Applied Approach to Privacy and Security for the Internet of Things - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

12
(FIVE YEARS 12)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799824442, 9781799824466

Author(s):  
Megha Kamble ◽  
Jaspreet Mehra ◽  
Monika Jain

The growing demand of internet of things (IoT) has rendered advancement in the practical fields towards society. In spite of recent advancements and cost effective IoT solutions for smart railway infrastructure, presently, most of the railway gates in India are opened and closed manually. This is a time-consuming process. It is an error-prone system and raises the accident probability. This chapter evaluates and demonstrates the applicability of IoT to resolve the problem of unmanned automatic railway crossing. The aim is to propose a prototype that will control with the help of microcontroller board, IoT sensor integration, and integrating it to machine learning-based image analysis to detect the intermediate real time obstacle (obstacle on the track). This kind of IoT system will also invite potential attacks, and traditional security countermeasures can be inefficient in dynamic IoT environments. So open challenges related to IoT security threats and emerging security mechanisms for security of the proposed smart railway crossing system are also elaborated.



Author(s):  
Kavitha Ammayappan ◽  
Arun Babu Puthuparambil ◽  
Atul Negi

Internet of things (IoT) is a buzzword around the globe. Academics and industries are evolving to solve real-world problems with emerging technologies; IoT is one among them. Now, it's very prevalent to see IoT devices in varied application domains like healthcare, hospitality, home, oil and gas, aviation, agriculture and marketing, cold storage chains, food preservation industries, automobile, environmental pollution monitoring sectors, energy industries, marine and fisheries, dairy and poultry, logistics, smart home and smart city, etc. Industries and research institutes are focusing to enrich environment and ecosystem to bring back green world again for the millennials and our future generations to make this globe as a potential place to cherish. In this mission, IoT is playing a major role of protection and preservation. In parallel, hackers are trying to destroy this mission by exploiting varied cyber vulnerabilities. To make IoT systems robust against those vulnerabilities it is necessary to understand the key vulnerabilities in detail.



Author(s):  
Suchandra Datta

The concept of internet of things involves the establishment of ubiquitous computing devices that seamlessly integrate with our living environments, being interconnected via networks to gather information about the surroundings so as to enable the devices to interact with the ambient environment in favorable ways. With the growth of this concept and subsequent development of smart homes, it is to be borne in mind that security is of the utmost importance in such scenarios. In this chapter, the authors highlight the various vulnerabilities prevalent in smart homes, which might be exploited by unscrupulous individuals to launch cyberattacks.



Author(s):  
Emmanuel Benoist ◽  
Serge Bignens ◽  
Alexander Kreutz

The rise of internet of things (IoT) in medicine has generated tons of new data through connected devices. Medicine and research in medicine are interested in using those data for the personalization of patients' treatment. The authors present the system MIDATA where patients can transfer their medical IoT data and store them. They have also the possibility to share those data with research groups. The solution respects patient privacy. Even an administrator of the site cannot access to the data of the patients. The patient can choose which users can decrypt their data. But users will lose their passwords and keys. So, the authors provide a novel solution for the recovery of the keys. This procedure has different levels: the patient has a new phone but remembers the password; the patient has forgotten the password but can use the phone; and the worst case is when the patient forgot the password and lost the phone, where they developed a novel solution for key recovery.



Author(s):  
Arundhati Arjaria ◽  
Priyanka Dixit

In today's digital era, internet of things and wireless communication needs no introduction as almost everything directly or indirectly is dependent on the same. This scenario also leads to various security issues because devices are connected to internet and this availability makes this exposure vulnerable for various attacks. Recently in internet of things and wireless ad hoc networks, there is an essential issue of how to increase channel utilization without degrading the performance. Some problems are also responsible to increase collision in the network. Here, the authors propose a busy tone-based medium access control scheme to avoid such problems in fully as well as non-fully connected environment. Here in this chapter, they present a brief introduction to internet of things, security challenges regarding IoT, and its association with wireless technology. They also discuss the problems concerning wireless communication, which affects the performance of networks and their solutions.



