Rida Khatoun - Cybersecurity in Smart Homes

Здесь есть возможность читать онлайн «Rida Khatoun - Cybersecurity in Smart Homes» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Cybersecurity in Smart Homes: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cybersecurity in Smart Homes»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.

Cybersecurity in Smart Homes — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cybersecurity in Smart Homes», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Table of Contents

1 Cover

2 Title Page SCIENCES Networks and Communications, Field Director – Guy Pujolle Network Security , Subject Head – Rida Khatoun

3 Copyright First published 2022 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address: ISTE Ltd 27-37 St George’s Road London SW19 4EU UK www.iste.co.uk John Wiley Sons, Inc 111 River Street Hoboken, NJ 07030 USA www.wiley.com © ISTE Ltd 2022 The rights of Rida Khatoun to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s), contributor(s) or editor(s) and do not necessarily reflect the views of ISTE Group. Library of Congress Control Number: 2022931518 British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN 978-1-78945-086-6 ERC code: PE6 Computer Science and Informatics PE6_2 Computer systems, parallel/distributed systems, sensor networks, embedded systems, cyber-physical systems PE7 Systems and Communication Engineering PE7_8 Networks (communication networks, sensor networks, networks of robots, etc.)

4 1 Home Automation Solutions for SecureWSN 1.1. Introduction 1.2. Background 1.3. Design decisions 1.4. Implementation 1.5. Evaluation of HAIFA 1.6. Summary and conclusions 1.7. Acknowledgements 1.8. References

5 2 Smart Home Device Security: A Survey of Smart Home Authentication Methods with a Focus on Mutual Authentication and Key Management Practices 2.1. Introduction 2.2. Smart home – introduction and technologies 2.3. Smart home security 2.4. Smart home authentication mechanisms 2.5. A primer on mutual authentication and key management terminologies 2.6. Mutual authentication in smart home systems 2.7. Challenges and open research issues 2.8. Conclusion 2.9. References

6 3 SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments 3.1. Introduction 3.2. Related literature 3.3. System design considerations 3.4. Silicon physically unclonable functions(PUF) 3.5. Convolutional encoding and Viterbi decoding the SRAM words 3.6. CMOS SRAM PUF construction 3.7. Algorithms for issuing CRP 3.8. Security of PUF-based IoT devices 3.9. Conclusions 3.10. Acknowledgements 3.11. References

7 4 IoT Network Security in Smart Homes 4.1. Introduction 4.2. IoT and smart home security 4.3. IoT network security 4.4. Prevailing standards and initiatives 4.5. Conclusion 4.6. References

8 5 IoT in a New Age of Unified and Zero-Trust Networks and Increased Privacy Protection 5.1. Introduction 5.2. Internet of Things 5.3. IoT security and privacy challenges 5.4. Literature review 5.5. Security and privacy protection with a zero-trust approach 5.6. Case study: secure and private interactive intelligent conversational systems 5.7. Discussion 5.8. Conclusion 5.9. Acknowledgements 5.10. References

9 6 IOT, Deep Learning and Cybersecurity in Smart Homes: A Survey 6.1. Introduction 6.2. Problems encountered 6.3. State of the art 6.4. IoT architecture 6.5. IoT security 6.6. Artificial intelligence, machine learning and deep learning 6.7. Smart homes 6.8. Anomaly detection in smart homes 6.9. Conclusion 6.10. References

10 7 sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices 7.1. Introduction 7.2. Definitions and history of IoT 7.3. IoT-related security concerns 7.4. Background knowledge for sTiki 7.5. The sTiki protocol 7.6. sTiki’s evaluation 7.7. Summary and conclusions 7.8. Acknowledgements 7.9. References

11 List of Authors

12 Index

13 End User License Agreement

List of Tables

1 Chapter 1Table 1.1. Comparison between MQTT and CoAP Table 1.2. Rule automation for available log types Table 1.3. Automation test procedure

2 Chapter 2Table 2.1. Summary of security threats and challenges for a smart home Table 2.2. Summary of protocols across different IoT layers (Kalla et al. 2020) Table 2.3. Matrix of security architectures and security goals (Authentication (...Table 2.4. Stages of defining an authentication protocol for IoT (Ferrag et al. ...Table 2.5. IoT authentication schemes (El-Hajj et al. 2019) Table 2.6. Examples of smart home authentication proposals Table 2.7. Examples of mutual authentication schemes

3 Chapter 3Table 3.1. The Algorithm #1 maximum intra Hamming distance and inter Hamming dis...Table 3.2. The Algorithm #2 maximum intra Hamming distance and inter Hamming dis...Table 3.3. The Algorithm #3 maximum intra Hamming distance and inter Hamming dis...

4 Chapter 5Table 5.1. Overview of selected IoT operating Systems (OS)

5 Chapter 6Table 6.1. Layers of IoT Table 6.2. Description of different neural network algorithms

6 Chapter 7Table 7.1. sTiki size according to size utility [Byte]

List of Illustrations

1 Chapter 1Figure 1.1. The relationship between all components of a SecureWSN (Schmitt 2019...Figure 1.2. CoMaDa and WebMaDa bi-directional communication (Weber 2020) Figure 1.3. MAPE-K model from IBM (Kephart and Chess 2003). For a color version ...Figure 1.4. High level architecture of the HAIFA model. For a color version of t...Figure 1.5. HAIFA startup sequence Figure 1.6. Adding gateways and actuators to HAIFA Figure 1.7. Overview of HAIFA hardware. For a color version of this figure, see ...Figure 1.8. One iteration of the Automation-Worker cycle Figure 1.9. HAIFA configuration and management endpoints Figure 1.10. HAIFA ZigBee gateway with communication flows Figure 1.11. Database schema of the HAIFA CoMaDa part Figure 1.12. Database schema of the HAIFA WebMaDa part Figure 1.13. HAIFA interfaces and core classes Listing 1.1. Hi-Module life-cycle methods Listing 1.2. HA Module – node-datum mapping update handler Listing 1.3. Hi-Module - create node-datum mappings Figure 1.14. Actuators, commands, and arguments Figure 1.15. Rules and conditions Listing 1.4. The gateway interface Listing 1.5. Implementation of the Automation-Worker Listing 1.6. The storage interface Listing 1.7. The PostgreSQL storage implementation – fetch all rules Listing 1.8. HAHttpController’s registration of the HA-Module Figure 1.16. HAIFA’sadministration frontendin CoMaDa Figure 1.17. Rule log visualization of the administration interface Figure 1.18. Rule creation – AngularJS widgetandsub-widgets. For a color version...Listing 1.9.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Cybersecurity in Smart Homes»

Представляем Вашему вниманию похожие книги на «Cybersecurity in Smart Homes» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Cybersecurity in Smart Homes»

Обсуждение, отзывы о книге «Cybersecurity in Smart Homes» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x