• Complain

Ziegler - Internet of Things Security and Data Protection

Here you can read online Ziegler - Internet of Things Security and Data Protection full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2019, publisher: Springer Nature, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Ziegler Internet of Things Security and Data Protection
  • Book:
    Internet of Things Security and Data Protection
  • Author:
  • Publisher:
    Springer Nature
  • Genre:
  • Year:
    2019
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Internet of Things Security and Data Protection: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Internet of Things Security and Data Protection" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Ziegler: author's other books


Who wrote Internet of Things Security and Data Protection? Find out the surname, the name of the author of the book and a list of all author's works by series.

Internet of Things Security and Data Protection — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Internet of Things Security and Data Protection" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Internet of Things Technology Communications and Computing Series Editors - photo 1
Internet of Things Technology, Communications and Computing
Series Editors
Giancarlo Fortino
Calabria, Italy
Antonio Liotta
Eindhoven, The Netherlands

More information about this series at http://www.springer.com/series/11636

Editor
Sbastien Ziegler
Internet of Things Security and Data Protection
Editor Sbastien Ziegler Mandat International Geneva Switzerland ISSN - photo 2
Editor
Sbastien Ziegler
Mandat International, Geneva, Switzerland
ISSN 2199-1073 e-ISSN 2199-1081
Internet of Things
ISBN 978-3-030-04983-6 e-ISBN 978-3-030-04984-3
https://doi.org/10.1007/978-3-030-04984-3
Library of Congress Control Number: 2018968445
Springer Nature Switzerland AG 2019
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

About this Book

The Internet of Things (IoT) is disruptively shifting the paradigm of cybersecurity, privacy, and data protection toward new territories. With tens of billion connected devices, the information gathering is becoming omnipresent and deeply pervasive. Simultaneously, networks are becoming exposed to new threats with an unprecedented surface of risk.

The security risks associated with IoT systems are extremely challenging to overcome given the highly dynamic nature, heterogeneous nature of hardware, global connectivity, changing parameters, and wide accessibility. These factors often result in IoT ecosystems being physically unprotected and susceptible to manipulation by external parties. As such, there are a number of security threats that can affect IoT objects. These threats include attacks targeting diverse communication channels, denial of service, physical threats, eavesdropping, and identity fabrication among others.

In view of these challenges, this book intends to provide an overview of complementary approaches, methodologies, and tools to better protect IoT infrastructures and personal data. It leverages recent research results from research projects. It has been made possible thanks to contributions from various international experts and research teams. Our acknowledgments go more specifically to the following European research projects: Privacy Flag, ANASTACIA, Synchronicity, U4IoT, SAINT, F-Interop, IoT Lab, and IoT6.

Contents
Sbastien Ziegler
Sbastien Ziegler , Cdric Crettaz , Eunah Kim , Antonio Skarmeta , Jorge Bernal Bernabe , Ruben Trapero and Stefano Bianchi
Antonio Skarmeta , Dan Garcia Carrillo and Alexis Olivereau
Luca Bolognini and Paolo Balboni
Anna Brkine , Anastasios Papathanasiou , Dimitrios Kavallieros , Sbastien Ziegler , Christopher Hemmens , Adrian Quesada Rodriguez , Georgios Germanos , Georgios Kokkinis , Georgios Leventakis , Jart Armin and John Bothos
Luca Bolognini and Sbastien Ziegler
Sbastien Ziegler
Ana Maria Pacheco Huamani and Sbastien Ziegler
Lucio Scudiero and Sbastien Ziegler
Luca Bolognini , Camilla Bistolfi and Sbastien Ziegler
Sbastien Ziegler , Mythili Menon and Pasquale Annichino
Adrian Quesada Rodriguez , Sbastien Ziegler , Christopher Hemmens , Ana Maria Pacheco Huamani , Cesco Reale , Nathalie Stembert , Drew Hemment , Rob Heyman , Jonas Breuer and Dejan Drajic
Antonio Skarmeta , Jos L. Hernndez-Ramos and Juan A. Martinez
List of Figures
Fig. 1.1 Network segmentation
Fig. 1.2 Traditional cybersecurity threat matrix
Fig. 1.3 Cybersecurity threat matrix: evolution with the Internet of Things
Fig. 2.1 Trustworthiness, security and privacy
Fig. 2.2 Pervasiveness of security and privacy within the system development life cycle
Fig. 2.3 Dimensions of a successful attack
Fig. 2.4 Cyberattack life cycle
Fig. 2.5 OWASP IoT surface areas
Fig. 2.6 OWASP IoTI1: Insecure web interface
Fig. 2.7 oneM2M context and security domains
Fig. 2.8 GSMA IoT example model
Fig. 2.9 ANASTACIA framework overview
Fig. 2.10 ARMOUR framework overview
Fig. 3.1 IoT device life cycle
Fig. 3.2 Generic bootstrapping framework
Fig. 3.3 EAP mode pass-through
Fig. 3.4 PANA flow of operation
Fig. 3.5 CoAP-EAP flow of operation
Fig. 3.6 Instantiation of Bootstrapping with AAA and EAP for IoT
Fig. 3.7 Examples of prevention and reaction security mechanisms
Fig. 3.8 Cybersecurity countermeasures at various attack stages
Fig. 3.9 SDN-based deployment
Fig. 7.1 Privacy Risk Area (PRA) and Privacy Safe Area (PSA)
Fig. 7.2 UPRAAM requirements
Fig. 7.3 UPRAAM iterative process scheme
Fig. 7.4 In-depth evaluation scope
Fig. 7.5 Asymmetric access to information
Fig. 7.6 UPRAAM crowd-driven evaluation methodology
Fig. 11.1 SynchroniCity architecture
Fig. 11.2 Smart city stakeholders
Fig. 11.3 DPIA Diagram, WP29, DPIA Guidelines
Fig. 13.1 MyData architecture
Fig. 13.2 DCapBAC basic scenario
Fig. 13.3 DCapBAC extended scenario
Fig. 13.4 SMARTIE architecture
Fig. 13.5 Instantiation of SMARTIE components in a smart building scenario
List of Tables
Table 1.1 Possible impact levels
Table 1.2 Emerging attack patterns
Table 2.1 Major security vulnerabilities
Table 2.2 OWASP top ten vulnerabilities
Table 3.1 Improvement in percentage, comparing PANA and CoAP-EAP message size overhead
Table 3.2 Comparing PANA and CoAP-EAP experimental results (authentication time, success ratio and energy consumption)
Table 3.3 Best practices for IoT IDS design
Table 9.1 Landscape of tools and roles regulated by the eIDAS Regulation
Table 9.2 Types of seals foreseen by EIDAS Regulation
Table 11.1 Desirable properties in IoT-enabled smart city services
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Internet of Things Security and Data Protection»

Look at similar books to Internet of Things Security and Data Protection. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Internet of Things Security and Data Protection»

Discussion, reviews of the book Internet of Things Security and Data Protection and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.