Download ebooks file A Beginner’s Guide to Internet of Things Security-Attacks, Applications, Authentication, and Fundamentals First Edition B. B. Gupta (Author) all chapters
Download ebooks file A Beginner’s Guide to Internet of Things Security-Attacks, Applications, Authentication, and Fundamentals First Edition B. B. Gupta (Author) all chapters
Download ebooks file A Beginner’s Guide to Internet of Things Security-Attacks, Applications, Authentication, and Fundamentals First Edition B. B. Gupta (Author) all chapters
com
https://textbookfull.com/product/a-beginners-guide-to-
internet-of-things-security-attacks-applications-
authentication-and-fundamentals-first-edition-b-b-gupta-
author/
OR CLICK BUTTON
DOWNLOAD NOW
https://textbookfull.com/product/biota-grow-2c-gather-2c-cook-loucas/
textboxfull.com
https://textbookfull.com/product/internet-of-things-security-
principles-applications-attacks-and-countermeasures-1st-edition-gupta/
textboxfull.com
https://textbookfull.com/product/cross-site-scripting-attacks-
classification-attack-and-countermeasures-1st-edition-b-b-gupta-
author/
textboxfull.com
Enabling the Internet of Things: Fundamentals, Design and
Applications 1st Edition Muhammad Azhar Iqbal
https://textbookfull.com/product/enabling-the-internet-of-things-
fundamentals-design-and-applications-1st-edition-muhammad-azhar-iqbal/
textboxfull.com
https://textbookfull.com/product/towards-the-internet-of-things-
architectures-security-and-applications-mohammad-ali-jabraeil-jamali/
textboxfull.com
https://textbookfull.com/product/introduction-to-mechanism-design-
with-computer-applications-first-edition-b-dyer/
textboxfull.com
https://textbookfull.com/product/entrepreneurship-e-business-1st-
edition-vandana-gupta-dr-a-b-mishra/
textboxfull.com
https://textbookfull.com/product/a-guide-to-quantitative-methods-y-b-
almquist/
textboxfull.com
A Beginner’s Guide
to Internet of Things
Security
A Beginner’s Guide
to Internet of Things
Security
Attacks, Applications,
Authentication, and Fundamentals
B. B. Gupta
Aakanksha Tewari
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources.
Reasonable efforts have been made to publish reliable data and information, but the
author and publisher cannot assume responsibility for the validity of all materials or the
consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders if
permission to publish in this form has not been obtained. If any copyright material has not
been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted,
reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other
means, now known or hereafter invented, including photocopying, microfilming, and
recording, or in any information storage or retrieval system, without written permission
from the publishers.
For permission to photocopy or use material electronically from this work, please access
www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance
Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-
for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of
payment has been arranged.
-B. B. Gupta
-Aakanksha Tewari
Contents
Preface xi
Acknowledgments xiii
Authors xv
vii
viii Contents
41
5.1 Privacy in IoT 41
5.2 Threat to Data Privacy in IoT 43
5.3 Enforcing Trust in IoT 44
5.4 Trust Management 46
5.5 Conclusion 47
References 83
Index 91
Preface
The potential capabilities of Internet of Things (IoT) can reduce a lot of time
and expenditure of various organizations. These devices are excellent data
collectors and sensors; therefore, they can help in efficient decision-making
in a wide range of applications. However, security remains the biggest issue in
the IoT domain. A lot of research is being carried out in this area to provide
strong security and privacy mechanisms in IoT networks. The development
of standards and protocol sets is necessary to build the IoT network properly.
Only time will ultimately tell how far IoT will reach and how it will reshape
the world. However, by the planned integration of existing technologies, we
can make IoT networks secure and more efficient. We address various issues in
securing IoT networks, which enabled us to develop various mutual authentica-
tion protocols that strengthen the security and privacy of IoT devices and pre-
vent confidential data from theft. The present scenario of IoT research is mainly
focused on the development of technologies for its implementation. By exam-
ining the recent statistics and literature, it also uncovers various challenges
that have the potential to prevent IoT from growing to its full potential.
Specifically, the chapters contained in this book are summarized as
follows:
xi
xii Preface
Writing a book is a huge task and more rewarding than one could fathom. This
book entitled A Beginner’s Guide to Internet of Things Security is the result of
great contributions and encouragement from many people. None of this would
have been possible without their ideas and support, which has helped greatly
in enhancing the quality of this book. The authors would like to acknowledge
the incredible CRC Press/Taylor & Francis Group staff, particularly Randi
Cohen and her team, for their continuous assistance and motivation. This book
would not have been possible without their technical support. The authors are
eternally grateful to their families for their love and unconditional support at
all times. In the end, the authors are most thankful towards the Almighty who
is always helping us to overcome every obstacle not only for this work but also
throughout our lives.
September 2019
B. B. Gupta
Aakanksha Tewari
xiii
Authors
xv
Evolution of
Internet of
Things (IoT)
1
History, Forecasts,
and Security
The Internet of Things (IoT) is a new paradigm which is transforming
everything from the consumer market, that is, household devices to industrial
applications at large scales. The Internet was always intended to bring pieces
of software, services, and people together on one platform at a global level [1].
Nowadays with the evolution of IoT, day-to-day objects have also become
a part of the Internet sending and receiving updates continuously from one
place to another. Therefore, we can define IoT as a network of interconnected
devices, which provide services and share data-connecting and performing
tasks in various applications [2].
The highly distributed and dynamic nature of IoT enables it to receive and
store data continuously in huge amounts. For example, in the field of health-
care, it has led to remote health monitoring, emergency notifications, etc. The
consumer electronics markets are also exploding with wearable gadgets [3].
Various domains such as wireless sensor networks (WSN), embedded systems,
and radio frequency identification (RFID) are found to be huge contributors
towards the growth of IoT.
As IoT is an evolving domain, it requires a lot of attention from the
researchers and the industry as well. Various standardization organizations
such as IEEE and IETF are also working towards developing standards and
protocols for IoT architecture. The sensors and actuators that are consumed in
1
2 A Beginner’s Guide to Internet of Things Security
the consumer electronics market are very low cost and small sized and have
high computational capabilities, which are the reasons for the growth of IoT as
automation is made so easy. Industries are also deploying IoT at large scales
such as in retail management and transportation [3,4].
The understructure for IoT is the Internet providing connectivity, which
also adds to the vulnerabilities in these networks. IoT networks face the same
security threats as the Internet; in addition, due to their limited capabilities and
simpler architecture, they are easier to compromise. At the physical layer, most
of the IoT devices use RFID, therefore ensuring that RFID tags can secure our
data from any threat to security and privacy [5].
Our aim is to perform an in-depth analysis of the recent advancements in
the field of security and privacy in IoT networks. Research needs to be done
in order to facilitate the integration of IoT with other technologies in a secure
environment. This can be accomplished by designing standard communi-
cation methodologies and standard protocols. It is a primary requirement
to make IoT power efficient and reliable. The use of proper authentication
mechanisms is one way to ensure security against various attacks and main-
tain the availability and integrity of data and services at all times for autho-
rized users.
The aforementioned trends show that the rapid growth IoT has been in the past
few years as well as its potential growth in the coming years. It is estimated that
the economy of IoT security will be around $28.90 billion in 2020. However,
in 2015, it was $6.89 billion. The growth in IoT requires a significant amount
of investment in its security as well. We need security mechanisms that can
protect the IoT network architecture as a whole [12,13].
The current rate of development in IoT technology will help us predict
its future. Currently, the number of connected IoT devices is around
5 billion, most of which are personal devices. Most of the devices are
1 • Evolution of Internet of Things (IoT) 5
FIGURE 1.2 Percentage growth of IoT applications in the next ten years.
(Source: DBS Bank.)
6 A Beginner’s Guide to Internet of Things Security
carry out attacks, which can disrupt services or transfer control to attackers at
remote locations. IoT devices are vulnerable to various attacks such as replay,
forgery, phishing, and denial of service.
In January 2015, Proofpoint revealed a spamming incident where the traf-
fic was routed through several devices across various countries. This global
attack had more than 750,000 malicious emails transferred from various
locations, which were sent from consumer devices such as home routers,
televisions, media and centers. Later on, it was discovered that at least one
refrigerator was also involved in this attack. It was observed that the incident
started from December 23, 2014, and continued till January 6, 2014, where
the malicious email traffic was sent thrice a day with a burst size of 100,000
emails each. The targets were both enterprises and individuals. The primary
cause of these attacks was a lack of caution and awareness. The attackers
exploited misconfigurations and the continued use of default passwords, which
made the devices vulnerable and easy to control [13–15].
Another wave of IoT attacks occurred in 2016, which mainly involved
devices such as IP cameras and routers. The compromised devices were turned
into botnets. These botnets were used collectively to launch attacks on a large
scale. The cybercriminals are becoming more and more advanced. In an attack
in 2018, a device that controlled around 15 CCTV cameras was attacked.
However, in due time, the security operator detected the malicious activity and
issued a warning that this might infect many more CCTV models. Another
cause of these flaws is a lack of complete patching of IoT devices [16].
The IoT-based companies sometimes ignore security, or they are not expe-
rienced enough to realize the gravity of the situation (Figures 1.3 and 1.4).
Lack of consumer awareness is also a very big cause behind these successful
attacks. Consumers are often excited about the features and functions these
devices provide so that they do not pay attention to security updates and setting
strong passwords.
The attacks are proof of the lack of security schemes in IoT networks,
which need to be taken very seriously. In the current scenario, IoT gadgets are
vulnerable to various attacks that may disrupt their services and transfer the
control to some remote attacker. The attacker can impersonate a server and
make the devices decrease their message-sending rates or increase the rate of
their resource consumption and bandwidth. The attacker might also imper-
sonate any tag and send multiple fake requests to engage servers’ resources
eventually leading to DoS.
IoT devices are also needed to be protected from a wide range of threats,
which include malware infections, disruption of services, and information
theft. The attacker could easily gain in controlling the devices that are a
part of smart home, automobiles, or personal fitness and disease-monitoring
gadgets. An attacker can simply hack the software in a person’s smart watch
or an insulin pump to track their location, or they might gain access to
the information systems present in the automobiles and use them to carry
malicious activities.
The most serious threat IoT devices face is malware such as Trojans,
viruses, and worms that can disable IoT systems. Besides, this work also needs
to be done to ensure that updates received by IoT devices are secure along with
secure default settings. There is still a huge room for improvement when it
comes to securing the IoT architecture.
8 A Beginner’s Guide to Internet of Things Security
1.4 CONCLUSION
Our research work has addressed various issues in securing IoT networks,
which enabled us to develop various mutual authentication protocols that
strengthen the security and privacy of IoT devices and prevent confidential
data from theft. We have discussed that the present scenario of IoT research
is mainly focused on the development of technologies for its implementation.
By examining the recent statistics and literature, we have also uncovered vari-
ous challenges that have the potential to prevent IoT from growing to its full
potential.
The potential capabilities of IoT can reduce a lot of time and expenditure
of various organizations. These devices are excellent data collectors and sen-
sors; therefore, they can help in efficient decision-making in a wide range of
applications. However, security remains the biggest issue in the IoT domain.
A lot of research is being carried out in this area to provide strong security
and privacy mechanisms in IoT networks. The development of standards and
protocol set is necessary to build the IoT network properly. Only time will ulti-
mately tell how far IoT will reach and how it will reshape the world. However,
by the planned integration of existing technologies, we can make IoT networks
secure and more efficient.
IoT Design,
Standards,
and Protocols
2
The Internet of Things (IoT) is a highly distributed and dynamic cyber-physical
system. It integrates devices having sensors, identification systems, storage,
communication, processing, and networking capabilities. With the advance-
ment of technology, sensors and actuators have more complex specifications,
which are available in lesser cost and smaller sizes nowadays. These devices
are making the growth of ubiquitous computing easier. Various industries are
deploying IoT for the development of industrial applications to increase auto-
mation and monitoring. The rapid advancement of technology and industrial-
ization will enable the applications of IoT in various fields and industries. For
example, consider the food industry that has integrated radio frequency iden-
tification (RFID) technology with wireless sensor networks (WSN) in order
to automate the process of monitoring, tracking, and measuring the quality of
food of any food supply chain [1,2].
In this chapter, we will survey the current scenario of security and trust
management in IoT by analyzing existing works and taxonomies of security
schemes and checking their compatibility with the existing IoT applications.
We also open issues and challenges and the expected future trends related to
IoT growth and need of security. The ongoing research in the field of IoT is
majorly focused on technology [3]. The full realization of IoT is not done yet;
therefore, there are huge opportunities of technical growth and development in
the field of IoT. However, the rapid growth rate of technology and the research
in IoT will have applications in the fields such as law, economics, management,
and social studies [4]. RFID technology, which is a primary enabler for IoT,
has also seen a rapid growth in the last couple of years. It has applications in
the field of retail management, transportation and logistics, and healthcare [8].
With the increasing use of RFID, the maintenance of security and data privacy
has also become a chief concern.
