Computing Reviews

Security, privacy and trust in the IoT environment
Mahmood Z., Springer International Publishing,New York, NY,2019. 293 pp.Type:Book
Date Reviewed: 08/19/20

I was pleased to review this book, edited by Zaigham Mahmood. The book is divided into two parts. The first part elaborates on different technologies and frameworks for security and privacy in the Internet of Things (IoT), whereas the second part explains privacy and trust in IoT with respect to two different applications: healthcare and the Internet of Vehicles (IoV).

Chapter 1 describes SCADA-based security challenges and vulnerabilities. It does not provide detailed solutions. However, it is a good introduction to SCADA requirements. Chapter 2 explains energy-perceptive authentication in a virtual private network (VPN). Energy-aware techniques are useful for IoT devices because of their inherent resource-constrained environment. This chapter explains the mathematical model of the proposed system and elaborates its functionality. Chapter 3 explains security threats with radio-frequency identification (RFID)-based IoT Systems. The chapter describes different kinds of attacks and explains how delegating computation to a server or a cloud can mitigate these attacks. Chapter 4 is based on theoretical information related to cyber threats and intelligence. This chapter does not contain any descriptive examples; however, it is useful in understanding the requirements and modeling of cyber threats.

Chapter 5 describes firewall-based techniques for controlling IoT-powered cyberattacks. This chapter also describes Seddulbahir--the first Turkish cyber firewall. It explains how on-the-fly packets are modified and describes system architecture, which consists of an artificial intelligence (AI) security engine, security rule module, protocol dissector module, and logging and alert module. Chapter 6 covers the blockchain framework and explains how it can be used to provide solutions for different IoT-based challenges. The chapter includes different use cases, including smart homes, smart cities, identity and access management, healthcare, and insurance. Chapter 7 covers quantum encryption and authentication frameworks for IoT devices. It contains mathematical models and illustrative examples, along with simulation results.

The second part of the book covers a few applications. In that, chapter 8 provides an overview of security and privacy issues in the healthcare sector. It contains a detailed survey and case analysis. Chapter 9 is focused on describing security threats and available solutions in the emerging field of telemedicine. Chapter 10 initiates the book’s discussion on vehicular networks. It describes the need and model for managing trust using software-defined networking (SDN). Since vehicular networks can experience an open environment, this chapter is important to understanding trust relationships and their needs. Chapter 11 extends the significance by proposing a privacy-preserving IoV scheme. It explains the challenges, the attack model, and solutions.

The last chapter (12) presents a model for secure packet transmission in mobile area networks, including an energy optimized algorithm, simulated results, and a node position prediction model.

Overall, the book is comprehensive in its coverage of security, privacy, and trust issues in IoT and many of its applications. It covers mathematical models and provides descriptions. It is a useful resource for knowledge seekers in the related domain.

Reviewer:  Jawwad Shamsi Review #: CR147041 (2012-0276)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy