Enhancing IoT Security
Enhancing IoT Security
Security
A holistic approach to security for
connected platforms
Vidushi Sharma
Gamini Joshi
www.bpbonline.com
Copyright © 2024 BPB Online
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means, without the prior written permission of the publisher,
except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information
presented. However, the information contained in this book is sold without warranty, either express
or implied. Neither the author, nor BPB Online or its dealers and distributors, will be held liable for
any damages caused or alleged to have been caused directly or indirectly by this book.
BPB Online has endeavored to provide trademark information about all of the companies and
products mentioned in this book by the appropriate use of capitals. However, BPB Online cannot
guarantee the accuracy of this information.
ISBN 978-93-55515-506
www.bpbonline.com
Dedicated to
My beloved:
Parents: Mr. Lalit Mohan Joshi and Mrs. Geeta Joshi
(For their endless love, support and encouragement
to achieve everything in life)
&
Parents-in-law: Dr. S.P. Lohani and Mrs. Hema Lohani
(For their continuous emotional and moral support)
&
My Husband: Mani Lohani
(For his continuous encouragement to improve my
knowledge and move ahead in my career)
&
My Daughter: Mishthi Lohani
(For her smile that inspires me to always be
positive and give my best)
— Gamini Joshi
About the Authors
https://rebrand.ly/lsyz3qa
We have code bundles from our rich catalogue of books and videos
available at https://github.com/bpbpublications. Check them out!
Errata
We take immense pride in our work at BPB Publications and follow best
practices to ensure the accuracy of our content to provide with an indulging
reading experience to our subscribers. Our readers are our mirrors, and we
use their inputs to reflect and improve upon human errors, if any, that may
have occurred during the publishing processes involved. To let us maintain
the quality and help us reach out to any readers who might be having
difficulties due to any unforeseen errors, please write to us at :
errata@bpbonline.com
Your support, suggestions and feedbacks are highly appreciated by the BPB
Publications’ Family.
Did you know that BPB offers eBook versions of every book published, with PDF
and ePub files available? You can upgrade to the eBook version at
www.bpbonline.com and as a print book customer, you are entitled to a discount on
the eBook copy. Get in touch with us at :
business@bpbonline.com for more details.
At www.bpbonline.com, you can also read a collection of free technical articles,
sign up for a range of free newsletters, and receive exclusive discounts and offers
on BPB books and eBooks.
Piracy
If you come across any illegal copies of our works in any form on the internet, we
would be grateful if you would provide us with the location address or website
name. Please contact us at business@bpbonline.com with a link to the material.
Reviews
Please leave a review. Once you have read and used this book, why not leave a
review on the site that you purchased it from? Potential readers can then see and
use your unbiased opinion to make purchase decisions. We at BPB can understand
what you think about our products, and our authors can see your feedback on their
book. Thank you!
For more information about BPB, please visit www.bpbonline.com.
6. Crypto Foundations I
Structure
6.1 Cryptography and its role in securing the IoT
6.2 Cryptography and its primitives in the IoT
Cryptographic primitives
6.3 Secrecy and secret-key capacity in IoT
Secret key capacity
6.4 Encryption and decryption
6.4.1 Symmetric key encryption algorithm
Substitution technique
Transposition technique
Electronic Code Book
Cipher Block Chaining Mode
Cipher Feedback Mode
Output Feedback Mode
Counter Mode
6.4.2 Asymmetric key encryption algorithm
Conclusion
6.5 Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
7. Crypto Foundations II
Structure
7.1 Message integrity- Hash functions and their security
7.1.1 Properties and applications of Hash functions
Applications of the Hash function
7.1.2 Popular Hash function
7.1.3 Merkle tree
Significance of the Merkle tree
7.2 Message authentication
7.2.1 Message Authentication Code
7.2.2 Authenticated encryption
7.3 Random number generation
7.4 Cipher suites
7.5 Signature algorithm means of IoT node authentication
7.5.1 Types of signatures
7.5.1 Digital signature schemes
7.6 Cryptographic key management
7.6.1 Key management fundamentals
7.6.2 Diffe-Hellman key exchange
Algorithm
7.6.3 Elliptic Curve Cryptography
Background explanation of ECC
ECC algorithm for key-exchange
ECC Algorithm for encryption and decryption
7.6.4 Public Key Infrastructure
PKIX Model
PKIX Management function
7.7. Examining cryptographic controls for IoT protocols
7.7.1. Cryptographic controls built into IoT communication
protocols
ZigBee
Bluetooth-LE
Near Field Communication
7.7.2 Cryptographic controls built into IoT messaging protocols
7.8 Transport encryption
7.8.1 Transport Layer Security
7.8.2 Secure Sockets Layer
7.8.3 HTTPS
Conclusion
7.9 Questionnaire
Multiple choice questions
Answer key
Long answer questions
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
18. Security Protocols for IoT Access Networks and Their Impact on
Mobile Networks
Structure
18.1. Existing security features of IoT protocols
18.2. Futuristic security protocol/algorithm for IoT network
18.2.1. Time-based secure key generation and renewal
a. Security protocol for unidirectional data transmissions
b. Security protocol for bidirectional data transmissions
18.2.2 Cognitive security
18.3 Impact of IoT security on mobile networks
Cost of mobile network
The risk and complexity of mobile networks
Delay in mobile network
Scope restriction of mobile network
Conclusion
18.4 Questionnaire
Multiple choice questions
Answer key
Long answer question
Short answer questions
Keywords (†)
References
Things to check before moving to the next chapter
Index
CHAPTER 1
The Internet of Things and its Security
Requirements
Structure
In this chapter, we will cover the following topics:
The Internet of Things and its fundamentals
The limitations of IoT and the need to secure IoT devices and systems
The security requirements in IoT architecture and its protocols
The threats and security in IoT technologies and their applications
Other IoT-supporting technologies
1.2.1 Identification
Identification plays a key role in the Internet of Things where it identifies
and matches services as per the demand. Identifiers are used for
identification that ensures the correct composition and operation of the
system. The process of identification involves naming and addressing
schemes.
The naming scheme includes Electronic Product Codes (EPC) and
ubiquitous codes (uCode) as the object identifier (Object ID). Object ID
refers to the instance of the object, for example, “T1” is the object ID of the
temperature sensor 1, “T2” is the object ID of the temperature sensor 2, and
so on. An extensive illustration of IoT naming schemes are explained as
follows:
Electronic Product Codes (EPC): It is a universal identifier that
provides a unique code to every existing physical object. EPCs are
electronically encoded in barcode tags and in Radio Frequency
Identification (RFID) tags that identify and track objects in inventory
and assets. It is a 96-bit number that distinguishes two identical
products with their manufacturing date, origin, and batch number.
Objects equipped with RFID tags are grouped into classes with each
class having its own GS1 key. The GS1 key assigns and manages keys
and defines the data structure related to EPC data. GS1 keys include
the following code where GDTI stands for Document, GSRN stands
for Service Relation, GTIN stands for Trade Item, GRAI stands for
Returnable/ Reusable Asset, GLN stands for Location, SSCC stands
for Logistical Unit and GIAI stands for Fixed Asset.
The basic format of the EPC code is represented in Figure 1.3, where
Header is an 8-bit number that represents the version and partitioning
scheme. EPC manager is a 28 bit number that indicates the company
manufacturer, Object class identifies the type of product in 24 bits, and the
serial number indicates the instance of each product using a 36-bit number:
IPv4and IPv6 are covered in the computer network, so are not discussed in this
book.
6LoWPAN is discussed in detail in Section 1.7.2.
1.2.2 Sensing
Sensing in IoT refers to the gathering of data by related objects like sensors,
actuators, or any wearable sensing device. Data is collected from the
environment and forwarded to the data warehouse, or the cloud. The
gathered data can be as simple as a temperature reading or can be as complex
as a full video recording. Data is then analyzed and specific action is taken
based on the demanded services. IoT products such as Arduino and
Raspberry Pi are equipped with sensors, built-in TCP/IP, and security
functionality. They are directly used to collect, connect, and provide the
required data to customers as and when required.
1.2.3 Communication
Once the data is sensed and collected, it is then forwarded to the cloud or
processing unit for processing and analysis. Communication between devices
and cloud/processing units is established using IoT communication
technologies such as Wi-Fi, Bluetooth, Z-Wave, LTE, RFID, Near Field
Communication (NFC), and Ultra-Wide Band (UWB). A thorough
explanation of the mentioned communication technologies is provided
below:
RFID is the combination of tags and readers represented by a small
chip. The RFID reader relays the query signal to the tag and receives
the reflected signal back from the tag, which is then transmitted to the
database. The database is then connected to the processing center
where objects are identified based on the reflected signal within the
range of 10cm to 200cm. RFID tags can be battery operated (active
tags) as well as non-battery operated (passive tags). The best example
of an RFID application is Electronic Toll Collection (ETC).
Nowadays, vehicles are enrolled in the ETC program, which consists
of an RFID system, whenever the vehicle passes through the tolls, the
payment is done automatically without any delay. In case if; the
vehicle is not enrolled in ETC, then the system sends an event that
triggers the action like STOP/FINE.
Near-Field Communication (NFC) is a group of communication
protocols that works at a high-frequency band at 13.56 MHz and
carries data rates up to 424 kbps. It provides a low-speed connection
and is used to bootstrap the wireless connections. It can cover a range
of up to 10 cm. They are used in contactless payments such as credit
cards and electronic ticket smart cards.
Ultra-Wide Band is a radio communication that uses low-energy and
high bandwidth for communicating in short-range applications such as
high-sensor data collection, precision locating, and tracking
applications.
Wi-Fi is a wireless network protocol based on IEEE 802.11 standard
and is generally used in Local Area Networks (LAN) ranging within
100 m. It allows devices to communicate and exchange data via a
wireless router which is then connected to the internet. For example, a
home router.
Bluetooth (BLE) is a short-range wireless technology, where data is
exchanged between fixed as well as mobile devices. It uses short-
wavelength radio waves to minimize power consumption. Bluetooth is
managed by the Bluetooth Special Interest Group (SIG) which
provides low-energy Bluetooth with high speed and IP connectivity for
IoT devices. BLEs are used in smartphones, watches, cars, and so on.
LTE (Long-Term Evolution) is a wireless standard communication
protocol that is used to transfer high-speed data between mobile
devices based on GSM † (Global System for Mobile Communication)
and UMTS † (Universal Mobile Telecommunication System) network
technologies. It provides multicasting and broadcasting services,
which are improved in its advanced version (LTE-A); which supports
frequency up to 100MHz downlink, and uplink spatial multiplexing
with higher throughput and lower latencies. It is used for mobile,
fixed, and portable broadband access.
Z-Wave is also a low-energy wave wireless communication protocol
that is used for home/office automation and serves for lightning
control, thermostat, doors/windows lock, security systems, and so on.
Z-Wave supplies application layer interoperability among home/office
control systems of different manufacturers that are part of its alliance.
Detailed explanation of all these protocols is beyond the scope of this book.
1.2.4. Computation
Once the data is delivered to the cloud or processing unit, the actual
evaluation, and analysis of it take place. The processing unit constitutes
microcontrollers, microprocessors, System on Chip† (SOCs), and Field
Programmable Gate Array† (FPGAs), which signifies the computational
ability of the IoT system.
Like other computer systems, IoT systems too cannot run without an
operating system, as the hardware/processing unit alone won’t be able to
communicate and execute the program. Therefore, low-power real-time
operating system platforms are used in IoT that run throughout the time till
the device is activated. Some of the IoT-supported operating systems are
Contiki, TinyOS, LiteOS, and RiotOS.
Cloud platforms form another unit of IoT processing system where a huge
amount of data (big data) is processed and analyzed, and then finally relevant
knowledge is extracted as per the user’s requirement.
Details of the IoT operating systems are discussed in Chapter 23, Security
Products.
1.2.5 Services
When the data is processed and information is acknowledged, it is made
available to end-users through various IoT services. IoT services are
classified into four classes, named as Identity-related services, Information
Aggregation Services, Collaborative – Aware Services, and Ubiquitous
Services. Thorough explanation of the stated services is presented below:
Identity Related Services are used to provide identity to the real-
world objects that wish to be the part of the IoT system. For example,
Azure Identity Service is a package that provides furnishing and
cryptographic services to the IoT devices based on the Azure platform.
The package includes identity service, key service, certificates service,
and Trusted Platform Module (TPM) services. Identity service
certifies the identity of the device, key service holds the cryptographic
keys for encryption, decryption, and digitally signing of the
documents, certificate services issues certificate to the issuer and at
last, TPM services allows the caller to endorse and store root keys,
activate new identity key and sign data using stored identity key. This
service allows the caller to access the TPM module and expose the
APIs which hinders the integrity of the stored keys.
Information Aggregation Services aim to collect and summarize raw
sensory data that is processed and reported to the IoT applications as
per the requirements. For example, in smart healthcare applications,
sensors and actuators in patients’ bodies or monitoring systems collect
the status of the patient and then remotely send it to the processing
center, where it is studied and analyzed to take suitable actions.
Collaborative-Aware Services act on top of information aggregation
services and utilizes the obtained data to make decisions and behave
accordingly. For example, in a building automation system, data such
as temperature, humidity, and so on., collected by sensors and
processed by the processing unit may at times generate a blinking or
alarm in a dishwasher or cooling/heating system indicating that there
is a problem that needs urgent maintenance.
Ubiquitous Services directs to provide collaborative-aware services
anytime, anywhere, and to anyone. The utmost goal of every IoT
application is to provide ubiquitous services. For example, an
intelligent transportation system, whose main aim is to achieve
reliability, availability, efficiency, and safety of transportation
infrastructure.
1.2.6 Semantics
Semantics refers to the smart extraction of knowledge so that the devices
interact and behave unambiguously. It includes the selection of the right
technology and the right resources at right time. It is supported by the
Resource Description Framework (RDF)† and Web Ontology Language
(OWL)†. Efficient XML Interchange (EXI)† is one of the popular
examples of OWL language, which is designed in the context of IoT and
optimizes the XML applications for resource-constrained IoT devices. It
reduces the bandwidth of the application and minimizes the storage size
without affecting battery life, code size, and energy consumption.
A real-life incident of a compromised IoT home device took place in 2014, when
security researchers of BLACK HAT USA, found a defect in the NEST
thermostat. The NEST thermostat was used in controlling the room temperature
and minimizing the heating and cooling bill by 10 to 20 %. However, BLACK
HAT indicated that the NEST thermostat can be effortlessly compromised using a
micro-USB cable that can install a backdoor within 15 sec whenever an attacker
gains physical access to the device and once the device is compromised, an
attacker can gain easy access to the homeowner and his connected devices.
Smart Meter is the IoT metering device connected to the Internet and
is used for monitoring and billing resource consumption such as
energy, water, gas, and so on. It enables real-time bilateral
communication between the service provider and their customers. As
with other IoT devices, smart meters suffer from safety, threats,
privacy, and productivity. Besides this; it has the threat of secure
communication and data management. In case, if an attacker
compromises the meter database and its communication network, then
he can easily gain access to the power grid and its components. The
damaging power grid may result in destroying the individual health
and bank balance.
As per the reports published by Brian Krebs in 2009, it was reported that
employees of Puerto Rico Power Company were illegally paid to reprogram the
devices to show incorrect results leading to large-scale electricity theft.
Though we say CPS can work without the Internet but is somehow connected to
the Internet, it can be through the supply chain, operating personnel, or can be by
any software patching system. It can be illustrated with the help of Figure 1.5:
Threats Explanation
Threats Explanation
Personal Blackberry
assets or pet radar(assets),
tracking AIRcable
Gateway,
Yepzon GPS
tracking
device (pets)
Periodic Environmental Sniffin
monitoring monitoring, attack
apps water level
Time monitoring Data t
specific Malw
Event based Theft control,
applications injecti
monitoring controlling of
apps home devices Repro
such as AC - attack
ON/OFF
Only GPS location
monitored monitor,
apps Personal
health care
Monitoring monitoring
applications devices
Monitored When
Control apps with unfamiliar
specific manual data is
monitoring control collected
applications Monitored Intervention of
apps with the rule-based
automated approach such
control as setting rules
for
temperature,
pressure for
different
carriage goods
Table 1.5: Threats and protection methods for application layer
Arkessa ✓ ✓ ✓ ✓
Axeda ✓ ✓ ✓ ✓ ✓ ✓
Etherios ✓ ✓ ✓ ✓ ✓
LittleBits ✓ ✓
NanoService ✓ ✓ ✓ ✓ ✓
Nimbits ✓ ✓
Ninja ✓ ✓ ✓
Blocks
IoT Gateway Service Assurance Billing Security
Platform Support support
REST
One ✓ ✓ ✓ ✓ ✓
Platform
RealTime.io ✓ ✓ ✓ ✓
Sensor ✓ ✓ ✓ ✓
Cloud
SmartThings ✓ ✓ ✓ ✓
TempoDB ✓ ✓
Thingworx ✓ ✓ ✓ ✓
Xively ✓ ✓ ✓ ✓ ✓ ✓
Security in cloud computing is discussed in Chapter 19, Cloud Security for the
IoT.
If the amount of generated data is very large, such that it is out of the capability of
edge nodes, then all the data is transmitted to the cloud for processing. This
obviously will increase the latency of the system. To solve this issue, fog
computing is used, which will filter and transmit only the relevant data to the
cloud.
Conclusion
The chapter demonstrates and explores the security aspect of the Internet of
Things and its emerging technologies. It gives the basic architecture of IoT
and fulfills the requirement of preliminary knowledge for the subsequent
chapters. The chapter states the importance of IoT security and explores its
requirements with respect to architecture, protocols, and applications. The
comprehensive illustration of the chapter is summarized as follows:
The Internet of Things (IoT) is defined as the interconnection (wired
or wireless) of low-power devices such as sensor and actuators, that
gathers, communicate, analyze and transmit information whenever and
wherever required via the internet.
There are various domains and applications where IoT has marked its
presence such as healthcare, smart homes, cities, defense, agriculture,
transportation, and many more. These applications are grouped into
Consumer IoT and Business IoT, where consumer IoT deals with the
application that is personally used by users while business applications
are those applications that present the insights of an organization and
tend to boost its efficiency.
The functioning of IoT is illustrated with the help of six building
blocks labeled as identification, sensing, communication, computation,
service, and semantics.
Identification: connected devices are identified using EPC code
and uCode.
Sensing: Data is gathered from the surroundings using sensors.
Communication: The collected data is then transmitted to the
cloud or processing unit for processing and analysis using
communication protocols such as RFID, NFC, LTE, and so on.
Computation: Transmitted data is computed and processed in the
cloud or in the processing unit.
Service: Relevant information is acknowledged from the processed
data and is made available to end-users in form of services.
Semantics: This element of IoT includes the selection of the right
technology, and right resources at right time.
Though IoT is a boon to the world, if not secured properly then may
serve as a curse to the world and can be the reason for its destruction.
It has been perceived that theft, privacy, safety, and productivity are
the four different ways in which attackers can attack consumers,
enterprises, and users.
There is an intense need to protect and secure IoT from attackers
because of the following reasons:
R1: Constrained system resources
R2: Device Heterogeneity
R3: Interoperability in IoT
R4: Over-the-air Firmware update
Cyber Security is generally used in place of IoT security. But they are
not similar; there is a slight difference between the two terms. Cyber-
security deals with the protection of data, information, software, and
application from unauthorized access with no engineering principle
whereas IoT security is an integration of cyber security and the
engineering principles like collection, communication, and
examination, which maintains confidentiality, integrity, and non-
repudiation of the IoT data and devices.
IoT systems are also sometimes confused with Cyber-physical
systems (CPS). IoT systems always need the interconnection of the
internet for fulfilling their objectives whereas CPS systems do not
always need the internet for achieving their objectives. They can
achieve their objective without even being connected to the Internet.
The architecture of IoT consists of four basic layers, specified as the
perception layer, network layer, processing layer and application layer.
Each of these layers is vulnerable to various threats, and attacks such
as information leakage, eavesdropping, man-in-middle attack, and
many more.
In general, the security requirements in every layer include lightweight
solutions that support confidentiality, integrity, availability,
heterogeneity, and much more.
For smooth functioning of IoT, it is needed that IoT technologies
should also be secured from threats and attacks. IoT enabling
technologies include:
Identification technologies: RFID tags, biometrics, EPC
Software Technologies: Integration of WSN and RFID
Communication Technologies: RFID, NFC, LTE-A and so on.
Network Technologies: Network functioning
As a normal network, an IoT network is too supported by various
protocols in a different layer. Safety in all these protocols is another
major requirement of IoT. IoT protocol stack includes:
Application Protocol: CoAP, MQTT, XMPP
Network Protocol: 6LoWPAN
Routing/transport Protocol: RPL
Link Layer Protocol: IEEE 802.15.4
Physical layer protocol: LTE-A, Z-Wave
The interconnection of millions of objects generates a huge amount of
data known as “Big Data”. The maintenance and analysis of this huge
amount of data are done with the help of superficial technologies, such
as Big-data analytics, cloud computing, Edge computing, and Fog
computing.
Big data includes the extraction of relevant knowledge from the pool
of data generated by IoT devices. It constitutes the processing and
managing of data in an efficient way.
Cloud computing is another technology that offers automated on-
demand availability resources such as storage, power, and services.
The distance between the IoT devices and the cloud is too large, which
may result in a delay in services as well as the vulnerability of being
attacked. Therefore, two new technologies known as edge computing
and fog computing were proposed to avoid the delay in services.
Edge computing is a computation of data at the network’s edge, which
is in close proximity to the physical location where IoT devices are
installed.
Fog computing is the mediator layer between edge and cloud that
transmits only the filtered data to the cloud so as to reduce the delay
and complexity of the system.
1.11 Questionnaire
d. network of sensors
2. Which of the following is not a fundamental component of an IoT
system?
a. Sensors
c. User interface
d. Transformer
3. Which of the following is not an IoT communication technology?
a. NFC
b. BLE
c. LTE
d. IPV6
4. Which of the following is not an IoT supported operating system?
a. TinyOS
b. Contiki
c. Windows
d. Riot OS
5. The architecture of IoT consists of following layers:
a. perception, network, transport, application
b. RESTFul
c. Android
d. CoAP
7. MQTT stands for _________.
a. Message Query Telemetry Transport
b. Client-server architecture
c. Both a and b
d. None
9. The applications of IoT include:
a. HOME and cities
c. Defense
b. Cloud
c. Edge servers close to IoT devices
Answer key
1. (a) 2. (d) 3. (d) 4. (c) 5. (c) 6. (b) 7. (a) 8. (a) 9. (d) 10. (c)
c. EIS systems
Keywords(†)
Sensors: It is a device that detects events and changes in its
environment, collects data, and transmits information to other devices
for further processing.
Actuators: This device is the opposite of sensors. It takes the
processed information as input and turns it into the environment
inform of physical action.
Microcontrollers: It is a small computer integrated into a chip and
contains more than one CPU along with memory and programmable
input/output devices.
M2M: It is a machine-to-machine technology that establishes a wired
or wireless connection between devices using any communication
channel.
GSM: It is a standard to describe the protocols for second-generation
digital cellular networks used by mobile phones and tablets.
UMT: Like GSM, it is also a standard but describes the protocols for
third-generation mobile-cellular networks.
System on Chip (SOCs):It is an integrated circuit that combines all
the components of a system into a single chip.
Field programmable gate array (FPGAs): They are semi-conductor
devices that consist of a matrix of Configurable Logic Blocks
(CLBs) comprising of AND, OR, and NOT gates; connected via
programmable interconnects. After manufacturing, they can be
programmed and reprogrammed as per the required application.
Resource Description Framework (RDF):It is a framework that
represents data on the web. Its statements are used to describe and
exchange metadata based on relationships.
Web Ontology Language (OWL): It is a semantic web language that
is used to represent complex knowledge about things, groups of things,
and the relations between things.
EfficientXML Interchange (EXI):It is a binary XML language that is
used to exchange data on a computer network.
OVH: It is a cloud service provider that provides infrastructure-as-
service to IoT systems.
OWASP: It is a community that produces freely-available articles,
methodologies, documentation, tools, and technologies in the field of
web application security.
Apache Hadoop: It is a framework that facilitates the distributed
processing of huge data set across network of computers using simple
programming models.
SciDB: It is a multi-dimensional data base management system that
analyses the IoT applications generating big data.
Zero Day Initiative (ZDI): It is an international software vulnerability
initiative that acquires software vulnerabilities from different security
researchers and then present these vulnerabilities to their original
vendors for patching before generalizing it into public domain.
Reply attacks: It is a network attack where valid data transmission is
maliciously or fraudulently repeated or delayed.
IMD Smart City Index: It is an index that defines the city as an
intelligent city that applies the latest technology to enhance their
benefits and diminish their shortcomings. It ranks the cities on the
basis of their smartness and technological advancement.
References
Introduction
The chapter discusses various aspects of information assurance followed by
the administration and execution of attacks in IoT systems. It presents the
difference between threats, vulnerability, and risk. The chapter supplements
various types of attacks and their organization into attack trees with
acceptable countermeasures like secrecy and encryption of the Internet of
Things. For determining the gravity of the threats, this chapter illustrates the
remarkable threat modeling process where threats are identified and rated
based on severity.
Structure
In this chapter, we will cover the following topics:
Information Assurance – Components
Threats
Vulnerabilities
Risk
Insecure Access Control
Attacks- Types, Composition, and Tools
Threat modeling for IoT Systems
2.1 Information Assurance: components
Information Assurance (IA) is an important domain of IoT security, which
assures information certainty and manages risks related to its usage, process,
storage, and transmission. It includes the following essential components,
also termed the five pillars of information assurance:
Confidentiality: It is the security measure that keeps secrecy of the
sensitive information and protects it against unwanted disclosure.
Secrecy of information is attained only if an authorized user is allowed
to access it. This can be done by using usernames, passwords, and any
secret code † or by any other form of two-factor authentication † .
Unwanted disclosure as stated is also a characteristic of confidentiality
which is attained by a method of encryption†.
Integrity: It is the security measure that protects the information from
unauthorized alteration, either intentionally or accidentally. It ensures
the accuracy of the data throughout the lifespan. For instance, market
purchases should be appropriately reflected in the account. If not, then
we say that the integrity of information is not maintained. Integrity can
be assured as simple as by “read-only file” constraint or as complexly
as by encryption, hashing†, or checksum
Authentication: It is the security measure that ensures that the valid
data is coming from a valid source. The validity of the source is
examined by access control mechanisms like username, password, and
OTP † (one-time-password). In simple terms, authentication is the
process in which the validity of the user is checked before providing
the access to the system.
Non-Repudiation: It is the security measure that prevents the denial
of occurred action caused by an individual or system in course of time.
For example, digital signatures † used in online transactions or in any
contract or in any receipt serves as the proof that the data has been sent
by that person or system. In other words, affiliated parties within the
course of time cannot deny the authenticity and integrity of the signed
document. For example: Tec builders received an email from Mr
Raghu. The digital signatures and time stamping on the mail signifies
that the mail has been sent by Mr Raghu and he cannot deny sending
the mail.
Availability: It is the security measure that ensures the presence of
information when needed by an authorized individual. Backup, spare
data channels, and onsite-offsite capabilities like customer support
help are some of the tools of availability.
2.2 Threats
A threat is defined as the possible negative activity or event performed by
any intruder† or vulnerable† individual that may have an awful impact on any
system or application. A threat can be natural or man-made; for example, the
act of God like earthquakes, storms, and hurricanes is a natural threat while
hacking and cracking without authorization are man-made threats.
Associated terms
Threat Actors: Threat actors are individuals or groups that perform
the action of threats; for example, a burglar invading our home, or an
intruder who exploits a vulnerability to realize a negative impact.
Threat source: These are the individuals who wish to employ threats.
They may persuade or give any kind of commission to the threat actor
to carry out the threat.
Threat action: It is an attack on system security.
Threat analysis: It is the process of determining, which component
within the system needs protection and from which type of security
threats.
Threat consequence: It is the result of a security violation (threat) that
includes disclosure, deception, and disruption.
Threat classification
As per Microsoft, threats are classified as STRIDE and are named as:
Spoofing: It is the condition where an attacker gains an illegitimate
advantage by falsifying its own identity. It is applied to various
communication methods like email communication; here, attackers
send false an email message to the recipient tricking them to think that
it is coming from a trusted source. These emails and messages contain
malicious attachments and links, which spread as soon as the email
message is unfolded. Another example of spoofing is IP spoofing. It is
the most common in IoT networks, where attackers disguise their
device IP address and pretend to be one of them or a trusted device. It
is basically done to gain access to a network where authentication is
based on IP addresses.
Tampering: It is the destructive action taken by an unauthorized user.
The unauthorized user alters the information such as those in a
database where sensitive information (price, credentials, permissions,
and so on.) is manipulated.
Repudiation: The situation where the attacker denies the action is
called repudiation. It can be avoided by using digital signatures, where
an attacker or any communication entity can never deny the action
performed by him like sending a document, message or a mail and so
on.
Information Disclosure: In this type of threat; the attacker performs
privacy breaching or data leaking. For instance, an attacker can
provide access to source code via temporary backups; he can reveal
the hidden directory , its structure or can unveil the technical details,
and so on.
Denial of Service (DoS): It is the threat where the attacker tends to
disrupt the services of the network by flooding unwanted data within
the network. The aim of the attacker is neither to steal any information
nor to leak any data; they only aim to disrupt communication with
respect to time and money. DoS attackers often target the servers and
services of high-profile organizations like banks, media, government,
and trade organizations.
DoS attack is implemented either by flooding or by crashing services.
In flooding, an attacker sends enormous traffic to the server, causing it
to slow down and then eventually stop it. In crashing, the attacker aims
to smash the target system and services by exploiting its weaknesses.
Elevation of Privilege: It is the act of exploiting bugs or design flaws
in an operating system or application to gain unwanted access to
resources that are generally hidden from the user and application. For
instance, a flaw in the IoT authentication method can be exploited by
an attacker, whereby he can smoothly get control of hidden
administrative power.
IoT devices are subjected to physical threats, hardware threats, software quality
threats, environmental threats, supply chain threats, and much more inherent to
both security and safety domains.
IoT devices in CPS (for example, actuation, physical sensing, and so on) are
subjected to physical reliability and resilience threats along with the compromise
and degradation of the computing platform.
It is not necessary for an organization to imply all the stated pillars of information
assurance (IA). There may be some pillars that impede the functioning of other
pillars or there can be pillars that boost other pillars. For instant, increase in
availability of the information works against the integrity, authentication and
confidentiality [1].
2.3 Vulnerabilities
Vulnerability is defined as the weakness in any device or application that can
be any existing bug, design flaw, or loophole within the system that allows
attackers to exploit it. Figure 2.1 presents the act of threat and vulnerabilities
within the system. Primarily, vulnerability is of four types: hardware
vulnerability, software vulnerability, network vulnerability, and procedural
vulnerability.
Hardware Vulnerability: It is the weakness within the system
hardware that can be attacked physically or remotely, for example, an
old version of systems or devices, unprotected storage, unencrypted
devices, and so on.
Software Vulnerability: It is the weakness in software development
or its configuration. For example, lack of input validation, unverified
uploads, cross-site scripting, unencrypted data, and so on.
Network Vulnerability: It is the weakness within the network which
can be hardware or software. For example, unprotected
communication, malware, or malicious software (for example: viruses,
keyloggers, worms, and so on.), Social engineering attacks,
misconfigured firewalls, and so on.
Procedural Vulnerability: It is within the organization’s operational
methods. For example, password procedure, that is, a password should
follow the standard password policy.
2.4 Risk
Risk is defined as the potential loss or damage caused by any threat that
exploits the vulnerability of the system. It can be any financial loss, loss of
privacy, damage of reputation, legal implications, or even loss of life.
Statistically, we can express risk as a product of threat and vulnerability
(equation 1).
Threats Explanation
Attack Description
Attack Description
These are only some types of attacks; however, throughout the book, we
will cover the other remaining attacks.
Attacks specific to IoT
Other than the discussed attacks in the preceding section, some
specific attacks related to IoT have emerged recently where attackers
tend to intercept or alter the behavior of devices either by physically
damaging them or by injuring them remotely. Attacks based on these
scenarios are as follows:
Physical access attack
In this type of attack, the attacker gains physical access to devices
and then tries to damage them without the user’s consent. Though it
seems impossible but can be discussed with the help of the
following scenarios: In scenario 1, the attacker gains access to the
market where second-hand IoT devices are contemplated. Users
using these devices are unaware that it has been compromised and
an eye is on them. In scenario 2, an attacker gets access to home
devices where he can easily reconfigure them and can have access
to the whole network. Similarly, they can pair new devices or reset
them, configure new passwords, or redirect traffic to an attacker’s
server. In scenario 3, attackers compromise the devices through
supply chain hacks. In this, the attacker illegally gets hold of the
Supplier Company’s network and trojanizes their software updates,
permitting the threat to spread on all devices that avail poisoned
updates. In scenario 4, skilled attackers can alter the device’s
internal memory or its firmware and can get the system under their
control. Thus, we can deduce that though physical access attacks
seem improbable but are still plausible threats, they should be
avoided.
Local attacks over Wi-Fi
In this type of attack, IoT devices present within the local home
network receive the malicious command from attackers either
through cloud polling or through a direct connection. As soon as the
attacker gets hold of the network; unwanted activities are
performed. For instance, an adversary can damage the IoT devices
like television, air-condition, digital lockers and so on by remotely
turning it on and off.
Attack against enterprise IoT components
IoT devices in enterprise systems utilize wireless communication
protocols such as ZigBee, ZWave, Bluetooth-LE, WiFi802.11, and
others. This section outlines the attacks against enterprise IoT
components:
Wireless reconnaissance and mapping attack
In this type of attack, the attacker collects all possible information
about the target before launching the actual attack. In the case of
enterprise systems, before instigating an attack, hackers tend to
gather all information on IoT devices and communication protocols
like Zigbee, z-wave, and so on with regards to its hosts, subnets,
ports, and protocols before damaging them.
Security protocol attacks
In these attacks, attackers tend to damage the protocol design,
implementation, and configuration. Here, external parties try to
sniff the exchanged network key during the pairing of zig-bee or z-
wave transactions and gain control over the zig-bee and z-wave
devices. Therefore, there is a need to determine additional layered
security control for these wireless communication protocols [3].
Physical Security Attacks
In physical security attacks, the attacker physically gets control of
the IoT host, embedded devices, and computing platforms where
they can easily access its processor, memory, and other sensitive
components like passwords, configuration data, and so on. To
protect enterprise IoT from physical attacks, various tamper
evidence controls, tamper response mechanisms, hardware security
cryptographic modules, and smart card chips are employed to verify
device identity and data from being compromised.
Application security attacks
In IoT enterprise, application endpoints include web servers and
mobile applications (as in iPhone and Android) which can be easily
exploited by attackers. The attacker can get control of the
application code, application host, and application process by
fuzzing the malicious program within the device. In addition,
attackers can crack hardcoded keys and passwords through reverse
engineering.
Nodes within the attack tree are represented by two logical operators AND
and OR where AND nodes represent different steps of achieving the same
goal while OR nodes are alternatives for achieving the goal.
The expansion of the Exploit transitive trust node is presented in Figure 2.5.
The representation and expansion of all nodes is a complex task; thus, it
needs greater analysis where the attack tree modeling requires a huge
number of experts in each of the sub-tree domains. Therefore, to model the
tree in an IoT system (or device), security engineering tools like the
SecurITree tool are used:
Figure 2.5: Third level of UAS attack tree
The SecurITree tool not only creates tree diagrams but also models the
effectiveness of each attack goal by measuring its capabilities (like technical
ability, attack cost, and noticeability), behavior probability, attack impact
(that is, the impact of the attack on the victim), attackers benefits, and
detriments of the attackers (how an attack can be demotivated). The tool
estimates every attack vector based on all possible tree traversal and logic
operators that define each attack goal. Once the attack vectors are generated,
reports in the form of graphs such as willingness-to-capability ratios are
produced, whose slope indicates to what extent the attacker continues to
pursue attacks with limited capability. This information helps in selecting
and prioritizing the security controls and other mitigation controls.
Enemy has alternatives for forging packages; thus, the root of the FTA is
connected with the OR symbol.
In the first case, if the enemy gets the secret key, it means he can either steal
the key or can self-calculate the key. Since alternatives are available, it is
represented by the OR symbol. If the enemy steals the key, then it is the end
of the event and cannot be extended because the package can be forged
easily, hence is represented by a basic event symbol. While if the enemy
aims to self-calculate the key, then how key calculation is performed, can be
further extended (Figure 2.7 (b)).
In the second case, the enemy tends to construct malicious files with valid
hash functions. It will be possible only if the enemy has effectively broken
the cryptographic algorithm. Thus, this event requires further extension
(Figure 2.7(c)).
Considering extension 1 (Figure 2.7 (b)) - When the enemy can calculate
the secret key
The enemy can calculate the secret key in any of the three situations. First,
when the secret key algorithm is not strong enough, second; when the enemy
can exploit the signing vulnerability, and last, the enemy can use its known
attacks on signing algorithms like brute-force to get the key. The first two
situations are the end of events while in the third situation, a secret key can
be calculated if the signing algorithm is poor (not complex) and the enemy
has applied its known attack. Since both conditions are a must for an
attacker, therefore it is represented by the AND symbol.
Considering extension 2 (Figure 2.7 (c)) - When effectively the enemy
can break the hash algorithm
Like in extension 1, in extension 2 also, the enemy can break the hash
algorithm, if either he has exploited the vulnerability of the hash algorithm or
has used the known attacks on hash algorithm. In either of the situations, the
enemy can break the hash algorithm (represented by OR gate). The first
situation is the end of the event as the weakness of the hash algorithm is
exploited while in the second situation, the enemy can break the hash
algorithm if the design of hash algorithm is poor and the enemy knows the
attack which can be applied to break it, thus is represented by AND gate.
b. Trace the flow of data from the entry point and document all the
components that interact with that data throughout the system.
f. Accountability
g. Separation of duties
i. Change in design
j. Change in implementation
ID Asset Description
The customer uses the smartphone application to pay for the spot.
Postconditions
The customer has paid to park the car for a set amount of time.
Use case 2: Parking enforcement officer is alerted to the non-payment
incident
Preconditions
The time allocated to a parking transaction has expired and the car
is still in the parking spot.
Use case
Parking application (backend) records the parking session start
time.
Conclusion
This chapter explores IoT threats, vulnerabilities, and risks along with their
countermeasures which would help the reader in analyzing and strategizing
the security model for an IoT system. The chapter presents different types of
attacks for specific as well as for enterprise IoT with appropriate threat
modeling demonstration. The chapter illustration is summarized as follows:
Information Assurance deals with the execution of methods and
techniques that protects and safeguards the information related to its
use, process, storage, and transmission
Information is assured by assuring:
Confidentiality: It ensures that sensitive information is secret and
is not disclosed to unwanted entities.
Integrity: It ensures the originality of information with no
alteration or modification either accidentally or intentionally.
Authentication: It ensures that authentic data is coming from
authentic users.
Non-repudiation: It ensures that communication parties cannot
deny the validity of the occurred action.
Availability: It ensures the presence of information whenever
needed by an authorized individual.
Resilience: It ensures the ability of the system to recover from
failure and attacks either deliberately or accidentally.
Safety: It ensures that the system is protected from harmful
situations.
Threat is a negative interference that exploits the weakness of the
system to breach security and harm the objects of interest by
negatively altering, stealing, or erasing the data or information.
Microsoft has classified threats as a STRIDE model:
Spoofing: An attacker gains illegitimate advantage by disguising its
identity
Tampering: An action of modification and alteration taken by
unauthorized user
Repudiation: A situation where the attacker denies the action already
taken
Information Disclosure: An act of performing data breaching and
leaking by an illegitimate user
Denial of Service: In this type of threat, an attacker disrupts the
network communication by flooding enormous data within the
network.
Elevation of Privilege: It is the act of taking unwanted advantage of
bugs and flaws present within the system, to gain uninvited access to
resources and application.
Vulnerabilities are weaknesses within a system that gives attackers the
opportunity to exploit the system related assets. It is classified into
four types: hardware vulnerability, software vulnerability, network
vulnerability, and procedural vulnerability.
Risk is the damage or destruction of assets or data caused by any threat
that makes use of existing vulnerabilities within the system. Risk can
be reduced by employing the risk management system.
Access control is a constraint on data security that states which user is
allowed to access which part of the system at what time.
There are three different ways to categories access control security
measure: List-based access control, role-based access control, and
capability-based access control
Access control threats are classified as internal threats and external
threats, privacy threats include digital profiling, cyber stalking and
recommendation systems and availability threats consisting of
infrastructure failure, infrastructure overload, malicious activity, data
inconsistency, and poor data quality.
Some common types of IoT attacks are:
Side channel attack: An attacker targets the implementation of
security measures and tries to recover the secret data.
Sniffing: An attacker illegally monitors and extract the unencrypted
data by invading the network traffic
Neighbor discovery attack: An attacker tends to disrupt the
working of neighbor discovery protocol.
Rogue Device: An attacker implants rogue devices, which tends to
launch the cyber-attack by exploiting the vulnerabilities of the
system.
Man-in-middle attack: An attacker secretly relays or spies the
communication between two parties, who think that they are
communicating directly with each other.
Eavesdropping: Attackers steal, delete, or alter the information
while in transit.
Attacks specific to IoT network
Physical Access attack: An attacker tries to disrupt the devices by
gaining physical access to them.
Local access attack over Wi-Fi: An attacker tries to disrupt the
devices remotely by gaining network or Wi-Fi access connected to
it.
Attack specific to IoT Enterprise
Wireless reconnaissance and mapping attack: In this, before
launching the attack; the attacker desires to collect all the
information related to the target like port, protocol, and so on and
then launch the final attack.
Security protocol attacks: An attacker aims to damage the
protocol design, implementation, and configuration.
Physical security attacks: An attacker physically gets control of
communication hosts, devices, and computing platforms.
Application security attacks: Attackers aim to damage the
application endpoints like web servers and mobile applications
Attack trees are the diagrammatic representation of showing how an
asset or target system can be attacked. It states the diagrammatic flow
of disruption caused by any malicious activity. The root node and
intermediary node are represented by AND and OR logical operators
while leaf nodes are represented by rectangular box symbols. The level
of the tree depends upon the complexity of the attack.
Fault trees are used to represent the safety measurements of the IoT
application. It presents the flow of natural occurrences of failures and
is illustrated by Fault Tree Analysis (FTA). FTA is the top-down
failure analysis where the risk of the system is analyzed using Boolean
logic AND and OR operators.
Threat modeling is the measurement to understand how an attack can
occur in any IoT application and what measures can be taken to
mitigate that attack. Threat modeling involves the following steps of
consideration:
Identification of assets
Architectural presentation of the system
Documentation
Architectural diagram with components and their interaction
Establishment of trust boundaries
Identification of technologies
2.8 Questionnaire
b. threat actors
c. Threat system
b. risk
c. attack
d. vulnerability
4. Privacy threat includes which of the following attack?
a. Digital profiling
b. cyber stalking
c. False Recommendation
b. eavesdropping
c. jamming
d. man-in-middle attack
Answer key
1. (a) & (b) 2. (b) 3. (d) 4. (d) 5. (a)
Keywords (†)
Secret code: It is the secret access code (combination of letters,
numbers, or special characters) that allows the user to access their
account and prevail their services.
Two-factor authentication: It is a security system that requires two
separate layers of identification for gaining access to accounts and
services.
Encryption: Conversion of data from readable format to encoded
format
Hashing: It is an algorithm performed on file or message to produce a
number called hash (also known as checksum), which is used to verify
that data within a file is not corrupted and modified.
One-Time-Password (OTP): It is the mechanism of logging into the
network by using a unique identification password that can be used
only once.
Digital signatures: It is the mathematical formulation of validating the
authenticity and integrity of the message.
Firewalls: It is the security device that monitors and filters incoming
and outgoing network traffic based on organization policies.
Antivirus: Software used to prevent, scan, detect and delete viruses
from the system
Intruder: They are attackers who attempt to breach the security of the
network.
Vulnerable: It is a weakness within the system that can be exploited
by an attacker
MAC address: Unique address which is used to track IoT devices.
References
Introduction
Security engineering is a complicated issue that deals with building systems;
free from fault, error, or failure. As a subject of concern, it explores tools,
processes, and methods needed to design, implement and test the systems.
These systems struggle with a viable source of interruption extending from
natural to malicious disasters. In today’s technical industry security engineering
has taken back seats, which if not acknowledged and rectified; then can cave in
the following gloomy activities:
Crime, for example, burglar and car alarms
Undermining of the business, for example, false payment
Undermining of industrial economic infrastructure, for example,
falsifying machines and network systems
Endangering human life, for example, damaging defence and nuclear
power systems and their privacy, for example, damaging medical record
data or any personal details.
Engineering in any discipline generally involves a methodological approach
that includes prototyping, testing, refining, and then finalizing the architecture
before being deployed. However, in this attainable world; where security is of
prime concern, instead of following traditional approaches; researchers,
developers, and company holders have practised plenty of other models for
imparting security in an IoT domain. Concerning this, the chapter illustrates the
development of security engineering for the Internet of Things.
Structure
In this chapter, we will cover the following topics:
Secure development methodologies for IoT
Security designing in IoT systems and its compliance with others
Planning and development of the security process and agreements
Process of selecting suitable security products and services for IoT
The characteristics of threat modeling, PIA, SIA, and compliance serves as the
inputs for embracing security while integrating a device within any
enterprise.
It is essential to know that privacy data is not published during the audit interface
without the explicit permission or agreement given by the device owner or user.
Such information is discovered and evaluated at the time of privacy impact
assessment.
Venafi TLS Protect † and CodeSign Protect † are two of the organizations that
ensure that the IoT update processes are protected against attacks and
vulnerabilities.
Authentication/Authorization
Authentication and authorization are the most important areas of IoT
security that require careful selection of technology. Authentication is
establishing trust for the identity of IoT devices and protecting generated
data against insecure access when information travels via an unsecured
network and Authorization is the process of validating the identity of
each endpoint within the IoT system. The certificate process is used to
validate the identity of the system.
Software-based authentication:
There are several methods of achieving authentication, some of them are:
One-way authentication: In this case, out of the two communicating
parties, only one party will authenticate itself for communication. For
example, in SSL authentication, only the client needs to validate itself
to the server, the server does not verify itself to the client application
but shares its public certificate with the client.
Two-way authentication: It is also referred to as mutual
authentication. In this type of authentication, both entities authenticate
each other. For example, authentication in point-to-point
communication between two parties.
Three-way authentication: In this authentication, the central
authority authenticates the two parties and helps them to authenticate
each other. For example, in Kerberos, the two communicating parties
implicitly trust the Kerberos server, which then helps in authenticating
each other.
Distributed Authentication: In distributed authentication, direct
authentication between the communicating parties takes place.
Centralized Authentication: In this authentication, a centralized
server or a trusted third party is used to distribute and manage the
authentication certificates.
Hardware-based authentication
Correct implementation of authentication and authorization has
beneficial effects on IoT security. However, choosing the right method is
challenging and if the wrong choice is done then the risk may increase
tenfold. It has been observed that the actual choice of solution depends
on the deployment design of the IoT infrastructure, which includes
hardware capacity, energy resources, security expertise, security
requirements, connectivity, and financial budgets.
As an example, public key infrastructure (PKI) certificates are used
for authenticating the functionality of the organization that does not use
cloud-based IoT services. PKIs are structured trees, that contain servers
and devices and maintain a list of trusted root certificates. Each
certificate has the device’s public key and is signed with the certificate
authority’s (CA) private key. A unique “thumbprint” provided by PKI is
then validated by running the cryptographic RSA algorithm.
On the contrary, organizations that make use of cloud-based services can
use web services like Amazon Web Services (AWS) IoT cloud platform
for building authentication and authorization solutions. AWS provides
X.509 certificates and SigV4 (Signature version4) certificates for
authentication. X.509 certificate is the most secure digital authentication
and is based on the chain of trust model. It is the best way to scale up
production and simplify service delivery. The SigV4 initiates
authentication information to AWS by generating a signature and then
adding it to the HTTP request [9]. In addition, AWS provides Identity
and Access Management (IAM) service to manage certificates and
authorization support [10].
In case, the organization has its own infrastructure, then in that case,
authentication and authorization support follow the build-your-own
approach. It is advisable for an organization to build its own support if
and only if it has considerable experience in designing and securely
deploying its infrastructure, as there are always high chances that
Registration Authority (RA) may get compromised.
Vehicle-based organizations follow IEEE 1609.2 standard for building
authentication certificates for resource-constrained devices. Brivo [11],
ForgeRock [12], Nexus [13] and OAuth2.0 [14] are some of the vendors
that offer IoT-specific authentication and authorization support.
Details of PKI, X.509 and IAM will be discussed later in this book.
The rest of the phases of IoT security lifecycle will be discussed in next chapter.
Conclusion
The chapter illustrates the exploration of security engineering principles for the
Internet of Things. It states the need for building security throughout the design
and development of the system. The chapter introduces the concept of the IoT
security lifecycle and presents an in-depth exploration of the design phase. The
comprehensive picture of the existing chapter is summarized below:
Security engineering is the principle that involves the methodological
approach of securing IoT systems from the beginning till the final
deployment of the product.
Conventionally security requirements and security management during
the entire operational phase were used as the means of securing IoT
systems from threats and attacks.
Security requirements are categorized into four types:
One-time requirement: Requirements that are needed once at the
start of the project.
Iteration requirement: Requirements that are needed again and
again after every specific interval of time.
Bucket requirement: Requirements that are collected and can be
used over the life of the project.
Functional requirement: Requirements that are required as per the
need of the product owner.
Product-as-a-service (PaaS) is used to maintain security during the
operational phase.
In PaaS instead of selling products to customers, vendors lease or sell
their product’s services based on the pay-per-use method.
Managing and controlling the requirements and services during the
operational phase was not enough to secure the complex IoT system.
Thus, the IoT security lifecycle was introduced for the protection of the
IoT system.
IoT security life-cycle is a course of events that secure the IoT products
from their existence to their deployment and eventually to their
stabilization.
IoT secure lifecycle constitutes four different phases viz. Design,
Implementation & Integration, Operation, and Displacement.
In the designing phase, the architectural structure of the system is
prepared, next in the implementation and integration phase the structural
design is implemented and the security feature is integrated with existing
components of an enterprise.
Following this, the operation and maintenance of the system are
executed, and last of all after the successful usage the system is disposed
of with appropriate security features.
The secure design phase is classified into three subclasses:
Safety and security design
Process and agreements
Technology Selection
Safety and security design constitute threat modeling, PIA, SIA,
Compliance engineering, and secure system design
Process and agreements constitute the Secure acquisition process, secure
update process, service level agreement, privacy agreement, risk
planning, and physical security planning.
Technological selection includes a section of appropriate IoT hardware,
microcontrollers, RTOS, IoT relationship platforms, cryptographic APIs,
security monitoring and authentication/authorization techniques, and
selection of edge/fog/SDN networks.
The rest of the phases will be discussed in Chapter 4, IoT Security
Lifecycle.
3.3 Questionnaire
b. Iteration requirement
c. Functional requirement
d. Bucket requirement
2. Actions included in the PIA assessment are:
a. Accept
b. Control
c. Manage
b. SIA
c. Protocols
d. Compliance
4. A documented agreement between the enterprise and vendor that
identifies both required services as well as the expected level of
services:
a. PIA
b. SIA
c. SLA
b. Two-way authentication
c. Three-way authentication
d. Distributed authentication
Answer key
1. (a) 2. (d) 3. (d) 4. (c) 5. (c)
Keywords (†)
Payment Card Industry (PCI): It is an organization that processes all
types of payment cards such as debit cards, credit cards, prepaid cards,
and ATM cards.
North American Electric Reliability Corporation (NERC): It is a
non-profit regulatory authority that assures the effective and efficient
reduction of risk to the reliability and security of the electrical grid.
Society of Automotive Engineers (SAE): It connects and educates
mobility professionals to enable safe, clean, and accessible mobility
solutions.
HIPAA: It aims to protect the patient’s health information from being
disclosed without the patient’s consent
Rekeying: It is the process used in cryptography to change the session
key and encryption in ongoing communication and limits the amount of
data being encrypted with the same key.
TLS: It is a Transport Layer Security protocol that is designed to
facilitate privacy and data security in communication networks over the
Internet.
Firewall: Network security device that monitors and filters the incoming
and outgoing network traffic.
Security Information and Event Management (SIEM): It provides
security by combining security products and services with security
information management and security event management.
TLS Protect: It provides automated key and certificate management and
security across multiple cloud providers and operating environments.
CodeSign: It secures the code signing private key, automates the
approval workflows, and maintains the irrefutable record of all code
signing activities.
Pay-per-use: It is a payment method where the customer pays for using
the product instead of buying it.
References
Structure
In this chapter, we will cover the following topics:
The significance of security lifecycle in IoT system
Knowledge of various phases of the IoT security lifecycle
Implementation, operation and maintenance of a secure IoT system in
an organization
The secure procedure of dismantling (if needed) the IoT devices and
its related features.
4.1 Introduction
The security engineer must characterize the IoT system and define a
suitable security lifecycle for each component so as to maintain a secure
state across the enterprise. Together with the security, the corresponding
lifecycle should support the IoT enterprise with the following features:
Privacy: The security lifecycle should be able to maintain the privacy
of sensitive information or metadata from a third-party relationship
that is allowed to take part in communication for some prescribed
tasks.
Protection against new attack vectors: A defined lifecycle should
be able to guard the enterprise against new attack vectors triggered
due to the configuration and installation of multiple new devices.
Risk: The security lifecycle should feature the provision of providing
safety to the unexposed risk, to preserve the IoT system from any
physical harm.
Data analytics: The lifecycle should support the application and the
security of preprocessing initial data analytics at the edge as well as
at the cloud for additional analytics.
In Chapter 3, Security Engineering for IoT Development, we have already
identified the four phases of the IoT security lifecycle, namely, secure
design, implementation and integration, operations and maintenance, and
secure ejection (Figure 3.2). In addition, we have addressed only the in-
depth explanation of phase 1: security design within the IoT system
lifecycle. Thus, in this current chapter, we will explore the other critical
aspects and phases of the IoT security lifecycle.
Ideally verification and validation are done throughput the security lifecycle.
The functionality of the IoT system can be verified using test drivers or
emulators†. It provides confidence in implementers that each device is
operating as per the defined security requirements. Testing performed on
these emulators records all types of issues, which can be positive as well as
negative. Identified issues are documented in Discrepancy Reports (DRs),
which are tracked by the development teams as and whenever the system is
updated or new releases are made available. Henceforth, the verification
and validation of the system are performed.
Splunk is the latest IoT monitoring tool that processes machine-generated data
and supports data collection, indexing, search and analysis. It supports various
IoT protocols like MQTT, AMQP, and REST; through add-on applications.
4.3.3 Penetration testing
Penetration testing is another development for operating and maintaining
security in IoT systems. It is a simulated fake attack that is performed to
investigate the exploitable vulnerabilities within the system. It is used to
validate IoT networks, devices, its existing security controls and identify
gaps within the implemented security controls. Penetration testing includes
five steps and is illustrated in Figure 4.3:
4.3.6 Forensics
IoT forensics is digital forensics that deals with IoT-related crimes and
includes the deep investigation of connected devices, sensors, and data
stored on all possible platforms such as in-home sensors, wearable devices,
and the cloud. It uses the multi-faceted approach to collect data from
various sources, for example, smart devices and sensors (it includes smart
gadgets at the crime scene like a smartwatch, weather control devices, home
automation appliances, and so on.), hardware and software (it includes
communication link between devices and external world like mobile,
firewall, and so on.), external sources (it includes network like cloud,
social network, ISPs, and mobile network providers).
Once the evidence or data is successfully collected from various sources no
matter what the IoT operating system is or on what platform it is based, it is
directly logged and monitored by the security staff to investigate and
analyze the related disruption.
Conclusion
This chapter is the continuation of Chapter 3 and discusses the rest of the
phases that is, Phase 2, phase 3, and Phase 4 of the IoT security life cycle. It
provides an in-depth discussion of implementing, operating, and disposing
of IoT devices and systems in a secure manner. A broad spectrum of the
chapter is illustrated as follows:
Once the secure designing of the IoT system is done, the next phase
includes the implementation of those designs and the integration of
the enterprise system with security training and configuration
mechanisms.
Implementation and integration of the IoT system include the
following sub-phases:
Formation of security CONOPS document: It is a document
that contains the operation of the system, its security needs, and
the method to satisfy those needs.
Implementation of the designed network with its integrated
security features: In this phase, the IoT network is implemented
with its security characteristics.
Security verification and validation: The implemented security
is verified and validated in this step.
Security training: Once implemented users and security
administrators are trained to operate the IoT system securely.
Secure configuration: In this step, the secure configuration of IoT
devices and networks is done.
After the implementation and integration of the IoT security system,
the next phase includes the operation and maintenance of these
security features. It includes the following sub-processes:
Credential management: Here identities, roles, cryptographic
keys, and credentials are managed.
Security monitoring: Detection and mitigation of abnormalities
are done by monitoring the devices and systems.
Penetration Testing: Simulation of fake attacks is done to
investigate the exploitable vulnerabilities within the system.
Asset and configuration management: It includes the
management of IoT assets and their databases within the system.
Incident Management: In this step, the system is trained in
dealing with the occurrence of the futuristic incident.
Forensics: It includes the deep investigation of IoT-related crimes
associated with any part of the system or platforms.
After sufficient use of the IoT system, after some time it may happen
that the organization wants to dispose of the IoT device or system,
then, in that case, the IoT system enters the disposing phase. The
organization should ensure the secure disposal of the IoT device and
system. It includes the following sub-phases:
Device disposal and zeroization: It states that whenever the IoT
system is disposed of, all cryptographic materials related to it
should be first securely removed and then should be disposed of.
Data purging: Data purging includes the secure removal of
sensitive data within the system and devices.
Inventory Control: All data related to the disposal of devices
should be removed from the inventory database.
Data archiving and records management: It includes the secure
retrieval of confidential data whenever needed.
4.5 Questionnaire
b. Security document
c. Security Guide
c. Security
b. unit Testing
c. penetration testing
d. system testing
4. In depth investigation of IoT-related crimes is known as ______.
a. forensics
b. crime analysis
c. crime examination
b. data deletion
Answer key
1. (a) 2. (b) 3. (c) 4. (a) 5. (d)
Keywords (†)
SIEM (Security Information and Event Management): It is a
security approach that combines security information and security
event management functions into a single security management
system.
Glue-code: It is an executable code that adapts different parts of code
that are incompatible with each other
Emulators: It is the hardware or software that enables dummy
systems to behave as an original IoT system.
Proof-of-concept: It is an understanding of a certain idea that
demonstrate its feasibility or its practicability.
References
Structure
The chapter covers the following topics:
The Sybil attacks and their detection scheme in a vehicular network
Malware propagation and its optimal controlling schemes
The concept of Smart Home Systems and the solutions for protecting them
from various attacks
Robustness in the IoT network and the technique of increasing its
performance
The concept of the vehicular network became popular in 1990 when the scientific-
community supported computing and telecommunication within the global positioning
system (GPS).
Projects such as PATH (California partners for advanced traffic and highways), ASV
(Advanced Safety Vehicles), and CHAUFFEUR (Europe) at that time were promoted
and favored in different areas of vehicular networks such as communication, application,
architecture, design, and security.
In-depth details of the VANET are out of the scope of this book, however, if readers wish,
they can refer to the following research papers [9]–[11]
Out of all these discussed attacks, the Sybil attack is the most common and critical in the
VANET network. Therefore, in the upcoming section, we will discuss the mechanism of
detection and mitigation of this attack.
Since CA knows the public key of all RSUs, hence can communicate securely
with RSU.
Thus,
and,
Where,
The expected time to go from state ‘k’ to state ‘j’ is given as:
Hence,
And,
Thus, we can write the rate transition matrix R for the model presented in
Figure 5.8 as follows:
From this ‘R’ matrix, the transition probability matrix ‘P(t)’ can be obtained.
(a)
(b)
(c)
Figure 5.9: Illustration of LRD defense Scheme
There are several other methods of representing malware propagation and its defence
mechanism. Readers can refer to the following research if interested [6]–[8].
Attack 1
In this attack, the attacker uses the dS Android Smartphone Application as the
entry point and switches ON the light when the homeowners are sleeping. It is
created by installing a rogue application on the homeowner’s Android smartphone,
which is unrelated to the SHS system. Once this rogue application is installed, it
launches a background service that sends a cross-application message using the dS
application public interface to the actual dS application system; anytime during the
night. The actual application then performs the action using stored credentials and
allows the rogue application to know the inner details. This attack seems to be
more dangerous and frightening if not investigated properly.
Solution analysis of attack 1: This attack can be avoided by preparing the white
list of applications that are allowed to send control events through the dS Android
application. Any installed application should have the request permission before
being granted access. In this way, this type of attack can be prevented from the
SHS system. Users should keep in mind that any application which has nothing to
do with SHS and is exposed to Android should not be installed.
Attack 2
In this attack, the attacker uploads the power readings of the SHS to a remote
server and allows the attacker to know when the home is empty or is likely to be
empty. It is created by illegally entering the dS application store and collecting all
the data from the dSM. This data is then periodically uploaded by the attacker to a
remote location. The attacker then uses this collected data to know when the
residence is likely to be empty.
Solution analysis of attack 2: This attack can be controlled, by observing that the
applications that send consumption events to the remote server, should declare
their purpose of sending readings to any remote service in the documentation and
should request those specific permissions during installation. If any of the sending
is against the purpose of the application, then the user should recognize the threat
and should take appropriate action like logging or reporting.
Game Theory is the study of mathematical models of conflict and cooperation between
two or more intelligent decision-makers. Here, the model is defined as a Game with
competitive activities, where each competitor interacts with other employers and
employs a strategy to maximize their utility payoff under a certain set of rules. The
detailed concept of Game-Theory is discussed in detail in Chapter 22, The Game-theory
foundations.
5.4.1 Network Robustness using Game-Theoretic analysis
Before analyzing the robustness of the IoT network, we need to understand the
scenario of the network which has been attacked and the defense mechanism which
is been used to detect the presence of an attack.
Let’s consider an IoT network where a Fusion-Based Defense Mechanism is used
to detect the presence of an attack. This mechanism is based on the feedback
received from each node. The feedback data is binary data that reflects whether the
node within the network is under attack or not as per the node-level detection
scheme. Then, the feedback is aggregated at the fusion center and the final
inference is carried out, that is, it will be concluded whether the network is under
attack or not.
The critical (or threshold) value of the network resilience such as the largest component
of the network affected by the attacker should always be less than 50% then only the
network will be said to be free of attack and the node-level detection scheme is already
given.
From the adversary’s viewpoint, the removal of a few nodes from the network does
not cause any harm to the network connectivity. However, if too many nodes are
removed without being noticed by the fusion center, then the objective of the
adversary is successful.
From the defender’s view, inferring attacks using all the feedback may sometimes
be time-consuming, high-energy consuming, and may act as a false alarm since it
may happen that only a few nodes are attacked. On the other side, concluding
attacks using only feedback might suffer from information deficiency and may fail
to detect the presence of attacks.
As a consequence, there should be a balance point at which both attacker and
defender should satisfy their own strategies. This point is known as Nash
Equilibrium or Game Equilibrium point in the game theory. At this point, no
player’s payoff that is, its objective; can be increased by changing the strategy. As
a result, we can infer that the game payoff at Nash equilibrium; can be used to
study the robustness of a network. In other words, the equilibrium point denotes
the robustness of the network.
Example: This can be explained with the help of the Game scenario as discussed
earlier:
Let’s consider Table 5.3:
Two Adversary (He is the attacker.) and Defender (He is the person who detects
players: the attack.)
Actions Sabotage (in case of attacker)/Detect (in case of defender) number of
taken by nodes either less than 50% (LT) or more than 50% (MT)
players:
Set of If number of nodes sabotaged are more than 50% than network-level
rules: attack has occurred. Otherwise, no attack has occurred.
Cost at the C = 1 (attack occur), if #sabotaged nodes > 50% of total nodes within the
network network or #detected nodes < 50% of total nodes within the network
level: C = -1 (no attack occur), if #sabotaged nodes <= 50% of total nodes within
the network or #detected nodes > 50% of total nodes within the network
PD It is the detection probability of the defender
Table 5.3: A game scenario between two players
Pay-off Matrix of the given game:
The probabilities of the possible payoffs for this game are illustrated in the
following matrix. Here, red implies an attack occurring, while green implies that
no attack has occurred (false alarm):
1,1 Attack occurs and is detected -1 ,-1 No attack occurs and no false alarm
generated.
In this game, there exists two Nash equilibrium (1,1) and (-1, -1), that is, two best
responses. In this situation, the Defender’s pay-off quantifies the capability of the
defense mechanism subject to attacker, who is always attacking and can be used as
a performance benchmark for network robustness. It is given by the equation 19 as
is represented by symbol v* :
If readers are facing any confusion, please refer to Chapter 22 The Game-theory
foundations.
Figure 5.14 represents the plot of equation 19. From the graph, it can be deduced
that as the detection probability increases the network robustness approaches to 1,
which suggests that the adversary gradually losses its advantage in disrupting the
network and the damage caused by the attack has been alleviated by the fusion-
based defense mechanism.
Figure 5.14: Network Robustness in terms of defender’s payoff
Conclusion
This chapter set forth the new aspects and dimensions of threats in an IoT network
which are cited as an Interconnection of Threats. It illustrates the theory of
malware propagation and its defense mechanism along with the solution-based
analysis of the attacks in smart home and vehicular systems. The comprehensive
details of the chapter are as follows:
A smart vehicular network is the subclass of mobile ad-hoc networks where
vehicles, roadside units, and people communicate with each other through
sensors and other internet-connected devices.
The open-ended behavior of vehicular networks towards the Internet has
made them vulnerable to various types of attacks such as malware attacks,
Sybil attacks, DoS attacks, and so on.
Out of various attacks, it has been observed that the Sybil attack is the most
threatening and may result in disturbing the routing, tampering trust and
reputation of the system, disseminating false messages, and tending to
damage the fairness of the resource allocation system. Therefore, it becomes
necessary to detect and mitigate this attack from VANET systems.
There are various Sybil attack detection schemes in the VANET network,
which are stated as follows:
Detection of Sybil Attack Using Neighboring Nodes: In this scheme,
information from the neighboring nodes is collected by the central
authority of the VANET network, which is then analyzed for its
consistent similarity and fake identities. If fake details are observed, then
nodes sending fake information are mitigated from the VANET network.
Platoon Dispersion Detection Techniques: In this technique, the
likelihood of Sybil anomalies present in the platoon (group of vehicles) is
discovered using the Cumulative Distribution Function of vehicle’s
identities.
Timestamp Series Approach: In this approach, RSU is given the
responsibility of identifying Sybil nodes. Each RSU issues a certified
timestamp to each vehicle passing by it. In case two messages with the
same timestamp series issued by the same RSU are noticed then that
message is considered a Sybil message and the node that has sent this
message is regarded as a Sybil node.
RSS Detection Approach: In this approach, an RSS signal is utilized to
detect the Sybil attack. RSS signal of each vehicle is captured and
analyzed. Since the vehicle is moving the observed RSS value should
always change but in case if the observed RSS values send by the vehicle
are the same every time, then that vehicle is said to be Sybil in nature
Location Certificate-Based Approach: In this approach, RSUs are used
along with cryptographic certificates together with the position
verification process. The dynamic position of the vehicle is captured and
the authenticity of the vehicle is determined by the nearby RSU using a
cryptographic method.
Other than the Sybil attack, Malwares such as trojans, viruses, and worms
are another point of concern in IoT networks. Since malware is the intrusive
software that has the ability to double itself and spread with twice the speed
as compared to other malicious attacks. Therefore, it is mandatory to study
its propagation mechanism and its defense strategies.
Malware in IoT can be propagated by infrastructure-based communication
and proximity-based communication.
The propagation of malware can be studied in the Impulse Free Model
(IFM). IFM is a microscopic model, where instead of considering the whole
network; an individual object is considered for the propagation of malware.
The Markov Model theory is used for studying and analyzing its internal
propagating feature.
For controlling the spread of malware throughout the network Local
Routing Depth (LRD) strategy is used. In LRD, malware infection is
mitigated in ranges instead of individually.
Smart Home Technology is one of the most common technologies that is
used in day-to-day life and have made our lives smarter and easier than ever
before. Protecting this system is one of the most challenging tasks that users
have to deal with it now and then.
DigitalSTROM (dS) is one of the most popular examples of the Smart
Home System (SHS). SHS has four vulnerable points where attack
generally takes place. They are clamping appliances, servers,
communicating BUS, control devices, and remote services.
Network Robustness is a performance parameter of the IoT network. It is the
measure of the ability to withstand the failure and disturbance within the
network.
The game-theoretic concept along with a fusion-based defense scheme is
used to evaluate the robustness of the IoT network.
5.5 Questionnaire
b. Internet
c. MANET
d. Wireless network
2. Attack which violates the one-to-one correspondence of a node with its
identity is known as:
a. DoS attack
b. Malware
c. Alteration attack
d. Sybil attack
3. Which detection scheme detects the sybil node by verifying the position
of node along with cryptographic techniques?
a. Location certificate-based approach
b. Timestamp-based approach
b. transition probability
c. incubation Probability
b. 5
c. 10
d. 20
6. DigitalSTROM comprises of following components:
a. DSS
b. DSM
c. DSC
b. Game-theory model
c. Chain model
Answer key
1. (c) 2. (d) 3. (a) 4. (b) 5. (c) 6. (d) 7. (b)
Keywords (†)
One-to-one correspondence: It is the act of counting each object in a set
once and only once per object.
Cumulative Distribution Function (CDF): It is the probability distribution
function of any random variable ‘X’, whose probability is will be less than
or equal to ‘x’. It can be expressed by equation: FX (x) = P(X ≤ x), where
FX(x) is the function of X, X is random variable, P is the probability
Attenuation power: It is the reduction of signal strength during
transmission. It is represented by decibels(dB).
Beacon signal: These are the types of signals that represent the proximity or
location of a device.
Incubation period: It is the time period between when you are infected with
something and when you might see symptoms.
Poisson process: It is a model for a series of discrete events where the
average time between events is known, but the exact timing of events is
random.
Ergodic: It is the idea that a point of moving system in stochastic process
eventually visits all parts of the space that the system moves in, in a uniform
or in random manner.
Birth and death process: It is type of Markov process where the state
transitions are only of two types, either ‘births’ that increases the state
variable by one and ‘deaths’ , that decreases the state by one.
References
Structure
The chapter covers the following topics:
Cryptography and its role in securing the IoT
Cryptographic primitives along with authentication and integration details
Meaning of secrecy and capacity of secret-key in IoT system
Symmetric key Encryption Algorithm with classical and modern techniques
Asymmetric key Encryption Algorithm
Cryptographic primitives
Cryptographic primitives in IoT are the well-established, low-level cryptographic
algorithms, which are generally used to build high-level cryptographic protocols for
IoT security systems. Some commonly used cryptographic primitives are:
Encryption and Decryption: Encryption is a systematic process that translates
plain text to cipher text, whereas decryption is the reverse of encryption and so
on; it translates cipher text back to plain text. It includes symmetric key
cryptography and asymmetric key cryptography.
Key (or secret key): The key can be any unique value or variable different
from plaintext, which is known to both the sender and receiver. The sender
encodes the plain text to cipher text with the help of the encryption algorithm
and key. On the other hand, the receiver decrypts the cipher text to plain text by
using a decryption algorithm and the known key (can be the same or different).
The actual transformation of the message depends on the key used.
Hashing: It is a cryptographic technique that transforms any form of message
(or plain text) into fixed size value or string. It includes one-way hash function
that computes the reduced hash value for a message like SHA256.
Digital Signatures: It is a cryptographic technique that confirms the author of
the message by using the MAC code.
Random Number Generators: It is used to generate random numbers that are
difficult for any third party to predict.
From the preceding discussion, we can infer that all cryptographic systems are
characterized by three independent dimensions:
a. The type of operation that is used for transforming plaintext to ciphertext.
Generally, transformation is performed by the substitution operation and
transposition operation. In substitution, each element in the plain text (bits or
letters) is replaced by another element; for example: ‘o’ in plain text is replaced
by ‘i’ in cipher text while in transposition, each element in the plain text is
transposed according to the location (Section 6.4.1).
b. Strength of the cryptographic system also depends on the number of keys used
for encryption. For symmetric encryption, a single key is used for encryption
and decryption while for asymmetric encryption, two different keys are used for
encryption and decryption (Section 6.4).
c. Cryptographic system is also characterized by the way in which plaintext is
processed. For example, a block cipher processes the input as one block of
elements at a time, yielding one block of output for every input. In Stream
Cipher, the input elements are processed continuously, producing the output one
element at a time (Section 6.4.1).
Maintaining secrecy is out of the scope of book. If the readers wish, they can refer the
following research papers [2], [3].
Since we have already assumed the power of noise in the main channel to be and
the power of noise in eavesdrop channel as , then the SNR at BOB will be:
and
Thus, the secret capacity of the main channel is the maximum transmission rate R at ∆
equals to 1.
It is clear from the preceding procedure that if data is ever decrypted prior to reaching IoT
device ‘B’, then it is always vulnerable to the eavesdropper. Thus, it is the duty of security
engineer to ensure that the encryption is performed at the right position of communication
stack with the right (and so on, strong) encryption algorithm.
A B C D E F G H I J K L M
0 1 2 3 4 5 6 7 8 9 10 11 12
U V W X Y Z
20 21 22 23 24 25
For each plain text letter ‘p’, the cipher text letter ‘c’ is expressed as:
C = E(k, p) = (p + k) mod26
where ‘E’ is an encryption algorithm and ‘k’ is a ‘key’ or letter standing down
the alphabet.
Example: For p = ‘A’ and k =’4’; C = (0+4)mod26 = 4 and letter for 4 is ‘E’ ,
thus ‘A’ in plain text will be replaced by ‘E’ in cipher text.
On the contrary, for decrypting:
P = D(k, c) = (c – k) mod26, where ‘D’ is the decryption algorithm and ‘k’ is a
‘key’ or letter standing up the alphabet.
Limitations of the Caesar cipher:
Encryption and decryption algorithms are very simple and known to everyone.
The value of ‘k’ can vary only between 0 to 25, so can be easily predicted by
the brute force attack and so on, ‘k’ can be obtained correctly by trial-and-error
for a maximum of 26 times only.
Plain text having only alphabets can be used in this type of technique.
Monoalphabetic Ciphers
As discussed with only 25 keys, Caesar cipher is not secure and is always
vulnerable to brute-force attacks. To solve this issue, a dramatic increase in
key-space is needed, which is attained in Monoalphabetic Cipher.
In monoalphabetic cipher, instead of using a single key in all elements of the
plain text, we use any permutation of the 26 alphabetic characters. This
mapping from plain alphabet to a wide-range of single cipher alphabet
eliminates the brute-force attacks. This can be explained with the help of the
following example:
Plain text: “Attack postponed”
Secret Key: “The quick brown fox”
*Ignore the second and latter occurrence of alphabets in the key.
Encryption:
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
I/J are written in a single cell. This is done to adjust 26 alphabets into 25 matrix cells.
AT TA CK
RS SR DE
Since ‘A’ and ‘T’ are neither in the same row nor in the same column, the
corners will be swapped and so on, in cipher text ‘A’ will be replaced with ‘R’
and ‘T’ will be replaced with ‘S’. Similarly, ‘C’ and ‘K’ also appear in a
different row and column, and so will be interpreted as ‘D’ and ‘E’,
respectively.
Thus , the cipher text obtained is ‘RSSRDE’.
Example: Plaintext: MOSQUE
Diagrams: MO SQ UE
MO SQ UE
ON TS ML
Since, ’M’ and ‘O’ appear in the same row, they will be moved right and so on;
replace ‘M’ with ‘O’ and ‘O’ with ‘N’. Similarly, since ‘S’ and ‘Q’ are also in
the same row, move right and replace the letter with the right letter, and so on;
‘S’ with ‘T’ and ‘Q’ with ‘S’. ‘U and ‘E’ appear in the same column, so now
move down. However, sinc ‘U’ appears in the last cell of the column, it will
wrap around and so on; replace ‘U’ with ‘M’. For ‘E’, move down and replace
‘E’ with ‘L’.
Cipher Text: ONTSML
Hill Cipher
Hill Cipher is yet another form of a multi-letter cipher, developed by the
mathematician Lester Hill in 1929. The encryption algorithm can encrypt a
group of letters at a time, which can be a digraph (two letters at a time), a
trigraph (three letters at a time), or a polygraph (multiple letters at a time) based
on the key value. The key in the Hill cipher is represented by a square matrix. It
can be 2x2 matrix (encrypts two letters at a time), 3x3 matrix (encrypts three
letters at a time) and so on.
Before studying Hill cipher, readers should be aware of the following mathematical concepts:
Encryption algorithm
Mathematically, the Hill Cipher Encryption Algorithm is represented as (equation 1):
where ‘C’ is the cipher text, ‘E’ is the encryption algorithm, ‘K’ is the key, and ’P’ is
the plain text.
Expanding equation 1:
Here, in equation 2, the key matrix is of size 3x3. Thus, we can translate 3 letters at a time.
Similarly, if the key matrix is of size 2x2, we can translate only 2 letters at a time and so on.
Example:
Solution:
Step 1: Translate the plain text into the numerical form (index of English alphabets).
P A Y M O R E M O N E Y
15 0 24 12 14 17 4 12 14 13 4 24
Step 2: The key is a 3x3 matrix, so partition the plain text into groups of three letters.
In case, letters are less in the last group, fill it with the filler ‘x’ and remove it in
decryption.
Plain Text = PAY MOR EMO NEY
Step 3: Encrypting PAY.
CT R R L M W B K A S P D H
Decryption Algorithm
Mathematically, The Hill Cipher Decryption Algorithm is represented in equation 6:
where, ’P’ is the plain text, ‘D’ is the decryption algorithm, ‘K’ is the key, ‘ ‘ is
the key inverse, and ‘C’ is the cipher text.
Key inverse is calculated by equation 7:
Explanation of mathematical concepts are out of scope of this book. Readers are advised to
study determinants and inverse of matrix before dealing with decryption. They are also
requested to learn how to take the inverse of a modulo number.
Example:
Solution:
Step1: Translate the cipher text into the numerical form (index of English alphabets).
R R L M W B K A S P D H
17 17 11 12 22 1 10 0 18 15 3 7
Step 2: The key is a 3x3 matrix, so partition the cipher text into group of three letters.
Cipher Text = RRL MWB KAS PDH
Step 3: Calculate
a-1 × a = 1 mod26, so here 17 × 23 = 1 mod26. Therefore, 23-1 = 17
CT R R L M W B K A S P D H
PT P A Y M O R E M O N E Y
Polyalphabetic Ciphers
The polyalphabetic cipher is introduced to improve the monoalphabetic
technique because in the monoalphabetic technique, a letter is encrypted to the
same cipher for all its occurrence in plain text. For instance, if a letter ‘a’ in
plain text is mapped to the letter ‘z’ in cipher text, then for all occurrences of
‘a’ in plain text, it will be mapped to ’z’ in cipher text, resulting in great
vulnerability. Thus, to improve this issue the polyalphabetic technique is used
where the same letters in different occurrences can be mapped to different
cipher letters.
Polyalphabetic cipher uses monoalphabetic substitution rules and a key within
it, determines which particular rule is chosen for a given transformation. It is of
two types: Vigenere Cipher and Vernam Cipher:
Vigenere Cipher: It consists of the 26 Caesar Cipher with shifts of 0 through
25. The encryption and decryption process are defined as in the following
equations:
Encryption Process:
(8)
Decryption Process:
(9)
Example:
Given: Plain text: We are discovered save yourself.
Key: deceptive
Solution:
Step 1: If the size of key is smaller than Plain Text (PT), then repeat the key
(K) till it covers the length of plain text.
PT w e a r e d i s c o v e r e
K d e c e p t i v e d e c e p
PT 22 4 0 17 4 3 8 18 2 14 21 4 17 4
Key 3 4 2 4 15 19 8 21 4 3 4 2 4 15
PT 4 24 14 20 17 18 4 11 5
Key 3 4 2 4 15 19 8 21 4
PT 22 4 0 17 4 3 8 18 2 14 21 4
Key 3 4 2 4 15 19 8 21 4 3 4 2
CT 25 8 2 21 19 22 16 13 6 17 25 6
PT 4 24 14 20 17 18 4 11 5
Key 3 4 2 4 15 19 8 21 4
CT 7 2 16 24 6 11 12 6 9
Step 4: Translate CT in numerals to the text form using the index of alphabets:
PT 22 4 0 17 4 3 8 18 2 14 21 4 17
Key 3 4 2 4 15 19 8 21 4 3 4 2 4
CT 25 8 2 21 19 22 16 13 6 17 25 6 21
CT(text) z i c v t w q n g r z g v
PT 4 24 14 20 17 18 4 11 5
Key 3 4 2 4 15 19 8 21 4
CT 7 2 16 24 6 11 12 6 9
CT(text) h c q y g l m G j
Transposition technique
In the transposition technique, the position of the plain text character is changed. This
implies that instead of replacement, there occurs some sorts of permutation on the
plaintext letters. Types of transposition cipher are as follows:
Rail fence technique
In this technique, the plain text letters will be written down as a sequence of
diagonals of given depth and then read off as a sequence of rows.
Example: Encipher the message “Our academy is the best” with a rail fence of
depth 2.
Solution: Plaintext – our academy is the best
Depth – 2
Step 1: Write the plain text diagonally in two rows as depth of the rail fence is
given 2.
o r c d m i t e e t
u a a e y s h b s
Step 2: Read the letters in a sequence of rows to get the cipher text.
t k v m
h n y u e y u h
a o r c
Step 2: Read the letters in a sequence of rows to get the cipher text.
k i l l c o r
o n a v i r u
s a t t w e l
v e a m t o m
o r r o w y z
*Last two cells were empty so they were filled with filler letter ‘y’ & ‘z’.
Step 2: Arrange the key at the top of the created rectangle.
4 3 1 2 5 6 7
k i l l c o r
o n a v i r u
s a t t w e l
v e a m t o m
o r r o w y z
Step 3: Read the cipher text column-by-column as per the order of key, which
means the column with key 1 will be written first, then the column with key 2,
then 3 and so on…
Cipher Text:
l a t a r l v t m o i n a e r
o r e o y r u l m z
4 3 1 2 5 6 7
l a t a r l v
t m o i n a e
r k o s v o c
i w t w o r e
o y r u l m z
To increase more complexity, it further can be extended till the n-stage row-column
transposition cipher. The number of stages acts as the key factor, which means both
the sender and receiver should know about it.
Block Ciphers
As mentioned previously, in a block cipher, a block of plain text bits is
processed to generate a block of cipher text bits, usually of the same size.
Although the size of block does not directly affect the strength of the encryption
scheme, the block following aspect should still be considered:
Avoid considering very small sizes of blocks because if the attacker has in
case discovered some previous block, then there are chances of launching
‘dictionary attack’, through which the plain text can be predicted. Thus,
large size blocks when opted as dictionary will be difficult to break, thus
making it difficult for the attacker.
Avoid using very large size blocks also, as the operation of cipher text
becomes inefficient.
A preferred block size is a multiple of 8 bits as it is very easy to implement
the processor that handles data in multiple of 8 bits. Basically, we take block
size of 64 bits or 128 bits. However, the size of plain text is not in the
multiple of block size. For instance, if we consider the block size of 64 bits
and plain text of 150 bits, then 2 blocks of 64 bits will be created but the last
block will be of size 22 bits, which is not applicable. So, in this case, we add
an additional 42 redundant bits in order to complete the 64 bits block-size.
The process of adding these additional bits is known as padding.
Too much padding sometimes make the system inefficient and insecure.
Studying the above DES structure, we can deduce that DES consists of three parts
named as initial & final permutation, round function, and key generation. They are
explained as follows:
Initial and final permutation
These are simple permutation boxes (P-boxes) having no cryptographic significance
but are used in inverse of each other during initial and final permutation. It can be
explained in Figure 6.13, where we can see that the permutations are done randomly
but the final permutation is just the inverse of the initial permutation:
The description and working of S-box, P-box and Expansion-box is not provided in this
book. If readers wish to have its details, they can refer to the book “Cryptography and
Network Security” by William Stallings
5. The result is a new matrix consisting of the same 16 bytes but shifted with
respect to each other.
c. Mix column: This sub-process includes a substitution mathematical function.
Each column of four bytes is transferred using this function and the resultant
output of the new four bytes is replaced with the original column. This goes on
for all the columns of matrix and a new matrix of 16 bytes entries is obtained.
The last round of the AES does not include this sub-process.
d. Add round keys: In this sub-process, the 16 bytes of the matrix are interpreted
into 128 bits and are XORed with 128 bits of the round key. If it is the last
round, then the result obtained is the cipher text and if not then, the resulting 128
bits are interpreted as 16 bytes and serves as the input for the next round.
The details of S-box and mathematical function of the AES are out of scope and can be
referred to in the book “Cryptography and Network Security” by William Stallings.
The decryption process of AES is similar to the encryption process, except the
sub-processes are performed in reverse order (Figure 6.15 (b)). First, the inverse
shift rows is performed followed by inverse sub-bytes, and then the add-round
key is carried out followed by inverse mix column.
Block cipher modes of operation
As we know a block cipher algorithm is the basic building block needed to
provide security to a variety of applications. NIST has defined various modes of
operation for enhancing the effect of block-cipher based cryptographic
algorithm. The various modes of operations defined are explained as follows:
Counter Mode
In Counter Mode (Figure 6.20), a reliable counter, equal to the size of the plain text
block is considered. The value of the counter is incremented by 1 for each subsequent
plain text block. In case of encryption, the counter is encrypted and then XORed with
the plain text block to produce a cipher text block, with no chaining mechanism. In
decryption, the same sequence of counter values is encrypted and then counter
XORed with the cipher text block to recover the corresponding plain text block:
Figure 6.20: Counter Mode
The discussed modes of operations are summarized in Table 6.3:
The calculation and derivation of the Euclidean Algorithm is out of the scope of this book.
Readers are advised to refer to Discrete Mathematics.
Example: The following example presents the generation of the RSA key pair. For
simplicity, we have considered small values of prime numbers ‘p’ & ‘q’ , but
practically they are very high numbers.
1. Let two primes be p= 7 & q=13 , thus n = p*q = 91.
2. Calculate =
3. Select ‘e’ s.t , thus e = 5.
4. Public Key = {e,n} = { 5,91}
5. Calculate ‘d’ by using = on
solving the extended Euclidean equation, the value of ‘d’ is derived to be 29.
6. Private Key = {d,n} = {29,91}
Encryption-Decryption algorithm
Once the public and private keys are obtained, the next step is the process of
encryption and decryption. Since RSA does not operate on bits, it only operates on
numbers modulo ‘n’. Thus, it is necessary to represent the plain text as a series of
numbers less than ‘n’.
Encryption: Let Plain text: M < n, public key {e,n}
Then, Cipher text:
Decryption: Let Cipher text Received: C, private key {d,n}
Then, Plain text:
Example: Let M = 10
Encryption:
Decryption: = 10
Conclusion
The chapter establishes the foundation of cryptography in securing the IoT network. It
guides the IoT developers and implementers and helps them in dealing and securing
network communication. The comprehensive outlines of the chapter are summarized
as follows:
Cryptography is a tool for designing security for network systems. The data is
converted and transmitted in unreadable form by the sender so that any
unwanted user is not able to read it. It is then again converted to the readable
form by the receiver at the receiver end.
Cryptography ensures confidentiality, authentication, integrity, and non-
repudiation.
Confidentiality is attained by encryption and decryption. In encryption, plain
text is converted into cipher text with the help of a key. While in decryption,
cipher text is converted into plain text with the help of the same or different
key.
Encryption algorithms are classified into two types: Symmetric and
Asymmetric key encryption algorithms.
In a symmetric algorithm, the same key is used for encryption and decryption,
while in asymmetric, different keys and so on; public and private keys are used
for encryption and decryption.
Symmetric encryption is further classified into classical and modern ciphers.
Where classical cipher comprises substitution and transposition ciphers.
The substitution cipher includes the replacement of letters by other letters.
Examples of substitution cipher include Caesar cipher, monoalphabetic cipher,
polyalphabetic cipher, Playfair cipher and so on.
Transposition cipher includes the change in position of letters within the
plaintext. It inculcates rail-fence and row-column cipher.
Modern cipher inculcates block cipher and stream cipher. In Block cipher, plain
text is divided into chunks and is then processed, while in stream cipher
plaintext is processed in bit format. Each bit in the plaintext is processed one by
one.
6.5 Questionnaire
b. receiver
b. stream cipher
c. bit cipher
d. byte cipher
3. How many rounds does the AES-192 perform?
a. 10
b. 12
c. 14
d. 16
4. Which are the most frequently found letters in the English language ?
a. e,a
b. e,o
c. e,t
d. e,i
5. On Encrypting “thepepsiisintherefrigerator” using Vigenere Cipher
System using the keyword “HUMOR” we get cipher text-
a. abqdnwewuwjphfvrrtrfznsdokvl
b. abqdvmwuwjphfvvyyrfznydokvl
c. tbqyrvmwuwjphfvvyyrfznydokvl
d. baiuvmwuwjphfoeiyrfznydokvl
6. DES follows
a. Hash Algorithm
b. Caesars Cipher
d. SP Networks
7. Which mode requires the implementation of only the encryption
algorithm?
a. ECB
b. CBC
c. CTR
d. OFB
Answer key
1. (b) 2. (a) 3. (b) 4. (c) 5. (b) 6. (c) 7. (c)
Keywords (†)
Permutation: Permutation of a finite set of elements ‘S’ is an ordered sequence
of all elements of ‘S’, with each element appearing exactly once. For instance,
if S = {a,b,c} then there exist 6 permutation abc, acb, bca, bac, cab, and cba.
Multi-letter encryption: It means that the same letter can have different cipher
elements. For example, at one point letter ‘E’ can have cipher element ‘G’ and
at other point the same letter ‘E’ can have a cipher element ‘T’. Thus, this
ensures more security as an attacker can get confused in obtaining the correct
element.
References
[1] M. Ramezani Mayiami, B. Seyfe, and H. G. Bafghi, “Perfect secrecy via
compressed sensing,” in 2013 Iran Workshop on Communication and Information
Theory, May 2013, no. 91, pp. 1–5, doi: 10.1109/IWCIT.2013.6555751.
[2] V. Y. F. Tan and M. Hayashi, “Analysis of Remaining Uncertainties and
Exponents Under Various Conditional Rényi Entropies,” IEEE Trans. Inf. Theory,
vol. 64, no. 5, pp. 3734–3755, May 2018, doi: 10.1109/TIT.2018.2792495.
[3] J. Pfister, M. A. C. Gomes, J. P. Vilela, and W. K. Harrison, “Quantifying
equivocation for finite blocklength wiretap codes,” in 2017 IEEE International
Conference on Communications (ICC), May 2017, pp. 1–6, doi:
10.1109/ICC.2017.7996925.
Structure
The chapter covers the following topics:
Concepts and techniques of cryptography in maintaining the integrity of
messages.
Cryptographic authentication and its role in nurturing IoT node
authentication
Cryptography key management fundamentals and various signature
algorithms
Cryptographic controls over IoT protocols
The hash function itself is not secret, so some means to protect the hash value should be
provided.
The main purpose of the Hash function is to ensure message integrity. However,
apart from that, hash functions can also be used for the following purposes:
Maintaining confidentiality with integrity: This can be achieved by first
concatenating the message with the hash code and then encrypting it using
symmetric encryption. Figure 7.2 illustrates that only A and B have shared
the same secret key. This means that the message is confidential as it is
coming from A and has not been disclosed to any third party, since keys are
shared between A and B only. It also ensures the integrity of the message by
comparing its sender’s hash value with recomputed receiver’s hash value.
Figure 7.2: Hash Function for maintaing confidentiality and integrity
Maintaining integrity: It may happen that certain applications demand
only integrity of data and are not concerned with confidentiality. In that
case, only the generated hash code is encrypted and is then concatenated
with a message. This is then shared with the receiver. Refer to Figure 7.3
for illustration:
The derivation of Wt and Kt is not discussed in this book. Readers can refer to the Book
“Cryptography and Network Security” by William Stallings.
Step 5: Output: When all ‘N’ 1024-bit blocks are processed, the output from the
Nth stage is the 512-bit message digest, which is considered the final hash value.
The behavior of SHA-512 can be summarized as follows:
H0 = IV (Initial Vector)
Hi = SUM64 (Hi-1 , ‘a b c d e f g h’i)
MD = HN
Where,
IV = initial value of the ‘a b c d e f g h’ buffer, as defined in step 3
‘a b c d e f g h’ i = the output of the last round of processing of the ith message
block
N = the number of blocks in the message (including padding and length fields)
SUM64 = Addition modulo 264 performed separately on each word of the pair of
inputs
MD = final message digest value
Data (m) is not considered as the part of the Merkle tree but the Hashed Data(m) is a part
of Merkle tree.
If a Merkle tree has more leaves, less hashed values are needed, in comparison to the
number of leaves, to validate whether the message is tempered or not. Figure 7.12
presents the large number of leaves but if we have to check whether particular data is
tampered or not, then the message and the only 5 hashed values are required to be sent
(represented by green).
A detailed description of these examples is out of the scope of the book. Readers can
refer to the book “Cryptography and Network Security” by William Stallings.
Here, ‘m’ is the modulus & m>0, ‘a’ is the multiplier & 0 <a < m, ‘b’ is the
incrementor & 0 ≤ b < m, y0 is the starting value or seed & 0 ≤ y0 < m.
If m, a, b, and y0 are considered to be integers then this technique will produce a
sequence of random integers ranging 0 ≤ yi < m.
The selection of a, b, & m is very critical in the development of good random
numbers. For instance, if a = 7, b = 0, m = 32, and y0 = 1, then it generates the
sequence {7,17,23,1,7,17….}, from the generated sequence. It is clear that it is
unsatisfactory as only 4 numbers are used out of 32 possible values. If for
instance, we change a=5, b=0, m = 32 and = 1, then it generates the sequence
{5,25,29,17,21,9,13,1,5,25……}, from the generated sequence we can infer that
only 8 numbers are used out of 32 possible values, which is again unsatisfactory.
Now let’s assume a = 3, b = 5, m = 31, and y0 = 0, then the generated sequence is
{0, 5, 20, 3, 14, 16, 22, 9, 1, 8, 29, 30, 2, 11, 7, 26, 21, 6, 23, 12, 10, 4, 17, 25, 18,
28, 27, 24, 15, 19, 0, 5……}. From the generated sequence, we can infer that this
is the satisfactory sequence generator, with 30 generated random numbers out of
31 possible values.
From these examples, we can conclude that the appropriate choice of parameters
should be done so as to have the best possible random numbers. The rules for the
choice of parameters are as follows:
The increment b and the modulo m should be relatively prime.
Each prime factor of m divides a-1.
If m is divisible by 4, then m-1 should also be divisible by 4.
Significance of the SEED Value in PRNGs
SEED in PRNGs plays a pivot role in producing random numbers for
cryptographic keys, initialization vectors, nonces and padding. SEEDs emerge
from high entropy sources, and if they are poorly designed, have some sort of bias
or malfunction that can compromise the PRNG output and cryptographic
implementation. This may result in spoofing of the messages. A generalized
PRNGs entropy seeding process is illustrated by the Figure 7.18. In the figure, it
can be depicted that there are several arbitrary entropy sources that are pooled
together and when needed PRNG extracts the seed value from this pool:
Entropy, entropy sources, and entropy testing can be well understood by referring NIST
special publication 800-90B [3].
The actual modeling of the digital signature algorithm will be discussed next. However,
for interest to the readers, digital signature includes three basic steps: generation of
private and public key pair, creation of digital signature, and verification of the
signature.
All parties communicating in this scheme should have great deal of trust that the
arbitration mechanism is efficient and is working properly.
b. Compute
Example
Let global elements q = 19 and α =10.
b. Compute
c. Compute
Example
Example
c. Choose a random integer ‘s’, s.t 0<s<q. ‘s’ is the user’s private key.
b. Concatenate the message and hash the result to compute the value e =
H(M ∥ x).
c. Compute y = (r + se) mod q. The signature includes the pair (e, y).
3. Verification of the signature
d. Select any random integer ‘x’ as a private key such that 0 < x < q.
e. Calculate a public key ‘y’ by using formula
f. Private key: {p,q,g,x}
g. Public key: {p,q,g,y}
b. Signature generation
a. A message is passed through the hash function to generate a message
digest ‘h’.
b. Choose any random integer ‘k’ such that 0 < k< q.
c. Calculate the value of ‘r’ by using formula
d. Calculate the value of ‘s’ by using formula
e. Digital signature created: {r,s}
c. Signature verification
a. Calculate the message digest using the same hash function as in the
signature generation and regenerate a message digest ‘h’.
b. Compute the value of ‘w’ such that
c. Compute the value of u1 as:
d. Compute the value of u2 as:
e. Compute verification component v as:
Algorithm
Diffe-Hellman algorithm consists of the following steps:
1. Selection of global public elements
a. Consider a prime number ‘q’.
b. Select ‘α’, such that ‘α’ is the primitive root of ‘q’ and . There can be
more than one primitive of ‘q’. So, it is up to the user to choose any
value as the primitive in algorithm.
‘α’ is the primitive root of ‘q’ if the number α mod q, α2 mod q, α3 mod q……… αq-1
mod q , is distinct and consist of integers from 1 to q-1 in some permutation.
For example:
if α = 3 and q = 7, then 3 is said to be primitive root of 7 because
31 mod 7 = 3, 32 mod 7 = 2, 33 mod 7 = 6, 34 mod 7 = 4, 35 mod 7 = 5, 36 mod 7 = 1
And the result obtained is integers from 1 to 6 in varying permutation.
112 512
160 1024
224 2048
256 3072
384 7680
512 15360
b. Let’s consider the equation , where ‘Q’ & ‘P’ are points on
curve and k < n (limit).
Here, the equation is regarded as Trapdoor function†, which
means if ‘k’ and ‘P’ are given, then it will be very easy to compute
value of ‘Q’ but if we know value of ‘Q’ and ‘P’, then it will be
extremely difficult to find ‘k’. This is called the discreet logarithmic
problem for elliptic curves.
c. Let’s consider point ‘G’; it is point on the curve whose order is greater
than ‘n’.
2. Key generation of user A
a. Select a random value nA as the private key, such that nA < n.
There are several approaches of encoding of message ‘m’ into a point on curve. Readers
are advised to refer [4] for the straightforward approach.
The cipher text for the encoded point will also be a point on curve and is
represented as follows:
where ‘k’ is a random positive integer chosen by A, ‘G’ is the global element (as
discussed earlier), is the encoded plain text and is the public key of B. This
Cipher point will be transmitted to the receiver end.
Decryption
As soon as the receiver receives , he decrypts the
ciphertext using the following steps:
1. Multiply the first coordinate of the cipher point by receiver’s private
key that is, .
2. Subtract the obtained equation (step a) from the second coordinate of the
that is,
3. But since we know from the key-exchange of ECC that , so
substitute in the above Step b.
4.
5. From this, we can deduce that after decryption, the same plaintext point
is received by the receiver, which when decoded will get the original plain
text message ‘m’.
ZigBee
ZigBee takes advantage of IEEE 802.15.4 MAC layer security services. The IEEE
802.15.4 MAC layer supports the AES algorithm with 128-bit key for both
encryption/decryption and data integrity. ZigBee devices can avail multiple
security options as stated in Table 7.2:
Bluetooth-LE
Bluetooth-LE or BLE comprises a number of modes that provides options for
authentication and un-authentication pairing, data integrity protections, as well as
link encryption. BLE supports the following security concepts:
Pairing: BLE devices are able to create more than one secret keys.
Bonding: It is the act of forming trusted device pair by storing keys created
during pairing for subsequent connections.
Device Authentication: It is the verification of paired devices having
trusted keys.
Encryption: It is the conversion of the plaintext message into the ciphertext
message.
Message Integrity: It is the act of protecting data against tampering.
BLE device association or bonding
BLE includes four different types of bonding options:
Numeric Comparison: In this type of BLE model, the user is shown a 6-
digit number and it bonds with it by entering YES if the number is the same
on both devices.
Just Works: It is designed for devices that do not include a display and is
the same as the numeric comparison without showing a number.
Out of band: This model combines with Near Field Communication (NFC)
to bond with secure pairing. Here, the NFC protocol is used to exchange the
device Bluetooth address and cryptographic information.
Passkey Entry: This model uses a six-character passkey to be entered on
one device and displayed on another for confirmation.
Keys used in Bluetooth for providing security services
BLE use the following keys for providing security services:
Temporary Key (TK): TK can be of different lengths and is used as an
input to the cipher-based derivation of the short-term key.
Short-term Key (STK): It is used for secure distribution of key material
and is based on the TK, which sets a random value provided by each device
that participates in Bluetooth paring process.
Long-term Key (LTK): It is a 128-bit key employed for link-layer
encryption.
Connection signature resolving key (CSRK): This key is used for signing
data at the ATT layer (Attribute Protocol Layer).
Identity resolving key (IRK): It is used to generate a private address based
on the device public address. It helps in device identity and privacy
protection.
7.8.3 HTTPS
The Hypertext Transfer Protocol Secure (HTTPS) is used to secure
communication over the Internet. IoT manufacturers often use the local web pages
as front-ends for IoT devices. These web pages use HTTPS protocol as a means of
communication. It prevents communication sniffing (means, it maintains privacy),
prevents data manipulation (means, it maintains integrity), and offers verification
of the peer or server (means, it maintains authentication). All of this means that,
even if our router is compromised, our bank account login details are safe.
Diagrammatically, HTTPS protocol works as shown in Figure 7.29. It uses bi-
direction encryption and is able to protect against attacks such as MITM,
eavesdropping, tampering, and forging:
Conclusion
The chapter extends the foundation of cryptography with message integrity and
authentication. Important points from the chapter are as follows:
Integrity of data is attained by the Hash function. MD5 and SHA are the
most popular hash functions.
Hashing includes the concept of the Merkle Tree, where the data and its
hash values are represented in a tree format. It is useful in detecting the
tampered or spoofed data in optimal time.
Message Authentication is attained by using Message Authentication Code
or MAC code.
Authenticated Encryption is another technique that ensures confidentiality
and authentication of data.
A digital signature is an asymmetric form of attaining authentication of IoT
node within the network.
Keys are the most important elements of cryptology. Therefore,
management of key within the network is the most vital job. This includes
key generation, establishment, derivation, storage, usage, escrow, and
destruction.
The manual designing of cryptographic tools for each application are not
enough to ensure security. Therefore, security measures are inbuilt in
various IoT communication and messaging protocols. Like ZigBee, BLE,
MQTT, CoAP and so on., have various security options, which can be
switched ON or OFF as per the requirements.
7.9 Questionnaire
c. both fixed size bit string and variable size bit string
b. Rooted tree
c. Merkle tree
d. Full tree
5. Which one of the following is not a public key distribution means?
a. Public-Key Certificates
b. Hashing Certificates
d. Public-Key authority
Answer key
1. (b) 2. (a) 3. (b) 4. (c) 5. (b)
Keywords (†)
Trapdoor function: It is a one-way function, with which it is easy to
compute in one direction, yet difficult to compute in opposite (inverse)
direction, without special information called the trapdoor value. This means
that the inverse can be computed if we know the trapdoor value; otherwise,
it is not possible.
Freezing Memory: In this attack, attackers spray liquid like liquid nitrogen,
onto the RAM module, so as to freeze it immediately. As the temperature
lowers, the RAM is able to hold the information for longer duration. After
freezing, they perform the cold boot attack by hard resetting the target
machine and copying the maximum data.
References
Structure
The chapter covers the following topics:
Understanding of privacy preservation and their threats
Existing solutions and their drawbacks in the Internet of Things
Privacy preservation approaches and their benefits in IoT network
Privacy preservation in smart buildings
K-anonymity
In K-anonymity technique, the privacy of data is preserved by modifying
(or anonymizing) data before it is being transmitted, so that the
identification of data becomes difficult. This technique will lead to K-
indistinguishable records; if an attempt is made to steal data by mapping the
anonymized data with external data sources. Although it provides security,
this technique is still prone to two attacks named homogeneity attack and
background knowledge attack. These attacks are illustrated with the help
of following examples:
Let us consider a patient’s data as shown in Table 8.3. This is the original
data without any modification. Let the value of ‘k= 3’, and the algorithm is
applied to two attributes viz Zip and age. This means that there will be 3
indistinguishable records whose ‘zip’ and ‘age’ will be anonymized; out of
which, an attempt will be made to identify a particular person’s data as
shown in the following table:
6 57906 47 Cancer
8 57673 36 Cancer
S. No Zip Age Disease
9 57607 32 Cancer
8 576** 3* Cancer
9 576** 3* Cancer
Table 8.4: After applying anonymization on zip and age
L diversity
To address the homogeneity attack, a new technique known as L-diversity
was proposed, where ‘L’ represents the values for the sensitive attributes
(here salary) in each equivalent classes. For instance, in Table 8.5, if the
algorithm is applied to the salary attribute; meaning salary is kept
confidential and value of ‘L= 3’, there are three equivalence classes named
as “low salary”, “medium salary” and “High salary”.
Now, if the intruder knows that Joe is 27 years old and lives in zip code
576, then definitely his salary would be under the low-income group. This
is called a similarity attack as all three persons in 576 zips have low
salaries as compared to others in the table. Though L-diversity does not
provide the exact salary details, it is still prone to similarity attacks, where
the outlook of the sensitive information can be revealed:
Network model
The network model is illustrated in Figure 8.2 and it consists of three
different types of nodes. These are as sensor nodes, storage nodes, and
mobile sinks:
Figure 8.2: An illustration of the Network Model
a. Sensor nodes
Sensor nodes are responsible for continuously sensing the occurrence
of events from the surrounding and forwards the event messages to
storage nodes, whenever an event of interest is sensed. The following
are the point of assumptions that are taken under consideration:
Statistically, let a network consists of ‘ ’ static sensor nodes at
positions and let
They are identical nodes and have the same sensing range (rs) and
the same communication range (rc).
These nodes do not store data but always forward data to the
storage nodes.
Each sensor node is aware of the relative location of its neighbors.
Nodes are capable of sensing only coarse data. That is, they are
able to sense only whether or not the target has been detected (in
Boolean terms), and no other information about the target. Once
detected, the reported measurements are circled with radius ‘rs’.
Each sensor is equipped with a long-range proximity sensor that
detects target whenever is the
position of target at time ‘t’.
b. Storage nodes
Storage nodes are the nodes that have a large memory and huge
battery capacity. They are responsible for storing data before mobile
sinks offload the data. Storage nodes can be compromised by injecting
faulty packets. Thus, to prevent storage nodes from malicious usage;
the sterilizing of the data is done by filtering it.
Statistically, let us consider a network consists of ‘ ’ storage nodes at
positions and let
c. Mobile sink
Mobile sinks are used to offload the data present in the storage nodes.
They are very small in number and are equipped with tamper proof
hardware that are very difficult or nearly impossible to be
compromised by any adversary. Mobile sinks are reliable and
trustworthy.
Threat model
All possible types of threats that breach the data privacy and harm the data
availability are considered in this threat model. The following assumptions
are considered about the damage caused intentionally by adversaries or
unintentionally, i.e., automatically by network dynamics:
Sensor nodes and storage nodes are considered to be untrustworthy
and are subjected to be compromised, since they are left unattended
in the field.
It is assumed that an adversary can compromise only up to ‘g’ storage
nodes, sensor nodes or any of their combinations.
Initially, g = 1 and the first target of the adversary is the storage nodes
as they have higher payoff than sensor node.
Adversaries do not have any global view of the network, i.e., they are
unaware of the locations of sensor and storage nodes. Once
compromised, the adversary can obtain all the stored data including
secret key and sensed data.
Nodes can themselves be failed or jammed during the lifetime of the
network. This can be due to hardware issues which can result in
disturbance of communication channel, or incapability of sending and
receiving data or permanent data loss. In every case, the storage
nodes will not be available to mobile sink, thus resulting in the
breaching of data privacy and harming of data availability.
Resolution of uncertainty
Generally, preserving privacy guarantees that the data is observable only to
those who are supposed to access it. However, if we closely look at privacy;
it is perceived that privacy is linked to its resolution of uncertainty.
Resolution of uncertainty can be explained with the help of the following
Location privacy example: we generally do not wish to reveal the location
of ‘where we are’ to any third person. Now, the definition of ‘where we are’
determines the boundary of the tolerance level of privacy, which can be
different in several cases. Suppose, Joe wishes to reveal his location on the
granularity of the city but does not wish to reveal his current street address.
This means the tolerance level of privacy for Joe is limited to only the city
but for others it may vary to state or country or even house address;
depending upon their privacy resolution. Thus, from this example, we can
say that privacy should quantify the level of information uncertainty, i.e., its
resolution of uncertainty.
This can be similar for uncertainty in data availability, where it should be
ensured that the complete data should not be visible; and only the required
information about the target with acceptable levels of resolution should be
available. Here, the acceptable level of resolution states the uncertainty of
data availability.
The advantage of using I-States is that no prior knowledge of the target is needed
except the content of the message.
Figure 8.5: Computation of the I-state: (a) an initial information state; (b) expansion
to account for the passage of time, and intersection with received message disks; (c)
the resulting updated I-state
The description discussed earlier, when is applied to the defined network
model (Section 8.4.1), then for a network with storage nodes, each
storage node will calculate its I-state based on its received
messages. In addition, there also exist a “master I-state ’ which is
derived from all messages received across all storage nodes and
. Thus, there exist total I-
states within the network.
Generally, when no attack or any hardware failure occurs, the mobile sink
will be easily able to collect all the stored data at each storage node which is
. But incase if some storage nodes fail, then it will prevent the mobile
sink from obtaining , thus reducing the information available in
mobile sink. A similar situation will occur, if any adversary has breached
the network privacy and has compromised any one of the storage nodes
resulting into the acquisition of its I-state .
a) Privacy
Privacy can be defined as the quantity of information that is protected in
spite of being compromised. Let’s assume that the network is
compromised and the adversary is able to compromise one storage node
‘i’. Now, the privacy breach can be the ratio of area in which
adversary can access the area in , which is the knowledge of the
entire network. In light of this, privacy-level at time ‘t’ can be evaluated
as in the following equation 1:
(1)
When P=0, it means that the privacy is not preserved and a single storage node
has access to the full knowledge of the network which can be also compromised.
When P = 1, means it is the “perfect” privacy, which is nearly impossible to
attain.
b) Availability
Availability can be defined across all possible nodes that are not
compromised. If a storage node fails, then the knowledge can be
reconstructed from the remaining storage nodes that is the
intersection of their I-States. Mathematically, availability can be defined
as the ratio of the entire knowledge of the network to the intersection of
all storage nodes that are not compromised and is represented as in
equation 2:
(2)
When A = 0, it means that the network has a single point of failure and all
messages are sent only to a single storage node.
When A = 1, it means that each message is sent to at least two distinct
storage nodes, this is the case of ‘perfect’ availability as no single failure
can result in data loss.
c) Energy Consumption
Let denote the amount of energy consumed by delivering a
message or generating a message per unit time by sensor node ‘i’. Let
‘N’ be the number of messages forwarded or generated by sensor node
‘i’ between ‘t=0’ to ‘t = T’. Then, the energy consumed by the whole
system or network is given as in equation 3:
(3)
For every SPG and storage nodes, it is always not possible to get valid yet
feasible colored graph. For example, if there are only two storage nodes
available to color the SPG, as shown in Figure 8.7, then it is impossible to
obtain a valid coloring among nodes A, C, and D. To address this issue, the
distributed coloring algorithm first generates a valid coloring and then changes
the infeasibility of colors to feasibility.
Algorithm
The distributed coloring algorithms work in the following way. Before
coloring the sensor nodes, each storage node is mapped with a unique color
numbered from 1 to . Once the storage node is assigned with color
number, then each sensor node is assigned a unique color based on its
neighbor color in SPG using algorithm 8.1.
Here, color is considered inform of the color number, for example, color 1, color
2, color 3, and so on.
4: = ReceiveAnnounce();
6: = UpdateColor( );
7: end if
8: until NoChange( ) and NoChange( )
Explanation of algorithm
Initially, each sensor node is assigned with unique infeasible color by
adding its own ID to (step 1 in algorithm 8.1) and then each sensor
node is allowed to participate in an iterative coloring procedure until there
is no color update between two consecutive iterations. A step-by-step
explanation is provided as follows:
Step 1. Sensor Node announces its current color with its ID to all its
neighboring nodes by broadcasting a message ( ) (Step 3 in
algorithm). Here, the current color is and is the identity
of the node.
Step 2. At the same moment, it records its neighbor’s current colors into
(Step 4 in algorithm).
Step 3. In every iteration, each sensor nodes that satisfies the following
conditions are allowed to update its color: (Step 5 in algorithm).
It has not been assigned a feasible color yet.
Its color number is larger than those of all its neighbors.
Step 4. The function UpdateColor() will find new color that satisfies the
following listed conditions: (Step 6 in algorithm)
Feasibility: The new color should belong to one of the storage nodes
colors, i.e.,
Validity: None of the neighbor nodes must have chosen this color,
i.e.,
Nearest: Among all feasible and valid color, the nearest storage node
that is separated by few numbers of counts is selected.
Step 5. The algorithm terminates when none of the nodes can update its
color (Step 8 in algorithm).
As discussed above, if no feasible and valid color is available then in those cases
UpdateColor() returns negative color i.e.,
8.6 Questionnaire
b. Retention
c. Purpose
d. Content
2. Which of the following are the dimensions of privacy?
a. User privacy
b. Respondent Privacy
b. K-anonymity
c. Cryptographic techniques
b. Mix-zone area
b. All information
c. No information
Answer key
1. (d) 2. (d) 3. (b) 4. (d) 5. (d)
References
Structure
The chapter covers the following topics:
Understanding the concept of location-privacy
Existing location privacy solutions and their drawbacks in IoV
Futuristic or research-based privacy preservation approaches and
their analysis
Importance of MixZone and group signature in preserving location-
privacy
9.1. Location privacy and its requirements in IoV
The Internet of Vehicles consists of vehicles having advanced sensing and
communication capability with smart roadside infrastructures that provide
computation and storage facility. IoV when equipped with vehicular
onboard units (OBUs) and roadside units (RSUs) is regarded as a
vehicle-to-vehicle and a vehicle-to-infrastructure network or Vehicular Ad-
hoc Network (VANET).
9.2.1. Pseudonyms
For driving safely on the road, vehicles are required to broadcast periodic
messages that generally consist of 4-tuple information named as {Time,
Location, Velocity, Content}. If the real identities of vehicles are used in the
safety messages, then there is a possibility that their location privacy will be
easily eavesdropped. Therefore, vehicles are instructed to use pseudonyms
instead of their real identities. Moreover, they are recommended to
randomly change their pseudonyms while driving because changing
pseudonyms will result in irrelevant identities and will guarantee the
location privacy of the vehicles. However, under continuous adversary
tracking, the pseudonyms schemes will be vulnerable to threat, if vehicles
keep using identical pseudonyms for a long time or change their pseudonym
on an improper occasion.
For instance, let us consider Figure 9.1, where three vehicles P1, P2, and P3
run on a road. If instead of all vehicles only one vehicle; for example, ‘P3’
changes its pseudonym from P3 to A1, then an adversary can easily link A1
to P3 because P1 and P2 are unchanged. Even if all three vehicles P1, P2,
and P3 change their pseudonym simultaneously, then too the location and
velocity details in safety messages will provide clue to adversaries where
they will be easily able to link the respective pseudonyms. In these
conditions, pseudonyms fail to protect the location privacy. To address these
issues, other schemes are proposed such as mix-zone, group signature, and
so on. These schemes tend to obscure the mapping relationship between
vehicle’s real identities and their pseudo identities.
If readers wish, they can explore [2], [3] for further details.
9.2.2. Mix-Zone
The continuous overhearing of the neighboring vehicles and the changing
pseudonyms at inappropriate timing fails to protect the location’s privacy.
Therefore, to resolve this issue; the mix-zone strategy is adopted, where the
road is divided into the observed zone and the unobserved zone (Figure
9.2). An unobserved zone is considered the mix-zone region, where the
vehicles are asked to change and mix their pseudonyms at an appropriate
time and location, making it difficult for the adversaries to track and
identify vehicles. An unobserved region is actually an intersection of
multiple entries (for example parking), where the vehicles are allowed to
change their pseudonyms and depart separately from different exits so that
pseudonyms cannot be linked to their original identity.
Figure 9.2 illustrates the road with the observed and unobserved region
(Mix-zone), such that the unobserved region has three entry points (A, B,
C) and three exit points (D, E, F). Let the vehicle enter the Mix-zone
coverage through ‘A’ and broadcast its safety messages with the help of
RSUs. The vehicle changes its pseudonyms in the coverage and then
departs from any one of the exits, which ensures the unlink-ability of
pseudonyms. Thus, it preserves the location and privacy of the vehicles.
However, the concurrent occurrence of vehicles in the same mix-zone
region and the presence of minimal traffic limits the preservation of
location privacy:
If readers wish, they can explore research papers [4], [5] for further details.
9.2.3. Group signature
The group signature scheme solves the issue of mix-zone, where the
location privacy fails in small traffic. In the group signature technique,
location privacy is protected by signing the messages using group identity.
Group identity is a respective secret key of each member of a group. As
soon as the vehicle joins the group, it becomes its member and then tends to
sign the message using its own secret key. The resulting signature obtained
is verified by anyone who knows the common public key. The person who
knows the common public key is regarded as the group leader and is the
trusted entity. He knows the true identity of vehicles, and is capable of
tracking down any of the group members, whenever necessary. The
signature does not reveal any information about the signer; except that they
are a member of the group. This scheme fails to perform better when the
group is too large, as it is very difficult to manage all group members
efficiently.
If readers wish, they can explore research paper [6] for further details.
If readers wish, they can explore research papers [7], [8] for further details.
Network model
For the true illustration of a vehicular network, we are considering Vehicle
Social Network (VSN) deployed in an urban area. Vehicle Social Network
(VSN) is a vehicular network with social networking perspective. It
includes socially aware units such as On-Body Units (OBUs), Road Side
Units (RSUs), and driver’s, passengers’ and pedestrians’ smart devices,
which communicate and share their data. The network model of the
MixGroup approach is illustrated in Figure 9.4 and consists of a number of
vehicles, roadside infrastructures, an intelligent transportation system
(ITS), data center, which are explained as follows:
1. Vehicle
Vehicles run on roads and are equipped with OBUs that are used for
vehicle-to-vehicle and vehicle-to-infrastructure communication and data
exchange. For the purpose of safety, every vehicle periodically broadcasts
its location information by using its predefined pseudonym. This is done to
protect its location privacy.
In addition, the vehicle consists of two hardware modules that secure OBU
and they are known as Tamper-proof-device (TPD) and an Event-Data-
Recorder (EDR).
Tamper-proof device (TPD): This device is used for cryptographic
processing and is used to store and protect all cryptographic keys and
materials. TPD has its own clock and a rechargeable battery that is
periodically recharged by the vehicle.
Event-Data-Recorder (EDR): This device stores TDP and records
critical data of a vehicle during emergency events such as its speed,
location, time, and so on. It can be extended to record the safety
message broadcasts during driving.
2. Road-side infrastructure
Road-side infrastructure is sparsely deployed to collect data from vehicles
related to its Intelligent-Transportation System (ITS) such as the
condition of the traffic, vehicles, or roads. It consists of two main
components known as Road-Side-Unit (RSU) for wireless communication
interface and Front-Computing-Unit (FCU) for local data processing.
They provide internet connectivity to OBUs and run safety applications
such as accident warnings or blacklist broadcasting. They can extend their
communication by redistributing or sending the information to other
roadside infrastructure and are connected to the ITS data center by wired
backhauls.
3. Data Center
Data Center is used to aggregate all ITS-related data and is responsible for
global decision-making such as pseudonyms generation and revocation. It
consists of three main components; named as the registration authority, the
location server, and the pseudonym database. The registration authority is a
trusted third party that is operated by governmental organizations and is
responsible for managing the identities and credentials of all vehicles
registered within the VSN. The location server manages the location-related
details of vehicles and the pseudonym database comprises pseudonym-
related repository:
Social model
For the successful implementation of location-privacy schemes, it is
essential to have knowledge related to VSN social features. The spatial
distribution of vehicles includes the features of Global social hot spots and
individual hot spots.
1. Global social hotspot: It is considered from the perspective of VSN
and is a place where a number of vehicles meet at a certain time. For
example, a Central Business District (CBD) or Crossroad where
many vehicles wait at red lights.
Threat model
The threat model considered for this location-privacy scheme consists of
two categories of adversaries, one external adversary and the other internal
adversary. External adversaries are adversaries that exist outside the group
such as compromised roadside infrastructure and internal adversaries are
the adversaries existing within a group such as malicious group member.
Some of the existing adversaries in this threat model are as follows:
1. Global Passive Adversary (GPA): It comes under the category of
the external adversary and can locate and track any vehicle in a
region of interest by eavesdropping on its broadcasted safety
messages. For example, a surveillance camera covers a vast range.
2. Restricted Passive Adversary (RPA): It also comes under external
adversaries and is limited in its location tracking capability in a
region of interest. The tracking range of RPA is dependent on the
vehicle’s transmission range and the distance between any two
successive deployed RSUs. It can exploit the deployed RSUs for
eavesdropping and estimating the locations of vehicle broadcasts. A
compromised service provider is the best example of RPA.
3. Internal Betrayal Adversary (IBA): IBA is an example of an
internal adversary, which can be a compromised group member. IBA
aims to leak the information to GPA and RPA, as soon as privacy-
related information such as pseudonyms is exchanged with the target
vehicle. Leakage of identity or any privacy-related information will
result in the seizing or reconstruction of the vehicle’s information
which can be its location, velocity, or any location-privacy-related
details.
2. Social hot spots: VSNs contain a number of social hot spots. Social
hot-spots are the places that have high social attractivity in a road,
meaning a large number of vehicles stopping on a particular spot, for
example, a supermarket.
3. Spatiotemporal mobility: The mobility in which vehicles travel to
different spots at different times every day, but almost in a periodic
manner is called spatiotemporal mobility. For instance, people going
to the office in the morning, restaurants, and home in the evening,
etc.
From the above discussed San Francisco sample, it was observed that vehicles
tend to meet 64% of other vehicles at individual social spots.
From both observations, it is concluded that there are two hot spots known as the
global hot spot and individual hot spot. Out of 100% of vehicles, 13% meet at
global hot spots while from the remaining, 87% of vehicles, 64% meet at
individual hot spots.
Theory of MixGroup
The aim of MixGroup is to efficiently aggregate all the potential
opportunities together in order to change their pseudonyms along the
vehicle’s moving paths. This can be explained with the help of Figure 9.5.
The diagram illustrates a vehicle’s path Vi which consists of single global
spots and three individual spots. As per the traditional scheme, a vehicle is
supposed to change its pseudonyms in global spot S3 where there are eight
other vehicles. But as per the MixGroup strategy, there are three more spots
available where the vehicle can change its pseudonyms, that is, at S1, S2
and S4. So, to effectively leverage these other opportunities, the MixGroup
scheme combines the spots S1 to S4 to an extended social region R1, where
the target vehicle Vi can cumulatively exchange pseudonyms with other
vehicles within the region R1. For instance, it may exchange pseudonyms
with vehicle Vb in S1, and then vehicle Vc in S3 and so on. Theoretically,
in total, Vi can meet 18 other vehicles and can have 18 opportunities to
exchange pseudonyms. Thus, in the MixGroup scheme, the exchange
opportunities are increased from 8 to 18. As a result, the privacy
preservation is also increased. The discussed MixGroup includes four key
mechanisms, the pseudonym mechanism, the group signature, the in-group
identity, and the encryption and authentication mechanisms, which are
explained as follows:
Basically, each TID is used only once for pseudonym exchange. This
avoids the adversary to establish any mapping relationship between the
vehicle’s real identity and pseudonym exchanging identity.
4. Encryption and authentication mechanisms: To prevent the illegal
entry of vehicles in a group-region, MixGroup uses strong encryption
and authentication mechanisms. For every vehicle ‘ ’, there are
three different sets of (public keys, private keys and certificates) for
real identity, temporary identity, and pseudonym exchange.
Authentication of vehicle’s real identity is done by the Registering
Authority (RA) using ( ). Temporary ID uses (
) for sending requests and responses before
pseudonym exchange. Lastly, ( ) are used to
authenticate the validity of the two sides during pseudonym
exchange.
The scope of encryption and authentication can also be extended for user
identification, granular access control to limit what users can see and do,
auditing for accountability and protecting the confidentiality of the sensitive data
in transmission.
TIDs are used only for sending requests and responses during the procedure
exchange of pseudonym exchange.
Here, the RSA algorithm is used for the generation of TIDs.
Group join
For a vehicle to join the group; the following steps are adopted:
1. Before entering the group-region and joining the group, each vehicle
periodically broadcast safety messages with its own pseudonyms
{ } given by the RA.
2. Nearby RSU, say , when hears the broadcast messages, then
will act as a mediator between a group and the vehicle . Where
vehicle , will request the group leader via to provide
membership of the group .
The group leader is elected by the nearby RSUs of the group Gj and is
responsible for distributing and managing Group Identity (GID) and the
associated keys and certificates.
3. The group leader will then verify the legality of the vehicle
with the help of RA.
4. After verification, leader provides parameters such as group
identity (GID), associated private key, certificate and parameters
related to TID to vehicle .
5. Finally, vehicle becomes the group member and will now
broadcast safety messages using instead of { } to prevent
the possible pseudonym tracking from the potential adversaries.
To ensure the liability of the message originator and the safety of the message
receiver, each vehicle signs its safety message with a timestamp to ensure
message freshness and include group private key and certificate to enable
verification.
Pseudonym exchange
Since the vehicle has entered a group and is now a group member of ,
thus it will periodically broadcast safety messages with the identity .
When vehicle meets other group members, then there will be an
opportunity for to exchange its pseudonyms. At this time, the vehicle
will initiate and broadcast a pseudonym exchange request. The steps to
exchange pseudonym are as follows:
1. As soon as vehicle discovers the presence of other vehicles in its
close proximity, by hearing safety messages, then it attempts to
exchange pseudonyms.
2. broadcast a pseudonym exchanging request message. The message is
associated with its public key of TID
3. When request messages from other vehicles is received by , then
instead of immediately exchanging pseudonym, will compute its
own exchange benefit and will decide whether to exchange at this
time or not.
Group leaving
When a vehicle moves out of the group-region, it will broadcast safety
messages using the newly changed pseudonyms. Group leaving includes the
following procedure:
1. Vehicle will leave the group, when it receives the message from
the RSU located at the boundary of the region. It will leave the group
by sending newly changed pseudonyms to the RA as the RSU
signing protocol.
2. Till the time vehicle is in the boundary of region and has not yet
received the signal from any RSU, it will use in its safety
broadcast messages instead of .
3. is believed to have left the group, when does not receive any
safety messages from with a certificate for a maximum
time . As a result, will delete the entry from the group
member list.
4. At last, after leaving the group, will determine by itself whether it
wants to join new group or not.
Revocation protocol
From the process and the procedure discussed till now, it can be inferred
that any violation of vehicles will be monitored and accused by
neighbouring vehicles or RSUs. For instance, if a compromised vehicle
is detected by vehicle , then:
1. If is within the group , then will record the violation actions of
and will report it to the group leader . The report will include
information such as type of violation by , the group certificates of
and , and the messages signed by .
2. After receiving the report, the group leader will check the
validity of the report and the identity of vehicle and then forward it
to the RA. (Go to Step 4).
3. But if has left the group , then the generated report will integrate
the pseudonym the public key and the certificate
. The report will be forwarded to the RA.
4. The RA will validate the report and will release the identity of by
its tracking list. If the violation is confirmed, the RA will add to
its blacklist and will broadcast the updated blacklist to all the RSUs
and vehicles in the VSN.
The details of IBA, ITA, GPA and RPA is discussed in Section 9.3.1: Threat
Model.
(1)
(2)
(3)
When pseudonym exchange is performed, the increase of pseudonym
entropy is given as in equation 4:
(4)
(5)
(6)
OR
2. The unpaired vehicle may skip the current exchange procedure until meeting
other vehicles.
Figure 9.9: The excepted and actual entropy of target vehicle with respect to traffic
condition
d) Figure 9.10 illustrates that both the expected and actual pseudonym
entropy of the target vehicle decreases rapidly with the increase in
attack strength:
Figure 9.10: The excepted and actual entropy of target vehicle with respect to
adversaries
Conclusion
The Internet of Vehicles is one the most promising fields of Internet of
things, which requires utmost protection and privacy as it may lead to theft
and accidents. Concerning this factor, the chapter focuses on the privacy
issues of IoV with traditional and futuristic schemes. Brief insights of the
chapter are discussed as follows:
Location privacy is one of the major issues in IoV as it broadcasts
current position, speed, acceleration, and other private details of
vehicle and vehicle’s owner to the general public, which may include
burglars and attackers.
Location-privacy preservation requires identity protection,
conditional tracking, and pseudonym exchange.
Traditional location-privacy preservation schemes include
pseudonyms, mix-zone, group signature, and silent period.
In pseudonym scheme, location privacy is preserved by assigning and
exchanging a dummy name or pseudonym to vehicles, so as to
confuse attackers from getting any personal information.
Changing pseudonyms fails in case of continuous tracking of
vehicles. So, to compensate it a mix-zone scheme is adopted where
vehicle space is divided into two zones observed and unobserved. To
prevent continuous tracking, the exchange of pseudonyms is done on
unobserved zone.
Mix-zone fails in low traffic areas, to compensate; a group-signature
scheme is acquired. In the group signature technique, location privacy
is protected by signing the messages using group identity. Group
identity is a respective secret key of each member of a group.
Silent period is another scheme where vehicles change their
pseudonym in a region of interest during a silent period, where
nobody except the vehicle knows that pseudonym is being
exchanged.
These traditional schemes are not compatible with traffic size. To
atone their issues, a new modern technique is developed by
researchers known as the MixGroup scheme.
In MixGroup technique, the social features of mobility are exploited
to preserve the location-privacy of vehicles.
MixGroup strategy utilizes the following:
Location privacy is preserved by exploiting the meeting
opportunities where pseudonym exchange takes place.
An extended pseudonym-changing region, known as group-region
is created where vehicles use their group identities (or group
signature) for exchanging their pseudonym with each other. The
use of group signatures to inform of group identity covers the
procedure of pseudonym exchange.
The operation of pseudonym exchange is performed by using the
entropy-optimal negotiation procedure. In this procedure, each
vehicle evaluates its benefit and risk while taking part in
pseudonym exchange.
The experimental analysis performed proves the validity and
authenticity of the MixGroup approach in presence of varying traffic
and adversaries.
9.4. Questionnaire
d. Agriculture System
2. In Mix-zone scheme, pseudonyms are exchanged in:
a. Observed region
b. Not exchanged
c. Unobserved region
d. All region
3. Silent period is the duration when the vehicle:
a. Broadcasts its safety messages
b. Updates pseudonyms
d. Doesn’t do anything
4. In MixGroup approach, location privacy is preserved by:
a. Creating sufficient opportunities and then exchanging
pseudonyms
b. Exchanging pseudonyms in silent period
b. High traffic
c. High traffic where vehicles stop for particular work or any other
reason
Answer key
1. (b) 2. (c) 3. (b) 4. (a) 5. (c)
Keywords (†)
Entropy: It is the measurement of uncertainty.
References
[1] X. Huang, J. Kang, R. Yu, and X. Chen, “Exploiting Mobility Social
Features for Location Privacy Enhancement in Internet of Vehicles,” in
Security and Privacy in Internet of Things (IoTs), CRC Press, 2016, pp.
187–224.
[2] S. Wang, N. Yao, N. Gong, and Z. Gao, “A trigger-based pseudonym
exchange scheme for location privacy preserving in VANETs,” Peer-to-
Peer Netw. Appl., vol. 11, no. 3, pp. 548–560, 2018, doi:
10.1007/s12083-017-0557-5.
[3] J. Kang, R. Yu, X. Huang, and Y. Zhang, “Privacy-Preserved
pseudonym scheme for fog computing supported internet of vehicles,”
IEEE Trans. Intell. Transp. Syst., vol. 19, no. 8, pp. 2627–2637, 2018,
doi: 10.1109/TITS.2017.2764095.
[4] C. Kalaiarasy, N. Sreenath, and A. Amuthan, “Location Privacy
Preservation in VANET using Mix Zones - A survey,” 2019 Int. Conf.
Comput. Commun. Informatics, ICCCI 2019, pp. 1–5, 2019, doi:
10.1109/ICCCI.2019.8822028.
[5] L. Benarous, S. Bitam, and A. Mellouk, “CSLPPS: Concerted Silence-
Based Location Privacy Preserving Scheme for Internet of Vehicles,”
IEEE Trans. Veh. Technol., vol. 70, no. 7, pp. 7153–7160, 2021, doi:
10.1109/TVT.2021.3088762.
[6] C. Zhang, R. Lu, P. H. Ho, and A. Chen, “A location privacy preserving
authentication scheme in vehicular networks,” IEEE Wirel. Commun.
Netw. Conf. WCNC, pp. 2543–2548, 2008, doi: 10.1109/wcnc.2008.447.
[7] A. K. Tyagi and N. Sreenath, “Location privacy preserving techniques
for location based services over road networks,” 2015 Int. Conf.
Commun. Signal Process. ICCSP 2015, pp. 1319–1326, 2015, doi:
10.1109/ICCSP.2015.7322723.
[8] L. Benarous and B. Kadri, “Obfuscation-based location privacy-
preserving scheme in cloud-enabled internet of vehicles,” Peer-to-Peer
Netw. Appl., vol. 15, no. 1, pp. 461–472, 2022, doi: 10.1007/s12083-
021-01233-z.
[9] P. Rosy, “Pseudonym-Based Privacy Preserving Framework for
Facilitating Cloud Data Security,” Int. J. Recent Technol. Eng., vol. 8,
no. 2, pp. 6516–6526, Jul. 2019, doi: 10.35940/ijrte.B2514.078219.
[10] S. Abd Razak, N. H. Mohd Nazari, and A. Al-Dhaqm, “Data
Anonymization Using Pseudonym System to Preserve Data Privacy,”
IEEE Access, vol. 8, pp. 43256–43264, 2020, doi:
10.1109/ACCESS.2020.2977117.
[11] “Health Applications.”
https://www.chino.io/compliance/pseudonymization-for-health-
applications.
[12] A. Agarwal and R. Saraswat, “A Survey of Group Signature Technique
, its Applications and Attacks,” vol. 2, no. 10, pp. 28–35, 2013.
Structure
The chapter covers the following topics:
Understanding the concept of Mobile WBSN and participatory sensing
Attack models in the field of personal IoT
Schemes of protecting privacy in Mobile WBSN
Schemes for protecting privacy in participatory sensing
10.1. Concept of personal IoT
In this hyper-connected IoT world, the employment of a “Personal Network”
has enabled the simplification of network functionalities. Broadly stating the
proliferation of personal or consumer IoT is classified into two broad areas
known as IoT in surrounding (such as environmental monitoring, transportation
management, personal entertainment, and so on) also known as participatory
sensing and IoT in person (such as wearable devices, smartphones. cars,
handheld devices, and so on) known as WBSN. These are short-range devices
that communicate among themselves and with an external network via a local
gateway, resulting in the formation of a Personal IoT (PIoT) Network. For
instance; when a car user within a car connects his/her smartphone to the car
devices, then it leads to the formation of the PIoT network. For smooth
functionality, it requires a framework that enables the high-quality integration
of PIoT into the current mobile IoT standards or to the 5G standards.
The diagrammatic representation of the PIoT network is illustrated in Figure
10.1; it consists of communication between personal IoT and public IoT.
Theoretically, PIoT can be defined as “A group of connected IoT devices
related to surroundings as well as to the immediate proximity of an individual”
[1].
Figure 10.1: The architecture of Personal IoT
Architecture of WBSN
Theoretically, WBSN consists of a central node which acts as a master and the
other sensors in the human body act as slave nodes. The quantitative and
qualitative parametric information is sensed and collected by sensors, which are
then transmitted to the medical staff whenever a life-threatening event occurs.
Deterministically, any mobile WBSN consists of four different entities named
WBSN, mobile gateway, cloud servers, and accessor as illustrated in Figure
10.2:
The major concern in this chapter is only the privacy protection of untrustworthy
cloud server (as in WBSN application) or central server (as in participatory sensing
application). Since, the communication among the entities is assumed to be protected
by the protocols at the MAC layers and link layer such as IEEE 802.11 or 3GPP.
Thus, the adversaries on the communication link are ignored.
b. The number of WBSN sensors for a single user, i.e., a Mobile Gateway is
small, which means that the amount of source data in each upload interval
is usually not very high.
Commonly, the number of sensors(n) for a single mobile gateway is less than or
equal to 16.
c. The range of the uploaded data is always short because the data sensed
from the person’s body rarely varies with an extremely abnormal
deviation. Mathematically, the range of data is expressed as
, where is the median value of the
sensed result, and is the maximal absolute offset, expressed as
Assumptions for the uploaded data:
i. D1, D2, ……..Dn are positive integers and in case if Di is negative, then
it can be expressed by sign mark Si = 0, 1, where ‘0’ is for negative
sign and ‘1’ is for positive sign.
ii. Di is an integer, and if it is a non-integer, then it can be changed to
integer by multiplying by 10pi, where pi is the distance of the decimal
point from the rightmost position.
For example,
If Di = 36.3, then in this scheme, we will denote it as 363,1,1; where
363 is the value, first ‘1’ is the decimal point position and second ‘1’ is
a sign of positive integer.
If Di = -36.3, then in this scheme, we will denote it as 363,1,0; where
363 is the value, first ‘1’ is the decimal point position and second ‘0’ is
a sign of negative integer.
d. The data is repetitive on most occasions, or the median value may persist
or recur most of the time. The reason is the same as that discussed in the
previous point (c), which states that the data sensed from the person’s
body rarely varies with an extremely abnormal deviation.
A tuple in MVT and RVT is appended upon the adjustment of Mi and Ri but in
KVT, it is appended for each piece of uploaded data.
Figure 10.4: The Illustration of MVT, RVT and KVT table at Mobile Gateway
c. Data encryption and data uploading constitute the following steps:
Step 1: When the sensing data is received by a Mobile Gateway (MG), a
random number is generated ranging between ‘0’ and ‘1’ and is expressed
as , denoted by
Step 2: MG stores to MVT and
to KVT
Step 3: The data is encrypted with the generated mask value using:
(1)
(2)
It will be provided with MVT, RVT and KVT by MG which covers its
data of interest and the interested , is retrieved
from MVT and KVT via SN, respectively.
is decrypted using
Figure 10.5: The Illustration of MVT, RVT and PVT table at Mobile Gateway
c. Data encryption and data uploading constitute the following steps:
Step 1: When the sensing data is received by a Mobile Gateway (MG), a
random permutation is generated ranging between ‘0’ and ‘n’ and is
expressed as
(3)
Where ‘S’ is a sign and
Step 4: Finally, MG uploads the encryption result to BC.
d. MA access: If MA wishes to access the uploaded data, then
It will be provided with MVT, RVT and PVT by MG which covers its
data of interest and the interest , is retrieved from
MVT and PVT via SN, respectively.
is decrypted using
Since the participatory sensing system is an open system and without admission
control. So, any type of contributor (trusted or malicious) can take part and upload
the data. The task of distinguishing the data has to rely on the observation of
contributors at central servers after uploading the subsequent information.
The task of distinguishing trusted contributors from bad-mouth contributors depends
on the establishment of reputation system by the central servers. The central servers
evaluate contributors’ reputation according to their observations.
This policy is used for uploaded data that degrade with time, for example,
volumes of traffic or cloud. Time average is evaluated as follows:
First, the time span between and is computed, denoted as
,where ‘n’ is the total number of data uploaded, is the
time-span of ith data and is the inferred time of the inferred actual surrounding
data.
Second, from all the obtained , select the minimum and maximum and
denote it as and .
Third, compute the summation of total time as
Fourth, compute the summation of total uploaded data as
This policy is used for all types of the uploaded data and is evaluated as
follows:
First, compute summation of all reputation values of contributors who upload
the data. It is denoted as , where is the reputation of ith
contributor.
(7)
Both gid and gak have been deployed previously by the application software on
smartphones.
Conclusion
The world of personal computing is one of the most accepted applications of
the IoT. The Mobile Wireless Body Sensor Network (Mobile WBSN) and
participatory sensing network are the most popular examples of personal IoT
implementation. The chapter focuses on the privacy protection of these
promising applications.
Personal IoT deals with all applications related to the personal networks
which are within the persons’ surrounding and within the persons’ body.
Surrounding IoT applications are known as participatory sensing
applications and IoT on persons deals with the wearable sensing network.
Mobile WBSN consists of a number of sensors that are placed in, around,
or on the human body to sense and monitor the parameters such as
temperature, blood pressure, ECG, EEG etc. They are useful in
diagnosing chronic diseases.
Any mobile WBSN consists of four different entities named WBSN,
mobile gateway, cloud servers, and accessor. WBSN are the sensors
implanted on the human body, mobile gateway are the smartphones that
upload the readings on the cloud servers for storage and analysis and
finally, accessors are the devices that access the cloud data and make
decisions accordingly.
In mobile participatory sensing, participants gain insight into the
environment by sensing and processing the available data in mobile or
smart phones. The collected and processed information enables wide
range of innovative applications.
The participatory sensing application includes participant’s mobile
phones (or consumers), application servers and administrators (or
contributors). The participant’s mobile phone collects the surrounding
data. Contributors are responsible for uploading the sensed data to the
central application servers. Application server manage and analyze the
uploaded data and present it to the consumer in an appealing form.
Both Mobile WBSN and participatory sensing are applicable in crucial
application. Therefore, the protection of privacy is the mandatory
requirement in these applications.
One-Time Mask (OTM) and One-Time Permutation (OTP) are the
two schemes that are developed to protect the privacy of the Mobile
WBSN.
OTM is a one-time XOR-based encryption and OTP is one-time
permutation-based encryption. Both these schemes are based on the
characteristics of Mobile Gateway (MG) and the properties of the
uploaded data, since it facilitates energy efficiency.
Privacy protection schemes in the participatory sensing includes:
Firstly, confirm the trustworthiness of uploaded data in presence of
malicious contributors.
Secondly, it should be able to evaluate the reputation of the
contributor; so that only a reputed contributor is allowed to upload
data.
Thirdly, it should protect the contributor’s privacy without admission
control.
Lastly, it should be able to maintain the robustness of the employed
defense system so as to impede the malicious contributors.
For the fulfillment of discussed security goals an scheme is developed
Lightweight and Robust scheme for maintaining Trustworthiness
and Privacy (LRTP). The scheme fulfills data trustworthiness,
reputation evaluation, privacy protection, and robustness in one solution
and in a lightweight manner.
10.3 Questionnaire
d. None of these
2. OTM technique is based on:
a. Naive encryption
b. XoR encryption
c. Substitution encryption
d. Permutation encryption
3. PVT table is applicable in:
a. OTP
b. OTM
d. None of these
4. Privacy protection in the participatory sensing includes:
a. Data trustworthiness
b. Reputation
c. Robustness
d. None of these
Answer key
1. (a) 2. (b) 3. (a) 4. (a, b, c)
Keywords (†)
Euclidean distance: It is the length of a line segment between the two
points.
References
The privacy and security solutions discussed till now, though helpful for
Internet of Things (IoT) networks, are found to be complex and power-
hungry with low decision-making ability. Besides, these solutions demand
fixed infrastructure, which makes them less suitable for remotely deployed
IoT networks. The shortcomings of existing security measurements had
accelerated the development and investigation of trust-based design models.
In view of this, the chapter discusses trust-management frameworks. It
gives a classification of trust management domains as structural domains
and conceptual domains. It also highlights the security issues from an
architectural perspective with their assets and liabilities. A new
architectural model resolving the issue related to future ICT technologies
such as naming, identification, mobility, scalability, control, management,
and others is discussed. The presented model demonstrates the “swarms of
things”, which self-organizes themself to establish the required security,
privacy, and trust levels.
Structure
The chapter covers the following topics:
Understanding the concept of trust and its role in securing IoT
Overview of Trust Management System and its classification with
respect to IoT network
Security issues in existing trust architecture
Trustable fellowships of self-organizing “Things” and their
representatives
Though the existing security techniques secure the IoT network, they are
not much fruitful. It is because of the following reasons:
The existing security techniques are complex and power-hungry, and
thus, not suitable for resource-constraint IoT networks that are having
low computational and operational capability.
Existing security demands fixed infrastructure, which is irrelevant for
remotely deployed IoT networks.
The conventional techniques are less preferred to the heterogeneous
environment, which is supported by IoT networks. Heterogeneity
includes diverse kinds of sensors that may lead to non-cooperation.
Thus, they should be controlled in an effective manner.
Finally, the conventional techniques demand excessive costs in terms
of energy, memory, and latency that further degrades the performance
of the network and state the impracticability of the sensor-enabled
IoT network.
The drawbacks of conventional security measurements and the
requirements of light-weighted and robust securing techniques had led to
the development of trust management systems that have low complexity
and higher resistance to attacks. In addition, they assist in analyzing the
behavior of nodes that provides true identification of nodes to be trusted or
compromised. Besides, the trust relationship plays a key role in addressing
the dynamic nature of the node and is deemed to be reliable and realistic
due to its exemplary decision-making ability.
The term peers, devices, and entities are used to describe IoT nodes.
a. Device layer
Trust in the Device layer includes the prevention and protection of devices
along with their hardware, software, and platform credentials. Initially, all
devices are considered trustworthy and are satisfied with all the
assumptions and prerequisites such as:
manufacturing and integration of the device’s hardware is sound and
valid;
the firmware and its development process follow the best policy and
practices; and
the generation, management, and deployment of tokens such as keys
are strong and unbreakable
Trust in the device layer is modeled to evaluate the behavior of all devices
participating within the network. The models build up a list of trustworthy
nodes that secure IoT devices and ensure data reliability.
c. Other layers
For scalability and other characteristics, trust can also be addressed in
Other layers of IoT architecture such as the network or application layer.
Along with securing IoT nodes, the layer also focuses on securing data
while in transmission. All in all, the system can be secured by evaluating
the trust of the data before its collection.
a. Distributed architecture
In the distributed architecture, every node within the network is responsible
for the evaluation of a trust management system. This means that each node
will collect the trust-related data, compute trust, distribute trust, and will
store trust as and when needed. It is demonstrated with the help of Figure
11.3. The primary aim of Distributed Trust Management is to monitor the
nodes and to notify the appropriate nodes about any anomalies (if present).
Each node analyzes the flow of data and evaluates the trust status of the
sender and receiver. It then updates the trust and creates alerts and events as
a response to the evaluation. The evaluation of the trust is based on history,
expectations, and specific events, which are stored by each node. Based on
the evaluation, nodes make decisions on when and whom to inform about
abnormalities.
Refer to Figure 11.3 for an illustration of the Distributed Trust Architecture:
b. Centralized architecture
In centralized architecture; a central entity is responsible for the collection,
computation, storage, management, and dissemination of trust-related
information. The architecture constitutes three types of nodes: Cluster
node (CN), Master Node (MN), and Super Node (SN) as shown in Figure
11.4.
A group of CNs forms the cluster and each cluster is managed by a single
master node. The Cluster Node is responsible for transporting the data
generated or collected by other CNs to their Master Node (MN). The
Master Node manages all the CNs of each cluster and stores the received
data sent by CN to its repository. The Super Node (SN) acts as the base
node or the central entity and is responsible for ensuring trust in an IoT
network. It consists of a trust management API, which allows the SN to
communicate with the master node (MN) in a given cluster. The repository
of SN stores the trust values and the addresses of MNs and CNs so that
relevant CNs and MN can be accessed.
Refer to Figure 11.4 features the Centralized Trust Architecture:
Figure 11.4: Centralized Trust Architecture
Since both direct and indirect trust models are alone; and not suitable for trust
estimation, therefore, researchers generally use the fusion of both direct and
indirect trust models for the evaluation of trust. Readers can refer to the
following research papers for in-depth study [7] [8] [9].
In order to find a good candidate, developers need to use meaningful, that is,
semantic-rich keywords.
Services can reveal any features such as the physical features of sensors and
actuators, and can configure and manage devices to reflect the required QoS,
energy restrictions, and tuning for the constrained environment.
Every service has a reputation and is verified with respect to possible threats and
risks, before the establishment of service contracts (SLAs).
Services of good quality prosper, while the bad services which are suspected of
being unsafe, will have a reduced reputation, naturally forcing them to improve
or disappear.
Phase 3, Once the agreement is established the services start the secure
exchange of Named Information, as illustrated in Figure 11.8 After the
establishment of SLA, services can securely publish and subscribe data to
their peers. At this time the data integrity takes advantage of self-verifying
names and their bindings. The two photo applications send their pictures to
the “Photo store app.” Refer to Figure 11.8:
Conclusion
Trust models are found to be one of the most popular solutions for securing
IoT-based networks. They are popular because of their low computational
complexity and efficient decision-making ability. The chapter highlights the
various trust-based models with their architecture and classification. It also
presents the various security issues and their solutions.
Trust is the mutual relationship between entities, which provides
communication security to the IoT network.
Trust Management Systems include four different phases for the
evaluation of trust. It comprises information gathering, trust
computation, trust propagation, and trust update.
The framework of the trust management system is classified into
layered architecture, propagational architecture, and conceptual
architecture.
Layered architecture signifies the trust within the layer of the IoT
model, propagational architecture is stated on the basis of
dissemination of trust and its related information to other nodes for
efficient decision-making judgment and finally, conceptual
architecture is based on the idea of information collection.
Despite the discussed trust models, the existing IoT technologies
suffer from issues such as naming and resolution, identification and
location splitting, availability of resources and services, and security
and privacy.
Nova-genesis (NG) model for an IoT architecture is proposed to
rectify the discussed issues by creating emerging trustable
fellowships of social and self-organizing “things,” together with their
software-as-a-service representatives. It creates a state-of-the-art
architecture to face the security, privacy, and trust requirements,
which are expected on the future internet.
11.6. Questionnaire
b. Integrity
c. Trust
d. Authentication
2. Trust Management System includes the following phases:
a. Information gathering and Trust computation
d. a and b
3. The ____________ trust includes the dissemination of trust and
its related information to other nodes for efficient decision-
making judgment
a. Propagational trust
b. Distributed trust
c. Centralized trust
b. Proxy names
c. Simple names
b. Contract-based model
c. Self-organizing services
Answer key
1. (c) 2. (d) 3. (e) 4. (a) 5. (a, b, c)
Keywords (†)
Statistical modeling: A mathematical model that comprises a set of
statistical assumptions concerning the generation of sample data. It
establishes a mathematical relationship between one or more random
variables and other non-random variables.
Bayesian modeling: It is a statistical model where probability is used
to represent all the uncertainty within the model. It uses both the
uncertainty regarding the output as well as the uncertainty regarding
the input to the model.
Fuzzy logic modeling: It is a logical mathematical procedure based
on the “IF-THEN” rule system, which allows the human thought
process to be reproduced in a mathematical form.
Mutual information independence: It is a measure of the mutual
dependence between two or more variables.
References
Structure
The chapter covers the following topics:
The concept of citizen-centric IoT information systems
Issues related to security and privacy in citizen-inclusive IoT
Overview of classical IoT-A Architecture Reference Model (ARM)
SocIoTal security framework
12.1. The concept of user-centric Internet of Things
The user-centric IoT provides smart applications and services that are based
on the needs of individual citizens, user communities, and society at large. It
encourages information flow among people and devices, where services of
high societal value can be built.
Users are considered to be the heart of the user-centric systems that address
various new IoT paradigms where users are given significant importance.
Some of the user-concerned IoT paradigms are as follows: Internet of
People, Social Internet of Things, Physical Cyber–Social Computing, and
People as a Service. Each is explained as follows.
The idea of SIoT came from the following fact: when large number of individuals
are tied in a social network, it provides more accurate answers to complex
problems than a single individual or a small group of knowledgeable individuals.
User-centric IoT includes several challenges; however, it was found that privacy
and trust are the most prominent challenge that need to be addressed. As such,
there will be no use of employing user-centric approach if no security is
maintained. Considering this factor, throughout the chapter, we will discuss the
privacy and trust in user-centric IoT with the help of SocIoTal project.
Core component
IoT core component is further classified into seven different sub-modules:
a. IoT Process Management
The objective of the IoT Process Management module is to provide the
functional concepts and interfaces that transmit the traditional business
system into real-world IoT systems. It includes the two functional
components known as process modeling and process execution. Process
modeling provides tools and an environment for modeling the IoT-aware
business process using standardized notation that addresses the IoT
ecosystem.
Process execution executes the IoT-aware processes that have been modeled
in the process modeling component. The execution is performed using IoT
services that are instrumented in the Service Organization Layer.
b. Service Organization
The service organization module acts as the communication hub for all other
modules present within the core component. Communication is based on the
idea of services and is used for composing and organizing services at
different levels of abstraction. Service organization consists of three different
processes named as Service Orchestration, Service Composition, and Service
Choreography.
Service Orchestration: Its only function is to organize the services
that resolve the IoT services coming from the process execution phase
or from the users. In the case of complex event processing, temporary
resources can be used to store intermediate results.
Service Composition: It resolves the services that are composed of
IoT services. It supports flexible service composition and increased
quality information. This can be done by supporting dynamic
resolution of complex services and by combining information from
several sources.
Service Choreography: It offers a broker that handles
Publish/Subscribe communication between services. The broker
function assures that a client interested in the offer should find the
service with the desired capabilities.
c. Virtual entity
The virtual entity module is responsible for interacting with the IoT system
on the basis of virtual entities and the functionalities that include services
having information about Virtual entities (VE). In addition, it contains the
functionalities that manage the existing associations as well as with any new
association, that is dynamically available. An association is a relationship
established between IoT services and virtual entities. An example of
association is “Give me outdoor temperature of Car -123”; here, providing
the outdoor temperature is an IoT service and the sensor in the car is
regarded as the virtual entity of the physical world car.
The virtual entity module consists of three different processes: VE
resolution; VE and IoT service monitoring; and VE service.
VE Resolution: The process provides the functionalities to the IoT
user so as to retrieve associations between virtual entities and IoT
services. Associations are discovered based on location, proximity and
other context-related information. Associations are managed by
insertion, deletion, and updation. In case, if no association exists, then
it can be created.
VE and IoT service monitoring: This process is responsible for
automatically finding dynamic or monitored associations, which are
then inserted into the VE resolution process. New associations are
derived on the basis of existing associations, service descriptions and
information related to VEs.
VE service: This process represents the overall access point that
learns and manipulates the status of the entity. It provides access to an
entity via operations that enable reading, updating or both of the
entities’ attribute values.
d. IoT service
The IoT service module contains the IoT services and the functionalities for
discovery, look-up, and name resolution of IoT services. It consists of the
following two functional processes known as IoT services and IoT service
resolution.
1. IoT services: The process discovers the resource and retrieves the
information in a synchronous way, provided by any IoT-based sensor
device or by any storage resources connected through a network. It
also delivers the information to a resource for controlling and
configuring the actuators and resources. In addition to it, the process
subscribes to information, that is, it returns the information provided
by a resource in an asynchronous way.
2. IoT service resolution: The functionalities offered by IoT service
resolution are discovery functionality, where IoT services are found
without any prior knowledge such as by querying. Lookup
functionality, which enables the user to access the service description
having prior knowledge regarding the service identifier; and Service
Identification, which locates and identifies the services through which
the user can contact and access the provided services. Service
Description Management updates, inserts or simply deletes the service
descriptions from the IoT Service Resolution process.
e. Communication
The communication module is an abstraction and models the variety of
interaction schemes derived from several technologies belonging to the IoT
systems. It provides a common interface to the IoT service module.
Communication is classified into three types: hop-to-hop communication,
network communication, and end-to-end communication.
f. Management
The Management module combines all the functionalities that are needed to
govern an IoT system. This module includes the four different processes
known as cost reduction, attending unexpected usage issues, fault handling,
and flexibility.
Cost reduction: The process controls the cost of a system by
designing it for the maximum number of users and/or use cases.
Attending unexpected events: The process provides strategies and
actions for the mitigation of impacts from unforeseen situations. Such
impacts can be link failure, queue overload, and so on. To better adapt
to a new situation, it is paramount that the component should have a
good overview of the system state.
Fault Handling: The process addresses the unpredictability of the
future behavior of the system itself. The process includes the
measurement of prediction of potential failures, detection of existing
failures, reduction of the effects of failures, and Repair.
Flexibility: The process includes the concept of reuse with some
additional functionality, where the IoT system will be able to react
towards changes as per the user requirements. This can take place
during boot-up, commissioning or also at run time.
The scope of our book is security, and therefore, the in-depth illustration of
security aspect is discussed in the forthcoming sections while rest of the sub-
sections are only briefed out. For detailed coverage of Core component readers
can refer the research book [2].
12.3.2. SocIoTal security framework
As already mentioned, the SocIoTal framework is an expansion of the
classical IoT-A framework with an additional security module within a core
component, as illustrated in Figure 12.2. The security module incorporates
seven different sub-components, namely, authentication, trust and reputation,
key exchange management, authorization (or access control), identity
management, context manager, and group manager.
12.3.2.1. Authentication
This component authenticates the users and the smart objects based on their
provided credentials. The component is responsible for binding the real
identity of the object to its subject. As a result, an assertion is generated
which is then used in the authorization process, to declare that a specific
subject was authenticated successfully. Authentication mechanisms can be
performed using login-password or electronic IDs. However, for the
implementation of strong authentication, SAML protocol is used in a
SocIoTal framework, which ensures authentication along with privacy at
minimal disclosure of attributes.
Step 3: Once the initialization by both parties is finished and the same
credential definition is shared, the issuer computes a random value called a
nonce, which is then sent to the subject. The subject then evaluates a token in
the form of a cryptographic message, which inculcates the attributes of the
credential, including the credential structure, and optionally satisfies the
issuance policy.
Step 4: After the evaluation of the token, the issuance message with the
token is forwarded to the issuer. The issuer in turn verifies the token, on the
basis of the issued policy, as discussed in Step 2. It also creates the
cryptographic part of the credential, where the attributes are signed with the
secret key. In addition, it also creates proof of correctness and saves the
pseudonym and the context for the purpose of maintaining accountability.
Step 5: At last, the issuer replies by sending the subject a cryptographic
message with the proof of correctness, and the attributes signature. The
subject then verifies the receipt of the cryptographic material, generates the
credential based on this message, and then stores the credential accordingly.
Credential Presentation Process
This process is used to authenticate users and smart objects, with
minimal attribute disclosure of private information; for instance, when
a subject wishes to access an IoT service, such that both parties have
already issued their credentials with the SocIoTal privacy preserving
IdM system. Then, the user provides the proof of credentials following
the Credential Presentation process as a means of authentication to
gain access to the IoT service. The steps for the credential presentation
process with the interactions between a subject (IoT object/user) and
verifier (IoT service) are as follows and are diagrammatically
represented in Figure 12.5:
Figure 12.5: IdM presentation process
Step 1: First, the subject makes a request for an IoT service. IoT service, that
is, the verifier would wish that the Subject should present cryptographic
proof of possessing a credential or certain attribute.
Step 2: Upon receiving the request, the verifier computes a random value
called a nonce, which is then sent to the subject.
As per the actual context, the Identity Selector Module of the subject makes use of
the credential manager to select the best credential that can be used against the
verifier and is among the ones that is already available in its database.
In case the Subject does not know the proof specification required by the IoT
service, the Verifier will send the Subject, a Presentation policy stating which data
a user has to reveal to the Verifier to gain access to the requested IoT service.
Step 3: The subject then defines the proof specification from the selected
credentials to be used against the Verifier. This proof includes the nonce, the
attributes as well as statements about attributes. Then, the Prover builds a
cryptographic object as proof and sends the proof along with the
specification to the Verifier.
Step 4: The Verifier then validates the incoming proof specification using the
cryptographic proof. It computes the verifying protocols and checks that the
attributes’ statements and pseudonyms are valid.
Step 5: Finally, the Verifier, depending on the result of the validation, sends
an affirmative or negative response to the subject. In case of successful
identity validation, the IoT Service then redirects the subject to the
authorization component to make an authorization decision based on
authorization policies.
12.3.2.6. Authorization
The authorization in the SocIoTal user-centric IoT framework is provided
with the use of Distributed Capability-based Access Control (DCapBAC)
strategy and a policy-based mechanism based on XACML†. The SoCIoTal
access control system infers access control privileges in the form of the
capability token.
Capability Token
A capability token is an authentication token that authorizes access requests
and grants access permissions. It includes the right permission for each client
so as to perform a set of operations on a particular resource. Figure 12.6
demonstrates the basic design of the capability token, which contains the
client profile identifier, resource provider identifier, resource identifier and
list of access permissions, and it is expressed in XML due to its simplicity,
wide usability and self-descriptive characteristics [1]. The time-stamp
determines the validity period of a user in accessing the resources.
Figure 12.6: Architecture of capability token
DCapBAC strategy
The DCapBAC consists of three entities known as issuer, subject and target.
The subject is the one who wants access. Target can be any IoT service or
entity or any application that the subject wants to access and the issuer acts
as the third-party entity that issues the capability token to the subject for the
assessment of Target. The basic operation of DCapBAC is shown in Figure
12.7 and includes the following steps:
Figure 12.7: Authorization process based on DCapBAC
Step 1: The subject or device owner or any other entity in charge of the
smart object, who wishes to access the device or services, requests an issuer
for the capability token.
Step 2: The issuer after verifying the credentials of the subject, tends to
make the authorization decision about the subject.
Step 3: Once the subject is identified, a capability token is issued to the
subject, so that other devices and IoT services can be accessed. For the
avoidance of security breaches, a token is signed by the issuer.
In SocIoTal access control framework, the process is based on the use of XACML
policies. XACML obligations are used to embed contextual conditions so as to be
easily verified by the target device.
Conclusion
The Internet of Things is an emerging technology that has not only
connected objects and applications with each other but also enriched the
connections of people with everyone and with everything. This has resulted
in the development of citizen-inclusive IoT. Though the development of
citizen-centric IoT has enhanced the application of IoT, it has also demanded
new security and privacy-preserving solutions. The chapter highlights the
concepts of user-centric IoT, its related issues and its solutions with respect
to the SoCIoTal security framework.
The user-centric IoT provides smart applications and services that are
based on the needs of individual citizens, user communities, and
society at large. It encourages information flow among people and
devices, where services of high societal value can be built.
The user-centric IoT comprises the following IoT paradigms, known
as the Internet of People, Social Internet of Things, Physical cyber–
Social Computing (PCSC), and People as a Service.
The integration of IoT with the people is regarded as the Internet of
People. It aims to put people at the center of innovation strategies and
is able to maximize the profit from the power of collective
intelligence.
Social Internet of Things (SIoT) is an IoT paradigm where things
establish social relationships with other objects, especially with respect
to humans. As a result, creating a social network of objects.
Physical Cyber Social Computing (PCSC) is a human-centric view
of computing that analyzes the observations, knowledge, and
experiences from the physical, cyber, and social worlds.
People as a Service is a mobile-centric IoT computing model that
generates, keeps and provides the user’s sociological profile as a
service to third parties directly from devices like the cloud or any
smart mobile phone.
User-centric Internet of Things has led to the following advantages:
navigation and resource discovery, scalability and heterogeneity,
availability, increased utilization, module reuse, and increased level of
trustworthiness.
Just as every application has its pros and cons, similar is the case with
user-centric IoT. Some of the issues in user-centric IoT are utility and
usability, Fault tolerance, interoperability, big-data, trust, and privacy.
The most popular solution for user-centric IoT is the SocIoTal security
framework, also known as a socially aware citizen-centric Internet of
Things.
SocIoTal framework creates a reliable and secure environment for
citizen-centric applications. It encourages citizens to contribute their
devices and their corresponding flow of information, so as to have
high socio-economic value.
The objective is to transform the business-driven IoT into social IoT,
in order to create a socially aware citizen-centric IoT.
SocIoTal framework is an extension of the classical IoT-Architectural
Framework and consists of three main important components known
as an application component, a core component, and a device
component.
Core components are further classified into various other small
components such as IoT process management, service organization, a
virtual entity, IoT service, communication, and management.
Core component with added security sub-component leads to the
development SoCIoTal security framework. It provides the facility of
authorization, authentication, context management, identity
management, key management, trust and reputation, and group
management.
12.4. Questionnaire
b. People as a service
b. Security
d. Scalability
3. The process of retrieving associations between virtual entities and
IoT services is known as _________
a. Virtual entity monitoring
b. Virtual entity resolution
b. Context Modeling
c. Context reasoning
c. Identity-based encryption
Answer key
1. (c) 2. (b) 3. (b) 4. (d) 5. (b)
Keywords (†)
XACML: XACML is “eXtensible Access Control Markup Language”.
It defines a declarative fine-grained, attribute-based access control
policy language, an architecture, and a processing model. It states how
to evaluate access requests according to the rules defined in policies.
CP-ABE ciphering scheme: The scheme includes the access policy
which is embedded in the ciphertext and private keys are generated
according to a set of attributes. For decryption, the user should own
the private key related to a set of attributes satisfying the access policy.
Citizen Sensors: It is the method that gives citizens more informed
and qualitative information about the quality of their living
environment.
References
Structure
The chapter covers the following topics:
The concept of cooperative communication, cooperative authentication,
cooperative incentive, and conflict balancing in IoT
Procedure for the bargaining-based dynamic game model for cooperative
authentication
Dynamic game with complete and incomplete information
Other variants of entity authentication such as reputation, voting, abstinence,
and police
Message authentication in IoT with VOR4VANET as an example
The fundamental of authentication is already covered in Chapter 1, Internet of Things and its
Security Requirements and Chapter 7, Crypto Foundations II, of this book.
All neighbor nodes are within the one-step transmission range of n0.
The condition k < N should always be true. If k > N, then the single process of cooperative
authentication fails while if k > N is always true, it means that the network has expired.
Step 2: After the selection of neighbor nodes, sends message “m” to all its “k”
neighbors and requests them to cooperatively authenticate “m”.
Step 3: All neighboring nodes in set will return a one-bit MAC code to ,
which determines whether “m” is true or not.
Step 4: After receiving all MAC† codes from set , sends message “m” and k-
bit MAC codes to the base station . If all MAC codes believe “m” is true, then
also believes it to be true, or else it is false and is rejected.
Taking into consideration
Let us consider nodes to be compromised by adversaries with probability “p.” It is
observed that any false identity or message will be recognized if the following two
conditions are satisfied simultaneously: (1) at least one neighbor node is compromised
and it takes part in cooperation and (2) adversaries cannot completely and correctly
guess all MACs generated by uncompromised neighboring nodes. After considering
these conditions, as per the permutations and combinations, the PCA is formulated as
in equation (1).
(1)
Here, k is the number of neighboring nodes taking part in cooperation, i is the number
of compromised nodes out of k neighboring nodes, p is the probability of
compromising and PCA is the probability of cooperative authentication.
Now if the PCA and p are given, then “k” can be easily calculated from the preceding
equation (1). This represents the least number of neighboring nodes, that is, minCNN
(minimum compromised neighboring nodes) that participate in cooperation for
compromising the network. The higher the value of minCNN is, the more resources
are consumed and the more location privacy is exposed. Therefore, our goal is to
incentivize precisely minCNN nodes, so that they participate in cooperation
without any mis-behavioral activity and the network communicates smoothly.
Incentivization of minCNN is carried out with the help Dynamic Game Model, which will be
discussed in next Section 13.3.
Before the discussion of next section; readers are advised to get know of the concept of
Game-Theory, which is discussed in Chapter 22, “The Game-Theory Foundations”.
In brief, Game Theory is the study of mathematical models of conflict and cooperation
between two or more intelligent decision-makers. Here, the model is defined as a Game
with competitive activities, where each competitor interacts with other employers and
employs a strategy to maximize their utility payoff under a certain set of rules.
(2)
Where is the conditional probability with
which the predictive location corresponds to the true location
and “M” is the number of locations.
If the conditional probability is of a uniform distribution, then
reaches the maximum value and is denoted as
as in equation (3).
(3)
(4)
C Node energy For the cooperation authentication process, the energy of the
node is measured using three different metrics:
The Initial energy
The current remaining energy
The consumed energy
(5)
(6)
(7)
S.No. Factors The utilization of bandwidth is denoted as follows:
Explanation
(8)
(9)
(10)
(11)
(12)
(13)
Here , and are the weights of bidding price, reservation price, cost
price, and loss of no authentication price with respect to , respectively.
(14)
(15)
(16)
Here , and are the weights of the asking price, reservation price, and
cost price, respectively. is also the weight whose value lies between 0 and 1.
denotes the location privacy leakage for a cooperative process for node .
It is assumed that nodes care about both Privicons and Enercons equally and set vCi to 0.5.
13.3.1.3. Bargaining procedure
When requests its neighboring nodes to authenticate message “m”, the price
bargaining between the buyer and potential sellers is conducted in the following way:
Step 1: The buyer offers a bidding price
The buyer first, calculate from equations (11), (12), and
(13), respectively. It selects and offers a suitable , as per equation (10). Then,
broadcasts an authentication request with the parameters of “m”, that is,
and to neighbor nodes.
Step 2: The potential sellers offer an asking price
As soon as receives an authentication request, it calculates from
equations (15) and (16), and then the price is selected, as per equation (14) and
offered.
Step 3: The buyer selects a sellers’ coalition on the following basis
Let denote
the set of optional sellers’ coalitions, where C is a coalition with their members
meeting the defined conditions. Here, NNs are the number of neighboring
nodes.
If , then the buyer chooses the coalition
as the seller’s coalition.
If , then the bargain fails. In such a situation, to make a bargain
successful, can increase with constraint that
Step 4: The buyer pays for the authentication service
If SC exists, the bargain is struck at the agreed price (AP) as in equation (17) and the
buyer pays AP for the agreed authentication service (AS).
(17)
(18)
Players
The set of players is represented as . Here, represents (source
player) and represents (neighboring node).
Strategy
The set of strategies for all players is represented as . Here,
is the strategy of and the strategy set is the strategy chosen
by other remaining players. For simplicity, the strategy set is also represented as
. Strategies in cooperative authentication states:
a. When has message “m” that requires authentication, it has two options:
Cooperation (CP) and non-cooperation (NC). CP represents that it requests
the player to authenticate “m” and NC represent that it refuses to send “m” to
for authentication.
b. When receives an authentication request, then it also has two options:
Cooperation (CP) and non-cooperation (NC). CP represents that wishes to
authenticate “m” and NC show that it rejects the request to authenticate “m”.
Thus, the set for strategies of is given as .
Utility function
The set of utility functions is represented as . The utility function of
under and is given as and is defined by the following:
Utility function for the buyer or source node is given as follows:
(19)
(20)
The in-depth description of the graph can be referred from the research paper [2]
Nash equilibrium is a situation in which a player will continue with their chosen
strategy, having no incentive to deviate from it, after taking into consideration the
opponent’s strategy.
(21)
(22)
(23)
Proof of these theorems are out of scope, if reader wishes, they can refer research paper [2]
Step 5:
If
Step 6:
If a bargain is concluded at , authenticating m and allocating the
utility to according to equation (18); otherwise, the bargain fails.
(24)
Here,
is the probability that is of type and is determined by “nature”.
takes action with the probability when it is of type .
The “nature” player refers to a player who assigns a random variable, which could take
values of types for each player, to each player and associates probabilities or a probability
density function with those types.
On the basis of the preceding assumptions; the following definitions are defined:
a. In I-G, a belief profile and a type-dependent
strategy profile constitute a
PBNE if, for each at the information set h,
(25)
Where:
From equation (19), it can be observed that the strategy for is related to its
, the sum of all and cost .
Thus, a time-dependent strategy of P can be obtained as
, where
and
Finally, the belief of in the type of player can be derived at a given
information set and type-dependent strategies can be obtained by
applying Bayes’ rule, as illustrated in equations (26) and (27):
(26)
(27)
In a similar manner, the strategy for player is also related to asking price and
time-dependent strategies of can be obtained as
, where:
And
(28)
(29)
Proof of this theorem is out of scope, if reader wishes, they can refer research paper [2]
Finally, summarizing all the preceding factors it can be stated that the PBNE helps a
player in I-G to decide whether or not to participate in cooperation and to maximize
its utility based on its belief about the types of other players. The belief is obtained
from the given information set (such as the history record of observed actions, and the
probability distributions of types) by applying Bayes’ rule. Algorithm 2 presents step-
by-step instructions for dynamic game algorithms with incomplete information.
Algorithm 2:
Dynamic game algorithm with incomplete information for cooperative
authentication
Required parameters:
Given the message “m” with for authentication.
selects a suitable and calculates using equation (1).
Select the coefficients .
chooses suitable weights
Each , selects suitable weights , and
Select the information set , type-dependent strategies
, and probability distributions of and .
Step 1:
calculates [equation (5)] and ,
[equation (9)]
using equations (11), (12), and (13), respectively.
And then predicts the beliefs and .
broadcasts an authentication request with parameters (
) to neighboring nodes.
Step 2:
For each collects the parameters
Step 5:
If is true,
Otherwise
If is true,
Otherwise
Step 6:
If a bargain is concluded at , authenticating m and allocating the utility
to according to equation (18); otherwise, the bargain fails.
13.5. Variants of entity authentication
In addition to the cooperative authentication techniques, there are other variants of
entity authentication. This section deals with the Node-eviction schemes
accompanying the node authentication mechanisms in network security. The section
illustrates various entity authentication techniques with respect to VANET as an
example. Conventionally, a centralized Certificate Authority (CA), such as Motor
Vehicle Registry was considered for node eviction. However, with the rise in the
number of vehicles, CA-based approaches were ineffective and the following local
node-eviction techniques were preferred that take action against other errant nodes,
both distributed and locally.
a. Reputation
In the reputation-based node eviction method, an individual node forms or updates a
reputation metric of other nodes with which it has interacted. Based on its own direct
observation and information provided, the node updates the reputation metric of
interacted nodes and then gets itself evicted from the nodes of which they have had
bad experiences. As a result, nodes with bad experiences are excluded from the
VANET. Reputation-based approaches are resilient from false detection but respond
to incidents slowly.
b. Vote
Vote-based node eviction method uses a Local Eviction of Attackers by Voting
Evaluators (LEAVE) protocol. In this method, the authority (or responsible node)
collects accusations (that is, negative votes) from different nodes that have witnessed
a node’s misbehavior and on reaching the threshold, revokes the node being accused.
Voting schemes equip the individual with a rapid reaction and self-protection.
However, voting becomes an injustice when there exist more deceptive nodes than
honest ones.
c. Abstinence
In this scheme, the nodes keep the ratings of other nodes to themselves. On
experiencing a bad node’s misbehavior, the node takes a passive role and stays away
from the bad node without reporting. They in return expect that other nodes will
eventually remove the bad nodes from the network.
d. Police
In this scheme, a special vehicle for instance a police car, patrols the network of roads
and revokes any misbehaving nodes immediately upon detection. This class is
accurate, as the evidence is first-hand, but its speed depends on the chance of a node
being caught, though the eviction is made instantly.
The performance analysis of the Reputation scheme is not considered as it forms the superset
of Vote, Abstinence, and Police scheme.
Vulnerability time and risks are the two most important parameters of authentication-
based node eviction schemes, and are discussed as follows:
Figure 13.7: Performance analysis of entity authentication with respect to vulnerability time
b. Average risks
Risk is the most important parameter that defines the accuracy of the node eviction
scheme. Figure 13.8 demonstrates that the Police node eviction scheme poses the
lowest risk as compared to the other two schemes because every detection triggers a
bad node being moved from Subnet A to Subnet B. Finally, in the end, good and bad
nodes are largely segregated, with almost no risk. However, as the percentage of bad
nodes increases, it becomes difficult for the single police node to catch all the bad
nodes in time, as multiple bad nodes pop up simultaneously at different locations. It
may also be possible that the police never catch some bad nodes, which results in a
rise in risk.
Similar to the Police Scheme, the Vote Scheme also shows lower risk when the
percentage of bad nodes is low but, when the proportion of the population increases
beyond 0.5, its threshold settings, the risk rises suddenly. It is because, after 0.5 there
are only a few good nodes left that report and more bad nodes that provide false
accusations. As the simulation reaches a state of equilibrium, almost all the nodes,
good or bad, end up in Subnet B, returning to the image of the initial state.
At last, the Abstinence Scheme shows the highest risk, since a bad node is moved out
of Subnet A only when every other node abstains itself from it. Risk rises steadily as
the percentage of bad nodes increases. At some points, the risk fluctuates, since a
good node is removed from Subnet A. It is also observed that after 0.5, the risk value
of the abstinence scheme becomes slightly lower than the Vote scheme. It is because
there are more bad nodes than good nodes that distorts the truth. Refer to Figure 13.8:
Figure 13.8: Performance analysis of entity authentication with respect to average risk
The in-depth description of the graph can be referred from the research paper [2]
(31)
Where:
, M = 1, if OBU delivers a good fragment and –1, if OBU delivers a
bad fragment, and , the recommended value of
Voting weighted by reputation determines the correct version of a data
fragment, in case its multiple copies from several OBUs carry different values.
The actual calculation of the mode from the list of reputations is obtained as in
the following:
(32)
Where:
are the non-negative reputations of corresponding OBUs
is the list of various OBUs that delivers duplicate data fragments to the
RSU.
This can be explained with the help of Table 13.2. Suppose, if an RSU receives
duplicates of a data fragment from four OBUs and only one of the four OBUs
delivers a “good (G)” fragment, whereas the rest three deliver “bad (B)”
fragments, that is, . Then, if the majority rule is applied the
final delivery to the RSU by OBU will be the bad fragment because there are
3Bs and 1G. However, if reputations are incorporated corresponding to each
OBU, that is, . Then, the list of OBUs will be equated to 3Gs
and 2Bs, resulting in a “G” mode. That means RSU would accept the good
fragment.
H1 H2 H3 H4 OBU
Fh B G B B B
Rh 1 3 0 1 G
The performance analysis and graphs considered in this chapter are referred from the
research paper [2].
Conclusion
The resource constraint feature of Internet of Things has given rise to cooperative
communication, where instead of directly forwarding the data from source to
destination, intermediate nodes forward packets on behalf of some other nodes. This
reduces the consumption of energy and resources by the nodes. Though the
consumption ability of IoT nodes is reduced, the open-ended behavior of nodes has
jeopardized the network. Since nodes of any type can take part in the network.
Therefore, to contemplate the security threats, authentication and authorization are
used as the best technique that protects nodes and maintains the integrity of the IoT
data. In respect of this, the chapter presents the various authentication and
authorization techniques in IoT networks.
The concept of cooperative communication has given rise to cooperative
authentication, where the probability of correct authentication (PCA) is
estimated by the neighboring nodes.
In a practical implementation of cooperative authentication, the source nodes
first, select the “k” neighboring nodes and transmit the message “m” to each
neighboring node. Neighboring nodes on receiving the message “m”,
authenticates the message using MAC codes and transmits it back to the source
node. The source node then forwards the message and all received MAC codes
to the base station or destination nodes. Base station on receiving the MAC
codes and message verifies the data. If all MAC codes are authenticated truly,
then the base station will also authenticate the message “m”. Otherwise, if any
one of the MAC codes is not authenticated that base station will reject the
message “m”.
For increasing the efficiency of this cooperative authentication, the concept of
incentivization, in the form of a Bargaining-Based Dynamic Game Model is
included, so as to increase the intensity of cooperation and make the
participation of nodes smoother.
The Bargaining game model is a cooperative game model where two or more
players/users bargain or negotiate over the division of certain goods so as to
have maximum profits. A solution to a bargaining problem means the
determination of a division of shares in order to have maximum payoffs.
While establishing the analogy, in the IoT-specific cooperative authentication
game model, authentication services provided by cooperative nodes are
regarded as goods, which are needed to be shared. The buyer is the source node,
which sends the message and the sellers are the neighboring nodes, which
generate the MAC code of the message. The objective of the game is to improve
the cooperation willingness of nodes so that all the sellers behave cooperatively
instead of selfishly.
Incentives are provided based on the bargaining price offered by the buyer and
asked by the seller.
Price Offered by Buyer is given as follows:
Where , are the weights of bidding price, reservation
price, cost price and loss of no authentication price with respect to ,
respectively.
The price Asked by the Seller is given as follows:
13.7. Questionnaire
b. If anyone node discards the authenticity of the message then the sink node
also discards its authenticity
c. If all nodes discard the authenticity of the message then the sink node also
discard its authenticity
b. Cooperative authentication
c. Dynamic game
b. Reputation strategy
c. Voting strategy
Answer key
1. (b) 2. (d) 3. (c) 4. (a) 5. (d)
Keywords (†)
MAC Codes: They are a cryptographic data checksum code, which uses a
session key to detect both accidental and intentional modification of data.
References
[1] S. Karnouskos, “The cooperative Internet of Things enabled Smart Grid,” SAP
Res. Vincenz-Priessnitz-Strasse 1, D-76131, Karlsruhe, Ger., no. May, 2010,
[Online]. Available: http://diktio.dyndns.org/files/2010_ISCE.pdf.
[2] L. Licai, Y. Lihua, G. Yunchuan, and F. Bingxing, “Preventing Unauthorized
Access to Sensor Data,” in Security and Privacy in Internet of Things (IoTs), CRC
Press, 2016, pp. 319–346.
Structure
The chapter covers the following topics:
The idea of computational models and their security in the Internet of
Things
The idea of Complex systems with their characteristics and
challenges
Examples and features of complex systems with their security
characteristics
The available computational tools with their future endeavor
14.1. An introduction to computational models and their
security
The computational model uses computer programs to simulate and study
complex systems using an algorithmic approach. These systems are
generally complex and nonlinear for which simple and intuitive analytical
solutions are not readily available. Therefore, a mathematical analytical
solution is derived by experimenting and adjusting the parameters of the
system with the help of computers and analyzing the differences in the
outcome of the experiments. These models are diversified into various
fields ranging from physics, chemistry, and biology to economics,
psychology, cognitive science, and computer science. Some examples of
commonly used computational models are weather forecasting models,
earth simulator models, flight simulator models, molecular protein folding
models, and neural network models.
Computational security accounts for providing security to these
computational models. The security of these models does not rely on
perfect security but on computational security. This means, that the
complex system is computationally secure “if it is unbreakable within any
reasonable time”. Mathematically, it can be formulated as the “Problem ‘P’,
which cannot be solved in a reasonable time and a reasonable time depends
on the task in hand [1]”.
Computational security can be explained with the help of the following example:
suppose if the intruder wishes to intercept the encrypted login details of
someone’s bank account. Then spending a few days to decrypt the account
would be reasonable. However, spending years to decrypt it is not useful. This is
because in a few years the account may be closed or the password would have
changed. Thus, it can be said that the algorithm for login details is
computationally secured.
Following are the points of concern that can be iterated during the course of
the computational attack so as to adaptively increase the chances of normal
execution without any effect of attack implementation:
Identifying and gathering relevant data from existing sources, and
actively exploring the system to collect additional useful data.
Evaluating data and building models for the targeted system at
different scales and in different domains.
Assessing the Security of the model using computer simulations,
which are likely to be intractable due to the complexity of the model.
Exploiting the identified vulnerabilities in order to create an initial
strategy for the attack.
Refinement of the attack strategy and devising its implementation
under the concealment, available timescales and resources, and other
required constraints.
The preceding points if successfully adapted can prevent the computational
exploitation of computational security in large as well as small scale IoT
systems.
14.2. Complex systems
Complex systems are regarded as networks of mutually interconnected sub-
units (that is, structural models derived from the physical structure) or as
network that captures the interdependencies and relationships (meaning,
functional models, and derived from logical structure). In other words, the
complex network models are collections of scalar interactions between the
pair of entities.
b. Traditional threats
Traditional threats consist of traditional attacks, where confidential
information can be easily gained access. Once an attacker obtains this
information, they can commit other crimes and serious attacks, such as
phishing and identity theft. Various traditional threats that can be used by
attackers to gain a user’s personal information are phishing, malware, Sybil
attack, spamming, hijacking, inference attacks, cloning, and so on.
c. Social threats
In this type of threat, attackers maliciously exploit the social relationship of
the users and interact in different ways with different kinds of users such as
minors, employees, and so on. For instance, an attacker can attract minors
by expressing sympathy, love, and care, or offering online gifts, and cash,
among others. Their motivations can include blackmail, sharing
pornography, engaging in cyber harassment, and spying. Some of the
examples of social threats are Cyberbullying (online harassing attack) and
cyber-grooming (sexually abusing using emotional talks), Corporate
espionage (automated social engineering attack to gain access to
information such as employee’s position within a company, email
addresses, full names, among others), Cyberstalking, and so on.
Details of all these attacks is out of scope. If readers wish, they can refer the
research paper [2].
Conclusion
The chapter presents, the design, deployment, and monitoring of complex
systems with that of security features. It highlights the concept of
computational security in complex systems along with various examples.
The key features of the chapter are as follows:
Computational models are the models that use computer programs for
the simulation and study of complex systems using an algorithmic
approach.
The security of these models does not rely on perfect security but on
computational security.
Computational security means that the system is unbreakable within
any reasonable time.
Complex systems are regarded as networks of mutually
interconnected sub-units (that is, structural models derived from the
physical structure) or as a network that captures the
interdependencies and relationships (such as functional models and
derived from the logical structure).
Wireless networks, social networks, economic networks, and
computer networks are some of the examples of complex systems.
Security to these systems is provided by computational tools. Some
of the examples of computational tools are signal processing tools,
network science tools, network tomography, and controllability and
observability of networks.
14.6 Questionnaire
b. Computational security
c. Steganography security
b. Social network
c. Economic network
d. Computer network
3. Rootkit is an example of
a. Malware
b. Spyware
c. Phishing
d. DoS
4. Machine learning, game theory, and deep learning is an example
of ________ processing tools
a. Network science tools
c. Network tomography
d. None of above
5. _____ is the ability to drive the system from an arbitrary state to
any other state.
a. Controllability
b. Observability
c. Tomography
Answer key
1. (b) 2. (b) 3. (a) 4. (b) 5. (a)
Keywords (†)
Spatiotemporal Interaction: Interactions where data is collected
across time as well as space and has at least one spatial and one
temporal property.
Rootkit: A rootkit is malicious software that is designed to give
unauthorized access to a computer or other software.
Darwinian Evolution: Theory of evolution where organisms produce
more offspring than are able to survive in their environment.
References
The protection of data and safeguarding of user privacy are the major
concerns of IoT organizations. This is where Identity and Access
Management (IAM) appears, as they help organizations to be away from
cyber-attacks and data leaks in the long run. Yet, the lack of proper IAM in
the Internet of Things is still a subject to be discussed, as it leaves devices
open to identity theft, encryption, and unauthorized parties taking control of
smart devices. This further demands the quick implementation of effective,
fast IoT digital identity, and security solutions. This chapter discusses
Identity and Access Management for IoT devices along with their lifecycle.
Technologies such as PKI and OAuth with different types of authentication
credentials are discussed for providing authorization and access control for
IoT devices. These technologies offer the foundations for a complete, user-
friendly, automated, and secure authentication and authorization solution.
Structure
The chapter covers the following topics:
The idea of identity and access management and its implementation in
the Internet of Things
The lifecycle of identity establishment
Illustration of IoT IAM infrastructure
The available authorization and access control for the Internet of
Things
15.1. Introduction to identity and access management for the
IoT
Identity and Access Management (IAM) is a structure of technologies and
policies that ensures that only suitable or authorized users have appropriate
access to technology resources. In addition, besides managing user access to
data, it also identifies devices of IoT systems. Traditionally, IAM includes
only the login process to gain access to the application portfolio. However,
the new-age advancement of IoT devices is unable to deal with available
traditional IAM solutions. Since many more IoT devices are expected to be
deployed throughout an organization than the usual one or two mobile
phones or laptops for each employee. Thus, there is a need to upgrade the
architecture quickly taking into account the number of device connections
and the looming security concerns. Refer to Figure 15.1:
Figure 15.1: Comparison of traditional and IoT IAM
The demand for IAM has gained precedence for the Internet of Things and
has forced the coverage of IoT into the following aspects:
Scalability with low latencies: Inculcation of IAM by IoT vendors
provides scalable runtime access for securing authentication and
authorization at high transaction rates, without facing any latencies
issues. IoT vendors tend to reduce data storage and manage both
structured and unstructured data sets that support deployment on-
premise and on the cloud platforms.
Integration of IAM with IoT devices: To manage the security in IoT,
device identity and access technologies are incorporated with IoT
platforms. This has accelerated the endorsement of IAM into the IoT
market while ensuring the protection of data at all costs.
Embedded device authentication: For ensuring identity and access
management, IoT manufacturers are joining hands with authentication
providers and product specialists. They are doing so for the creation of
a dynamic and robust authentication process.
Need of IAM for IoT can be illustrated with the help of examples, such as the
following:
The leased IoT solutions designed for radio machine technology, records the
number of scans and permits operations only up to a certain number of
entitlements. These are restricted to only authorized users and authorized
machines, which makes the system very complex. Therefore, access control
decisions for restricted users, for specific device version, time of day and other
constraints is implemented using IAM program.
The use of wearable devices, such as Fitbit, requires that it should be worn by
authorized individual only for whom the Fitbit is designed for and no one else
should use it. This is done to have the accurate information related to daily steps
and heart rate. Employment of IAM in wearable technology not only manages the
fresh inculcation of data but also uses the significant privacy concerns related to
safeguarding the personal information.
b. Cross-domain IoT
Machine-to-machine applications cannot be combined with each other since
they are domain-specific and not interoperable. However, IoT is diversified
into several domains, where the management of heterogeneity is of major
concern. This demands that devices should communicate with each other
and be interoperable. This has resulted in the emergence of cross-domain
IoT. A cross-domain IAM solution helps to manage and understand the
multiple identities across domains and devices perfectly. These solutions
assist the successful operation of IoT services in their environment.
c. Credential abuse
Stealing of credentials such as usernames, passwords, or any other sensitive
data is another issue of the IoT ecosystem. It generally takes place in the
workplace, where employees sometimes intentionally or unintentionally
share their data with coworkers, which leads to credential abuse. The
absence of a proper IAM solution gives them the opportunity to hackers,
where they have unwanted access to data and places, which they can easily
exploit. Therefore, it is necessary to have a proper IAM platform, where an
organization and its employees can control all their interlinked devices and
build them to be strong enough to shield data at a corporate level.
d. Virtual Eavesdropping
In Virtual Eavesdropping company secrets and sensitive information is
leaked via virtual personal assistants such as Alexa, Siri, or any other
advanced version. The leakage of data affects the reputation of the brand in
the market. Therefore, to address these challenges IAM solutions should be
built in such a manner that they should include the following:
A well-equipped user identity system that controls their IoT
environment
Responsive authentication and data access protocols for contextual
control
End-to-end encryption for data protection at endpoints, that is,
between two different devices as well as everywhere else in between.
The identity issues in the Internet of Things that were discussed preceding
are analyzed and resolved using the IAM program. For this, the IAM
program should be designed in such a way that it should mitigate the fault in
an environment, where:
New devices with diverse functions are securely added to the network
at a rapid pace.
Data and devices are frequently shared within the organization as well
as with other organizations.
Privacy is maintained despite consumer data being collected, stored,
and frequently shared with others.
There are times when local access to the device is required for administration
purposes. This may require the provisioning of SSH keys or administrative
passwords.
Monitoring in IoT system also include the privileged account management tools
that allows the features such as checking out administrative passwords to aid in
audit processes.
X.509
X.509 is a digital certificate that is built on top of a trusted standard known
as the International Telecommunication Union (ITU)† standard,
consisting of a format similar to the format of PKI certificates. The
certificate is used for providing secure transaction processing and private
information. It is used to handle the security and identity in computer
networking and internet-based communications. They are issued by a trusted
entity known as Certification Authority (CA). CA maintains the certificates
known as CA certificates, which are used to issue X.509 certificates. The
X.509 certificate format uses an associated public and private key pair for
encrypting and decrypting a message.
AWS-based X.509 certificate allows only one-click for the generation of a device
certificate; which creates public/private key pair. The detailed study of AWS-
based X.509 authentication can be referred from the website [5].
IEEE 1609.2
IEEE 1609.2 standard credential is used for building authentication
certificates for resource-constrained devices employed in vehicle-based
organizations. The certificate format of IEEE 1609.2 is half the size of the
conventional X.509 certificate. It uses strong, elliptic curve cryptographic
algorithms known as Elliptic Curve Digital Signature Algorithm
(ECDSA), and Elliptic Curve Diffie-Hellman (ECDH). The certificate
uses unique attributes including explicit application identifier (SSID) and
credential holder permission (SSP) fields. Attributes permit IoT applications
to make explicit access control decisions without internal or external queries
regarding the credential holder’s permissions. Attributes are embedded right
in the certificate during the secure, integrated bootstrapping and enrollment
process with the PKI. The reduced size of credentials makes them attractive
for others as well as for bandwidth-constrained wireless protocols.
15.3.4. Biometrics
Biometric authentication is the most popular domestic as well as commercial
method of authenticating IoT devices. It supports both passwordless and
two-factor authentication experience, which ranges from fingerprints to
voice prints.
Consumer door lock is an example of fingerprint biometric and voiceprint
biometrics are generally used to authenticate across a set of distributed IoT
devices such as Road Side Equipment (RSE) in the transportation sector.
Hypr Biometric Security [1] is the most popular voiceprint technology.
Revocation support
While authenticating devices using PKI credentials, it is necessary that
devices should know the validity of the credentials of other devices (aside
from expiration). As the devices can be compromised, malfunctioned, or
retired, they are thus generally revoked. Therefore, it is necessary to include
revocation support for maintaining the identity of IoT devices. Since a
revoked device is never trusted by any application or network layer
engagement.
The existing method of revocation uses CA, which periodically generates
and issues Certificate Revocation Lists (CRL). CRL contains a
cryptographically signed document that lists all the revoked certificates. This
requires that the end devices have the ability to reach out through the
network and frequently refresh CRLs. It also requires turnaround time for
the following:
the CA to generate and publish the CRL,
end devices to become aware of the update, and
end devices to download it.
15.5. Authorization and access control
As soon as the device is identified and authenticated, the next foremost step
is to determine what that device can read or write to other devices and
services. This section presents the framework of authorization (OAuth 2.0)
and access control within the IoT protocols.
OAuth2.0 components
The essential components of an OAuth 2.0 system are as follows:
Resource owner: The resource owner is the user or system that owns
the protected resources and grants access to them.
Client: The client is the system that requires access to the protected
resources. To access resources, the Client should hold the appropriate
Access Token.
Authorization server: The authorization server receives requests
from the Client for Accessing Tokens and issues them upon successful
authentication and consent by the Resource Owner. The authorization
server exposes two endpoints: the Authorization endpoint, which
handles the interactive authentication and consent of the user, and also
the Token endpoint, which is involved in a machine-to-machine
interaction.
Resource server: The resource server protects the user’s resources
and receives access requests from the Client. It accepts and validates
an Access Token from the Client and returns the appropriate resources
to it.
Working of OAuth2.0
Before the use of OAuth 2.0, the Client such as mobile apps, websites, smart
devices, and so on. Must acquire its own credentials, a client_id and client
secret, from the Authorization Server to identify and authenticate itself when
requesting an Access Token. The token request, exchange, and response are
represented in Figure 15.5 and are explained as follows:
We encourage readers to visit IETF RFC 6819 for a more thorough treatment of
OAuth2 security considerations [6].
Conclusion
Employment of Identity and Access Management in the Internet of Things is
considered as one of the best solutions for protecting data and safeguarding
user privacy. Concerning this the chapter highlights the concepts of IAM and
its utility in IoT. The comprehensive details of the chapter are presented as
follows:
Identity and Access Management (IAM) is a structure of technologies
and policies that ensures that the right users have the appropriate
access to technology resources.
IoT IAM includes several IoT devices and various application
portfolios that interact through authorized IAM technological
resources.
The demand for IAM manages the security, scalability with low
latency, and embedded authentication of IoT devices.
The idea of IAM was introduced because of the following identity
issues in existing IoT, such as default passwords, cross-domain IoT,
credential abuse, and virtual eavesdropping.
The identity lifecycle includes the naming convention, secure
bootstrap, credential provisioning, account monitoring, account
updates, account suspension, and deletion.
IAM helps in providing authentication with the help of the following
credentials such as usernames and passwords, symmetric keys,
certificates, and biometrics.
IoT IAM infrastructure includes public key infrastructure (PKI)
architecture with identity management and revocation support.
OAuth 2.0 is an open authorization and a token-based framework that
allows a client to access protected and distributed resources without
the entry of any kind of user’s credentials.
Access control is another feature of the IAM solution where only the
authenticated devices or entity is allowed to access only the permitted
devices or entities.
Access control in the publish/subscribe protocol is provided by the
third entity known as the broker.
Access control in communication protocol is provided by the Access
Control List (ACL).
15.6. Questionnaire
b. Certificates
c. Biometrics
b. Authorization framework
c. MQTT server
d. MQTT topics
Answer key
1. (d) 2. (a) 3. (b) 4. (b) 5. (a)
Keywords (†)
UUID: It is a 128-bit Universally Unique Identifier; standardized by
the Open Software Foundation (OSF) as part of the Distributed
Computing Environment (DCE).
ITU: It stands for International Telecommunication Union. It is a
specialized agency of the United Nations responsible for matters
related to information and communication technologies.
References
[1] “https://www.hypr.com/.” .
[2] “https://datatracker.ietf.org/doc/rfc7744/.” .
[3] “https://letsencrypt.org/.” .
[4] “http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.html.” .
[5]
“https://docs.aws.amazon.com/iot/latest/developerguide/authentication.ht
ml].”
[6] “https://tools.ietf.org/ html/rfc6819#section-4.1.1.” .
Structure
The chapter covers the following topics:
The application of data aggregation in IoT system
Various data aggregation schemes
Privacy-preserving data aggregation scheme based on time-series
Since security is the prime focus of our book, therefore in-depth study of privacy
preservation using time-series data aggregation will be studied next.
16.2.1 Prerequisites
The actual implementation of the time series aggregation in the IoT requires
the prior study of the IoT scenario where the scheme is applicable, its design
and security goals, and the properties of the Group that are discussed as
follows:
IoT scenario
The time-series data aggregation scheme is applicable to a stationary IoT
scenario. It includes one trusted authority, one control center, one gateway,
and a set of “n” nodes denoted as N = . The maximal
value of nodes is denoted as .
Trusted authority (TA): This is a trustable entity and is responsible
for managing and distributing key materials to other entities in the
system.
Control center: This is the core entity, which is responsible for data
collecting, processing, and analyzing the time series data from a set of
nodes “N” for monitoring IoT scenarios.
Gateway: This entity acts as a relay and aggregator of the system. It
relays information from the control center to N, and at the same time,
collects and aggregates data from N and forwards the aggregated data
to the control center.
Nodes: Each node is equipped with sensors. It collects and
reports the time series data , where is a large value
while is a smaller value to the control center via the gateway.
With respect to traditional data aggregation schemes, the time series aggregation
in IoT enables the control center to obtain not only small plaintext space
aggregation, that is, ∑ni=1 xi, but also large plaintext space aggregation, that is,
∑ni=1 mi. This enables control center to carry out more accurate data analytics for
the monitoring and controlling the IoT system.
(1)
(2)
Here “p” is prime such that , where be the security parameter and
is an integer less than and .
(3)
Now, let be an integer less than p, then, as per the Fermat’s Little Theorem,
it can be stated that . That is
On raising both side of equation (4) to the power of p and with the modulus p2, it can
be concluded that,
(5)
(6)
System settings
The system consists of the following settings:
is the security parameter, and is the prime number such that
, where and is also prime.
A random number is selected as a generator of , then
is computed, and a secure cryptographic hash
function is selected. The public parameters
obtained are
Next, the TA chooses n random numbers
and computes ,
such that
(7)
Finally, the TA sends as the secret key to the control center, as
the secret key to the gateway, and as a secret key to each
corresponding node via secure channels.
(8)
(9)
Since
Thus,
(10)
(11)
Since so,
Thus
(12)
(13)
With this plan of action, the aggregation at the gateway and the decryption at
the control center will not be affected.
Node leaving:
The same is the case of leaving, when a node with the secret key
leaves, the TA also randomly chooses a subset of nodes {
of N, where each node has its secret key .
Then, the TA assigns a new secret key to each such that:
(14)
The discussed dynamic key management is also suitable for multiple users’
joining and leaving cases.
Figure 16.2: Computational costs of (a) aggregation at the gateway and (b) decryption
at the control center varying with n.
For in-depth analysis the preceding graphs can be referred from the research paper
[1].
Conclusion
Data aggregation is an important process of the IoT system, and so
preserving data privacy while aggregating data is of prime concern, which
needs instant action. The chapter highlights various data aggregation
schemes with its main focus on privacy-preserving time series aggregation
schemes. The comprehensive details of the chapter are presented as follows:
Data aggregation is the process that collects data from various sensors
and IoT devices and then integrates them using an aggregation
function.
It is used to minimize the injected traffic into the system by executing
the aggregation code on devices.
IoT includes three wide categories of data aggregation mechanisms
such as client-server-based, mobile-agent-based, and time-series-
based.
In the client-server approach, the sensed data is saved in the memory
of the IoT device, where the execution of the aggregation function
takes place, and then the final packet is forwarded to the destination.
Client-server aggregation mechanism is further divided into cluster-
based, tree-based, and centralized-based.
In mobile-agent-based data aggregation mechanism, each IoT device
saves its sensed data on a local memory and waits for the sink to
produce one or several mobile agents to process, aggregate, and
collect the required information.
In a time-series-based data aggregation mechanism, data is
periodically collected by central authority from all or from a group of
IoT devices.
Time series-based data aggregation is used for preserving the privacy
of the IoT system.
The scheme is based on the features of Group , and preserves the
privacy of each individual node within the IoT network.
16.3 Questionnaire
Multiple choice questions
1. Process of collecting data from various IoT devices and then
integrating them for optimizing traffic is known as:
a. Aggregation
b. Separation
c. Splitting
Keywords (†)
Group: It is a set and an operation that combines any two elements of
the set using an operation to produce the third element of the set. Here
the operation should be associative, an identity element should exist,
and every set element should have its inverse.
References
[1] R. Lu, X. Lin, C. Huang, and H. Bao, “Privacy-Preserving Time Series
Data Aggregation for Internet of Things,” in Security and Privacy in
Internet of Things (IoTs), CRC Press, 2016, pp. 405–428.
[2] S. Yousefi, H. Karimipour, and F. Derakhshan, “Data Aggregation
Mechanisms on the Internet of Things: A Systematic Literature Review,”
Internet of Things, vol. 15, no. April, p. 100427, Sep. 2021, doi:
10.1016/j.iot.2021.100427.
Structure
The chapter covers the following topics:
The idea of green IoT, its components, and open issues
Real-time GIoT and its issue
Real-time query processing in the GIoT
Generation of an optimized secure path in GIoT
a. Green hardware
Hardware elements play a vital role in achieving GIoT technology, as they
consume a significant percentage of network energy. GIoT is achieved by
designing and constructing energy-efficient and renewable elements to make
them harmless and eco-friendly. Green Hardware elements include the
following:
Green SoC hardware element. It is a small-sized, high-frequency, and
low-power consumption element suitable for an optimal GIoT
platform. This element is built using high-density nanometer
technologies coupled with Ultra-Low Voltage (ULV) (0.3–0.5 V)
CMOS, which has ultra-low average power and convenient speed
performance in the near-threshold regime. Details of green SoC can be
referred from the research paper [1].
Transparent and recyclable interconnected sensors in a wireless
channel with optimal antenna designs as per the green standards † .
Working and other details of green sensors can be referred from
research paper [2].
Ultra-low-power FPGA hardware platform. It includes an MSP430
ultra-low-power microcontroller, which operates as sensor nodes, and
Pulsed-Index Communication (PIC), which acts as a single-wire
communication protocol.
The design optimization and redundant facility minimize the problem
of power leakage. It also facilitates the inactivation of unnecessary
hardware elements.
The facility of switching between sleep and active modes with
predefined time intervals to conserve energy.
b. Green software
Designing reliable software prevents the repetition of processes and tends to
reduce energy consumption. It has been observed that along with green
hardware, green software also plays a pivotal role in achieving GIoT
services. It uses the development of energy-efficient software that minimizes
environmental impacts and is reusable, with minimal computational and
memory resource requirements. It can operate the services such as data
analysis and event prediction.
Data analysis: Data analysis encompasses the analysis of data
generated by green IoT devices. The accuracy and speed of this
generated data affects the decisions taken, and the software developed
for its processing plays a critical role in GIoT performance. Therefore,
for achieving effective GIoT, it is essential to include energy
consumption management systems in the developed software.
Event prediction: Green software plays a vital role in processing
event database management, event notification, event classification,
and prediction models. Software is also responsible for accurate data
collection, efficient data analysis, and real-time results announcement.
In addition, GIoT software is also responsible for real-time accurate
decision-making. Thus, there is always a need for the development of
efficient software for event prediction with minimum computational
overhead.
c. Green communication
Green communication too plays an important role in GIoT, as data
transmission in wireless networks consumes a significant amount of energy.
GIoT communication includes technologies such as Zigbee, BLE, PLC,
RFID, and NFC. These technologies consume a limited amount of power and
contribute toward the significant performance of the GIoT.
d. Green architecture
For achieving an effective GIoT system, the facility of greenery should be
enforced in the communication architecture that connects GIoT to other
networks and end-users. The architecture includes the two dominant
architectures known as green cloud computing architecture and green fog
computing architecture.
Green cloud-computing: It is also known as the green cloud of things
and achieves consistency, coherence, and scalability on optimal power
consumption. It also provides scalability and flexibility to businesses
and opportunities to users for accessing free demanded resources.
Furthermore, the earned data from actual things are combined with
other available resources that generate value-added information for
users. It is identified as a service-oriented model that stores and
analyzes big data systematically.
Green fog-computing: Inculcation of fog-computing in GIoT is
termed as green fog-computing. Green fog-computing optimizes the
efficiency of the green cloud as the data sources and edge nodes are
closer to the device layer than the cloud layer. Thus, consumes limited
power. Moreover, it facilitates continuous and real-time data
acquisition through local storage. In addition, it solves the problem of
redundancy, security, and data compression with minimum latency.
Green tags
Green tags are the RFID tags that help to promote a greener world by
reducing vehicle emissions, conserving energy use in buildings, improving
waste disposal, and so on. Carbon footprints and energy consumption are
reduced by the use of passive tags where no batteries are used; instead, the
tag uses the radio energy transmitted by the reader for the identification of
IoT objects. It focuses on reducing the size of RFID tags in order to use less
non-biodegradable material in their production.
Other green initiatives in green tags include producing biodegradable RFID
tags, printable tags, and paper-based RFID tags.
Green coding
Green coding and low-code development, along with Automated Software
Quality Monitoring, are the evolving technologies that minimize the energy
consumption of software. Thereby limiting the potential environmental
impact. It uses the choice of language, AI models, and software development
techniques for the development of greener software. It is based on the
principles of greener logic such as zero-waste code, benefit-driven visual
content, low-footprint resources, and greener methodology involving Agile
and Lean methods. The developers are advised to focus on removing unused
features and inefficient loops in the code as well as limit apps’ computational
accuracy as required for operational needs.
Greening of IoT can also be performed by drones. They offer effective energy
utilization; hence, lowers the power consumption of IoT devices.
As IoT devices require a lot of transmission power to relay data across long
distances. Here drones come into play, where drone can move closer to IoT
devices to collect, process, and send data to another device in a different location.
The methods of data collection using drone-based WSN have been successful in
lowering flight time, energy consumption, and data gathering delay.
Green M2M
Green M2M focuses on using energy-efficient techniques to intelligently
adjust the transmission power, design efficient communication protocols, do
activity scheduling based on workload variation, and employ energy
harvesting. For instance, the green M2M allows the owner to monitor and
control vehicle charge settings, plan single- or multiple-stop journeys, locate
charging stations, and pre-heat or cool the car.
a. Technical challenges
GIoT technical challenges constitute the following:
Budgetary limitations and hardware constraints obstruct the
implementation of concepts and ideas at the GIoT hardware layer.
The absence of fast renewable materials and incompatibilities between
different materials pose another challenge for GIoT.
For effective utilization of GIoT, it is recommended that GIoT should
be able to combine with other non-green networks, leading to a
heterogeneous structure. Preserving green features in these
heterogeneous networks and maintaining green communications are
fundamental challenges.
The lifetime of the device should be compatible with the type of
application.
b. Standardization
The lack of appropriate standards for GIoT leads to the following challenges:
The production of various equipment and devices with different
hardware and software that are not compatible with each other.
Limits the frequency bands and energy levels for different radio
communications.
Reduction of energy consumption and recycling.
Production of harmful gasses, which intends humans to encounter
environmental problems.
Since focus of our book is on security, therefore issue of security will be further
elaborated and discussed in this chapter.
It is expected that if the data transmission by sensor node does not meet the
expected deadline, then it has been attacked and if it is not below the power
consumption threshold point, then it is not satisfying the resource constraint
property of IoT node.
(1)
Where is the energy consumed by transmitting one bit from one node
to other
k is the number of transmitted bits from the node
d is the distance between two nodes and
The plan for data gathering is shown in Figure 17.5 and is demonstrated as
follows:
It can be viewed as a query plan .
Each edge represents a need to transfer bytes of
data from .
The query plan Q is assumed to be a partial order function for set .
It means that the data transfer of must be processed before that of
.
Dijkastra’s algorithm is an algorithm used to find the shortest paths between nodes,
that is from sources to all nodes in the given graph. Step by step procedure of
dijkastra is out of scope of this book. Readers can refer book “Introduction to
Algorithms” by Thomas H. Cormen, PHI publication for further study.
In depth analysis of PERT algorithm can be referred from research paper [3].
The algorithm did not consider the scenario where two paths use the same edge
ei,j.
The derived Query propagation plan is not equal to Query Plan. This is because the
Dijkstra algorithm has discovered some paths consuming smaller amounts of
energy than those in the query plan.
In given example, the transmission time of the critical path is greater than
the deadline. Thus, a two-phase mechanism to derive the query
propagation plan is followed. First, the subdeadlines is assigned for the
segments of the plan. Then, generation of the path for each segment on the
critical path is done to meet the assigned subdeadline with the RSP
algorithm.
Conclusion
Preserving energy is an important parameter of resource-constrained Internet
of Things, which has resulted in the development of the Green Internet of
Things (GIoT). It focuses on the reduction of energy consumption of IoT
elements with smart and sustainable technologies. The overall detail of the
chapter is presented as follows:
GIoT is defined as an energy-efficient IoT where intelligent
communication is established between devices, at any time and at any
place, with a vital characteristic of prioritizing energy requirements.
In GIoT architecture, energy-efficiency is integrated into all layers
from bottom to top, referred to as the power management layer.
GIoT technology consists of four major components named as green
hardware, green software, green communication, and green
architecture.
As with other technology, GIoT too has open issues; some of them are
technical issues, standardization, security and privacy, and so.
A real-time GIoT is an extended version of GIoT. It is an energy-
efficient IoT that functions within a time frame that the user senses as
immediate or current.
The major issue in GIoT is providing security in a limited time with
limited energy. This is done by finding the optimized path from source
to destination.
For this, real-time query processing is implemented with the help of a
query plan and query propagation plan.
Query Plan is the path through which the data is transmitted from
sensors to sink.
Query Propagation Plan is a multi-hop path; basically, adopted at run
time, through which the data is transmitted from sensors to sink.
Data gathering in query processing includes multicasting data
dissemination, sensor sensing, and then the transmission of data
packets to sink.
Once the data is gathered, a secured path from nodes to sink is
generated using four important procedures named as the discovery of
the minimal-cost path, the discovery of the critical path, budget
reassignment, and path regeneration.
Path generation includes the series of algorithms as discussed
previously in Section 17.3.2 and is explained with the help of an
example.
17.4 Questionnaire
b. Energy consumption
c. Memory
d. Size
2. The instant (or time) when an IoT application result should be
produced is called a _____.
a. Finish Line
b. Start Line
c. Deadline
b. Budget reassignment
c. Path regeneration
Answer key
1. (b) 2. (c) 3. (b) 4. (d)
Keywords (†)
PERT: PERT is a Program Evaluation and Review Technique (PERT).
It is a method that examines the tasks in a schedule and determines a
Critical Path.
Critical path: It is the longest path (in time) from Start to Finish
and indicates the minimum time necessary to complete the entire
project.
Green Standards: It aims to develop a standard and raise awareness
for best environmental practices in AI research and development
References
[1] D. Bol et al., “Green SoCs for a sustainable Internet-of-Things,” in 2013
IEEE Faible Tension Faible Consommation, Jun. 2013, pp. 1–4, doi:
10.1109/FTFC.2013.6577767.
[2] K. Guerchouche, E. Herth, L. E. Calvet, N. Roland, and C. Loyez,
“Conductive polymer based antenna for wireless green sensors
applications,” Microelectron. Eng., vol. 182, pp. 46–52, Oct. 2017, doi:
10.1016/j.mee.2017.08.007.
[3] S. Ali Göksu and Elma Ćatović, “Implementation Of Critical Path
Method And Project Evaluation And Review Technique,” 3rd Int. Symp.
Sustain. Dev., vol. 2017, no. May 2012, pp. 205–302, 2012, [Online].
Available: https://www.researchgate.net/publication/265421349.
In the discussed example (Figure 18.1), clocks are locked to a global positioning
system (GPS) timescale.
Fields Characteristics
Consecutive values of the timestamps are used by the gateway for estimating the
behavior of the clocks of the non-IoT unidirectional devices in terms of phase
and drift.
It can be noted that if the received timestamp time series is monotonically
increasing that it enables the avoidance of replay attacks.
Since devices are close to the gateway, propagation delays are neglected.
Time interval of the security keys is kept sufficiently long so as to transmit one or
more packets and to absorb possible retransmissions or any other unwanted
delay.
In IoT network, each terminal within a coverage area is served by more than
gateway. These gateways have clocks running at different times. Therefore,
mentioning the identity of the gateway in sent message is fundamental for
bidirectional transmissions. As it distinguishes one gateway from other and
assist the terminal to decrypt the message correctly. Identities of the gateways
are inserted in the sent messages.
Conclusion
The connectivity in the Internet of Things is reaching beyond the expected
domain. It has connected sensor devices, non-sensor devices as well as
people as a whole. The connectivity of these different types of entities
requires the implementation of various protocols. Moreover, this
heterogeneity too requires novel security techniques that secure IoT systems
from unwanted intruders. Considering this factor, the chapter discusses
various types of security protocols and their impact on mobile networks.
The overall detail of the chapter is presented as follows:
The conventional IoT protocols, such as XMPP, CoAP, and so on,
supports connectivity but lack the security features with respect to
heterogeneity of the system.
In view of this, the chapter introduces the concept of Time-based
secure key generation and its renewal.
Time-based protocols secure not only the IoT devices but also the
flow of data transmission, both unidirectional as well as bidirectional.
Time-based protocol protects the device by generating a key from
time to time at both sides of the communication channel, that is, at
the transmitter as well as at the receiver sides. The transmitter is used
to encrypt data by means of an encryption key which is extracted
from a shared sequence of keys. Similar is the case with the receiver,
which decrypts data at the other side using a decryption key extracted
from the same sequence of keys.
For protecting data, the protocol uses the concept of hashing and
timestamping.
Other than time-based protocol, cognitive security protocol can also
be used for protecting the IoT system.
This protocol includes the concept of “cognition”, which involves
conscious intellectual activity, such as knowing and perceiving, and is
based on the possibility of being reduced to empirical factual
knowledge.
The discussed protocols secure the network from unwanted intruders.
However, the enforcement of security has adverse effects on mobile
networks with respect to cost, complexity, delay, and scope of mobile
networks.
18.4 Questionnaire
c. Using SCRAM-SHA-1-PLUS
c. Payload
b. Cognition
c. Intelligence
b. Delay in system
Answer key
1. (d) 2. (c) 3. (d) 4. (b) 5. (d)
Keywords (†)
Cognition: the process by which knowledge and understanding is
developed in the mind.
Backoff time: It is a waiting time that a station waits before
attempting retransmission of the frame.
Capillary network: It is a local network that uses short-range radio-
access technologies and provides local connectivity to things and
devices.
References
[1] R. Giuliano, F. Mazzenga, A. Neri, and A. M. Vegni, “Security
Protocols for IoT Access Networks,” in Security and Privacy in Internet
of Things (IoTs), CRC Press, 2016, pp. 481–494.
Structure
In this chapter, we will cover the following topics:
Cloud services and the IoT
IoT offerings by cloud service providers and their security controls
The architecture of IoT cloud security
Advanced technologies of cloud-enables systems for the Internet of
Things
19.1. Cloud services and the IoT
The supporting services of the cloud connect IoT devices, device data,
individuals, and organizations together. Gateways, applications, protocol
brokers, and a variety of data analytics and business intelligence
components reside in the cloud for convenience, cost, and scalability. In
addition, cloud-based services offer the most compelling environment to
organizations, where more and more features are added for connecting IoT
products in a secure way.
a. Asset/inventory management
One of the important aspects of securing IoT is to track assets, inventories,
and attributes of the devices within the network. The cloud is found to be a
great solution for enabling enterprise asset and inventory management. This
cloud-based service provides all the devices that have been registered and
authorized to be operated within the organization’s boundaries.
c. Real-time monitoring
Real-time monitoring services are required in mission-critical applications
such as emergency management, industrial control, manufacturing, and
many more. Organizations are using industrial control systems, industrial
monitoring, and other functions in the cloud to reduce operational costs so
as to make the data more available and open up new B2B and B2C services.
IoT devices such as programmable logic controllers (PLCs) and remote
terminal units (RTUs) are directly connected to the cloud, supporting the
ability to monitor systems more efficiently and effectively.
d. Sensor coordination
Automated workflows in machine-to-machine transactions require sensors
and devices to cooperate and coordinate with each other. The cloud plays a
central role in enabling these automated workflows. For example, with the
help of cloud services, IoT devices can query to gather the latest
information, restrictions, or instructions. The publish/subscribe protocols,
such as MQTT, make use of cloud services to drive many IoT
implementations.
f. Information sharing
IoT allows the sharing of information among many stakeholders. For
example, an implantable medical device provides information to a medical
office, and that medical office then provides that information to an
insurance provider for further assessment. This Information sharing and
interoperability services of the cloud are mandatory for enabling powerful
IoT analytics. These services support protocols based on the
publish/subscribe model and enable data to Business-to-Business (B2B),
Business-to-Infrastructure (B2I), and Business-to-Customer (B2C)
offerings.
g. Message transport/broadcast
The centralized, adaptable, and elastic capabilities of the cloud provide an
ideal environment for implementing large-scale IoT message transaction
services. These cloud services include message transport and broadcast
services that support the implementation of HTTP, MQTT, and other
protocols. Other than transport and broadcast, these service protocols
publish, subscribe, and move data in a centralized or distributed manner.
a. Kinesis
It is a real-time data analytical engine and has the following features [2]:
It collects, process, and analyze real-time streaming data so as to get
timely insights information and then respond instantly instead of
waiting until all the data is collected before the processing can begin.
It is capable of processing streaming data in a cost-effective manner,
along with the flexibility of choosing the tools that are best suited for
the required applications.
Kinesis Firehose operates as the ingestion platform that accepts data
streams, such as audio, video, application logs, and so on, and loads it
into other Amazon domains such as Simple Storage Service (S3),
Redshift (data warehousing), and Amazon ElasticSearch (ES).
b. Amazon Lambda
It is an event-driven, serverless computing platform that runs code in
response to events and automatically manages the computing resources
required by that code. It has the following features [3]:
Run code without provisioning or managing infrastructure. Simply
write and upload the code as a .zip file or container image.
Automatically respond to code execution requests at any scale, from a
dozen events per day to hundreds of thousands per second.
Save costs by paying only for the compute time that is used. Payment
is per millisecond instead of provisioning infrastructure upfront for
peak capacity.
Optimize code execution time and performance with the right
function memory size.
d. CloudWatch
Amazon CloudWatch is a monitoring and management service that provides
data and actionable insights for AWS on-premises applications as well as on
other infrastructure resources or clouds. It includes the following features
[5]:
CloudWatch collects, access, and analyzes resources and application
data using powerful visualization tools.
It improves operational performance using alarms and automated
actions that are set to activate at predetermined thresholds.
It seamlessly integrates with more than 70 AWS services for
simplified monitoring and scalability.
CloudWatch dashboards are used to troubleshoot operational
problems with actionable insights derived from logs and metrics.
e. DynamoDB
Amazon DynamoDB is a fully managed NoSQL database service that
supports key-value and document data structures. It has the following
features [6]:
It delivers applications with consistent single-digit millisecond
performance, nearly unlimited throughput and storage, and automatic
multi-region replication.
It secures data with encryption, performs automatic backup and
restores, and guarantees reliability with an SLA of up to 99.999%
availability.
Focus on innovation and optimize costs with a fully managed
serverless database that automatically scales up and down as per the
requirement.
f. AWS Thing Shadow
AWS Thing Shadow is a virtual service that maintains the state of an IoT
device even when it is offline. This service adds shadows to AWS IoT thing
objects. Shadows are used to make the device’s state available to apps and
other services, irrespective of whether the device is connected to AWS IoT
or not. AWS IoT thing objects have multiple named shadows; in order to
have an IoT solution that has more options for connecting devices to other
apps and services. Thing shadows support the MQTT protocol with
predefined topics and are used to interact with the service and devices [7].
For example, if an MQTT-enabled light bulb is offline, an MQTT command
can be sent to the virtual things repository to change its color. When the
lightbulb comes back online, it will change its color appropriately. From a
perspective of security, only authorized endpoints and applications should
publish the MQTT topics. It is also recommended that the administrative
console be locked down sufficiently to keep unauthorized actors from
gaining access to directly configured IoT assets.
The section presents only some aspects of AWS IoT. For in-depth illustration
readers can refer website [11].
The section presents only some aspects of Azure IoT. For in-depth illustration
readers can refer website [12].
Virtualization systems that host management servers, brokers, IoT gateways, and
other IoT architectural elements are built into Amazon, Google, and other cloud
providers.
SDNs are used today by security vendors that basically tackles distributed denial
of service (DDOS) challenges.
Data services
Data services are another source of managing and structuring huge amounts
of data, data sources, and data sinks in IoT. These services include cloud
environment tools, such as Amazon’s DynamoDB. It offers scalable, low-
latency, NoSQL database capabilities that manage various IoT data storage,
sharing, and analytics services. Similarly, in an easy-to-use Web front,
developers create and manage tables, logs, access, and other data control
features.
Data security, authentication, and access control are implemented on a per-
table basis that makes use of AWS identity and access management
systems. It means that a single organization can execute a variety of
analytics, produce derivative data populated in distinct tables, then
selectively make that data available via an application to its various unique
customers.
Ravello Systems [10] offers a powerful framework for deploying and testing
VMWare/KVM applications virtually in self-contained cloud capsules running
in AWS or Google cloud.
Microservices
Microservices is a concept in which large, monolithic enterprise
applications such as Web UI and REST APIs, databases, core business
logic, and so on; are modularized into small, bite-sized services like a
Service-Oriented Architecture (SOA). Each module comes with its own
business logic, data backend, and APIs connecting to other microservices.
Each individual microservice is virtually instantiated into the container type
(for example, Docker, VMWare) of choice. The technology simplifies and
mitigates the complexity of enterprise applications that tend to grow and
snowball in response to changing requirements.
Cognitive IoT
Cognitive IoT is another cloud-based technology that elevates the
performance of the IoT system. For instance, in health monitoring
applications, massive bio-dataset is coupled with various patient metadata
that allows cognitive systems to predict with much greater clarity the
probability of disease conditions or other health maladies before they
appear. Similarly, in a GPS-denied environment, cognitive IoT, with the
help of an Unmanned Aerial System (UAS), understands the surrounding
environment so as to have effective navigation techniques. The concept of
cognition is already discussed in Chapter 18, Security Protocols for IoT
Access Networks and its Impact on Mobile Networks.
Conclusion
Cloud technology elevates the performance of IoT systems. It resolves the
issue of storage, processing, and managing large amounts of data. The
popularity of the cloud in IoT systems requires security of the cloud so that
data stored, processed, and managed is secured and flawless. Considering
this aspect, the chapter discusses the cloud, cloud service provider
offerings, and the cloud’s enablement of the IoT. It presents the security
architectures and the spawning of the cloud with powerful directions for
connectivity and support of the Internet of Things. The comprehensive
details of the chapter are presented as follows:
Cloud services connect IoT devices, data, individuals, and
organizations together. Some of the cloud services that connect IoT
systems are asset management, real-time monitoring, customer
intelligence, digital marketing, digital transport, and many more.
Like other IoT systems, cloud-based IoT also suffers from several
threats and attacks. Therefore, there is a need to address the security
aspect of cloud IoT. Attacks basically take place in cloud
infrastructure. Cloud infrastructure that is open-ended and prone to
attacks are its virtual endpoints, cloud administrators, users, and
networks.
To overcome the attacks, security-as-a-service (SECaaS) is
provided by cloud service providers.
Some of the major SECaaS are AWS IoT, Microsoft Azure IoT suite,
Cisco Fog Computing, and IBM Watson IoT platform.
Implication of secured cloud-based services is vital for IoT
deployments. Therefore, there is a mandatory requirement to have
some security control on the cloud.
Basic controls offered by cloud service providers are authentication,
authorization, periodic software and firmware updates, end-to-end
security recommendations, maintenance of data integrity, security
monitoring, and bootstrapping.
The architecture of cloud security constitutes users, applications,
devices, interfaces, communication, and security.
Security controls and offerings are not enough for cloud security;
thus, there is a need to implement some new technologies for cloud-
enabled IoT.
SDN, data services, secure development, deployment, microservices,
on-demand computing, cognitive IoT, and many more are next-
generation applications of cloud-enabled IoT.
19.7. Questionnaire
b. CoAP
c. MQTT
d. XMPP
2. Cloud networking attackers, target the following cloud
component:
a. Virtual networking components
b. Lambda
c. S3
b. Edge Computing
c. Fog Computing
d. Block chaining
5. Docker is a:
a. Container tool
b. Application tool
c. Project tool
Answer key
1. (c) 2. (a) 3. (d) 4. (c) 5. (a)
Keywords (†)
Key fobs: It is a small security hardware device with built-in
authentication that is used to control and secure access to network
services, data, mobile devices, and computer systems.
References
[1] “https://aws.amazon.com/iot/?nc=sn&loc=0.” .
[2] “https://aws.amazon.com/kinesis/?nc=sn&loc=0.” .
[3] “https://aws.amazon.com/lambda/.” .
[4] “https://aws.amazon.com/s3/.” .
[5] “https://aws.amazon.com/cloudwatch/.” .
[6] “https://aws.amazon.com/dynamodb/?refid=1e5631f8-a3e1-45eb-8587-
22803d0da70e.”
[7] “https://docs.aws.amazon.com/iot/latest/developerguide/iot-device-
shadows.html.”
[8] “https://learn.microsoft.com/en-us/azure/iot-hub/iot-hub-devguide.” .
[9] “http://www.docker.com/.” .
[10] “https://www.ravellosystems.com.” .
[11] “https://aws.amazon.com/iot-core/.” .
[12] “https://azure.microsoft.com/en-in/products/iot-hub#overview.” .
Several procedures and techniques for protecting data have been studied
throughout this book. Furthermore, the chapter discusses another element of
data protection known as Informed consent. In this method, the consent of a
subject (for example, a citizen) is taken by a third party to legitimately
process personal data. For this, citizens should have a clear understanding
of how his/her personal data is used by third parties. Understanding of the
third party by the citizen is a complex task as the complete details of the
third party are not known to the citizen. This issue is likely to be more
critical in the Internet of Things (IoT), where the collection of personal
data happens in various ways, which are often not evident to the user.
Considering this, the chapter discusses the idea of informed consent for IoT,
its issues, and solutions. It highlights a policy-based approach, where rules
and regulations are defined to know the details of third parties and the way
the subject’s data (that is, citizen) is used.
Structure
In this chapter, we will cover the following topics:
The idea of informed consent and how it maintains the privacy
Informed consent in IoT and its issues
Policy-based solution for informed consent
The Article 29 Working Party (now known as European Data Protection Board) is
an independent party that deals with the issues related to the protection of
privacy and personal data.
Security rules
Security rules consist of security rule templates, also known as policy rules.
These rules are Event-Condition-Action rules. Action specifies the action
of allowing, denying, modifying, or delaying a service or data in the IoT
device or system. It also triggers the execution of additional actions that are
to be enforced. In addition, it also specifies the trust management policies to
increase/decrease the trust evidence for a specific trust aspect.
For informed consent, the execution of an Ask for User Consent abstract
activity is performed. It is instantiated by considering the previously
specified user preferences and the current user situation, such as whether
he/she is busy, available, in a meeting, and so on. Actually, users have two
alternatives: (1) to specify a priori the consent rules to allow, deny, modify,
or delay an activity or (2) to specify rules that declare when the users
should be explicitly asked for consent in an interactive way. For the
implication of a second alternative policy, language should be very
expressive and allows users to specify temporal and cardinality constraints
for the informed consent rules. For instance, that consent should be
explicitly asked once per hour or once per day if the data access requests
are not more than 10 per day.
VO, CVO and service are part of security management (SM) cross-layer iCore
IoT architecture [1] represented in Figure 20.3, and is responsible for the
evaluation and enforcement of policies. Therefore, in this policy-based informed
consent iCore IoT architecture is considered.
Figure 20.3: iCore IoT architecture
VO, CVO, and service are used for object virtualization, service composition and
execution, and service creation and management respectively.
The actual objective of iCore project is to enable IoT node with multiple
functionalities based on its capability. Thus, supports reusability and
interoperability.
For example, the ambient light control in a smart building can use the projector
VO to realize that there is a movie or slide projected in a particular room, and
thus, can turn off the lights. The idea is simply to reuse IoT objects in multiple
applications. The CVO enable IoT devices to interact with other devices, and
infuse multiple VOs to offer any smart applications. For example, a smart home
has strict requirements regarding energy reduction, light control, climate control,
and security. By combining multiple VOs, these requirements could be served.
At the service object, multiple application requirements are addressed. Referring
to the same example, the service object enables an ambient light control
application to use information from the projector by querying IoT devices (or
services) in the vicinity, learning from the obtained information, and making
intelligent decisions. This satisfies the semantic interoperability on all respective
layers.
Conclusion
The chapter introduces the idea of informed consent for maintaining the
privacy of data. It presents an approach to handle the authorization of data
operation in the IoT. It illustrates the semi-autonomous policy-based
approach, which integrates context awareness and enforcement through the
“SecKit” mechanisms. The comprehensive details of the chapter are
presented as follows:
In informed consent, the individual is fully informed about the nature
and purpose of the application or project, the data that is being
collected, and how that data will be used subsequent to their
participation.
There are several applications where informed consent is used. The
most popular applications are health care, transport, infrastructure,
housing, and so on, and regulate the interactions of citizens within
this digital world.
Conventionally, informed consent in IoT was supported by End User
License Agreements (EULAs).
EULA is a user license agreement that states what and how the
application data will be used by the other party. It is quite long and
complex, thus not supported in the IoT system.
Therefore, a policy-based informed consent approach was formulated
so as to support IoT systems.
As per Article 29, working party informed consent should at least
include identity, contact, categories, information regarding the
disclosure of data to third parties, and information regarding
withdrawal and deletion of consent.
Implantation of these minimum points in IoT; still result in the
following issues such as lack of information symmetry, availability,
quality and efficiency issue, complexity, and so on.
In order to solve the issue of informed consent in IoT, a policy-based
approach is considered, where rules regarding the authorization of
data and devices are enforced and focused.
Policy-based IoT system consists of the following elements: Policy
Management GUI and its users (enables the user to define a set of
rules for policies), Policy-based System (to authorize or deny data
operations on behalf of the user), Community (handles the reputation
of the system), and Policy Enforcement component (enforces policies
as per the need).
Policy-based framework consists of Model-based Security Toolkit
(SecKit).
SecKit specifies the policy rules, security policies, security rules, and
so on.
This kit consists of several policy enforcement design templates.
Each template tends to execute in runtime mode and present an
application for the enforcement of policies to users. Designing of
each template is demonstrated in Section 20.2.3.
Finally, the implementation of these designs maintains the privacy of
IoT data.
20.3 Questionnaire
c. a and b
d. None of the above
2. Informed consent in IoT is challenging because of the following
reasons:
a. Lack of control and information asymmetry
b. Security policies
c. Context situation
c. Policy enforcement
Answer key
1. (c) 2. (a, b, c) 3. (a) 4. (a)
Long answer question
1. How policy-based solutions can create informed consent and
maintains the privacy of IoT?
Keywords (†)
Consent fatigue: Loading users with questions and forcing decisions
on them when they access a website for the first time.
References
Structure
In this chapter, we will cover the following topics:
The idea of Blockchain technology and how it came into existence
Cryptocurrencies and their types
Key concepts of blockchain technology such as P2P network,
consensus, mining, distributed ledger, and many more
Classification of blockchain wallets
The idea of Altcoins and Anonymity
21.1. Blockchain technology: The introduction
The concept of Blockchain technology could be clear by first analyzing the
drawbacks of the current banking system and then knowing how
cryptocurrency can resolve these issues. Then it will be easy to dive into and
understand the technology with its architecture and features.
21.1.1. Issues with the current banking system and its solutions
Banks have been in the picture for centuries and have been acting as the
facilitator to multiple economic and financial activities, which include
lending, trading, transaction settlement, payment processing, and so on.
However, the longevity of the banking system has made it stagnant, leading
to it becoming slow in terms of adopting prevailing changes. They still
require a lot of paperwork, face security vulnerabilities, and have multiple
time-consuming and expensive processes in place. This can be
acknowledged with the following examples:
Nowadays, any transaction on a banking channel costs a very high
transaction fee. Suppose if one wishes to transfer an amount from
his/her account to someone’s else account through a banking channel;
then the bank might charge a fee; let us say for 200$, it might charge
5$, this will make the receiver to receive only 195$, which in
percentage terms is a very high percentage of transaction fee.
Furthermore, in the current scenario, people end up doing double-
spending. Double spending is a unique problem where digital money
is spent twice. For instance, let us suppose a sender has 800$ in his/her
account, but he/she ends up sending 1000$; 500$ each to two other
users. As the bank was not able to update its record time when the
transaction with the first user took place. So according to the sender,
there is still 800$ present in the account. Hence, it can be said that the
present banking system is not adequate enough to keep up-to-date
records of all transactions. Subsequently, the user is able to spend
more than the amount present in his/her account. Moreover, keeping
records updated requires a lot of paperwork which can be prone to
inconsistency and is time-consuming.
In addition, the banking systems are prone to hacking. Hackers attack
financial institutions and gain unauthorized access to data. They can
do transactions on our behalf, which we are not aware of, or they can
transfer money to some illegitimate account.
In 2017, the number of frauds in India through ATM cards and net banking was
about 1,785, each amounting to more than one lakh rupee.
Components of block
Each block contains four major components named as data, hash, previous
hash, and nonce. It is presented in Figure 21.1.
Data attribute of the block contains the sender’s address, receiver’s address,
and the transaction amount or information. There can be multiple
transactions among multiple senders and receivers. So, each block can
contain “n” number of transactions, each with their sender’s address,
receiver’s address, and transaction amount.
Hash is like a digital fingerprint of the current block, which is unique to
each block. It means once a block is created, any change inside the block
will cause the Hash to change. It takes the previous hash, data, and nonce as
the input value and produces a fixed-length output. Commonly, the SHA256
hashing algorithm is used in blockchain technology; however, other hashing
algorithms can also be considered.
Previous hash is the attribute which is connecting a block to its previous
block. So along with its own hash value, a block also contains the hash value
of the previous block.
Nonce is a random value used to vary the output of the hash value whenever
any transaction takes place. It is used in a proof-of-work algorithm that
verifies the transactions done within the blockchain.
Formation of blockchain
Formation of blockchain is represented in Figure 21.2. Let us consider a
blockchain of three blocks. The first block is a Genesis block and has no
previous hash. Block 2 contains a hash of Block 1, whereas Block 3 contains
Hash of Block 2, and so on. In this way, a chain of blocks is formed and is
known as blockchain.
Figure 21.2: Formation of Blockchain
This is the way that makes a blockchain secure. Let us assume, an attacker
changes the data of Block 2. Correspondingly, the Hash of the Block will also
change. However, Block 3 still contains the old Hash value of Block 2. This
makes Block 3, and all succeeding blocks invalid as they do not have the correct
Hash of the previous block. Therefore, changing a single block will make all the
following blocks invalid.
b. Encryption
Blockchain eliminates unauthorized access by using cryptographic
algorithms, such as SHA256, to ensure that blocks are secure. Each user in
the blockchain has their own keys. They are provided with two sets of keys,
a private key and a public key. The private key is known only to the sender
and confirms if the origin of the transaction is legitimate. The public key is
used to uniquely identify the sender and is shared by the sender with every
transaction that floats on the blockchain network. Let us take a look at the
transaction verification process.
At sender end
Suppose a sender wants to send a message; he will pass the message through
the hash function and generate a hash value of the message. After the hash
value is created, it is passed through the signature algorithm along with the
private key, and a digitally signed document is created. Illustrated in Figure
21.4:
d. Incentives of mining
With PoW, miners compete against each other to solve the mathematical
puzzle. That is, they aim to validate the block and transactions. Whenever
they validate any new transaction or block and record them on a public
ledger, they use their sources such as time, money, electricity, and so on. In
return for this effort, they get a reward or incentive.
An Incentive is basically a reward given to a Blockchain Miner for speeding
up the transactions and validating the decisions while processing the
complete transaction securely. When a group of miners create blocks
together for validating transactions and then share the incentives among all
the Miners with equality, then it is known as Incentive Pool.
In cryptocurrency networks, a reward is given in the form of Bitcoin digital
currency. As a reward, the miners get 12.5 BTC (bitcoins). The reward gets
halved after every 210,000 blocks, that is, approximately after every four
years. In 2012 the bitcoins given to miners was 25.00 BTC, which dropped
to 12.50 BTC in 2016, and which further dropped to 6.25 BTC in 2020. In
Bitcoin, incentives are of two types block rewards and transaction fees. The
block reward is a reward that miners get in exchange for the service of
creating a block on the blockchain. It is a special transaction within a block,
known as a coin-creation transaction. It is the block reward that is decreased
every four years. When the reward value reaches zero, the transaction fee
comes into play, and then it is the only incentive that is given to miners.
21.2. Crypto-currencies
Since man evolved, the currency has been a very important part of our lives.
In the caveman era barter system was used, which involved goods and
services being exchanged among each other. For example, a person having
ample oranges can exchange them with another person having a lot of
apples. However, the barter system fell out of use because it had some
glaring flaws. These flaws include requirements coincide; for instance, if a
person has five apples and his friend has five oranges. If he wants some of
the oranges, then he can exchange them with his friend until and unless his
friend has a requirement for the apples that he owns, or else he will not be
able to make an exchange. Another problem in the barter system is that there
is no common measure of value. It means the value of the commodity that
is to be exchanged cannot be expressed; that is, it is difficult to decide for
how many apples and how many oranges can be exchanged. The next issue
is not all goods can be divided or subdivided; for example, live animals
cannot be divided into smaller units. Another issue is that the goods cannot
be transported easily. Unlike today, where the modern currency is easily
adjusted in the wallet or mobile phone. It includes paper currency, coins,
credit cards, and digital wallets, for example, Apple Pay, Amazon Pay,
Paytm, PayPal, and so on.
Actually, after realizing that the barter system did not work very well, currency
went through a few iterations in 110 BC. An official currency was minted in 1250
AD then a gold-plated Florence was introduced, which was used across Europe
and from 1680 to 1980 paper currency gained a widespread popularity and was
misused across the world.
From 2018 there is more than 1,600 cryptocurrencies available. Some of the
popular ones are bitcoin, Litecoin, Ethereum and zed cash.
Bitcoins
Bitcoin is a digital currency that is decentralized and works on the
blockchain technology. It uses a peer-to-peer network to perform
transactions involving goods and services. The transactions are manual,
which means one has to personally perform these transactions. It takes about
10 minutes to perform a transaction, which is the amount of time it takes for
a block to be added to the blockchain. The limit of Bitcoins is 21 million and
is supposed to hit this number by the year 2140.
Ether
Ether is a currency that is accepted in the Ethereum network. Ethereum
network also uses blockchain technology to create an open-source platform
for building and deploying decentralized applications. Ethers have the option
to make transactions manual or automatic, or programmable, which means
that transactions can take place when a certain condition has been met. It is
very fast and takes about 20 seconds to perform any transactions. Ether is
expected to be around not more than 100 million units.
Cryptocurrencies are often traded on online exchanges and are used to purchase
goods and services from merchants that accept them as payment. However, the
regulatory landscape around cryptocurrencies is still evolving, and there are
concerns about issues such as security, volatility, and potential illicit use cases.
Actually, all nodes within the network create a consensus or mutual agreement.
Where they agree about which blocks or transactions are valid and which are
invalid. They reject the blocks/transactions that are tampered with.
Figure 21.9: P2P network in Blockchain technology
a. Proof of work
This consensus algorithm is used to select a miner for the next block
generation. The central idea behind the PoW algorithm is to solve a complex
mathematical puzzle and easily give out a solution. This mathematical
puzzle requires a lot of computational power; therefore, it is always
recommended that the node that solves the puzzle as soon as possible gets to
mine the next block. Bitcoin uses this PoW consensus algorithm.
b. Proof of Stake
In the PoS system, users within the blockchain network stake a certain
amount of cryptocurrency and become the validator of the transactions.
Once selected as a validator, they are required to validate the transaction
based on the amount of cryptocurrency they have staked. This process gives
opportunity to the participants to act in the best interest of the network as if
any malicious activity is detected, and then it would result in the loss of their
staked cryptocurrency.
d. Proof of Burn
In PoB, validators “burn” coins by sending them to an address from where
they are irretrievable. Burning coins means that validators have a long-term
commitment in exchange for their short-term loss. The more coins they burn,
the better their chances of being selected to mine the next block. However,
the algorithm is good but wastes resources needlessly. Moreover, it is also
questioned that the mining power simply goes to those who are willing to
burn more money.
e. Proof of Capacity
In the PoC, validators invest their hard drive space for the selection of being
selected as miners for the next block. The more hard-drive space validators
have, the better is their chances of getting selected for mining the next block
and earning the block reward.
f. Proof of Elapsed Time
PoET is one of the fairest consensus algorithms, which chooses the next
block as per their wait time. In this algorithm, nodes wait for a random
amount of time and then add proof of their wait in the block. The created
blocks are then broadcasted to the network for others’ consideration. The
winner node is selected as the validator, which has the least timer value in
the proof part. The block that is validated by the winning validator node then
gets appended to the Blockchain. The algorithm has additional checks that
stop nodes from always winning the election and stop nodes from always
generating the lowest timer value.
Smart contracts do not contain legal language, terms, or agreements. They only
have code that executes actions when specified conditions are met.
In 1998, Nick Szabo, an American computer scientist, defined smart contracts as
computerized transaction protocols that execute the terms of a contract.
Ethereum blockchain has the smart contract capabilities. However, the Bitcoin
blockchain can be used for building smart contracts only after its Taproot is
upgraded. Taproot allows to communicate to layers that have smart contracts
enabled on their blockchains.
21.7. Altcoins
Altcoins are alternative coins that represent all the cryptocurrencies or
tokens other than Bitcoin and sometimes Ethereum. Bitcoin and Ethereum
are excluded from altcoins because most cryptocurrencies are forked† from
one of the two. Altcoins are basically designed and released by developers
who have a different vision or use for their tokens or cryptocurrency. Like
Bitcoins, Altcoins too are referred to as mined cryptocurrencies, stablecoins,
security tokens, and utility tokens. They also share code and functions like a
giant computer that is capable of processing large amounts of data and
transactions at the same time.
Implementation of Bitcoins has several shortcomings; for example, the
consensus algorithm used to create blocks, known as Proof-of-Work, is
energy intensive and time-consuming. Therefore, Altcoins are used, which
have improved the limitations of Bitcoin by employing the Proof-of-Stake
(PoS) as their consensus algorithm. It minimizes the energy consumption
and the time required to create blocks and validate new transactions.
The first altcoin was Litecoin that was forked from the Bitcoin blockchain in 2011.
The consensus algorithm used in Litecoin is Scrypt, which is less energy-
intensive and quicker than Bitcoin’s SHA-256 PoW consensus mechanism.
Investing in altcoins can be a way for cryptocurrency enthusiasts to diversify
their portfolios and take advantage of emerging trends and technologies.
However, it is important to conduct thorough research and understand the
risks involved, as not all altcoins are created equally. Some altcoins may
have questionable development teams or lack a clear use case, whereas
others may be outright scams or Ponzi schemes†.
21.8. Anonymity
In this world of cryptocurrency, anonymity plays an important role in
helping users to protect their security and privacy. Transactions in
blockchain are always visible and traceable and can damage the security and
privacy of the system. Therefore, the idea of anonymity is used to enhance
the privacy and security of the blockchain.
Anonymity employs the use of anonymous addresses in order to keep the
identities of the users hidden on the blockchain. It states that no one is aware
of the user’s true identity but are undoubtedly aware of his online activity. It
means that the user can carry on with his movements while staying
anonymous. Actions and identity are kept separate by anonymity.
However, it can also be used for illegal activities such as money laundering,
terrorism financing, and drug trafficking. This has alarmed regulators and
law enforcement agencies, who argue that anonymity can hinder their ability
to investigate and prosecute criminal activity. Governments have
implemented regulations requiring cryptocurrency exchanges and other
service providers to collect user information and adhere to know-your-
customer (KYC) and anti-money laundering (AML) laws.
Conclusion
Blockchain is one of the most popular and exciting technologies. It is used as
an alternative to the modern banking system that overcomes its limitations. It
is an underlying concept that cryptocurrencies work. The chapter
contemplates the components of blockchain technology with
cryptocurrencies as an application.
The issues of double spending, high transaction costing, and hacking
in the current banking system are resolved by Blockchain technology.
Blockchain is a decentralized, secured technology where details of the
transactions are kept in a constantly growing distributed ledger that is
permanent and immutable.
It is a chain of blocks that are linked with each other using a hash
function. Block consists of block number, data, nonce, hash value, and
the hash value of the previous block. This hash value of the previous
block links the upcoming block with each other and forms a chain of
blocks.
Blockchain is the most secure technology as any tampering in any of
the blocks will make blockchain invalid.
Distributed ledger, encryption, mining, an incentive of mining, and
consensus algorithm make blockchain the most secure technology.
Apart from other applications, cryptocurrency is the most popular
application that uses blockchain technology for transacting amounts
from one account to another. The most common examples of
cryptocurrencies are Bitcoin and Ethereum.
Cryptocurrency is a digital or virtual currency that is meant to be a
medium of exchange.
It is a peer-to-peer (P2P) network that allows users to send and receive
payments without the need for intermediaries such as banks or
payment processors.
Transactions are validated by a network of users using complex
mathematical puzzles, ensuring that they are secure and tamper-proof.
They are faster and more efficient than traditional payment methods.
To validate the block and the associated transaction, it is required that
all the peers of the blockchain network reach a common agreement.
This common agreement is termed as the consensus algorithm.
It is a program used in blockchain through which all the peers of the
blockchain network achieve a common distributed agreement about
the state of the distributed ledger.
There are various types of consensus algorithms that are available
such as Proof-of-Work, Proof-of-Stake, Byzantine Fault Tolerance,
Proof-of-Burn, Proof-of-Capacity, and so on.
A smart contract is a self-executing program that automates the
actions required in an agreement or contract. Contracts are stored on a
blockchain network and are executed automatically when certain
conditions are met.
In order to store the cryptocurrencies, various types of blockchain
wallets are used. These wallets are classified on the basis of keys and
applications.
These wallets are like normal wallets and are user-friendly. Based on
private keys, wallets are categorized as hot wallets and Cold wallets.
In Hot wallets are the wallets that are available online on the internet,
and transactions are performed when the system is connected to the
internet. On the other hand, Cold wallets are those where the
processing of transactions is performed offline, that is, after removing
the system from the internet. Once the transaction is done, the system
is connected to the internet for the execution of the complete
transaction.
Based on applications, wallets are classified as software wallets,
hardware wallets, and paper wallets. A software wallet is an
application that is downloaded on a device. The device can be a
desktop or mobile, or any Web-based wallet which can be accessed
online. The hardware wallet is a type of cold storage device, typically
like a USB, which stores the user’s private key in a protected manner.
A paper wallet is an offline process for storing cryptocurrencies. This
wallet is a printed paper consisting of both a private key (also known
as a password) and a public key (also known as a public address),
which are accessed using a QR code.
Altcoins are alternative coins that represent all the cryptocurrencies or
tokens other than Bitcoin and sometimes Ethereum. These coins are
forked from Bitcoin and Ethereum with their limited qualities.
Anonymity is an idea used in Blockchain technology where
anonymous addresses are used to keep the identities of the users
hidden on the blockchain. It states that no one is aware of the user’s
true identity but is undoubtedly aware of his online activity. It means
that the user can carry on with his movements while staying
anonymous. Actions and identity are kept separate by anonymity.
21.9. Questionnaire
b. Business Technology
c. Blockchain Technology
d. Medical Technology
2. Which of the following is not a Blockchain component?
a. Ledger
b. Wallet
c. Hash
d. Certificate authority
3. What are the pillars of Blockchain technology?
a. Transparency
b. Immutability
c. Decentralization
a. Only i
b. Only i and ii
b. Software wallet
Answer key
1. (c) 2. (d) 3. (d) 4. (c) 5. (b)
Keywords (†)
Forked: In Blockchain, a fork is defined as diverging blockchain, and
it is components into two different potential paths forward, such that
some of its properties are inherited.
Ponzi scheme: It is an investment fraud that pays existing investors
with funds that are collected from new investors. Scheme organizers
often promise to invest the money at high returns with little or no risk.
Game theory is a mathematical tool that estates the behavior of logical decision-
makers. It can model many real-world scenarios and is widely used in various
applications such as science, political science, economics, computer science, and
so on. In Chapter 5, IoT as Interconnection of Threats and in Chapter 13,
Preventing Unauthorized Access to Sensor Data and Authentication in IoT of this
book, we have highlighted the idea of the Game-Theoretic approach. However, the
detailed description is missing. Therefore, in this chapter, the foundation of game-
theory will be discussed along with real-life examples and strategic scenarios.
Structure
In this chapter, we will cover the following topics:
The concept of the Game-Theoretic approach with the help of examples
Need of best response and Nash-equilibrium
Idea of mixed-strategy
Demonstration of various types of games such as repeated games, Bayesian
games, and coalitional games with the support of examples
Market game
A market is a structure where business or commercial activities are performed by
various firms and companies that make goods available to consumers.
Agents: Here, agents are firms or companies that compete with each other by
producing different goods such as soft drinks, soaps, and so on. For example,
nestle (dairy milk) and Cadbury (kit-kat).
Strategies: These agents compete by using strategy. Strategies can be as diverse as
setting prices or adjusting the quantity, such as increasing or decreasing the amount
of goods in a single packet.
Aim: Aim in this case is to maximize profit and market shares so as to build brand
loyalty.
Rules: In order to sell goods in the market, there are certain rules that are required
to be followed. These companies cannot collude (conspire) to artificially fix the
prices, or they cannot plot with the type of goods produced in the market. This law
is known as the Anti-collusion law.
Political game
Agents: They can be political parties or contestants of elections competing with
each other.
Strategies: Strategies can be companioning strategies, which means how they
attract voters toward themselves.
Aim: The aim of politicians is to maximize their vote share and achieve fame,
power, money, and so on by winning the game.
Rules: Elections include a certain set of rules, for instance, spending law.
Competing parties are allowed to spend a limited amount on their companioning
for a limited period of time.
Auction game
The game includes selling items that are very precious such as arts and antiques.
Other precious items such as spectrum or mining resources such as coal. These are
required to be auctioned to the highest bidder.
Agents: Here, competing agents are the bidders that compete with each other for
attaining rights on miming, spectrum, antiques, and so on.
Strategies: The strategy can be to understand the situation and bid accordingly so
as to win the auction.
Aim: The aim is to maximize utility by achieving rights on auctioned items at a
reasonable price.
Rules: The auction is conducted by the auctioneer, who enforces the rules.
Everyone in the auction is allowed to speak but at the time when the auctioneer
allows. Next, there is some minimum bidding value for each item. If the bid is
accepted, then it is mandatory for the buyer to purchase the object.
a) If both P1 and P2 deny, then each one will get one year of imprisonment.
As there is no evidence, a minor punishment is given.
b) If both confess the crime, that is, both betray each other, then each one will
get three years of imprisonment.
c) If P1 confesses and P2 denies, then P1 will be released (zero years of
imprisonment), and P2 will get four years of imprisonment. This is
because P2 is not cooperating as well as now P1 has betrayed and has
given evidence against P2.
d) If P2 confesses and P1 denies, then P2 will be released (zero years of
imprisonment), and P1 will get four years of imprisonment. This is
because P1 is not cooperating as well as now P2 has betrayed and has
given evidence against P1.
Here, Agents are P1 and P2, Strategies (or action) can be either to confess or deny, aim is
to get minimum imprisonment, and rule is that no communication between P1 and P2 is
allowed.
Games with two players, and a finite number of actions, are often represented by a
table known as Game Table, illustrated in Table 22.1. Here, rows are set for P1,
and columns are set for P2. Since both P1 and P2 can either confess or deny, the
rows represent the action of P1, and the columns represent the actions of P2. The
cells of the table represent the payoff of each of the players depending on their
outcomes. For instance, the cell corresponding to CC has –3, –3, which means both
P1 and P2 have confessed to the crime, and both are getting imprisonment of three
years. Similarly, the cell corresponding to DD has –1, –1, which means both P1
and P2 have been denied, and both are getting minor imprisonment of one year.
Cell CD has 0, –4, which means P1 has confessed, and P2 has denied; therefore,
P1 will be released, and P2 will get an imprisonment of four years. Similarly, Cell
DC has –4, 0, which means P1 has denied and P2 has confessed; therefore, P1 will
be punished, and P2 will be freed. From all these, it can be concluded that the
payoff of P1 not only depends on the action of P1 but also the action of opponent
P2.
In general terms, games where the payoff of one player not only depends on
his/her own actions but also the actions of opponents is known as strategic
interaction and game is known as strategic game.
(1)
Payoff: Payoffs are utility functions of different players and are represented by the
function . For instance, is the payoff of player 1 and is the
payoff of player 2.
In general terms, it captures the rewards that the players have for different
outcomes. It is represented by , where is the action of ith player and
is the action of the rest of the players. For instance, is the utility
function of player P1, where is the action of P1 and is the action of P2.
Similarly, is the utility function of player P2, where is the action of
P1 and is the action of P2.
In our Prisoner’s Dilemma example, the payoffs of the two players are given as
follows:
is the utility/payoff of player P1, when P1 and P2 both confesses
is the utility/payoff of player P1, when P1 confesses and P2
denies
is the utility/payoff of player P1, when P1 denies and P2
confesses
is the utility/payoff of player P1, when P1 and P2 both deny
is the utility/payoff of player P2, when P2 and P1 both confesses
is the utility/payoff of player P2, when P2 confesses and P1
denies
is the utility/payoff of player P2, when P2 denies and P1
confesses
is the utility/payoff of player P2, when P2 and P1 both deny
Best Response (BR) of firm 1 when firm 2 chooses to set low price is
Best Response (BR) of firm 2 when firm 1 chooses to set high price is
Best Response (BR) of firm 2 when firm 1 chooses to set low price is
Table 22.5: Nash-equilibrium of Market game
Now, when the market game table is referred to with all its best responses, it can be
seen that in cell (L,L), the best responses of both the firms are intersecting. Thus,
the outcome (L, L) is said to be the Nash Equilibrium of market game. From
this, it can be concluded that in order to get the best responses from the consumer,
firms should indeed set low prices, then only the market can be captured.
(2)
If P2 always chooses Tail, then “1” is the normal payoff of P2 when P1 opts
for Head, and “–1” is the normal payoff of P2 when P1 opts for Tail. So, the
net payoff of P2 for itself choosing Tail while P1 chooses Head will be “
”. Similarly, the net payoff of P2 for itself choosing tail while P1
also chooses Tail will be “ ”.
Thus, the average payoff of P2 when always choosing Tail can be computed as
follows:
(3)
(6)
(7)
It signifies that P2 is choosing both Head and Tail with probability 1/2. In other
words, P2 is randomly mixing Head and Tail with 50% probability. Thus, the
Nash-Equilibrium (NE) for player 2 in this mixed strategy game is (1/2,1/2).
Finally, the Mixed-Strategy Nash-Equilibrium of this game can be formulated as
follows:
(10)
Average payoff of Auditor for not auditing tax-payer
(11)
Average payoff of Tax-payer for being Honest
(12)
Average payoff of Tax-payer for being Cheater
(13)
From equations (6) and (7), we can deduce that auditor will randomly choose
whether to audit or not; if:
(14)
(15)
Sometimes, repeated games are preferred over pure strategic single game with the
intention that may be after certain period of repetitions, the performance of the game in
terms of Nash-equilibrium gets improved. We will discuss it with examples.
Formally, repeated games are defined as “the games that are played over a discrete
period of time either finitely or infinitely depending on their historical trust or
reputation.” It is assumed that players observe and remember the outcome of all
the previous stage/level games. It signifies that repeated games are games of
perfect recall. For every different observation of the outcome of stage games,
players could have different responses. All this is pictured or visualized as a tree
known as the Game Tree.
Mathematically, a repeated game is constructed out of the base game “B” that
defines a single play of the game or the game that players repeat at each stage. A
base game in strategic form is represented as , where
is the set of players, is the set of actions available to each
player i and is the payoff function of player . Every repetition in the game is
termed as an iteration or round.
Net payoff of Stage 2 is computed by adding outcomes of Stage 1 to the present outcomes
of Stage 2, resulting into net payoff outcome of Stage 2. For instance, in
subgame 1: (–3, –3) is added to all (–3, –3), (0, –4), (–4,0), and (–1, –1) resulting into (–
6, –6), (–3, –7), (–7, –3), and (–4, –4)
subgame 2: (0, –4) is added to all (–3, –3), (0, –4), (–4,0), and (–1, –1) resulting into (–3,
–7), (0, –8), (–4, –4), and (–1, –5)
subgame 3: (–4,0) is added to all (–3, –3), (0, –4), (–4,0), and (–1, –1) resulting into (–7,
–3), (–4, –4), (–8, –0), and (–5, –1)
subgame 4: (–1, –1) is added to all (–3, –3), (0, –4), (–4,0), and (–1, –1) resulting into (–
4, –4), (–1, –5), (–5, –1), and (–2, –2)
Finally, the actual game tree of the twice repeated prisoner’s dilemma game with
net payoff is represented in Figure 22.3.
Basically, the intention of repeating prisoner’s dilemma game was that, it was hopeful
that may be at some stage the payoff of (–1, –1) could be received. So that imprisonment
of players could be reduced to one year. However, the result is very sad as better
punishment could be given but was not given.
Let us assume that this game is repeated twice. The game tree of this game is
illustrated in Figure 22.5. The construction of the game tree is already discussed in
Example 5.
Figure 22.5: Game tree of the described game
This game has two NE, which means in every stage there will be two possible
outcomes, either (U, C) or (D, R). If the outcome in different stages is (U, C), then
it is considered to be good, but the outcome (D, R) is not regarded as an efficient
choice, though it is the NE of the game. It is because there is no other outcome
whose payoff is better than (U, C), that is, (1,4) for both players. On the other
hand, though (D, R) is the NE but there is another outcome (U, L) whose payoff is
better than (D, R). The payoff of (U, L) is (4, 3), which is better than the payoff of
(D, R), that is, (2,1) for both players.
Since it is not a one-stage game, so enforcement of having only NE as the outcome
can be revoked by modifying the interactions between the players. In the given
game, (U, L) can be attained as the outcome when P1 and P2 interact in the
following manner. P1 asks P2, let us cooperate on (U, L); that is, in Stage 1, he will
go for “U”, and P2 should go for “L”, as it will benefit P1 by the payoff of 4 (refer
table). If P2 does that, then in the next period, they will coordinate on (U, C),
which is a Nash equilibrium and is self in forcible. Considering P2 is having an
option or incentive to deviate to “C”, where he will have the higher payoff of 4.
However, if P2 does not help P1 in the first period, then in Stage 2, P1 can punish
P2 by playing “D”, and then, P2 will be forced to play “R”, and at the end, P2 will
be at the worst position in the second stage. Since the payoff of the attained
outcome (D, R) for P2 will be “1”, which is less for P2 in both situations of (U, L)
with the payoff of “3” as well as (U, C) with the payoff of “4”.
Finally, it is concluded that finitely repeated games with multiple NE can obtain
different outcomes in different stages and can improve the efficiency of the games
as and when required.
(16)
Here, 1 is the earned payoff in 0th period, δ is the discount/interest earned in 1st
period, is the discount earned in 2nd period, is the discount earned in the 3rd
period, and so on. S is the net payoff.
Multiplying δ on both sides of equation (16), we get the following:
(17)
(18)
(20)
(21)
(22)
Table 22.14: Game table of BoS when the girl is interested in going with the boy
If the Girl is not interested (U) is going with the boy it means girl prefers to
watch things alone while the boy prefers to watch together. In this case, the payoffs
are modeled as follows and are illustrated in game Table 22.15:
If both boy and girl want to watch cricket, then the payoff of the boy will be
10, but since the girl is not interested in going with boy so her payoff will be
0.
If both boy and girl want to watch movie, then payoff of boy will be 5
(because boy has no problem with girl but prefers cricket over movie so
payoff 5), but since girls is not interested in going with boy so her payoff is
0.
If a boy wishes to watch cricket and a girl wishes for a movie. As they both
wish differently, the payoff of boy will be 0, but as the girl is not interested
in the boy so she can go alone and watch the movie. Thus, the payoff of a
girl, in this case, is 10 as she also prefers to watch movies.
If a boy wishes to watch a movie and a girl wishes for cricket. As they both
wish differently so payoff of the boy will be 0, but as the girl is not
interested in the boy, so she can go alone and watch cricket. Thus, the payoff
of the girl in this case is 5 as she prefers to watch movies over cricket so the
payoff is a bit less.
Table 22.15: Game table of BoS when the girl is not interested in going with the
boy
Game has only one type of boy and two different types of girls. Let us assume the
probability of a girl being interested is 1/2 and for being uninterested is also 1/2. It
means there are 50% chance that a girl will go with a boy and 50% chance that she
will not go. Finally, Bayesian battle of sexes game is represented in Figure 22.7:
Figure 22.7: Game table of Bayesian BoS game
The probabilities of type I and type II girl is given as: P(I) = ½ and P(U) = ½
Utility payoff of boy choosing “C” with respect to a girl with strategy (C, C) is stated as
Ub (C, (C, C)), where
a “boy” wishes to watch “C”, that is, cricket, a “Girl” of Type I (I) also wishes to watch
“C” and a “Girl” of Type II (U) too wishes to watch “C”
(C, C) within the utility payoff of boy is described as the strategy of girl, where first “C”
is of Type I girl and other “C” is of Type II girl.
Strategy combination of girl is (C, C), (C, H), (H, C) and (H, H).
The utility payoff of the boy for each action with respect to each strategy of the girl
is calculated by considering game tables in Figure 22.7 as follows:
Similarly, we can also calculate the utility payoff of the boy with other strategy
choices for the girl such as (H, C) and (H, H).
Computation of utility of boy with girl strategy choice (H, C) and (H, H) is left for the
readers to evaluate.
Finally, the average payoff table for boys is illustrated in Table 22.16:
Bayesian games can also be extended for mixed-strategy Bayesian games. Concept is
same as discussed above. Readers can refer following research paper for their knowledge
[3], [4].
In this chapter we will discuss only coalitional Games with Transferable Utility (TU).
The grand coalition has the highest payoff among all coalitional structures.
Every additive game is necessarily constant sum, but not vice versa. This can be stated by
equation v(S) + v(N\S) = v(S ∪ (N\S)) = v(N).
From the definition of super additivity it is clear that every super-additive game is a
convex game.
e. Simple Games: Coalitional games with restrictions on the values that payoffs
are said to simple games. Statistically, A game is said to be simple
game, if, . Voting Game is the best example of
simple games as it says
G is a proper simple game if it is both simple and constant-sum. It implies if S is a
winning coalition, then N-S is a losing coalition.
Imputation set (C): It is a set that consists of payoffs in P in which each agent
gets at least what he/she would get by going alone (that is, by forming a singleton
coalition). Statistically, for a game , the imputation set (C) is defined as a
set C= {
As per dummy player axiom, the fairness would be achieved; if dummy players
receive a payment equal to exactly the amount that they achieve on their own.
Statistically, if “i” is a dummy player and is the payoff profile,
then
Axiom 3: Additivity
Let there be two different coalitional game theory problems, defined by two
different characteristic functions and , but involves the same set of agents. If
the game is remodeled into a single game, then for the combined game each
coalition S achieves a payoff of
As per additivity axiom, there will be a fair distribution of payoffs for G if the
agents get the sum of what they would get in the two separate games.
A Coalitional game that satisfies these three axioms consists of exactly one or a
unique pre-imputation set, which implies that the payoff division within the set is
feasible and efficient. To evaluate the unique pre-imputation set, the idea of the
Shapley Value is used.
Given a coalitional game , the Shapley value of player “i” is given by
equation (23):
(23)
(24)
Here |N| = 4
(25)
Finally, the payoff division is (50, 16.66, 16.66, and 16.66), which adds up to the
entire $100 million.
The core
The Shapley value discussed till now provides a fair way of dividing the grand
coalition’s payment among its members. However, the analysis of stability is
ignored in this case. For instance, the question can arise whether the players in the
game are willing to form a grand coalition as computed by Shapley value and
divide payments, or would some of them prefer to form smaller coalitions?
Actually, smaller coalitions are found to be more attractive for subsets of the
players, even if they lead to lower value overall. Consider the majority voting
example, where A does not have a unilateral motivation to vote for a different split
while A and B have the incentive to defect and divide the $100 million between
themselves, for example, dividing it (75, 25). So instead of including all players,
only two players can combine and divide the amount.
This leads to the question of what payment divisions would make the agents want
to form the grand coalition. The answer is that they would want to do so if and
only if the payment profile is drawn from a set called the core, defined as follows:
“A payoff vector X is in the core of a coalitional game (N, v) if and only if
”
It means the sum of payoffs to any group of agents S ⊆ N must be at least as large
as the amount that these agents could share among themselves if they formed a
coalition on their own.
Since the core provides a concept of stability for coalitional games, therefore, it is
an analog of the Nash equilibrium from non-cooperative games. However, it forms
a stronger notion because Nash equilibrium describes stability only with respect to
deviation by a single agent, while core states stability with respect to deviation by
all players within the game. Thus, the core in coalitional games is known as strong
Nash equilibrium, which requires stability with respect to deviations by arbitrary
coalitions of agents/players.
Conclusion
Game theory is a mathematical tool used in research work for analyzing the
behavior of competing players. It is a logical decision-maker that produces optimal
decisions for independent and competing actors in a strategic setting. The chapter
illustrates the foundation of game theory with the help of varying real-life
scenarios.
The concept of game theory came into existence in 1940 by John von
Neumann and Oskar Morgenstern, which was further extended by John
Nash.
Game Theory includes the Game with its multiple competing players. Every
Game has its own set of rules, and players formulate their strategies
according to them. The objective of each player is to achieve maximum
payoff. Actions performed by players set their utility payoff.
Aim of each player is to achieve the Best Response from other players so
that maximum profit (or payoff) can be acquired.
The outcome of any Game is decided by the Nash-Equilibrium of the game.
NE is the point of stability, from where the players are not allowed to
deviate.
Strategy is a plan of action that players take while being part of the game.
In pure strategy games, the action of players is either yes or no. That is, the
probability of performing the action is either 1 or 0.
In Mixed strategy, players select their actions according to their probability
distribution over the available action set.
There are various types of games in real-time scenarios, such as repeated
games, Bayesian games, coalitional games, and so on.
In repeated games, the interaction between players is repeated more than
once. They are of two types: finitely repeated games and infinitely repeated
games.
In finitely repeated games, players interact with a finite number of times,
whereas in infinitely repeated games players interact infinite time.
Bayesian games are games where players take part with certain probability
and are uncertain of their competing payoff. For example, in a game of
Auction, competing players do not know the bidding number of other
players. They are always “UNCERTAIN” regarding their competing payoffs.
Coalitional games are games where players take part in groups. Here players
instead of competing with each other, collaborate among themselves and
form a group. Each member of the group then shares the payoff according to
their contribution.
Coalitional games are of two types: games with transferable utility (TU)
and games with non-transferable utility (NTU). In TU, players can share
the commodity among themselves, for example, money, while in NTU,
players cannot share their commodity among themselves, for example, a car
bought in sharing.
22.7. Questionnaire
b. Marketing
c. Game
d. None of these
2. One of the assumptions in Game Theory is
a. All players act rationally and intelligently
b. Penalty
c. Reward
d. Loss
4. Which of the following is an example of a game theory strategy?
a. You scratch my back, and I will scratch yours.
b. Mixed strategy
c. Pure strategy
d. Dominance strategy
Answer key
1. (c) 2. (a) 3. (a) 4. (a) 5. (c)
Long answer questions
1. Consider the Market Game consisting of two different retail chains, R1 and
R2. These two retail chains have the option either to set price high or low. If
both retailers set a high price, then both will get the high profit of Rs. 500, if
both of them set a low price, then both of them will get a low profit of Rs.
250 each. However, if one set high and other low, then retailer setting high
price will get market share amounting to Rs. 0, and retailer with low price
will get the maximum market share profit of Rs. 750. Illustrate the game
table of this game and formulate the utility payoff of the two retail chains
R1 and R2 for every possible outcome.
2. Consider a “Cold War” game consisting of two countries, C1 and C2. Each
country has some sort of financial deposit, which they are required to spend
properly. However, these countries have two sets of actions either they can
invest their amount on military defense (D), or they can spend their amount
for improving the health of citizens (H). If both C1 and C2 spend their
amount on the health of the citizens then the outcome is 100, 100; if both
invest their amount on military then outcome received is 10, 10. However, if
one of them focuses on health and the other on defense, then a country
focusing on defense has a strategic advantage over the other country and
receives payoff of 150, while a country that focuses on health gets a payoff
of minus 100. Formulate the game table, best response dynamics, and NE
for the given cold war scenario.
3. Let us consider an “investment game” that includes investor (I) and the
stock market (SM) as the two players. Investors can invest in stock 1 (S1) or
stock 2 (S2) depending upon the past returns of the stock, R1 as last one
year’s return and R2 as last two years’ return. It is observed that Stock 1(S1)
has returned 5% rate to the investor corresponding to R1 and 6% rate
corresponding to R2. On the other hand, Stock 2 (S2) has returned 10% rate
to the investor corresponding to R1 and 3% rate corresponding to R2. As far
as the stock market is concerned, the payoff of market in each case will be
the minus of the payoff of the investor (for example, payoff of SM in case of
(S1, R1) will be –5, and so on). Formulate the game table of the “investment
game” and try to find out whether it is pure strategy game or not. If not, then
find the mixed strategy Nash equilibrium of this game.
4. There are three kids, A, B, and C, “A” has 6$, “B” has 4$ and “C” has 3$.
There are also three ice-cream tubs of different weights. A 500 g tub is of
7$, 750 g is of 9$ and 1000 g is of 11$. Kids do not care about money;
however, each one of them wants to have maximum ice-cream. Since none
of the kid is having sufficient money to buy any of the tub, so Which
coalition will be formed? And how should that coalition divide its payoff
(here ice-cream) among its members?
5. Given game involves the scenario of confrontation, where players either
fight (F) or surrender (Su). It includes two players P1 and P2. P1 is of one
type, while P2 is of two types. He can be strong (S) or weak (W). If he is
strong, he will fight else will surrender. The probability of P2 being strong
(S) is ¼, and probability of being weak (W) is ¾. In addition,
If both P1 and P2 surrender (Su), then payoff of both players is 0
If both P1 and P2 fight (F), then payoff of player who is strong is 1, and
payoff of player who is weak is -1.
If one player surrenders (Su) and other fights (F), then payoff of player who
fight is 1, and that who surrenders is 0.
Build the game table of each player of each type
References
Structure
In this chapter, we will cover the following topics:
The existing security products with commercialized and
uncommercialized characteristics
Test-bed frameworks on security and privacy of IoTs
Secure IoT databases
23.1. Existing IoT security products
The Internet of Things is an advanced method of communication that is
incompatible with established methods of cybersecurity and is vulnerable to
threats that can easily corrupt software by overriding the executing
commands or can steal data. Therefore, it is an immediate requirement to
have secured IoT systems that are able to safeguard the devices from
unwanted access and intruders.
Security in IoT provides users with secured data and regularly updates the
threat awareness and protection of devices. A strong security structure
models the communication within the devices and connects the users that
can manage and draw data with minimal risk.
It is being perceived that the technologies of IoT security are expanding and
evolving to meet the demands of cybersecurity and IoT as a whole.
Products in this category incorporate core qualities of security software and
are escalated to integrate with IoT management tools. So as to provide
industries and companies; with an absolute and reliable use of the network.
To ensure optimum security while deploying IoT devices within the
organization, the best practice is to discuss and consult about the product
with cybersecurity consulting providers. It is always good to consider a
qualified IoT development team so as to complete the build and deployment
process. For qualifying the inclusion of a security product in the IoT
security category, a product must have the following features:
It must be compatible with the latest IoT devices and technologies
It must bolster security measures so as to inherent it in inter-device
communication and user access cases
Product must have extensive authentication service to verify device
ownership and administrative license
Product should always alert device owners whenever device
communication is interrupted, or other situations arise
Product must always be assisted with software updates whenever they
become available
Employment of the discussed features in security products, though,
increases its credibility; however, the impact of user satisfaction in any IoT
security product is regarded as the most important attribute. The top four
factors that positively impact user satisfaction with IoT Security products
are “Quality of Support”, “Ease of Admin”, “Ease of Setup”, and “A
virtuous partnership in business”. Some of the foremost existing
commercialized IoT security products are:
e. IoT security
To introduce trust in the diversified IoT infrastructure, ZingBox originated
the IoT personality-based approach to secure and manage IoT devices
throughout their entire lifecycle, from discovery to retirement. Each IoT
device has a controlled set of functions, flow, and vulnerabilities no matter
where it is installed, also known as IoT personality. This approach perceives
the behavior of each device and detects unusual activities to administer trust
among the connected devices. Conventional security solutions emphasize
on data protection; ZingBox extends itself to provide service protection for
business continuity.
f. Cybeats
Cybeats delivers an integrated security platform designed to secure and
protect high-valued connected devices. Its unique approach eliminates
device downtime due to cyber-attacks and allows device manufacturers to
develop and maintain secure and protected devices in a timely and cost-
efficient manner.
g. KeyScaler
KeyScaler provides device authority through Identity and Access
Management (IAM) for the Internet of Things (IoT). It is a platform that
assures trust in IoT devices and the IoT ecosystem and addresses the
challenges of securing the Internet of Things. KeyScaler uses breakthrough
technology, including Dynamic Device Key Generation (DDKG) and PKI
Signature, which delivers unrivalled simplicity and trust to IoT devices.
h. Memfault
This product ensures security by monitoring the IoT system. It proactively
monitors the smart devices, their releases, their data, and their fleet-level
metrics, like the health of the battery, its connectivity, and its real-time
dashboards.
i. Quantum edge
It is a CloudGuard Edge that protects the premises of stores and offices with
top-rated threat prevention schemes. It can be deployed in minutes and can
be managed by a unified threat prevention and access platform.
j. Spartan
Spartan is a family of digital authentication products that is used for
authenticating IoT endpoints, enabling anti-counterfeiting and anti-cloning.
This product uses Intrinsic ID’s patented SRAM (Static RAM) PUF
technology† that gives microcontrollers and semiconductors a unique
identity, which serve as the foundation of a security subsystem. In addition,
with identification, it also enables a software approach to provide hardware-
based security that can be implemented virtually on any CPU.