RFID systems are always deployed in bulk; these systems comprise a set
of tags that have some storage and computational capabilities. These tags are
11
12 A Beginner’s Guide to Internet of Things Security
What is the subtle charm of “Manon Lescaut” which has given it the
place of a classic in French fiction, and which causes it to be read at
the present time with the same delight as when it was written? It
does not sparkle with wit, nor is it filled with wisdom. The heroine is
far from being an estimable character, and the poor hero, the
Chevalier des Grieux, is admirable only in one thing—in his constant
and self-sacrificing devotion to the unworthy object of his passion.
This sounds like rather poor material for a novel, yet so charmingly
and simply is the story told, so deep and so natural is the Chevalier’s
passion, that he invests his wayward mistress in our eyes with the
same charms that he sees in her himself, until we pardon the
infidelities of the beautiful creature almost as readily as he.
TOM JONES
HENRY FIELDING
There are some who insist that Fielding’s “Tom Jones” has not been
surpassed by the work of any of the later novelists.
On the other hand, hypocrisy becomes living flesh and blood in the
person of the discreet, pious, treacherous, cold-blooded Blifil, who
“visited his friend Jones but seldom, and never alone,” and
“cautiously avoided any intimacy lest it might contaminate the
sobriety of his own character.”
“Recount, O Muse, the names of those who fell on this fatal day.
First, Jemmy Tweedle felt on his hinder head the direful bone.
Him the pleasant banks of sweetly winding Stour had nourished,
where he first learnt the vocal art, with which, wandering up and
down at wakes and fairs, he cheered the rural nymphs and
swains, when upon the green they interweaved the sprightly
dance, while he himself stood fiddling and jumping to his own
music. How little now avails his fiddle! He thumps the verdant floor
with his carcass.”
Dr. Johnson is one of the few men whose reputation is due, not so
much to his writings (which are generally the source of all permanent
renown in a literary man) as to his conversation and his peculiarities
as recorded by his wonderful biographer—things which in most men
are the source of a very limited and evanescent fame.
The plot is the slenderest possible. Rasselas, the fourth son of the
emperor of Abyssinia, is confined within the “Happy Valley,” from
which exit is impossible, and, wanting nothing, naturally suffers from
ennui. He spends twenty months in fruitless imaginings, and then
four months more in resolving to lose no more time in idle resolves,
when he is awakened to more vigorous exertion by hearing a maid
who had broken a porcelain cup remark, “What cannot be repaired is
not to be regretted.” Then for a few hours he “regretted his regret,”
and from that time bent his whole mind to the means of escape. He
spent ten months trying to find a way out (a job which would be
laughed at by an able-bodied member of the Alpine Club) then he
betook himself to an inventor of a flying machine, who of course
came to grief. Finally a poet, named Imlac, told Rasselas of his
extensive travels, and they received from the conies, who had “dug
holes tending upwards in an oblique line,” a hint as to the means of
escape, of which Dr. Johnson gives the following rather foggy
description: “By piercing the mountain in the same direction, we will
begin where the summit hangs over the middle part and labor
upwards till we issue up behind the prominence.” The two now
proceed to tunnel the mountain, and Nekayah, the prince’s sister,
with her favorite maid, Pekuah, accompany them to the outside
world. They journey to Cairo, where they engage in the search for
happiness,—philosophy, the pastoral life, material prosperity,
solitude, the life led “according to nature,” the splendor of courts, the
modesty of humble life, marriage, and celibacy, all being
successively examined and found wanting. They visit the pyramids,
and here Pekuah is carried away by a band of Arabs, but she is
afterwards ransomed and relates her adventures (which are not
interesting) at considerable length. They admire the learning and
happiness of a certain astronomer, but Imlac finds out that he is
crazy; they consult an old man whose wisdom has deeply impressed
them, but who can give them little comfort; they discuss the merits of
conventual life; finally they visit the catacombs, where Imlac
discourses on the nature of the soul; and at “the conclusion in which
nothing is concluded” (for this is the title of the last chapter), Pekuah
thinks she would like to be the prioress of a convent, Nekayah wants
to learn all the sciences and found a college, Rasselas desires a little
kingdom where he can administer justice, while Imlac and the
astronomer (who has now recovered his right mind) “were contented
to be driven along the stream of life without directing their course to
any particular port.” They all know that none of their wishes can be
gratified, so they resolve to go home. This conclusion might have
been inserted almost anywhere else in the book with equal propriety.
