Rida Khatoun - Cybersecurity in Smart Homes

Здесь есть возможность читать онлайн «Rida Khatoun - Cybersecurity in Smart Homes» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Cybersecurity in Smart Homes: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cybersecurity in Smart Homes»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.

Cybersecurity in Smart Homes — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cybersecurity in Smart Homes», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать
HAHttpContro lier – execute command on actuator Listing 1.10. AngularJSfrontendsendingrequests to the HAHttpController Listing 1.11. Instantiationofthe HA-Module andgatewayattachments Listing 1.12. Guice binding of object instances to interfaces Listing 1.13. Injection of the storage by Guice into the HA-Module constructor Listing 1.14. Usage of an Apache Log4j 2 Logger Figure 1.19. Logging output of CoMaDa (white messages = WebMaDa responses). For ...Figure 1.20. Devices connected to the CoMaDa server and Zigbee2Mqtt configuratio...Figure 1.21. Zigbee2Mqtt’s topic tree. For a color version of this figure, see w...Figure 1.22. Zigbee2Mqtt’s gateway class diagram Listing 1.15. Configuration file with actuator-command-mappings Listing 1.16. Actuator instantiation for ZigBee gateway Listing 1.17. HiveMQ MQTT Java client usage Listing 1.18. ZigBee gateway actuator setDeviceState(...) method Listing 1.19. ZigBee gateway actuator – executing commands Figure 1.23. ZigBee’s gateway administration frontend Listing 1.20. Message class forHA updates Listing 1.21. Handler for uploading messages to WebMaDa Listing 1.22. WebMaDa’s upload handler for HA messages Listing 1.23. SQL procedure inserting new rule logs into the database Listing 1.24. WebMaDa – send HA request to the WSS Listing 1.25. WSS – Handle HA/PULL requests received from WebMaDa Listing 1.26. CoMaDa – handle incoming requests from WebMaDa Figure 1.24. WebMaDa’s HAIFA administration frontend. For a color version of thi...Figure 1.25. WebMaDa’s HAIFA rule edit Listing 1.27. WebMaDa frontend sending HA-requests to the WSS Figure 1.26. Testbed for rule evaluation. For a color version of this figure, se...Figure 1.27. Testing the rule configuration Figure 1.28. Node visualization of temperature measurements. For a color version...

2 Chapter 2Figure 2.1. Smart home ecosystem Figure 2.2. Comparison of IoT protocol stack with Wi-Fi at different layers of t...Figure 2.3. Certificate-based mutual authentication Figure 2.4. DTLS handshake, client-server authentication Figure 2.5. TLS 1.2 and 1.3 comparison Figure 2.6. High level overview of a smart home system Figure 2.7. Device onboarding and authentication

3 Chapter 3Figure 3.1. Telehealth network model. For a color version of this figure, see ww...Figure 3.2. Basic structure of the secure sketch at the server (on the left) and...Figure 3.3. Basic structure of the fuzzy extractor at the server and client. For...Figure 3.4. Structure of a (2, 1, 3) convolutional encoder. For a color version ...Figure 3.5. Structure of an alternative form for a (2, 1, 3) convolutional encod...Figure 3.6. Basic cell structure for a 6-transistor SRAM CMOS cell Figure 3.7. Basic cell structure for NOR gate-based SRAM PUF Figure 3.8. Detail of the basic cell structure for NOR gate-based SRAM PUF Figure 3.9. The pdf distributions of transition probability a due to the differe...Figure 3.10. Algorithm #1 for the authentication of an IoT edge device and secur...Figure 3.11. The Algorithm #1 histogram on the left shows the intra Hamming dist...Figure 3.12. The Algorithm #1 histogram on the left shows the intra Hamming dist...Figure 3.13. The Algorithm #1 histogram on the left shows the intra Hamming dist...Figure 3.14. Algorithm #2 for the authentication of an IoT edge device and secur...Figure 3.15. Algorithm #3 for the authentication of an IoT edge device and secur...

4 Chapter 4Figure 4.1. Smart home system using IoT Figure 4.2. Smart home security system Figure 4.3. Network level security

5 Chapter 5Figure 5.1. Data subjects’ rights Figure 5.2. Zero-trust framework. For a color version of this figure, see www.is...Figure 5.3. Zero-trust framework mapped on LinTO use case

6 Chapter 6Figure 6.1. Security requirements in IoT Figure 6.2. AI, ML and DL. For a color version of this figure, see www.iste.co.u...Figure 6.3. a) Traditional programming; b) machine learning. For a color version...Figure 6.4. Structure of the deep learning network Figure 6.5. Deep learning vs machine learning (Wasicek 2018). For a color versio...Figure 6.6. Deep learning has no feature extraction step. For a color version of...Figure 6.7. Smart home applications and systems. For a color version of this fig...Figure 6.8. Typical neural network structure Figure 6.9. Different deep learning algorithms Figure 6.10. Feed-forward and feedback network architectures Figure 6.11. Data points identified as anomaly detection

7 Chapter 7Figure 7.1. Data flow within the IoT (Schmitt 2019). For a color version of this...Figure 7.2. Attack types in IP networks (Schmitt 2019) Figure 7.3. Assumed WSN Setup for the sTiki Implementation (Siffert 2018) Figure 7.4. Messages sent in the ANOR handshake (Lowack 2013) Figure 7.5. sTiki’s architecture (Siffert 2018). For a color version of this fig...Listing 7.1. sTiki’s main processing function on CoMaDa (Siffert 2018) Figure 7.6. sTiki message M1 captured with Wireshark (Siffert 2018). For a color...Figure 7.7. Testing setup for sTiki (Siffert 2018) Figure 7.8. sTiki message M 4 captured with Wireshark (Siffert 2018). For a color...Figure 7.9. Data Packet with an IV captured with Wireshark (Siffert 2018). For a...Listing 7.2. Debugging output for message M 1 in CoMaDa (Siffert 2018) Figure 7.10. Data Packet with a MC captured with Wireshark (Siffert 2018). For a...Listing 7.3. Debugging output for Data Packet received with MC (Siffert 2018) Figure 7.11. sTiki message M 2 captured with Wireshark (Siffert 2018). For a colo...Figure 7.12. sTiki message M 3captured with Wireshark (Siffert 2018). For a colo...Listing 7.4. XML example for sensors (Sgier 2017) Figure 7.13. CoMaDa’s live stream showing the message aggregation

Guide

1 Cover

2 Table of Contents

3 Title Page SCIENCES Networks and Communications, Field Director – Guy Pujolle Network Security , Subject Head – Rida Khatoun

4 Copyright First published 2022 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address: ISTE Ltd 27-37 St George’s Road London SW19 4EU UK www.iste.co.uk John Wiley Sons, Inc 111 River Street Hoboken, NJ 07030 USA www.wiley.com © ISTE Ltd 2022 The rights of Rida Khatoun to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s), contributor(s) or editor(s) and do not necessarily reflect the views of ISTE Group. Library of Congress Control Number: 2022931518 British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN 978-1-78945-086-6 ERC code: PE6 Computer Science and Informatics PE6_2 Computer systems, parallel/distributed systems, sensor networks, embedded systems, cyber-physical systems PE7 Systems and Communication Engineering PE7_8 Networks (communication networks, sensor networks, networks of robots, etc.)

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Cybersecurity in Smart Homes»

Представляем Вашему вниманию похожие книги на «Cybersecurity in Smart Homes» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Cybersecurity in Smart Homes»

Обсуждение, отзывы о книге «Cybersecurity in Smart Homes» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x