Cyber Physical Systems - Advances and Applications -  - E-Book

Cyber Physical Systems - Advances and Applications E-Book

0,0
45,19 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

The book gives a comprehensive overview of the evolving landscape of cyber-physical systems (CPS) with a primary focus on security challenges and innovative solutions. CPS, encompassing a wide array of applications from e-Health to smart grid and industry automation, is explored in depth through eight edited reviews.

The book starts with an exploration of various threat detection and prevention techniques in IoT environments, followed by discussions on security in smart grid cyber-physical systems, and the integration of cyber-physical systems with game theory. It also covers important topics such as cyber-physical systems in healthcare, augmented reality challenges, network and computer forensic frameworks, and a review of industrial critical infrastructure perspectives.

The journey from traditional data warehouses to data lakes is thoroughly examined, shedding light on the evolution of data storage methods. The final chapter explains intrusion detection in industrial critical infrastructure, reviewing feature selection and classification models. By navigating through these topics, the book equips readers with a comprehensive understanding of cybersecurity challenges and solutions in an era of automation and IoT technologies.
This book is intended for a diverse readership, including professionals, researchers, and technology enthusiasts keen on exploring the intricacies of CPS, IoT security, data storage evolution, and industrial infrastructure protection.

Key Features:
Analytical insights into cyber-physical systems security.
Thorough exploration of threat detection and prevention techniques.
Application-focused chapters covering smart grid, healthcare, and more.
Integration of game theory and augmented reality in cyber-physical systems.
Comprehensive overview on network and computer forensic frameworks.

Readership
Computer science students; Cybersecurity graduates and trainees; academics, researchers and industry professionals interested in understanding and utilizing cyber-physical systems.