Author(s):  
Emmanuel Benoist ◽  
Jan Sliwa

Smart, networked medical devices play a rapidly growing role in healthcare. Those devices and their data have to be integrated into the healthcare system. There are several reasons to reuse those data for well-defined purposes by well-defined partners; this reuse should be controlled by the patient and not depend on the manufacturer infrastructure. Different stakeholders have an understandable reason to access those data under the control of the patient. The authors propose an architecture of a decentralized data broker that receives the data streams from the devices and redistributes them securely to legitimate recipients. This broker is based on the peer-to-peer network Freenet. This network has been defined to be censorship resistant and to protect the privacy of persons sharing data. This covers the needs for protection expected from a secure data broker. The patient can directly define which of the stakeholders will receive which information and the information is encrypted in a way that only that partner can read it.



Author(s):  
Suchandra Datta

Driver assistance systems are advancing at a rapid pace, and almost all major companies have started investing in developing autonomous vehicles. However, the security and reliability in this field is still uncertain and debatable. A vehicle compromised by the attackers remotely can be easily used to create chaos of epic proportions. An attacker can control brake, accelerate, and even steering, which can lead to catastrophic consequences. Therefore, an autonomous vehicle can be weaponized extremely easily if proper security protocols are not implemented. This chapter gives a very short and brief overview of some of the possible attacks on autonomous vehicle software and hardware and their potential implications.



Author(s):  
Eoghan Casey ◽  
Hannes Spichiger ◽  
Elénore Ryser ◽  
Francesco Servida ◽  
David-Olivier Jaquet-Chiffelle

IoT devices produce information that can be used in criminal investigations and cybersecurity incidents to make inferences about identities, locations, chronologies, and relationships between relevant entities. Before this information is relied upon to make critical decisions, its veracity must be assessed critically, and the link between virtual and physical worlds must be evaluated carefully. This chapter presents the forensic science principles needed to exploit the full potential of IoT traces, including uniqueness, exchange, provenance, integrity, reliability, repeatability, evaluating links between virtual and physical entities, and formally assessing alternative hypotheses. This chapter also discusses core forensic processes and activities, demonstrating their application to forensic analysis of IoT devices using practical examples. A typology of IoT traces is proposed and their usefulness during an investigation is discussed. Finally, an investigative scenario is presented to illustrate the opportunities and challenges of exploiting IoT devices and traces for investigative and forensic purposes.



Author(s):  
Xinxing Zhao ◽  
Chandra Sekar Veerappan ◽  
Peter Loh

Modern processors employ optimization techniques such as out-of-order and speculative execution to maximize the performance. However, they may leave observable side effects that leak the secrets of the system. This phenomenon has led to a proliferation of Spectre and Meltdown attack variants, and this trend will likely continue in the near future. While many makeshift countermeasures have been proposed, they are either not adequately effective or come with inadvertent consequences. New types of processors are designed to deal with these problems; however, those older ones in billions of devices that are currently being used cannot easily or even possibly be replaced. In this chapter, therefore, the authors provide a cross-platform, micro-agent detection system, which can detect four main types of Spectre variants and one variant of Meltdown in real-time in these devices. The empirical performance tests show that the micro-agent system and the in-built detection mechanisms are efficient and effective in detecting such attacks.



Author(s):  
Manoj Kumar Srivastav

Security of information is always a challenging domain for any computer network organization. An organization always sets different types of policies with the course of time so that no information can be leaked. Some external or some internal factors of an organization play important roles in revealing the information. An organization mainly depends on its employees. An employee manages the data and information and there exists some chance among employees to reveal the data. There is need to study and set policies for employees so that no full information can be revealed. Information security management system (ISMS) has collection of different types of policies and procedures for systematically managing organizationally sensitive data. ISMSs have to deal with management of employees of an organization to minimize the risk of revealing information. This chapter studies employee management so that an organization can continue its business securely.



Sign in / Sign up

Export Citation Format

Share Document