logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Iot Security: Advances in Authentication

Iot Security: Advances in Authentication (Hardcover)

Mika Ylianttila, Madhusanka Liyanage, An Braeken, Pardeep Kumar (지은이)
John Wiley & Sons Inc
236,230원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
153,540원 -35% 0원
1,540원
152,000원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Iot Security: Advances in Authentication
eBook 미리보기

책 정보

· 제목 : Iot Security: Advances in Authentication (Hardcover) 
· 분류 : 외국도서 > 컴퓨터 > 네트워킹 > 보안
· ISBN : 9781119527923
· 쪽수 : 320쪽
· 출판일 : 2020-02-10

목차

Preface

Acknowledgments

Part I : IoT Overview 

Chapter 1: Introduction to IoT

1. Introduction

1.1. Evolution of IoT

2. IoT Architecture and Taxonomy

3. Standardization Efforts

4. IoT Applications

4.1. Smart Home

4.2. Smart City

4.3. Smart Energy

4.4. Healthcare

4.5. IoT Automotive

4.6. Gaming, AR and VR

4.7. Retail

4.8. Wearable

4.9. Smart Agriculture

4.10. Industrial Interne

4.11. Tactile Internet

5. Conclusion

Chapter 2: Introduction to IoT Security

1. Introduction

2. Attacks and Countrameasures

2.1. Perception Layer

2.2. Network Layer

2.3. Application Layer

3. Authentication and Authorization

3.1. Authentication

3.2. Authorization

3.3. Authentication at IoT Layers

4. Other Security Features and Related Issues

4.1. The Simplified Layer Structure

4.2. The Idea of Middleware

4.3. Cross-Layer Security Problem

4.4. Privacy

4.5. Risk Mitigation

5. Discussion

Part II : IoT Network and Communication Authentication

Chapter 3:  Symmetric Key Based Authentication with an Application to Wireless Sensor Networks

1. Introduction

2. Related Work

3. System Model and Assumptions

3.1. Design goals

3.2. Setting

3.3. Notations

3.4. Attack model

4. Scheme in normal mode

4.1. Installation phase

4.2. Group node key

4.3. Individual cluster key

4.4. Pairwise key derivation

4.5. Multicast key

4.6. Group cluster key

5. Authentication

6. Scheme in change mode

6.1. Capture of CN

6.2. Capture of CH

6.3. Changes for honest nodes

7. Security analysis

7.1. Resistance against impersonation attack

7.2. Resistance against node capture

7.3. Resistance against replay attacks

8. Efficiency

8.1. Number of communication phases

8.2. Storage requirements

8.3. Packet fragmentation

9. Conclusions

Chapter 4:  Public Key Based Protocols – EC Crypto

1. Introduction to ECC

1.1. Notations

1.2. ECC for authentication and key management

2. ECC based Implicit Certificates

2.1. Authentication and key management using ECC implicit certificates

3. ECC based signcryption

3.1. Security features

3.2. Scheme

4. ECC based group communication

4.1. Background and assumptions

4.2. Scheme

5. Implementation aspects

6. Discussion

Chapter 5:  Lattice-Based Cryptography and Internet of Things

1. Introduction

1.1. Organization

2. Lattice-Based Cryptography

2.1. Notations

2.2. Preliminaries

2.3. Computational Problems

2.4. State-of-the-Art

3. Lattice-Based Primitives

3.1. One-way and collision-resistant hash functions

3.2. Passively secure encryption

3.3. Actively secure encryption

3.4. Trapdoor functions

3.5. Gadget trapdoor

3.6. Digital signatures without trapdoors

3.7. Pseudorandom functions (PRF)

3.8. Homomorphic Encryption

3.9. Identity-Based Encryption (IBE)

3.10. Attribute-Based Encryption

4. Lattice-Based Cryptography for IoT

5. Conclusion 

Part III: IoT User Level Authentication

Chapter 6:  Efficient and Anonymous Mutual Authentication Protocol in Multi-Access Edge Computing (MEC) Environments

1. Introduction

2. Related work

3. Network model and adversary model

4. Proposed Scheme

4.1. System setup for the edge nodes registration at the registration center

4.2. User registration phase

4.3. Login and user authentication phase

4.4. Password update phase

5. Security and Performance evaluation

5.1. Informal security analysis

5.2. Performance analysis

6. Conclusion

Chapter 7:  Biometric-Based Robust Access Control Model for Industrial Internet of Things Applications

1. Introduction

2. Related work:

3. Network model, threat model and security requirements.

3.1. Network model:

3.2. Threat model:

3.3. Security goals:

4. Proposed Access Control Model in IIoT

4.1. System setup:

4.2. Authentication and key establishment:

5. Security and performance evaluations:

5.1. Informal security analysis:

5.2. Performance analysis:

6. Conclusions:

Chapter 8:  Gadget Free Authentication

1. Introduction to Gadget Free World

2. Introduction to Biometrics

3. Gadget Free Authentication

4. Preliminary aspects

4.1.  Security Requirements

4.2. Setting

4.3. Notations

5. The system

5.1. Registration phase

5.2. Installation phase

5.3. Request phase

5.4. Answer phase

5.5. Update phase

6. Security analysis

6.1. Accountability

6.2. Replay attacks

6.3. Insider attacks

6.4. HW/SW attacks

6.5. Identity privacy

7. Performance Analysis

7.1. Timing for cryptographic/computational operation

7.2. Communication cost

8. Conclusions 

Chapter 9:  WebMaDa 2.1 – A Web-Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel

1. IoT-related Concerns

2. Design Decisions

3. WebMaDa’s History

4. WebMaDa 2.1

4.1. Email Notifications

4.2. Data Control Support

5. Implementation

5.1. Mailing Functionality

5.2. Logging Functionality

5.3. Filtering Functionality

6. Proof of Operability

6.1. Automated Request Handling

6.2. Filtering Functionality Using Logging Solution

7. Summary and Conclusions

Part IV:  IoT Device Level Authentication

Chapter 10:  PUF Based Authentication and Key Exchange for Internet of Things

1. Introduction

2. Related Work

2.1. Key Agreement from IoT Device to Server

2.2. Key Agreement between Two IoT Devices

3. Preliminaries

3.1. System Architecture

3.2. Assumptions

3.3. Attack model

3.4. Cryptographic Operations

4. Proposed system

4.1. Registration phase

4.2. Security Association phase

4.3. Authentication and Key Agreement Phase

5. Security Evaluation

6. Performance

6.1. Computational Cost

6.2. Communication Cost

7. Conclusions

Chapter 11:  Hardware Based Encryption via Generalized Synchronization of Complex Networks

1. Introduction

2. System scheme: Synchronization without correlation

2.1. The Delay-Filter-Permute block

2.2. Steady-state dynamics of the DFP

2.3. DFP bitstream generation

2.4. Sensitivity to changes in the permutation table

3. The chaotic followers

3.1. The Permute-Filter block

3.2. Brute force attack

3.3. PF bitstream generation

4. The complete system

4.1. Image encryption example

4.2. Usage for authentication

5. Conclusions and outlook 

Part V : IoT Use cases and Implementations

Chapter 12:  IoT Use Cases and Implementations: Healthcare

1. Introduction

2. Remote patient monitoring architecture

3. Security related to eHealth

3.1. IoT authentication

4. Remote patient monitoring security

4.1. Mobile Application Security

4.2. Communication Security

4.3. Data Integrity

4.4. Cloud Security

4.5. Audit Logs

4.6. Intrusion detection module

4.7. Authentication architecture

4.8. Attacks on remote patient monitoring platform

5. Conclusion

Chapter 13:  Secure and Efficient Privacy-Preserving Scheme in Connected Smart Grid Networks

1. Introduction

2. Preliminaries

2.1. System model

2.2. Security requirements

2.3. Cryptographic operations and notations

3. Proposed Scheme

3.1. Initialisation phase

3.2. Smart meter registration phase

3.3. Secure Communication between smart meter and aggregator

4. Security Analysis

4.1. Formal proof

4.2. Informal discussion

5. Performance Analysis

5.1. Computation costs

5.2. Communication costs

6. Conclusions

Chapter 14:  Blockchain-Based Cyber Physical Trust Systems

1. Introduction

2. Related work

3. Overview of use-cases and security goals

4. Proposed Approach

5. Evaluation results

5.1. Security features

5.2. Testbed results

6. Conclusion

Index

저자소개

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책