These are only a few IoT security products. Apart from these, many other
products are available in the market. Readers can refer following websites to
explore other IoT security products [9]–[11].
b. Supersensor testbed
This testbed is deployed at the University of Glasgow. It depends on a
distributed data collection system with flexible and scalable micro-
component design architecture. Its architecture is composed of a Raspberry
Pi and a set of sensor nodes, which are connected to a central server. The
sensor nodes are used for real-time data collection and network connectivity
establishment. On the server side, a publish/subscribe model with a queuing
system is executed for effective real-time data processing and storage in a
database. The server also provides a user interface that allows users to
access node and sensor data using REST APIs.
In addition, the Protocol Buffers language (proto3) is used for serializing
and parsing data. Moreover, a heartbeat mechanism is also implemented in
the server to support remote health and availability monitoring of the data
and devices [2].
c. MakeSense testbed
MakeSense testbed is introduced for real-life and large-scale IoT
experimentation for social research. It is used to test situation-aware
applications and real-time monitoring indoor activity applications. The
testbed design inculcates the client-server model, where a set of sensor
nodes is deployed as clients and connected to a server using the
Lightweight Machine-to-Machine protocol through Broadband Internet.
Next, the server is hosted in the cloud for IoT data analysis and
visualization. It provides API access to sensor nodes for remote
management and configuration of available resources. The MakeSense
testbed tests the security implementations of the Datagram Transport
Layer Security (DTLS), data encryption using Advanced Encryption
Standard (AES), and pre-shared key authentication [3].
f. ASSET testbed
ASSET is a testbed abbreviated as an Adaptive Security for Smart Internet
of Things in eHealth. It is a testbed that develops risk-based adaptive
security methods and mechanisms for IoT in eHealth. It accurately
evaluates the adaptive security solutions in a realistic simulation and use
cases. It also includes an estimation strategy of the energy consumption
using the Holt-Winters prediction† method and is useful while studying the
feasibility of adaptive lightweight security solutions [6].
g. Stanfords testbed
This testbed is a cross-disciplinary research effort of Stanford University,
the University of California, and the University of Michigan. It focuses on
the following three key areas: analytics, security, and hardware and
software systems. Analytics states how to integrate the enormous streams of
physical world instrumentation with the existing data? Security signifies
how can pervasive sensing and analytics systems preserve and protect user
security? And Hardware and software systems express what hardware and
software will make developing new intelligent and secure IoT applications
as easy as a modern Web application? [7].
These are some of the IoT testbeds. Apart from these, research work on several
other testbeds is going on. Readers can refer following research papers and can
explore other available and upcoming IoT testbeds [12], [13].
Conclusion
Security professionals are always used to continually defend IoT systems
against different types of threats and attacks. Several security products and
test beds are used by them to secure IoT devices and data. Considering this,
the chapter presents various IoT security products and testbeds along with
the measurements of the security of IoT databases. The comprehensive
details of the chapter are illustrated as follows:
Security products are the tools that protect IoT from threats and
breaches, identify and monitor risks, and help to fix vulnerabilities.
Before the installation of any IoT security product, it should have the
features of inheritance, alertness, compatibility, authenticity, and
updated availability.
The opted security product should be user satisfied and should
support “Quality of Support”, “Ease of Admin”, “Ease of Setup”, and
“A virtuous partnership in business”.
Examples of existing commercialized IoT security products are AWS
defender, Microsoft defender, entrust product, cybeats security
product, and so on.
Testbeds are the means of testing the security of IoT devices and
systems. These are the platforms that conduct rigorous, transparent,
and replicable testing of IoT systems, their computing tools, and their
integrating technologies.
Some of the deployed IoT testbeds are smart campus testbed,
supersensor testbed, makeSense testbed, and so on.
Along with the devices, the protection of IoT databases is also
mandatory, as the data generated by IoT devices is huge and
unstructured.
IoT databases can be protected by database administrators, who
should have the property of implementing robust data protection
measures, data verification, validation, cleansing, and monitoring
processes, data defense mechanisms, data platforms, architectures,
protocols, formats, and the ability of continuous learning and
training.
23.4. Questionnaire
b. Platforms
Answer key
1. (d) 2. (b) 3. (c) 4. (a)
References
Keywords (†)
PUF technology: PUF stands for Physically unclonable functions
(PUFs). It is a technique in hardware security that takes advantage of
variations of inherent devices to produce an unclonable and unique
device response for a given input.
TelosB mote: The TELOSB mote is simulated as an IoT node and
constitutes a sensor processor and radio device.
Holt-Winters prediction: The Holt-Winters is a time-series
forecasting method that uses exponential smoothing to make
predictions based on past observations.
B
background knowledge attack 296, 297
bargaining-based dynamic game model 435
bargaining-based dynamic game model for cooperative authentication
about 435
analysis 445
bargaining-based price 438, 439
bargaining procedure 439, 440
dynamic game 440
performance 442
pre-requisite 436
price factors affect 436-438
Bayesian games
about 652
analysis 654-656
battle of sexes game example 652, 653
Bayesian Nash-equilibrium (BNE) 654
behavior domain 587
Best Response (BR) 631-633
big data 517
big data analytics 43
biometrics 494
Bitcoin 601, 612
Bitcoin P2P network 613
Blockchain 601
Blockchain architecture
about 602
block components 603
formation 604
Blockchain technology
about 600
banking system issues 600-602
banking system solutions 600-602
features 604
use case 609, 610
blockchain wallet 616
blockchain wallet, types
about 617
application classification 618
private key classification 617
block cipher
about 217, 218
modes of operation 227
schemes 221
block component
data 603
hash 603
previous hash 603
block reward 609
Bluelog tool 142
BlueMaho tool 142
Bluetooth-LE (BLE)
about 8, 282
bonding options 282
security concept 282
security services, providing 283
bootstrapping
threat mitigation 490
with PKI 489
boundary defense 121
Building Automation System (BAS) 314, 315
Building Energy Management and Grid Interaction System (BEMGS) 314, 315
Building Management Information Technology (IT) System (BMITS) 314, 315
Business-to-Business (B2B) 560
Business-to-Customer (B2C) 560
Business-to-Infrastructure (B2I) 560
Byzantine Fault Tolerance (BFT) 614
C
Caesar Cipher
about 199-202
limitations 200
mathematical representation 199
capability token 421
Central Authority (CA) 157, 159
Central Business District (CBD) 335
Central digitalSTROM Server
about 174
hardening 176, 177
centralized architecture 386, 387
Centre of Communication Systems Research’s (CCSR) 674
Certificate Authority (CA) 24, 494
Certificate-Based Key Establishment (CBKE) 282
Certificate Revocation Lists (CRL) 497
Certification and Accreditation (C&A) 103
Chlorofluorocarbons (CFCs) 517
Cipher Block Chaining Mode (CBC) 228, 229
Cipher Feedback Mode (CFB) 217, 229-231
Cipher suite 259, 260
cipher text 193
Ciphertext Policy-Attribute Based Encryption (CP-ABE) 423
Cisco Application Framework (CAF) 566
Cisco fog computing 566
classical IoT-architectural framework
about 410
application component 410
core component 410
device component 410
classification, Trust Management System (TMS)
about 383
conceptual architecture 388
layered architecture 383
propagational architecture 385
client-server-based data aggregation mechanism 505
centralized-server-based data aggregation mechanism 506
cluster-based data aggregation mechanism 505
tree-based data aggregation mechanism 506
cloud computing
about 43, 44
interoperability 44
reliability 44
synchronization 43
cloud-enabled directions
about 576
Cognitive IoT 576
On Demand Computing (ODC) 576
cloud-enabled IOT computing
about 573
container for secure deployment of IoT environment 574, 575
container for secure development of IoT environment 574, 575
data service 574
microservices 575
software defined networking 574
cloud IoT security controls
about 567
authentication 567
authorization 567
data integrity, maintaining 570
end-to-end security recommendation 569
secure bootstrap and enrollment of IoT devices 570
security monitoring 570
software/firmware update 569
cloud security
IoT threats 560, 561
cloud service provider (CSP)
about 562
AWS IoT 562
Cisco fog computing 566
exploring 562
IBM Watson IoT platform 566, 567
Microsoft Azure IoT suite 565
CloudWatch
about 563
features 563
Cluster node (CN) 386
coalitional game theory
about 656
analyzing 660
classes 659, 660
classes of games, relationship between 660
core 663
outcome 658
payoffs division method 661
shapley value 661, 662
voting game example 658
with transferable utility 657
CoAP security modes
Certificate 284
PreSharedKey 284
RawPublicKey 284
cognitive security 550-552
cold wallet 617
communication module 413
complex system
about 467
characteristics 468
Internet of Things (IoT) 468, 469
security challenges 470
complex systems, with security characteristics
about 471
computer network 473
economic network 473
social network 471
wireless network 471
compliance 102
Composite Virtual Objects (CVO) 589
computational model 466
computational security
about 466
future scope 477, 478
need for 466, 467
computational tools for complex systems
about 474
network controllability and observability 476
network science tools 475
network tomography 476, 477
signal processing tools 474, 475
computer network 473
Concept of Operations (CONOPS) 131
conceptual architecture
about 388
Direct trust model 388
Indirect trust model 389
Confidentiality, Integrity, and Availability (CIA) 28
Consistency Check (CC) 35
Constrained Application Protocol (CoAP) 30
container technology
example 575
content-oriented privacy threats
about 293
data aggregation threat 293
data querying threat 294
context information 587
context manager
architecture 416, 417
context-oriented privacy threats
identity privacy threat 294
location-based privacy threat 294
privacy policy and access control threat 294
context situations 587
contextual-oriented privacy threats 294
Continuous-Time Markov Chain (CTMC) 166
control-delegation services 176
controllability 476
conventional encryption 198
Convergent Information Architecture (CIA) model 393
Cooperation (CP) strategy 446
cooperative authentication
implementing 433, 434
Cooperative Communication (CC) 429, 431
cooperative game theory 656
cooperative incentive 432
core component
about 411
communication module 413
IoT Process Management module 411
IoT service module 412
management module 413
service organization module 411
virtual entity module 411, 412
Core Network (CN) 36
Counter Mode 232
Crackle tool 142
credential issuance process 418, 419
credential presentation process 419, 420
cryptanalysis 193
Cryptocurrency
about 610-612
Bitcoin 612
Ether 612
cryptographic controls for IoT protocols
examining 280
cryptographic controls into IoT communication protocols
building 281
Near Field Communication 283
ZigBee 281
cryptographic controls into IoT messaging protocols 283, 284
cryptographic key management
about 268
Diffe-Hellman Key-Exchange algorithm 273
key management fundamentals 268-272
Public Key Infrastructure (PKI) 278
Cryptography
about 192
features 192
Cryptography primitives 193, 194
Cryptography security role 192
Cumulative Distribution Function (CDF) 158
Cybeats 672
cyber-physical system (CPS)
about 14
versus cybersecurity 14, 15
versus IoT security 14, 15
cybersecurity
about 14
versus cyber-physical systems (CPS) 14, 15
versus IoT security 14, 15
D
data 603
data aggregation gateways 510
data aggregation mechanisms on IoT system
about 504
client-server-based data aggregation mechanism 505
mobile-agent-based data aggregation mechanism 506
time-series-based data aggregation mechanism 506, 507
data aggregation threat 293
data analysis 520
Data Centric Trust Establishment (DCTE) 392
Data Distribution Standard (DDS) 284
data encryption nodes 510
Data Encryption Standard (DES) 222
Datagram Transport Layer Security (DTLS) 31, 675
Data Owner privacy 294
data querying threat 294
DCapBAC strategy 421-423
decryption 197
Denial of Service (DoS) 61
desktop wallet 618
Destination Oriented Directed Acyclic Graph (DODAG) 34
device layer 383, 384
Device-to-Device (D2D) communication 517
Device Under Test (IoT-DUT) 676
Diffe-Hellman Key-Exchange algorithm 273-275
Digital Signature Algorithm (DSA)
about 265, 266
advantages 268
mathematical formulation 267
digital signatures scheme
about 262
Digital Signature Standard (DSS) 265
Elgamal digital signatures scheme 262, 263
Schorr digital signatures scheme 264
Digital Signature Standard (DSS) 265
digitalSTROM chip (dSC) 173
digitalSTROM (dSS) 171, 173, 174
digitalSTROM meter (dSM) 173
direct digital signature 261, 262
Direct Sequence Spread Spectrum (DSSS) 35
Direct trust model 388
Discrepancy Reports (DRs) 135
distributed architecture 385, 386
Distributed Capability-based Access Control (DCapBAC) 421
distributed consensus
about 614
algorithm types 614
distributed graph coloring scheme 308
DODAG Destination Advertisement Object (DAO) 34
DODAG Information Object (DIO) 34
DODAG Information Solicitation (DIS) 34
domain-specific IoT, security concerns
about 36
agriculture 39, 40
Enterprise Information Systems (EIS) 38
home automation 39
IoT-based healthcare 42
SCADA systems 36, 37
smart cities 40, 41
social IoT 41, 42
dynamic data masking 298
Dynamic Device Key Generation (DDKG) 672
dynamic game
about 440
players 440
strategy 440, 441
utility function 441, 442
DynamoDB
about 564
features 564
E
economic network 473
edge computing 45, 46
edge layer 45
edge nodes 45
Efficient XML Interchange (EXI) 10
EIS security pillars
access control 38
security awareness 38
security policy 38
Top Level Management Support (TLMS) 38
ElasticSearch (ES) 562
Electronic Code Book (ECB) 217, 228
Electronic Product Codes (EPC) 5, 6
Electronic Serial Numbers (ESNs) 488
Electronic Toll Collection (ETC) 8
Elevation of Privilege 61
Elgamal digital signatures scheme 262, 263
Elliptic Curve Cryptography (ECC)
about 275
background explanation 276
decryption algorithm 278
encryption algorithm 277, 278
key-exchange algorithm 276, 277
Elliptic Curve Diffie-Hellman (ECDH) 494
Elliptic Curve Digital Signature Algorithm (ECDSA) 494
Encapsulating Security Payload (ESP) 33
encryption 605
encryption algorithm
about 197
symmetric key encryption algorithm 198
transposition technique 213
encryption and authentication mechanism 340
Encryption-Decryption algorithm 235
End User License Agreements (EULAs) 583
Enterprise Resource Planning (ERP) 38
entity domain 587
Entrust IoT security 672
Ether 612
Event-Condition-Action rules 589
Event-Data-Recorder (EDR) 334
event prediction 520
Expected Transmissions (ETX) 34
Extensible Messaging and Presence Protocol (XMPP) 32, 33
F
Face-to-face (F2F) enabler 416
Fault Tree Analysis (FTA) 74
features, Blockchain technology
encryption 605-607
mining 607, 608
mining incentives 609
Proof-of-Work (PoW) 607
public distributed ledger 604, 605
Feistel cipher 218
Feistel decryption algorithm 220
Feistel encryption algorithm 219, 220
Field Programmable Gate Array (FPGAs) 9
final permutation 223
finitely repeated game
multiple equilibrium 647-649
Prisoner’s Dilemma Game example 644, 645
finitely repeated games 643
fog computing 46, 566
fog layer 566
Front-Computing-Unit (FCU) 334
futuristic data dissemination (FDD) approach 305, 306
G
Galois Counter Mode (GCM) 260
Game-Theoretic Analysis
using, in network robustness 180-182
Game-Theoretic approach
about 626
auction game 628
market game 627
political game 627
Prisoner’s Dilemma Game 628, 629
terms 626
wireless communication game 628
Geographic Information System (GIS) 73
GIoT components
about 519
Green architecture 520
Green communication 520
Green hardware 519, 520
Green software 520
GIoT open issues
about 524
GIoT technical challenges 525
security and privacy 525
standardization 525
Global Passive Adversary (GPA) 336
green cloud computing architecture 521
green fog computing architecture 521
Green IoT (GIoT)
about 517, 518
application layer 519
communication layer 519
contribution 524
issues 526
power management layer 519
real-time application 526
real-time query process 527
things layer 519
Green IoT technologies
about 521
Green cloud computing 522
Green coding 522, 523
Green data centers 523
Green M2M 523
Green sensing networks 522
Green tags 521, 522
Grim Trigger strategy 649
ground control station (GCS) 72
group identity (GID) 342
group manager 423, 424
group signature 339
H
hacking 601
hardware-based authentication 120
hardware vulnerability 62
hardware wallet 618
hash 603
Hash function
about 242
applications 243-245
Message Digest-version5 (MD5) 245
properties 242, 243
hash tree 249
heterogeneous IoT systems 13
Hill cipher 205-209
homogeneity attack 296
Homogeneity attack 297
Horizontal operators 406
hot wallet 617
human-machine interface (HMI) 37
Hypertext Transfer Protocol Secure (HTTPS) 287
I
IAM for IoT application development
credential abuse 486
cross-domain IoT 486
default password risks 486
implementing 485
virtual eavesdropping 486, 487
IBM Watson IoT platform 566, 567
Identity and Access Management (IAM)
about 120, 483, 484, 672
need for 485
identity lifecycle
about 487
account deactivation 492
account deletion 492
account monitoring and control 491
account suspension 492
account updates 492
credential and attribute provisioning 490
credential deactivation 492
credential deletion 492
secure bootstrap 488
with unique requirement 488
Identity Management (IdM)
about 418
credential issuance process 418, 419
credential presentation process 419, 420
IEEE 802.15.4 35
IEEE 1609.2 494
Impulse Free Model (IFM) 165, 166
Indirect trust model 389
industrial control system (ICS) 37, 671
infinitely repeated game
about 643, 649
Prisoner’s Dilemma Game 650, 651
triggering strategy 651
information and communication technology (ICT) 583
Information Assurance (IA)
about 58
authentication 58
availability 59
confidentiality 58
integrity 58
non-repudiation 58
resilience 59
safety 59
Information-Centric Networking (ICN) 393
information disclosure 61
information technology (IT) 313
informed consent
about 582
challenges, implementing 584, 585
in Internet of Things (IoT) 582, 583
Infrared (IR) 322
initialization vector (IV) 499
Initial Permutation (IP) 222, 223
Initial Vector (IV) 229, 257
Insecure Access Control
about 63
Access Control List-Based Systems 64
access control threats 65
availability threats 66
Capability-Based Access control 64
challenges 64, 65
Discretionary Access control 64
Key-based Access control system 64
privacy threats 65, 66
Role-Based Access control 64
Intelligent Transportation Systems (ITS) 327, 333, 334
Internal Betrayal Adversary (IBA) 336
Internal Tricking Adversary (ITA) 337
INternational Future INdustrial Internet testbed 675
International Telecommunication Union (ITU) 2, 494
Internet Engineering Task Force (IETF) 33, 495
Internet of People
about 404
features 404
Internet of Things (IoT)
about 2, 3, 291
authentication 23-25
authorization 23-25
constrained system resources 12
device heterogeneity 13
growth trends 3-5
informed consent 582, 583
insufficient authentication 25, 26
insufficient authorization 25, 26
interoperability 13
limitations 11, 12
malware control strategy 170
malware propagation 164, 165
malware propagation, modeling 165-169
market opportunity 3-5
network robustness 179
Over-The-Air firmware update 13, 14
Internet of Things (IoT), security technologies
communication technologies 28, 29
enabling 26
hardware technologies 26, 27
network technologies 29
software technologies 27, 28
Internet of Vehicles (IoV) 327
Intrusion Detection System (IDS) 40
IoT architecture 15
IoT architecture, factors
business factors 15
security factors 15
technical factors 15
IoT architecture layers
about 16
application/interface layer 17
network layer 16
perception/sensing layer 16
security requirements 21-23
security threats 17-20
service/processing layer 16
IoT-cloud platforms
characteristics 44
edge computing 46
features 44
IoT cloud security architecture
about 571-573
architecture components 571
IoT cloud services
about 558
asset/inventory management 558
customer intelligence and marketing 559, 560
entitlement management 559
information sharing 560
message transport/broadcast 560
real-time monitoring 559
samples 558
sensor coordination 559
service billing 559
service provisioning 559
IoT cooperation
about 430
conflict balancing 433
cooperative authentication 431, 432
cooperative communication 430, 431
cooperative incentive 432
IoT databases
about 676, 677
security 676
threats and challenges 677
IoT device networking
about 5
communication 8
computation 9
identification 5
semantics 10, 11
sensing 7
services 9, 10
IoT devices
identity 488, 489
IoT IAM infrastructure
about 495
PKI, implementing 495, 496
IoT naming schemes
Electronic Product Codes (EPC) 6
Ubiquitous Codes (uCode) 6, 7
IoT network
security protocol/algorithm 546
IoT networking protocols
about 30
application protocol 30
Link Layer protocol 35
Network Layer protocol 33
Physical Layer protocol 35, 36
Routing protocol 34
Transport Layer protocol 34
IoT node authentication
signature algorithm 260, 261
IoT platforms
Cisco IoT Cloud Connect 117
Google Xively 118
IBM Watson IoT 117, 118
ThingWorx 118
IoT Process Management module 411
IoT protocols
security features 544, 545
IoT security
about 14, 672
versus cyber-physical systems (CPS) 14, 15
versus cybersecurity 14, 15
IoT security and privacy testbed
about 673
ASSET testbed 675
INternational Future INdustrial Internet testbed 675
MakeSense testbed 674, 675
Siboni’s security testbed 676
smart campus testbed 674
SmartSantander testbed 675
stanfords testbed 675, 676
supersensor testbed 674
IoT Security CONOPS document
about 131
access control 132
authentication 132
compliance and reporting 132
confidentiality and integrity 131
disposal 132
incident response and forensics 132
monitoring 132
operations and maintenance 132
IoT security lifecycle
about 97
features 130
implementation and integration 130
operations and maintenance 137
processes and agreements 110-114
secure design 98-103
technology selection 115-123
IoT security lifecycle, implementation and integration
about 130, 137
asset and configuration management 143
data archiving and records management 146
data purging 145
dispose 144
forensics 144
incident management 143, 144
inventory control 145
IoT device management 138, 139
IoT Security CONOPS document 131
network implementation and security integration 132-135
penetration testing 141, 142
secure configuration 136, 137
secure device disposal and zeroization 145
security monitoring 140
security training 135, 136
system security verification and validation (V&V) 135
IoT security on mobile networks
cost of mobile network 552
delay in mobile network 553
impact 552
risk and complexity of mobile network 553
scope restriction of mobile network 553
IoT security products
about 670, 671
AWS IoT device defender 671
Cybeats 672
Entrust IoT security 672
features 670
IoT security 672
KeyScaler 672
McAfee embedded control 671
Memfault 672
Microsoft Defender for IoT 671
Quantum edge 673
Spartan 673
IoT service module
about 412
IoT service resolution 412
IoT services 412
IoT systems
threat modeling 78-86
IoT techniques, challenges
about 389
identifier/locator splitting 391
naming and name resolution 389, 390
resources and services 391
security and privacy 392
IoT technologies
about 42, 43
big data analytics 43
cloud computing 43
edge computing 45
fog computing 46
IoT threats
from cloud security 560, 561
IOx architecture
fog director 566
fog nodes 566
Host OS 566
IPV6-based Low power Personal Area Network (6LowPAN) 33
K
K-anonymity technique 296, 297
key agreement 269
key encryption key (KEK) 270
key generator function 224
KeyScaler 672
key transportation 270
Kinesis
about 562
features 562
know-your-customer (KYC) 620
L
layered architecture
about 383
device layer 383, 384
other layers 385
support layer 384
L diversity 298
Lightweight and Robust scheme for maintaining Trustworthiness and Privacy (LRTP) scheme 369-
374
Linear Congruential Generator (LGR) 257, 258
Link Layer protocol 35
Lithium-Ion (LI) 114
Local Area Networks (LAN) 8
Local Eviction of Attackers by Voting Evaluators (LEAVE) protocol 454
Local Routing Depth (LRD) 170
location privacy
about 328
requirements 328, 329
location-privacy preservation solutions
about 329
group signature 331
mix-zone 330
pseudonyms 329, 330
silent period 331, 332
Long-range Wide Area Networks (LoRaWAN) 571
Long-Term Evolution-Advanced (LTE-A) 35
Long-Term Evolution (LTE) 9
LowPAN Border Router (LBR) 34
M
Machine-to-Machine (M2M) communication 517
MakeSense testbed 674, 675
management module
about 413
cost reduction 413
fault handling 413
flexibility 413
unexpected usage issues 413
market game
example 634, 635
Master Node (MN) 386
matching pennies game
example 636-640
Maximum Transmission Unit (MTU) 33
McAfee embedded control 671
Memfault 672
Merkle tree
about 249, 250
significance 250-252
message authentication 252, 457
Message Authentication Code (MAC)
about 192, 253, 254, 493
limitations 254
Message Digest-version5 (MD5) 245
Message Queue Telemetry Transport (MQTT) 31
metamodeling
specification 587-589
microservices 575
Microsoft Azure
authentication mechanism 568
Microsoft Azure IoT suite 565
mining 607
mixed-strategy 636, 637
MixGroup approach
about 332, 333
experimental analysis 349-351
pre-requirements 333
security analysis 345
MixGroup key mechanism
encryption and authentication mechanism 340
group signature 339
pseudonym mechanism 339
temporary in-group identity 340
MixGroup process
about 341
group join 342
group leaving 344
pseudonym exchange 343
revocation protocol 344, 345
RSU signing protocol 343, 344
system initialization and key generation 341
mix-zone area 319
mobile-agent-based data aggregation mechanism
about 506
drawbacks 506
Mobile Gateway (MG)
about 363
characteristics 363
mobile wallet 618
mobile WBSN
about 359
architecture 359
issues 360, 361
mobile WBSN privacy protection
One Time Mask (OTM) scheme 365, 366
One Time Permutation scheme 366, 367
Mobile Wireless Body Sensor Networks (Mobile WBSN) 357
monitoring services 176
multicasting data dissemination 528
N
Nash Equilibrium (NE) 446, 631-633
National Institute of Standards and Technology (NIST) 103, 265
Natural Language Names (NLNs) 393
Near Field Communication (NFC) 8, 283
network controllability and observability
about 476
features 476
network detection and response (NDR) 671
Network Layer protocol 33
network robustness
Internet of Things (IoT) 179
with Game-Theoretic Analysis 180-182
network science tools
about 475
features 475
network tomography 476, 477
network vulnerability 62
nodes, network model
mobile sink 301
sensor node 300, 301
storage node 301
Non-Cooperation (NC) strategy 446
North American Electric Reliability Corporation (NERC) 103
Nova-Genesis (NG) model
about 393
identifier/locator splitting 394, 395
naming and name resolution 393, 394
resources and services 395-397
security and privacy 398, 399
O
observability 476
On-Board Communication unit (OBU) 153
onboard units (OBUs) 328
On Demand Computing (ODC) 576
One Time Mask (OTM) scheme
about 363-366
comparative analysis 368
one-time pad technique
fundamental 213
One Time Permutation (OTP) scheme
about 363-367
comparative analysis 368
online wallet 618
Open Authorization (OAuth 2.0)
about 497
components 497, 498
working 498
OpenID Connect (OIDC) 568
Open Web Application Security Project (OWASP) 111
Orthogonal Frequency Division Multiple Access (OFDMA) 35
Output Feedback Mode (OFB) 231
Over-The-Air (OTA) 14
P
paper wallet 619
participatory sensing
about 358, 361
architecture 361, 362
issues 362
participatory sensing privacy protection
about 368
Lightweight and Robust scheme for maintaining Trustworthiness and Privacy (LRTP) scheme 369-
374
Password based key derivation (PBKDF) 270
paying taxes game
example 640, 641
mixed strategy 642, 643
Payment Card Industry (PCI) 103
Pay-Per-Use (PPU) 114
peer-to-peer (P2P) network 613
People as a Service 406
Perfect Bayesian Nash Equilibrium (PBNE) 449
Perfect Forward Secrecy (PFS) 273
performance analysis, variants of entity authentication
about 454, 455
average risks 456, 457
average vulnerability time 455
performance, bargaining-based dynamic game model for cooperative authentication
energy consumption 443
location privacy leakage 442
network survivability 444
Personal IoT (PIoT) network
about 358
architecture WBSN 360
concept 358
mobile WBSN 359
participatory sensing 361
security aspect 363
Personally Identifiable Information (PII) 100
Physical Cyber Social Computing (PCSC) 406
Physical Layer protocol 35
PKIX management function 280
PKIX model
about 279
elements 279
plain text 193
Platform-as-services (PaaS) 44
Playfair cipher 202-204
Playfair square 202
point-of-sale (POS) 671
policy-based solution for informed consent
about 585
elements 585, 586
policy-based framework 587
policy enforcement component 589-591
SecKit, implementing 592-594
Policy Decision Point (PDP) 589
policy enforcement component 589-591
Policy Enforcement Points (PEPs) 587
polyalphabetic cipher 209, 210
pre-requirements, MixGroup approach
about 333
network model 333, 334
social model 335
theory 338
threat model 336
traces of vehicles 337, 338
vehicular social network 337
pre-requirements, privacy preservation data dissemination
about 300
network model 300
threat model 301, 302
prerequisites, time-series data aggregation privacy preservation scheme
about 507
Group Z*p2 properties 509
IoT scenario 507, 508
security consideration and design goals 508
PreSharedKey mode 31
price-based incentive mechanism 432
Prisoner’s Dilemma Game
example 628, 629
game table 646
mathematical formulation 630
Privacy Impact Assessment (PIA) 100
privacy preservation 292
privacy preservation data dissemination approach
about 299
futuristic data dissemination (FDD) approach 305, 306
implementing 307
pre-requirements 300
resolution of uncertainty 302-305
privacy preservation for IoT
in smart buildings 313
privacy preservation techniques
about 294, 295
anonymization techniques 296
cryptographic techniques 296
dynamic data masking 298
privacy-preserving approaches
in smart buildings 318
Radio Frequency Identification (RFID) 320, 321
Video surveillance 321
Wireless LAN 318, 319
privacy threats classification
about 293
content-oriented privacy threats 293
contextual-oriented privacy threats 294
private key classification
cold wallet 617
hot wallet 617
probability of correct authentication (PCA) 431, 432
procedural vulnerability 62
process execution 411
processing layer 384
process modeling 411
Product-As-A-Service (PaaS) 95
programmable logic controllers (PLCs) 37, 144, 559
Proof of Burn (PoB) 615
Proof of Capacity (PoC) 615
Proof-Of-Concept (POC) 139
Proof of Elapsed Time (PoET) 615
Proof of Stake (PoS) 614, 619
Proof of Work (PoW) 614, 607
propagational architecture
about 385
centralized architecture 386, 387
distributed architecture 385, 386
proxy gateway controllers (PGCs) 393
pseudonym mechanism 339
Pseudo Random Number Generators (PRNGs)
about 257
process 258, 259
pseudo random numbers 257
public distributed ledger 604, 605
public key infrastructure (PKI)
about 278, 495
bootstrapping 489
implementing, for IoT IAM infrastructure 495, 496
revocation support 496, 497
Public Key Infrastructure X.509 (PKIX) 278
Pulsed-Index Communication (PIC) 519
pure strategy game 637
Q
Quality of Service (QoS) 46, 504
Quantum edge 673
Query plan (QEP) 528
R
Radio Access Network (RAN) 36
Radio Frequency Identification (RFID)
about 6, 8, 320
approaches 320, 321
Randomized Strategy 637
random number generation 257
RawPublicKey mode 31
real-time query process, GIOT
about 527
mathematical representation 529-531
query execution path, deriving 535, 537
query processing 528
secure path generation scheme 531-535
real-time query-processing (RTQP) 531
Registration Authority (RA) 120, 329
remote terminal units (RTUs) 37, 559
remote third-party services
hardening 178
repudiation 61
reputation-based incentive mechanism 432
Resource Description Framework (RDF) 10
Respondent privacy 294
Restricted Passive Adversary (RPA) 336
risk 63
Roadside Equipment (RSU) 152, 494
Roadside Unit (RSU) 153, 159, 328, 334
Role-Based Access Control (RABC) 64, 138
RSA asymmetric cryptosystem 234, 235
S
Safety Impact Assessment (SIA)
about 102
factors 102
scalability 677
Schorr digital signatures scheme 264
secret key 198
secret-key capacity 195-197
Secure Hash Algorithm (SHA) 246-249
Secure Multiparty Communication (SMC) 322
Secure Socket Layer (SSL) 286
security analysis, MixGroup approach
about 345
attack and defense analysis 346
conditional tracking 345
entropy optimal pseudonym exchange 347, 348
security-as-a-service (SECaaS) 562
security aspects, Personal IoT (PIoT) network
mobile WBSN privacy protection 363
participatory sensing privacy protection 368
Security Credential Management System (SCMS) 139
security engineering
building 94
operation management 95-97
requirement management 94, 95
Security Information and Event Management (SIEM) 122
security operations center (SOC) 671
security protocol/algorithm, IoT network
time-based secure key generation and renewal 546-548
security system integration
about 104
accounts and credentials 106
audit and monitoring 107
concern 104
patching and updates 107
secure bootstrap 104-106
Security Toolkit (SecKit)
about 587
implementing 592-594
Self-Driving Vehicles (SDVs) 113
Self-Verifying Names (SVNs) 393
sensor location diversity 299
Service-Centric Networking (SCN) 393
Service Level Agreement (SLA) 112, 391
service organization module
about 411
service choreography 411
service composition 411
service orchestration 411
Service-Oriented Architecture (SOA) 393, 575
SHS hardening
about 176
Central digitalSTROM Server, hardening 176, 177
remote third-party services, hardening 178
Smart Communication Bus, hardening 177
smart control devices (SCD), hardening 177
SHS system
attack scenarios 178, 179
solution analysis 178, 179
Siboni’s security testbed 676, 677
Signal-Noise-Rate (SNR) 196
signal processing tools
about 474
features 474
signatures types
about 261
arbitrated digital signature 262
direct digital signature 261, 262
signature verification 261
signing function 266
silent period 319
similarity attack 298
Simple Authentication and Security Layer (SASL) 33
Simple Storage Service (S3)
about 562, 563
features 563
single round function 224
smart buildings
concept 313
IoT technologies 316
privacy preservation for IoT 313
privacy-preserving approaches 318
privacy threats 316, 317
subsystem 314
smart campus testbed 674
Smart Communication Bus
hardening 177
smart contract 615, 616
smart control devices (SCD)
about 175
hardening 177
smart home communication bus 175, 176
Smart Home System (SHS)
about 171
attack vectors 174
digitalSTROM example 172
digitalSTROM technical structure 173
solution-based analysis of attack vectors 171
SmartSantander testbed 675
Social Internet of Things (SIoT)
about 41, 405
components 405
features 405
social network
about 471
multimedia content threats 472
social threats 472
traditional threats 472
Social Network Analysis (SNA) 475
social threats 472
Society of Automotive Engineers (SAE) 103
SocIoTal framework
about 409
classical IoT-architectural framework 410
SocIoTal security framework
about 413
authentication 414
authorization 421
context manager 416
group manager 423, 424
Identity Management (IdM) 418
key-exchange management 415
trust and reputation 415
software-based authentication
centralized authentication 120
distributed authentication 120
one-way authentication 119
three-way authentication 119
two-way authentication 119
Software-Defined Networking (SDN) 121, 393, 408
Software Development Kits (SDKs) 117
software vulnerability 62
software wallet 618
Spartan 673
Spatial Light Modulator (SLM) 322
Spatial Privacy Graph (SPG) 299, 307
SPG-based data dissemination 307-312
spoofing 60
stanfords testbed 675, 676
strategic game 630
strategic interaction 630
stream cipher 217
Subgame Perfect Nash Equilibrium (SPNE) 446
substitution technique
about 199
types 199
Super Node (SN) 386
supersensor testbed 674
Supervisory Control and Data Acquisition (SCADA) 36
support layer 384
Sybil attack detection, in vehicular network
about 152
challenges and attacks 154, 155
concept 152-154
consequences 156, 157
schemes 157-163
Vehicular Ad-Hoc Network (VANET) 152-154
symmetric key encryption algorithm
about 198
Cipher Block Chaining Mode (CBC) 228, 229
Cipher Feedback Mode (CFB) 229-231
Counter Mode 232
Electronic Code Book (ECB) 228
Output Feedback Mode (OFB) 231
substitution technique 199
Symmetric Key Establishment (SKKE) 282
symmetric keys 493
System on Chip (SOC) 9, 38
T
tampering 60
Tamper-proof-device (TPD) 334
Temporary In-group Identity (TID) 340
Third Generation Partnership Project (3GPP) 36
threat
about 60
associated terms 60
classification 60
threat model 301, 302
threat modeling
about 100
for IoT systems 78-86
threats and challenges, IoT databases
about 677
data governance and ethics 678, 679
data innovation and collaboration 679
data privacy and compliance 677, 678
data quality and integrity 678
data security and resilience 678
data skills and awareness 679
time-based secure key generation and renewal
about 546, 548
cognitive security 550-552
key features 547
security protocol for bidirectional data transmissions 550
security protocol for unidirectional data transmissions 548, 549
time-series-based data aggregation mechanism 506, 507
time-series data aggregation privacy preservation scheme
about 507
aggregated data decryption control center 511
computational cost 513
data aggregation gateways 510
data encryption nodes 510
prerequisites 507
privacy maintenance 512
scheme 510
system settings 510
traces of vehicles
observations 337, 338
transport encryption
about 284
Hypertext Transfer Protocol Secure (HTTPS) 287
Secure Socket Layer (SSL) 286
Transport Layer Security (TLS) 284, 285
Transport Layer Security (TLS) 259, 284
transposition technique
about 213
modern symmetric encryption technique 216
rail fence technique 214
row column transportation 214-216
trigger strategy equilibrium 649
true random numbers 257
trust
concept 380
role 380
Trusted Platform Module (TPM) 10
Trust Management System (TMS)
about 381
classification 383
information gathering 381
trust computation 381
trust propagation 382
trust update 382
U
Ubiquitous Codes (uCode) 6, 7
Ultra-Low Voltage (ULV) 519
Ultra-Wide Band 8
Ultra-Wide Band (UWB) 8
Uniform Resource Identifier (URI) 389
Unmanned Aerial System (UAS) 576
Unmanned Aircraft System (UAS) 72
uploaded data
properties 364
user-centric IoT, concept
about 404
advantages 407
Internet of People 404
People as a Service 406
Physical Cyber Social Computing (PCSC) 406
Social Internet of Things (SLoT) 405
user-centric IoT, issues
about 407
big data analysis 408
data models 408
fault tolerance 408
interoperability 408
nomenclatures 408
trust and privacy 408, 409
utility and usability 407
User privacy 294
US Postal Service (USPS) 103
V
VANET(VOR4VANET) 458, 459
variants of entity authentication
about 453
abstinence 454
performance analysis 454
police 454
reputation 453
vote 454
Vehicle To Infrastructure (V2I) 154
Vehicle To Vehicle (V2V) 154
Vehicular Ad-hoc Network (VANET) 328
Vehicular Sensor Network (VSN)
about 154, 333
characteristics 337
verification function 266
Vernam cipher 211-213
Vertical operators 406
Video surveillance 321
Vigenere cipher 210, 211
virtual entities (VE) 411
virtual entity module
about 411, 412
VE and IoT service monitoring 412
VE resolution 412
VE service 412
Virtual Objects (VO) 589
visual privacy preservation mechanism
solutions 322, 323
vulnerability
about 62
hardware vulnerability 62
network vulnerability 62
procedural vulnerability 62
software vulnerability 62
W
Web Ontology Language (OWL) 10
web wallet 618
Wheatstone-Playfair cipher 202
Wi-Fi 8
Wireless LAN
about 318, 319
conditions 319
factors 319
key challenges 320
wireless network 471
WireShark tool 142
wiretap channel 195
X
X.509 certificate 494
Z
Zero Day Initiative (ZDI) 37
ZigBee
about 281
keys 282
link keys 282
master keys 281
network keys 282
Z-Wave 9, 36