O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing the Internet of Things

Book Description

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound.

This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

  • Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures
  • Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks
  • Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT
  • Contributed material by Dr. Imed Romdhani

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. About the Authors
  6. Chapter 1. Introduction: Securing the Internet of Things
    1. Abstract
    2. 1.1 Introduction
    3. 1.2 Security Requirements in IoT Architecture
    4. 1.3 Security in Enabling Technologies
    5. 1.4 Security Concerns in IoT Applications
    6. 1.5 Summary
    7. References
  7. Chapter 2. Security Architecture in the Internet of Things
    1. Abstract
    2. 2.1 Introduction
    3. 2.2 Security Requirements in IoT
    4. 2.3 Insufficient Authentication/Authorization
    5. 2.4 Insecure Access Control
    6. 2.5 Threats to Access Control, Privacy, and Availability
    7. 2.6 Attacks Specific to IoT
    8. References
  8. Chapter 3. Security and Vulnerability in the Internet of Things
    1. Abstract
    2. 3.1 Secrecy and Secret-Key Capacity
    3. 3.2 Authentication/Authorization for Smart Devices
    4. 3.3 Transport Encryption
    5. 3.4 Secure Cloud/Web Interface
    6. 3.5 Secure Software/Firmware
    7. 3.6 Physical Layer Security
    8. 3.7 Summary
    9. References
    10. Further Reading
  9. Chapter 4. IoT Node Authentication
    1. Abstract
    2. 4.1 Security Goals in IoT
    3. 4.2 Public-Key-Based Authentication
    4. 4.3 Identify-Based Authentication, Encryption, and Digital Signature
    5. 4.4 IP Connectivity
    6. 4.5 Lightweight Cryptography
    7. 4.6 Existing Security Schemes for IoT
    8. 4.7 Summary
    9. Further Reading
  10. Chapter 5. Security Requirements in IoT Architecture
    1. Abstract
    2. 5.1 Introduction
    3. 5.2 Network Layer
    4. 5.3 Service Layer
    5. 5.4 Application–Interface Layer
    6. 5.5 Cross-Layer Threats
    7. 5.6 Threats Caused in Maintenance of IoT
    8. References
  11. Chapter 6. Security in Enabling Technologies
    1. Abstract
    2. 6.1 Security in Identification and Tracking Technologies
    3. 6.2 Security in Integration of Wireless Sensor Network and RFID
    4. 6.3 Security in Communications
    5. 6.4 Security Protocols and Privacy Issues into 6LoWPAN Stack
    6. 6.5 Security in Service Management
    7. References
    8. Further Reading
  12. Chapter 7. Existing Security Scheme for IoT
    1. Abstract
    2. 7.1 Data Security and Privacy
    3. 7.2 Data Confidentiality and Key Management
    4. 7.3 Literature Review
    5. References
    6. Further Reading
  13. Chapter 8. Security Concerns in Social IoT
    1. Abstract
    2. References
  14. Chapter 9. Confidentiality and Security for IoT Based Healthcare
    1. Abstract
    2. References
    3. Further Reading
  15. Index