Internet of Things Security /
Patel, Chintan
Internet of Things Security / - Baco Raton : Taylor & Francis Books India Pvt. Ltd, 2019. - 238 pages :
Cover
Half Title
Title
Copyright
Dedication
Contents
Foreword
Preface
Acknowledgment
Authors
1 IoT: An Overview
1.1 Abstract
1.2 Introduction
1.3 IoT Vision
1.3.1 Application-Oriented
1.3.2 Things Oriented
1.3.3 Communication Oriented
1.3.4 Research-Oriented
1.3.5 Security Oriented
1.4 IoT Reference Architecture
1.4.1 Four Layered Architecture
1.4.2 Seven layered architecture by CISCO
1.4.3 IoT Nuts and Bolts
1.5 IoT Security
1.5.1 An overview
1.5.2 An Architecture
1.6 IoT Authentication Models
1.7 Light weight cryptography
1.7.1 An overview
1.7.2 A literature study
1.8 IoT historical approach
1.9 IoT futuristic approach
1.10 Summary
1.11 References
2 Mathematical Foundations
2.1 Abstract
2.2 Elliptic Curve Cryptography
2.2.1 Foundation
2.2.1.1 Basics of Polynomial Expressions
2.2.1.2 Polynomial Curve fitting
2.2.1.3 Algebraic Set
2.2.1.4 Groups
2.2.1.5 Rings
2.2.1.6 Fields and Finite fields
2.2.1.7 GCD, Modular arithmetic, Prime numbers
2.2.1.8 Basics of discrete logarithms
2.2.1.9 Polynomial arithmetic on prime field and extension field
2.3 Diffie-Hellman key Exchange and Elgamal scheme
2.3.1 Diffie-Hellman key exchange
2.3.2 Elgamal crypto system
2.4 Elliptic Curve Cryptography Operations
2.4.1 Elliptic curve over prime field
2.4.2 Elliptic curve over Extension field
2.4.3 Elliptic curve Diffie-Hellman problem(ECDHP) and Discrete logarithm problem (ECDLP)
2.4.4 Message Encoding and Decoding as Elliptic curve points
2.4.5 Message Encryption and Decryption on Elliptic curve points
2.5 Scalar multiplication problem
2.5.1 Scalar multiplication MSB First bit
2.5.2 Scalar multiplication LSB First bit
2.5.3 Montgomery Scalar Multiplication Operation
2.6 Hash-based operations
2.6.1 Hash function
2.6.2 Hash chains and its calculation
2.6.3 Bio hashing
2.7 RSA Algorithms
2.8 Bilinear pairing system
2.8.1 Bilinear pairing system decision Diffie-Hellman problem
2.9 Chebyshev chaotic Map:
2.10 Introduction to block chain technology
2.11 Summary
2.12 References
3 IoT Authentication
3.1 Abstract
3.2 Authentication layered architecture
3.2.1 Introduction
3.2.2 Physical layer authentication
3.2.3 Network layer authentications
3.2.4 Data processing layer authentication
3.2.5 Application layer authentication
3.3 IoT node authentication
3.3.1 Introduction
3.3.2 Architecture
3.3.3 Phases
3.3.3.1 System setup phase by gateway node
3.3.3.2 Sensors and user registrations
3.3.3.3 Key exchange phase
3.3.3.4 Login phase and authentication
3.3.3.5 Password update phase
3.3.3.6 Device adding phase
3.4 Cloud centric IoT authentication architecture
3.5 Authentication Issues for Resource constrained IoT Devices
3.6 Application oriented authentication scenarios
3.6.1 Health care
3.6.2 Manufacturing and logistics
3.6.3 Grid
3.6.4 Agriculture
3.7 Summary
3.8 References
4 Single Server Authentication
4.1 Abstract
4.2 Introduction
4.3 Client-server Model
4.3.1 DTLS Protocol
4.3.2 MQTT Protocol
4.4 Adversary Model
4.5 Phases
4.5.1 Server initialization phase
4.5.2 User registration phase
4.5.3 Login phase
4.5.4 Authentication and key agreement phase
4.5.5 Password updating phase
4.6 Summary
4.7 References
5 Multi-Server Authentication
5.1 Abstract
5.2 Introduction
5.2.1 Challenges in IoT multi-server environment
5.3 Model of adversary
5.4 Phases
5.4.1 Initialization phase by registration center
5.4.2 Server registration
5.4.3 User registration
5.4.4 User login
5.4.5 User authentication and key exchange
5.4.6 User password updating phase
5.5 Summary
5.6 References
6 Attacks and Remedies
6.1 Abstract
6.2 Introduction
6.3 User Anonymity
6.4 Perfect forward secrecy
6.5 Replay attack
6.6 Off-line password guessing attack
6.7 User impersonation attack
6.8 Man in the Middle attack
6.9 Smart card loss and stolen attack
6.10 Server spoofing attack
6.11 Denial of Service attack and Distributed DoS
6.12 Summary
6.13 References
7 Analytical Matrices and Tools
7.1 Abstract
7.2 Analytical Matrices
7.2.1 Time complexity
7.2.2 Space complexity
7.2.3 Energy Consumption
7.3 Analytical tools
7.3.1 AVISPA
7.3.2 BANLogic
7.3.3 Scyther
7.3.4 ProVerif
7.4 Summary
7.5 References
8 Future Work and Conclusions
8.1 Future Work
8.2 Conclusions
Index
Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.
9781032605210
Internet of Things – Security measures
Computer networks – Security measures
005.8 / PAT
Internet of Things Security / - Baco Raton : Taylor & Francis Books India Pvt. Ltd, 2019. - 238 pages :
Cover
Half Title
Title
Copyright
Dedication
Contents
Foreword
Preface
Acknowledgment
Authors
1 IoT: An Overview
1.1 Abstract
1.2 Introduction
1.3 IoT Vision
1.3.1 Application-Oriented
1.3.2 Things Oriented
1.3.3 Communication Oriented
1.3.4 Research-Oriented
1.3.5 Security Oriented
1.4 IoT Reference Architecture
1.4.1 Four Layered Architecture
1.4.2 Seven layered architecture by CISCO
1.4.3 IoT Nuts and Bolts
1.5 IoT Security
1.5.1 An overview
1.5.2 An Architecture
1.6 IoT Authentication Models
1.7 Light weight cryptography
1.7.1 An overview
1.7.2 A literature study
1.8 IoT historical approach
1.9 IoT futuristic approach
1.10 Summary
1.11 References
2 Mathematical Foundations
2.1 Abstract
2.2 Elliptic Curve Cryptography
2.2.1 Foundation
2.2.1.1 Basics of Polynomial Expressions
2.2.1.2 Polynomial Curve fitting
2.2.1.3 Algebraic Set
2.2.1.4 Groups
2.2.1.5 Rings
2.2.1.6 Fields and Finite fields
2.2.1.7 GCD, Modular arithmetic, Prime numbers
2.2.1.8 Basics of discrete logarithms
2.2.1.9 Polynomial arithmetic on prime field and extension field
2.3 Diffie-Hellman key Exchange and Elgamal scheme
2.3.1 Diffie-Hellman key exchange
2.3.2 Elgamal crypto system
2.4 Elliptic Curve Cryptography Operations
2.4.1 Elliptic curve over prime field
2.4.2 Elliptic curve over Extension field
2.4.3 Elliptic curve Diffie-Hellman problem(ECDHP) and Discrete logarithm problem (ECDLP)
2.4.4 Message Encoding and Decoding as Elliptic curve points
2.4.5 Message Encryption and Decryption on Elliptic curve points
2.5 Scalar multiplication problem
2.5.1 Scalar multiplication MSB First bit
2.5.2 Scalar multiplication LSB First bit
2.5.3 Montgomery Scalar Multiplication Operation
2.6 Hash-based operations
2.6.1 Hash function
2.6.2 Hash chains and its calculation
2.6.3 Bio hashing
2.7 RSA Algorithms
2.8 Bilinear pairing system
2.8.1 Bilinear pairing system decision Diffie-Hellman problem
2.9 Chebyshev chaotic Map:
2.10 Introduction to block chain technology
2.11 Summary
2.12 References
3 IoT Authentication
3.1 Abstract
3.2 Authentication layered architecture
3.2.1 Introduction
3.2.2 Physical layer authentication
3.2.3 Network layer authentications
3.2.4 Data processing layer authentication
3.2.5 Application layer authentication
3.3 IoT node authentication
3.3.1 Introduction
3.3.2 Architecture
3.3.3 Phases
3.3.3.1 System setup phase by gateway node
3.3.3.2 Sensors and user registrations
3.3.3.3 Key exchange phase
3.3.3.4 Login phase and authentication
3.3.3.5 Password update phase
3.3.3.6 Device adding phase
3.4 Cloud centric IoT authentication architecture
3.5 Authentication Issues for Resource constrained IoT Devices
3.6 Application oriented authentication scenarios
3.6.1 Health care
3.6.2 Manufacturing and logistics
3.6.3 Grid
3.6.4 Agriculture
3.7 Summary
3.8 References
4 Single Server Authentication
4.1 Abstract
4.2 Introduction
4.3 Client-server Model
4.3.1 DTLS Protocol
4.3.2 MQTT Protocol
4.4 Adversary Model
4.5 Phases
4.5.1 Server initialization phase
4.5.2 User registration phase
4.5.3 Login phase
4.5.4 Authentication and key agreement phase
4.5.5 Password updating phase
4.6 Summary
4.7 References
5 Multi-Server Authentication
5.1 Abstract
5.2 Introduction
5.2.1 Challenges in IoT multi-server environment
5.3 Model of adversary
5.4 Phases
5.4.1 Initialization phase by registration center
5.4.2 Server registration
5.4.3 User registration
5.4.4 User login
5.4.5 User authentication and key exchange
5.4.6 User password updating phase
5.5 Summary
5.6 References
6 Attacks and Remedies
6.1 Abstract
6.2 Introduction
6.3 User Anonymity
6.4 Perfect forward secrecy
6.5 Replay attack
6.6 Off-line password guessing attack
6.7 User impersonation attack
6.8 Man in the Middle attack
6.9 Smart card loss and stolen attack
6.10 Server spoofing attack
6.11 Denial of Service attack and Distributed DoS
6.12 Summary
6.13 References
7 Analytical Matrices and Tools
7.1 Abstract
7.2 Analytical Matrices
7.2.1 Time complexity
7.2.2 Space complexity
7.2.3 Energy Consumption
7.3 Analytical tools
7.3.1 AVISPA
7.3.2 BANLogic
7.3.3 Scyther
7.3.4 ProVerif
7.4 Summary
7.5 References
8 Future Work and Conclusions
8.1 Future Work
8.2 Conclusions
Index
Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.
9781032605210
Internet of Things – Security measures
Computer networks – Security measures
005.8 / PAT
