Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security, privacy and trust in the IoT environment
Mahmood Z., Springer International Publishing, New York, NY, 2019. 293 pp. Type: Book (978-3-030180-74-4)
Date Reviewed: Aug 19 2020

I was pleased to review this book, edited by Zaigham Mahmood. The book is divided into two parts. The first part elaborates on different technologies and frameworks for security and privacy in the Internet of Things (IoT), whereas the second part explains privacy and trust in IoT with respect to two different applications: healthcare and the Internet of Vehicles (IoV).

Chapter 1 describes SCADA-based security challenges and vulnerabilities. It does not provide detailed solutions. However, it is a good introduction to SCADA requirements. Chapter 2 explains energy-perceptive authentication in a virtual private network (VPN). Energy-aware techniques are useful for IoT devices because of their inherent resource-constrained environment. This chapter explains the mathematical model of the proposed system and elaborates its functionality. Chapter 3 explains security threats with radio-frequency identification (RFID)-based IoT Systems. The chapter describes different kinds of attacks and explains how delegating computation to a server or a cloud can mitigate these attacks. Chapter 4 is based on theoretical information related to cyber threats and intelligence. This chapter does not contain any descriptive examples; however, it is useful in understanding the requirements and modeling of cyber threats.

Chapter 5 describes firewall-based techniques for controlling IoT-powered cyberattacks. This chapter also describes Seddulbahir--the first Turkish cyber firewall. It explains how on-the-fly packets are modified and describes system architecture, which consists of an artificial intelligence (AI) security engine, security rule module, protocol dissector module, and logging and alert module. Chapter 6 covers the blockchain framework and explains how it can be used to provide solutions for different IoT-based challenges. The chapter includes different use cases, including smart homes, smart cities, identity and access management, healthcare, and insurance. Chapter 7 covers quantum encryption and authentication frameworks for IoT devices. It contains mathematical models and illustrative examples, along with simulation results.

The second part of the book covers a few applications. In that, chapter 8 provides an overview of security and privacy issues in the healthcare sector. It contains a detailed survey and case analysis. Chapter 9 is focused on describing security threats and available solutions in the emerging field of telemedicine. Chapter 10 initiates the book’s discussion on vehicular networks. It describes the need and model for managing trust using software-defined networking (SDN). Since vehicular networks can experience an open environment, this chapter is important to understanding trust relationships and their needs. Chapter 11 extends the significance by proposing a privacy-preserving IoV scheme. It explains the challenges, the attack model, and solutions.

The last chapter (12) presents a model for secure packet transmission in mobile area networks, including an energy optimized algorithm, simulated results, and a node position prediction model.

Overall, the book is comprehensive in its coverage of security, privacy, and trust issues in IoT and many of its applications. It covers mathematical models and provides descriptions. It is a useful resource for knowledge seekers in the related domain.

Reviewer:  Jawwad Shamsi Review #: CR147041 (2012-0276)
Bookmark and Share
 
Security and Protection (C.2.0 ... )
 
 
General (C.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy