Security and Fault Tolerance in Internet of Things

Security and Fault Tolerance in Internet of Things PDF

Author: Rajat Subhra Chakraborty

Publisher: Springer

Published: 2018-12-13

Total Pages: 214

ISBN-13: 3030028070

DOWNLOAD EBOOK →

This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.

Supporting Fault Tolerance in the Internet of Things

Supporting Fault Tolerance in the Internet of Things PDF

Author: Sen Zhou

Publisher:

Published: 2015

Total Pages: 116

ISBN-13: 9781339528601

DOWNLOAD EBOOK →

This thesis addresses the issue of fault tolerance in the Internet of Things(IoT). The goal of fault tolerance in IoT is to better adapt to changing environments and build up trustworthy redundancy. However, in real IoT deployment scenarios like smart homes or offices, heterogeneity and constant evolution of IoT systems pose a big challenge to building up redundancies and adapting to changing environment. Firstly, heterogeneous devices are deployed in the environment with limited duplications. This brings challenges to find redundant devices in the first place. Secondly, with a changing environment, there comes the need for devices, though deployed with different purposes and capabilities, to collaborate with one another and to be sharable among different applications with QoS requirements. This brings challenges to management of IoT applications and IoT devices. Thirdly, in order to achieve failure-resilience on heterogeneous devices, an evolving yet lightweight dynamic binding mechanism should be designed. This is the basis for supporting both previous points.In this dissertation, we propose to address this above issues from a service-oriented point of view. Service-Oriented Architecture(SOA) provides IoT with a abstraction of integratable and manageable services. We have designed an IoT middleware to facilitate the cooperation of different devices to achieve this cross-modality fault tolerance. When a fault happens to a device, the middleware can reconfigure the system by using devices of other modalities to cover the fault. The three above problems are addressed in three different stages of service management: service discovery, service mapping, service execution.For service discovery, this thesis presents a sensing device adaptation scheme for composing more available services. In IoT, sensors of different modalities may be used to enhance the system fault tolerance. We propose the concept of virtual services which use data from other sensor devices to replace an actual service on some faulty device. We do regression analysis to identify and generate virtual services using available sensors. Depending on the sensor correlation types, we can use with recursive least squares (RLS) or multivariate adaptive regression splines (MARS) for virtual service generation. These virtual services provide more choices of backup services without deployment of duplicate backup sensors.For service mapping, we separate it into two steps: phase 1 pre-runtime mapping for functionality of the application and phase 2 run-time mapping for fault-tolerance. For pre-runtime mapping, we model it into a quadratic integer programming problem. Location policies are used to specify user preference during this mapping, and to limit the size of the QLP problem. For phase 2 mapping, with abundant provision of virtual services, we model it into a multiobjective optimization problem and use a multiobjective genetic algorithm, NSGA-ii, to solve it. With more sensor data from the network, virtual services are updated, and phase 2 mapping is triggered periodically in order to adapt to the changed environment.For service execution, we set up hierarchical monitoring for monitoring service status. We investigate the issue of device clustering for fault monitoring in IoT systems. We model the new monitoring clustering problem as a multiple traveling salesman without depot problem. In order to detect device faults quickly, fault monitoring must be conducted regularly and frequently. Therefore, it is desirable to reduce the communication cost for fault monitoring. We define the problem by extending the multiple traveling salesman problem (mTSP) in an integer programming (IP) formulation. We also present heuristic algorithms for constructing both monitoring clusters and also the monitoring route within each cluster. Simulation results show that our heuristic algorithms can deliver near optimal solutions on reducing the communication cost, with a low complexity.Finally, we provide detailed design of the fault tolerance framework, which incorporate above stages and support from our fault recovery mechanism.

Internet of Things Vulnerabilities and Recovery Strategies

Internet of Things Vulnerabilities and Recovery Strategies PDF

Author: Fahim Masoodi

Publisher: CRC Press

Published: 2024-07-26

Total Pages: 355

ISBN-13: 1040025625

DOWNLOAD EBOOK →

The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT’s broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT- systems, the book offers recovery strategies and addresses security concerns related to: Data Routing Data Integrity Device Supervision IoT Integration Information Storage IoT Performance The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.

Security Challenges and Approaches in Internet of Things

Security Challenges and Approaches in Internet of Things PDF

Author: Sridipta Misra

Publisher: Springer

Published: 2016-09-03

Total Pages: 110

ISBN-13: 3319442309

DOWNLOAD EBOOK →

This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT. The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.

