Securing the internet of things:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge, MA
Syngress, Elsevier
[2017]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | x, 144 Seiten Illustrationen, Diagramme |
ISBN: | 9780128044582 0128044586 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV044331060 | ||
003 | DE-604 | ||
005 | 20180208 | ||
007 | t | ||
008 | 170530s2017 a||| |||| 00||| eng d | ||
020 | |a 9780128044582 |9 978-0-12-804458-2 | ||
020 | |a 0128044586 |9 0-12-804458-6 | ||
035 | |a (OCoLC)992150584 | ||
035 | |a (DE-599)BSZ489087094 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-521 |a DE-Aug4 | ||
050 | 0 | |a TK5105.8857 | |
082 | 0 | |a 004.678 | |
084 | |a ST 205 |0 (DE-625)143613: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Li, Shancang |e Verfasser |0 (DE-588)138683891 |4 aut | |
245 | 1 | 0 | |a Securing the internet of things |c Shancang Li, Li Da Xu |
264 | 1 | |a Cambridge, MA |b Syngress, Elsevier |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a x, 144 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
505 | 8 | 0 | |t About the Authors |t Introduction: Securing the Internet of Things |t Security Architecture in the Internet of Things |t Security and Vulnerability in the Internet of Things IoT Node Authentication |t Security Requirements in IoT Architecture |t Security in Enabling Technologies |t Existing Security Scheme for IoT |t Security Concerns in Social IoT |t Confidentiality and Security for IoT Based Healthcare |t Index |
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Internet of things | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Computer security | |
689 | 0 | 0 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Xu, Li |e Verfasser |0 (DE-588)132942615 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029734306&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029734306 |
Datensatz im Suchindex
_version_ | 1804177556388184064 |
---|---|
adam_text | ABOUT THE AUTHORS...........................................................ix
CHAPTER 1 Introduction: Securing the Internet of Things.....................1
Shancang Li
1.1 Introduction.......................................... 1
1.1.1 Overview......................................... 1
1.1.2 State-of-the-Art...................................2
1.1.3 Security Requirements..................... .....4
1.2 Security Requirements in ioT Architecture.................6
1.2.1 Sensing Layer and IoT End-Nodes ............. 7
1.2.2 Network Layer................................... .9
1.2.3 Service Layer............................... 11
1.2.4 Application—Interface Layer.......................13
1.2.5 Cross-Layer Threats........................... 14
1.2.6 Threats Caused in Maintenance of IoT..............15
1.3 Security in Enabling Technologies..................... 15
1.3.1 Security in Identification and Tracking Technologies ....15
1.3.2 Security in Integration of WSN and RFID...........16
1.3.3 Security in Communications....................... 17
1.3.4 Security in Networks .............................18
1.3.5 Security in Service Management....................18
1.4 Security Concerns in IoT Applications....................19
1.4.1 Security Concerns in SCADA Systems................19
1.4.2 Security Concerns in Enterprise information
Systems..................................... ....20
1.4.3 Security Concerns in Social IoT................. 21
1.4.4 Confidentiality and Security for loT-Based
Healthcare........................................22
1.5 Summary..................................................22
References...................................................23
CHAPTER 2 Security Architecture in the Internet of Things.................. 27
Shancang Li
2.1 Introduction....................................... 27
2-2 Security Requirements in IoT........................... 28
2.2.1 !oT Data Security Challenges.........................29
2.2.2 Security in the Sensing Layer.............................31
2.2.3 Security in the Network Layer.............................32
2.2.4 Security in the Service Layer.............................32
2.2.5 Security in the Interface Layer...........................33
2.2.6 Challenges to Secure ioT..................................33
2.3 insufficient Authentication/Authorization.......................34
2.3.1 Authentication in ioT....................................-34
2.3.2 Authorization.............................................34
2.3.3 Insufficient Authentication/Authorization.................35
2.3.4 Insufficient Device Authentication in IoT.................36
2.4 Insecure Access Control....................................37
2.4.1 Role-Based Access Control Systems.........................38
2.4.2 Access Control List-Based Systems ...................... .38
2.4.3 Capability-Based Access...................................39
2.4.4 Challenges in Access Control..............................40
2.5 Threats to Access Control, Privacy, and Availability............40
2.5.1 Threats in Network Layer..................................42
2.5.2 Threats in Sensing Layer..................................43
2.5.3 Threats in Cross-Layer and Maintenance of IoT............45
2.6 Attacks Specific to IoT.................................... ...46
2.6.1 Physical Access...........................................46
2.6.2 Local Attacks Over WiFi...................................48
References............................................................48