“‘To live according to nature is to act always with due regard to the
fitness arising from the relations and qualities of causes and
effects; to concur with the great and unchangeable scheme of
universal felicity; to cooperate with the general disposition and
tendency of the present system of things.’
“The prince soon found that this was one of the sages whom he
should understand less as he heard him longer. He therefore
bowed and was silent; and the philosopher, supposing him
satisfied, and the rest vanquished, rose up and departed with the
air of a man that had coöperated with the present system.”
I began “Tristram Shandy” several times, and read the greater part of
it on disconnected occasions; yet the poor hero had such a hard
time, through so many hundreds of pages, in getting into the world at
all, that I always gave up without reading the book to the end. And,
to say the truth, nobody ought to read it consecutively. A part of the
humor consists in the endless prolixity with which trifling events are
narrated, and a joke thus lengthened out into the enormous
dimensions of several volumes becomes too huge to handle all at
once. Another part of the humor is displayed in the jumble with which
the events and observations upon them are thrown together. The
preface, for instance (and a very amusing preface it is), is pitched
into the middle of the book. Whole chapters are omitted and their
places supplied by stars, and the subsequent chapters (which tell the
whole story) are given to explaining why these omissions were
made, namely, that the parts left out were too fine for the rest of the
story. The author appropriately asks us, after several volumes of this
confusion, how our heads feel!
Naturally, in such a book a good part of the fun has to be dug out
with considerable labor; and this is not always the way in which
humor is most attractive. To the reader who is anxious for a
denouement, “Tristram Shandy” is a most exasperating work, for
there is no denouement at all. You never get anywhere, and the
book ends, like the Sentimental Journey, right at the midst of
perhaps the most interesting part of it.
“Time wastes too fast; every letter I trace tells me with what
rapidity life follows my pen; the days and hours of it more
precious, my dear Jenny, than the rubies about thy neck, are
flying over our heads like light clouds of a windy day, never to
return more; everything presses on,—whilst thou art twisting that
lock, see! it grows gray; and every time I kiss thy hand to bid
adieu, and every absence which follows it, are preludes to that
eternal separation which we are shortly to make.”
THE VICAR OF WAKEFIELD
OLIVER GOLDSMITH
Upon his return home the vicar finds that the two great ladies from
London have departed, without his daughters, being dissuaded from
taking them by a letter of one Mr. Burchell, a friend of the family, a
gentleman in reduced circumstances, as was supposed, whose
attentions to Sophia have caused her father much anxiety. A letter of
Burchell is discovered, containing some dark insinuations, which are
erroneously thought to apply, not to the two women, but to the vicar’s
own family, and great is the indignation at Burchell for his
scandalous interference. Squire Thornhill continues his attentions to
the vicar’s eldest daughter, and is included with the family in a huge
picture, which is inadvertently made so large that it will not go into
any of the rooms of the vicar’s cottage, but has to stand against the
kitchen wall. Instead of pressing his suit openly, however, the squire
elopes with Olivia, upon whom he imposes a fictitious marriage, and
then, after a time, abandons her. The poor clergyman starts upon a
vain pursuit of his daughter, believing that Burchell is responsible for
her abduction. In his wanderings he comes upon his son George,
who is attached to a company of strolling players, and the young
man gives him an account of his adventures; of his travels in
Holland, whither he has gone to teach the Dutch English, without
reflecting that for this purpose it was necessary that he should first
learn Dutch; of his induction into the art of a connoisseur of pictures
at Paris, where he learns that the whole secret of it consists in a
strict adherence to two rules,—“the one, always to observe the
picture might have been better if the painter had taken more pains;
and the other, to praise the works of Pietro Perugino.” The squire
arrives during the vicar’s interview with his son, and agrees to
purchase for George a commission in a West India regiment, taking
from the father a bond for a hundred pounds, the purchase money.
But shortly afterwards the vicar comes upon his daughter Olivia, who
is in great distress, and he learns from her that it is the squire, and
not Burchell, who has betrayed her. When the good man returns
home he finds his dwelling in flames, and rescues his two little boys,
but is seriously burned in the conflagration, and shortly afterwards he
has an altercation with the squire, who thereupon arrests him for
non-payment of the hundred pounds, and throws him into jail. One of
his fellow-prisoners begins to talk about cosmogony, Sanchoniathon,
etc., and he recognizes the rogue Jenkinson, who now, however,
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com