IoT Applications, Security Threats, and Countermeasures

IoT Applications, Security Threats, and Countermeasures PDF

Author: Padmalaya Nayak

Publisher: CRC Press

Published: 2021-09-02

Total Pages: 279

ISBN-13: 1000431649

DOWNLOAD EBOOK →

Addresses the complete wireless technologies like Radio Frequency (RF), Wi-Fi, SigFox, Zigbee, Light Communication like Li-FI, Infrared, Bluetooth, etc Covers Block-Chain related self-adaptive cyber-physical security systems Based on the latest technologies, and covering the major challenges like Machine Learning, Evolutionary Computing, Sensor Networks, Ad Hoc Networks, Security Issues, and Advances in IoT Discusses security and privacy issues through IoT ecosystem and its implications to the real world Includes data sharing, security, connectivity solutions in IoT applications Examines privacy issues and challenges related to Cloud Computing, Fog Computer, and Edge Computing technologies in IoT

Computational Science and Its Applications – ICCSA 2021

Computational Science and Its Applications – ICCSA 2021 PDF

Author: Osvaldo Gervasi

Publisher: Springer Nature

Published: 2021-09-09

Total Pages: 672

ISBN-13: 3030870138

DOWNLOAD EBOOK →

​​The ten-volume set LNCS 12949 – 12958 constitutes the proceedings of the 21st International Conference on Computational Science and Its Applications, ICCSA 2021, which was held in Cagliari, Italy, during September 13 – 16, 2021. The event was organized in a hybrid mode due to the Covid-19 pandemic.The 466 full and 18 short papers presented in these proceedings were carefully reviewed and selected from 1588 submissions. The books cover such topics as multicore architectures, blockchain, mobile and wireless security, sensor networks, open source software, collaborative and social computing systems and tools, cryptography, applied mathematics human computer interaction, software design engineering, and others. Part IX of the set includes the proceedings of the following events: ​​13th International Symposium on Software Engineering Processes and Applications (SEPA 2021); International Workshop on Sustainability Performance Assessment: models, approaches and applications toward interdisciplinary and integrated solutions (SPA 2021).

Blockchain Technology and the Internet of Things

Blockchain Technology and the Internet of Things PDF

Author: Rashmi Agrawal

Publisher: CRC Press

Published: 2020-12-31

Total Pages: 329

ISBN-13: 1000038637

DOWNLOAD EBOOK →

This new volume looks at the electrifying world of blockchain technology and how it has been revolutionizing the Internet of Things and cyber-physical systems. Aimed primarily at business users and developers who are considering blockchain-based projects, the volume provides a comprehensive introduction to the theoretical and practical aspects of blockchain technology. It presents a selection of chapters on topics that cover new information on blockchain and bitcoin security, IoT security threats and attacks, privacy issues, fault-tolerance mechanisms, and more. Some major software packages are discussed, and it also addresses the legal issues currently affecting the field. The information presented here is relevant to current and future problems relating to blockchain technology and will provide the tools to build efficient decentralized applications. Blockchain technology and the IoT can profoundly change how the world—and businesses—work, and this book provides a window into the current world of blockchain. No longer limited to just Bitcoin, blockchain technology has spread into many sectors and into a significant number of different technologies.

Security and Privacy in the Internet of Things

Security and Privacy in the Internet of Things PDF

Author: Ali Ismail Awad

Publisher: John Wiley & Sons

Published: 2021-12-29

Total Pages: 340

ISBN-13: 1119607744

DOWNLOAD EBOOK →

SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book provides timely coverage of IoT architecture, security technologies and mechanisms, and applications. The authors outline emerging trends in IoT security and privacy with a focus on areas such as smart environments and e-health. Topics include authentication and access control, attack detection and prevention, securing IoT through traffic modeling, human aspects in IoT security, and IoT hardware security. Presenting the current body of knowledge in a single volume, Security and Privacy in the Internet of Things: Discusses a broad range of IoT attacks and defense mechanisms Examines IoT security and privacy protocols and approaches Covers both the logical and physical security of IoT devices Addresses IoT security through network traffic modeling Describes privacy preserving techniques in smart cities Explores current threat and vulnerability analyses Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications is essential reading for researchers, industry practitioners, and students involved in IoT security development and IoT systems deployment.

Towards the Internet of Things

Towards the Internet of Things PDF

Author: Mohammad Ali Jabraeil Jamali

Publisher: Springer

Published: 2019-06-12

Total Pages: 134

ISBN-13: 3030184684

DOWNLOAD EBOOK →

This book presents a comprehensive framework for IoT, including its architectures, security, privacy, network communications, and protocols. The book starts by providing an overview of the aforementioned research topics, future directions and open challenges that face the IoT development. The authors then discuss the main architectures in the field, which include Three- and Five-Layer Architectures, Cloud and Fog Based Architectures, a Social IoT Application Architecture. In the security chapter, the authors outline threats and attacks, privacy preservation, trust and authentication, IoT data security, and social awareness. The final chapter presents case studies including smart home, wearables, connected cars, industrial Internet, smart cities, IoT in agriculture, smart retail, energy engagement, IoT in healthcare, and IoT in poultry and farming. Discusses ongoing research into the connection of the physical and virtual worlds; Includes the architecture, security, privacy, communications, and protocols of IoT; Presents a variety of case studies in IoT including wearables, smart cities, and energy management.

Security of Internet of Things Nodes

Security of Internet of Things Nodes PDF

Author: Chinmay Chakraborty

Publisher: CRC Press

Published: 2021-08-30

Total Pages: 321

ISBN-13: 1000421724

DOWNLOAD EBOOK →

The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures® covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.