it is the culmination of convergence of different visions like Things oriented, Internet oriented, and Semantic oriented [31,32]. According to the definition in [45], IoT allows people and things to be connected anytime, anyplace, with anything and anyone, ideally using any path or network and any service. Continuing the momentum, one recent proposition named as Social Internet of Things (SIoT) aims to interconnect the IoT to human social networks [33]. SIoT explains how the objects are capable of establishing social relationships in an autonomous way with respect to their owners. Another prominent facet of IoT is Industrial Internet of Things (IIoT) which intends to transform the entire existing industrial manufacturing and maintenance system to a smart e...

Table of contents

  1. Cover
  2. Table of Contents
  3. About the Editors
  4. List of Contributors
  5. Preface
  6. Acknowledgments
  7. Part I: IoT Overview
  8. Part II: IoT Network and Communication Authentication
  9. Part III: IoT User Level Authentication
  10. Part IV: IoT Device Level Authentication
  11. Part V: IoT Use Cases and Implementations
  12. Index
  13. End User License Agreement