CHAPTER 3 Security and Vulnerability in the Internet of Things...............49
Shancang Li
3.1 Secrecy and Secret-Key Capacity.................................49
3.2 Authentication/Authorization for Smart Devices................ 52
3.3 Transport Encryption.......................................... 56
3.3.1 Transport Layer Security..................................57
3.3.2 Secure Sockets Layer......................................57
3.3.3 HTTPS.....................................................57
3.3.4 Transport Trust in IoT....................................58
3.4 Secure Cloud/Web Interface......................................59
3.5 Secure Software/Firmware........................................60
3.6 Physical Layer Security....................................... 63
3.7 Summary....................................................... 65
References............................................................66
Further Reading.......................................................66
CHAPTER 4 IoT Node Authentication...............................................69
Shancang Li
4.1 Security Goals in IoT...........................................70
4.2 Public-Key-Based Authentication.................................71
4.2.1 Symmetric Cryptography....................................73
4.2.2 Public-Key Cryptography,...........................75
4.2.3 Public Key Infrastructure......................... 76
4.3 Identity-Based Authentication, Encryption, and Digital
Signature.................................................78
4.3.1 Identify-Based Authentication................... ...78
4.3.2 Digital Signature...................................80
4.3.3 Raw Public Key.......................................83
4.3.4 X.509 Certificates ................................84
4.4 IP Connectivity...........................................85
4.4.1 Datagram Transport Layer Security,.................85
4.4.2 Constrained Application Protocol....................88
4.5 Lightweight Cryptography................................... 88
4.5.1 Efficiency of End-to-End Communication....................89
4.5.2 Applicability to Lower Resource Devices..................89
4.6 Existing Security Schemes for foT................... 90
4.7 Summary................................................. 93
Further Reading................................................93
CHAPTER 5 Security Requirements in loT Architecture...........................97
Shancang Li
5.1 Introduction..............................................97
5.1.1 Security Challenges in loT Environment...............99
5.1.2 Sensing Layer and loT End-Nodes....................100
5.2 Network Layer............................................ 102
5.3 Service Layer.............................................104
5.4 Application-Interface Layer...............................106
5.5 Cross-Layer Threats.................................. 107
5.6 Threats Caused in Maintenance of loT....................... 108
References ...................................................108
CHAPTER 6 Security in Enabling Technologies .................................109
Shancang Li and Li Da Xu
6.1 Security in Identification and Tracking Technologies......109
6.1.1 Identification.............................. 110
6.2 Security in Integration of Wireless Sensor Network and
RFID......................................................111
6.3 Security in Communications ...............................114
6.4 Security Protocols and Privacy Issues into 6L0WPAN
Stack.......................................................115
6.5 Security in Service Management......................... 115
References .................................................... 116
Further Reading.............................................. 116
CHAPTER 7 Existing Security Scheme for loT...................................119
imed Romdhani
7.1 Data Security and Privacy,................................119
7.2 Data Confidentiality and Key Management,..................120
7.3 Literature Review.................................. 123
References................................................127
Further Reading......................................... 129
CHAPTER 8 Security Concerns in Social loT............. 131
Imed Romdhani
References.............................................. 132
CHAPTER 9 Confidentiality and Security for loT Based Healthcare....133
Imed Romdhani
References.............................................. 136
Further Reading...........................................137
INDEX.....................,............................................141
|
any_adam_object | 1 |
author | Li, Shancang Xu, Li |
author_GND | (DE-588)138683891 (DE-588)132942615 |
author_facet | Li, Shancang Xu, Li |
author_role | aut aut |
author_sort | Li, Shancang |
author_variant | s l sl l x lx |
building | Verbundindex |
bvnumber | BV044331060 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.8857 |
callnumber-search | TK5105.8857 |
callnumber-sort | TK 45105.8857 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 205 ST 277 |
contents | About the Authors Introduction: Securing the Internet of Things Security Architecture in the Internet of Things Security and Vulnerability in the Internet of Things IoT Node Authentication Security Requirements in IoT Architecture Security in Enabling Technologies Existing Security Scheme for IoT Security Concerns in Social IoT Confidentiality and Security for IoT Based Healthcare Index |
ctrlnum | (OCoLC)992150584 (DE-599)BSZ489087094 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02193nam a22004698c 4500</leader><controlfield tag="001">BV044331060</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180208 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170530s2017 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128044582</subfield><subfield code="9">978-0-12-804458-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128044586</subfield><subfield code="9">0-12-804458-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992150584</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ489087094</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.8857</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.678</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 205</subfield><subfield code="0">(DE-625)143613:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Li, Shancang</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)138683891</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing the internet of things</subfield><subfield code="c">Shancang Li, Li Da Xu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA</subfield><subfield code="b">Syngress, Elsevier</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 144 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="505" ind1="8" ind2="0"><subfield code="t">About the Authors</subfield><subfield code="t">Introduction: Securing the Internet of Things</subfield><subfield code="t">Security Architecture in the Internet of Things</subfield><subfield code="t">Security and Vulnerability in the Internet of Things IoT Node Authentication</subfield><subfield code="t">Security Requirements in IoT Architecture</subfield><subfield code="t">Security in Enabling Technologies</subfield><subfield code="t">Existing Security Scheme for IoT</subfield><subfield code="t">Security Concerns in Social IoT</subfield><subfield code="t">Confidentiality and Security for IoT Based Healthcare</subfield><subfield code="t">Index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet of things</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xu, Li</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)132942615</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029734306&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029734306</subfield></datafield></record></collection> |
id | DE-604.BV044331060 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:49:57Z |
institution | BVB |
isbn | 9780128044582 0128044586 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029734306 |
oclc_num | 992150584 |
open_access_boolean | |
owner | DE-739 DE-521 DE-Aug4 |
owner_facet | DE-739 DE-521 DE-Aug4 |
physical | x, 144 Seiten Illustrationen, Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Syngress, Elsevier |
record_format | marc |
spelling | Li, Shancang Verfasser (DE-588)138683891 aut Securing the internet of things Shancang Li, Li Da Xu Cambridge, MA Syngress, Elsevier [2017] © 2017 x, 144 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index About the Authors Introduction: Securing the Internet of Things Security Architecture in the Internet of Things Security and Vulnerability in the Internet of Things IoT Node Authentication Security Requirements in IoT Architecture Security in Enabling Technologies Existing Security Scheme for IoT Security Concerns in Social IoT Confidentiality and Security for IoT Based Healthcare Index Internet der Dinge (DE-588)7713781-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internet of things Computer networks / Security measures Computer security Internet der Dinge (DE-588)7713781-4 s Computersicherheit (DE-588)4274324-2 s DE-604 Xu, Li Verfasser (DE-588)132942615 aut Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029734306&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Li, Shancang Xu, Li Securing the internet of things About the Authors Introduction: Securing the Internet of Things Security Architecture in the Internet of Things Security and Vulnerability in the Internet of Things IoT Node Authentication Security Requirements in IoT Architecture Security in Enabling Technologies Existing Security Scheme for IoT Security Concerns in Social IoT Confidentiality and Security for IoT Based Healthcare Index Internet der Dinge (DE-588)7713781-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7713781-4 (DE-588)4274324-2 |
title | Securing the internet of things |
title_alt | About the Authors Introduction: Securing the Internet of Things Security Architecture in the Internet of Things Security and Vulnerability in the Internet of Things IoT Node Authentication Security Requirements in IoT Architecture Security in Enabling Technologies Existing Security Scheme for IoT Security Concerns in Social IoT Confidentiality and Security for IoT Based Healthcare Index |
title_auth | Securing the internet of things |
title_exact_search | Securing the internet of things |
title_full | Securing the internet of things Shancang Li, Li Da Xu |
title_fullStr | Securing the internet of things Shancang Li, Li Da Xu |
title_full_unstemmed | Securing the internet of things Shancang Li, Li Da Xu |
title_short | Securing the internet of things |
title_sort | securing the internet of things |
topic | Internet der Dinge (DE-588)7713781-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Internet der Dinge Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029734306&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lishancang securingtheinternetofthings AT xuli securingtheinternetofthings |