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB
MOBI

Seitenzahl: 284

Veröffentlichungsjahr: 2024

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
PREFACE
List of Contributors
A Comprehensive Analysis of Various Threat Detection and Prevention Techniques in IoT Environment
Abstract
1. INTRODUCTION
2. CLASSIFICATION OF IOT LAYERS
2.1. Application Layer
2.2. Middleware Layer
2.3. Network Layer
2.3.1. Low Power Wi-Fi
2.3.2. Zigbee
2.3.3. Near Field Communication (NFC)
2.3.4. BLE
2.3.5. Low Power Wide-Area-Networks (LPWAN)
2.4. Sensor Layer
2.4.1. Mobile Phone Sensors
2.4.2. Healthcare Sensors
2.4.3. Neural Sensors
2.4.4. Environmental and Chemical Sensors
2.4.5. RFID
3. VARIOUS SECURITY ISSUES IN IOT LAYERS
3.1. Phishing Attacks
3.2. Side-Channel Attack
3.3. Unauthorized Access
3.4. Remote to Local (User) Attacks (R2L)
3.5. Probing
3.6. User to Root Attacks (U2R)
3.7. Eavesdropping Attack
3.8. Node Capture Attacks
3.9. Replay Attack
3.10. Wormhole Attack
4. IoT SECURITY
4.1. IoT Security Using IDS
4.2. IoT Security Using Machine Learning Techniques
4.3. IoT Security Issues using Blockchain
4.3.1. Ethereum
4.3.2. Hyperledger Fabric
4.3.3. Hyperledger Sawtooth
4.3.4. EOSIO
4.3.5. Corda
4.3.6. Quorum
4.3.7. Distributed Ledger
4.3.8. Peer to Peer Communication
CONCLUSION
REFERENCES
Security Concerns in Smart Grid Cyber-Physical System
Abstract
1. INTRODUCTION
2. SMART GRIDS
2.1. Model for Smart Grid
3. Characteristics of CPS with Smart Grid
3.1. Connectivity
3.2. Mobility
3.3. Security & Privacy
3.4. Flexibility
3.5. Dynamics
3.6. Interoperability
4. Components of Smart Grid
5. Applications of SG-CPS
6. Applications of Smart Grid Cyber Physical System (SG-CPS)
6.1. Advanced Metering Infrastructure (AMI)
6.2. Demand Management
6.3. Electric Vehicles (EVs)
6.4. Wide-Area Situational Awareness
6.5. Distributed Energy Resources and Storage
6.6. Distributed Grid Management
6.7. Energy Management
6.8. Smart Home
6.9. Self-healing Grid
6.10. Power Demand Forecasting
6.11. Power Generation Forecast of Renewable Energy
6.12. Fault Diagnosis and Protection
6.14. Smart Grid Security
7. Security Objectives in SG-CPS
7.1. Confidentiality
7.2. Integrity
7.3. Availability
7.4. Accountability
8. Cyber-attacks in SG-CPS
8.1. Transmission System Attacks
8.2. Interdiction Attacks
8.3. Complex Network (CN)-based Attacks
8.4. Substation Attacks
8.5. Switching Attacks
8.6. PMU Attacks
8.7. Smart Meter Attacks
9. Countermeasures
9.1. Counter-acting Attacks using Moving Target Defense
9.2. Counter-acting False Data Attacks using Anomaly Detection
Conclusion
References
Cyber Physical Systems in Clinical Setting
Abstract
1. INTRODUCTION
1.1. Cyber Physical Systems
1.2. Definition of Sensor
1.3. Classification of Sensors
1.4. Usage of Sensors
1.5. How Do the Sensors’ Function?
1.6. Diverse Variety of Sensors
1.6.1. Touch Sensor
1.6.2. Color Sensor
1.6.3. Humidity Sensor
1.6.4. Magnetic Sensor (Hall Effect Sensor)
1.6.5. Microphone (Sound Sensor)
1.6.6. Flow and Level Sensor
1.6.7. Strain and Weight Sensor
1.7. Key Difficulties in CPS
1.8. Security Challenges in CPS
1.8.1. High Assurance Software
1.8.2. Interoperability
1.8.3. Context Awareness
1.8.4. Autonomy
1.8.5. Security and Privacy
1.8.6. Certifiability
1.8.7. Executable Clinical Workflows
1.8.8. Model-based Development
1.8.9. Physiological Close-loop Control
1.8.10. Patient Modeling and Simulation
1.8.11. Smart Alarms and Adaptive Patients
1.8.12. User-centered Design
1.8.13. Infrastructure for Medical-Device Integration and Interoperability
1.8.14. Compositionality
1.8.15. Security and Privacy
1.8.16. Verification, Validation and Certification
2. SENSOR NETWORKS AND TRANSMISSION TECHNOLOGIES
2.1. Types of Networks
2.1.1. Body Area Network (BAN)
2.1.2. Personal Area Network (PAN)
2.1.3. Local Area Network (LAN)
2.1.4. Metropolitan Area Network (MAN)
2.1.5. Wide Area Network (WAN)
2.2. Transmission Technologies
2.2.1. Wired Transmission
2.2.1.1. Controller Area Network (CAN) bus
2.2.1.2. RS232
2.2.1.3. RS485
2.2.1.4. USB
2.2.1.5. RJ45
2.2.2. Wireless Transmission
2.2.2.1. 3G/4G/5G
2.2.2.1.1. UMTS
2.2.2.1.2. LTE
2.2.2.2. Global Positioning System (GPS)
2.2.2.3. RFID
2.2.2.4. Comparison of Wireless Transmission Technologies
3. ARCHITECTURE OF CYBER PHYSICAL SYSTEM
3.1. Design Requirements of CPS Architecture
3.1.1. Reliability
3.1.2. Accuracy
3.1.3. Latency
3.1.4. Scalability
3.1.5. Interoperability
3.1.6. Autonomy
3.1.7. Protection and Confidentiality
3.1.8. QoS
3.2. Generic Architecture of CPS
3.3. Service Oriented Architecture (SOA) for CPS
3.3.1. Service Description
3.3.2. Service Composition
3.3.3. Service Registry
3.3.4. Service Discovery
3.3.5. Service Monitoring
3.3.5.1. Advantages of SOA
3.4. CPS Layer Model
3.4.1. Physical Layer
3.4.2. Network Layer
3.4.3. Decision Layer
3.4.4. Application Layer
3.5. CPS Architecture for Clinical Setting
3.5.1. Physical / Sensor Layer
3.5.2. Network Layer
3.5.3. Decision Layer
3.5.4. Application Layer
3.5.4.1. Statistics-based Applications
3.5.4.2. Monitoring-based Applications
3.5.4.3. Knowledge-based Applications
3.5.4.4. Prediction-based Applications
3.6. Enabling Technologies for Healthcare Cyber Physical Systems
4. IMPLEMENTATION OF CPS IN CLINICAL SETTING
4.1. Cyber Physical Systems in Clinical Settings
4.2. Mechanism Makes up Cyber Physical Systems
4.3. How Does a Cyber-physical System Operate?
4.4. Implementation of Cyber Physical Systems
4.4.1. Connection Level
4.4.2. Conversion Level
4.4.3. Cyber Level
4.4.4. Cognition Level
4.4.5. Configuration Level
5. EMERGING CYBER-PHYSICAL SYSTEMS IN CLINICAL SETTINGS
5.1. CPS Based Hospital Asset and Patient Location Tracking System
5.1.1. Working of the Asset Tracking System
5.1.1.1. Asset Tracking Module
5.1.1.2. Patient Tracking Module
5.1.2. Advantages
5.1.3. Similar CPS Applications in Clinical Settings
5.2. Medical CPS (MCPS) and Big Data Platform
5.3. LiveNet
5.4. HipGuard
5.5. AlarmNet
CONCLUSION
REFERENCES
Cyber Physical Systems in Autonomous and Unmanned Aerial Vehicles
Abstract
1. INTRODUCTION
1.1. Evolution of Autonomous Vehicles
1.2. Introduction to Unmanned Aerial Vehicles (UAVs)
2. IMPORTANCE OF CPS
2.1. Advantages of Cyber Physical Systems
2.1.1. Smart-city Administration
2.1.2. Infrastructure
2.1.3. Automotive
2.1.4. Agriculture
2.1.5. Sustainability
2.1.6. Security and Privacy
2.1.7. Health Care
3. CHALLENGES WITH RESPECT TO CYBER PHYSICAL SYSTEMS
3.1. Hybrid
3.2. Multidisciplinary
3.3. Distributed
3.4. Large-scale
3.5. Dynamic
3.6. Adaptive
3.7. Human-in-the-loop
3.8. Steps that can be Taken to Overcome the Mentioned Challenges
3.8.1. Cross-domain
3.8.2. Based on components
3.8.3. Educational
3.8.4. Time-awareness
3.8.5. Trust-conscious
3.8.6. Human-centric
4. ROLE OF CPS IN AUTONOMOUS VEHICLES
4.1. Design Prospects of CPS in Autonomous Vehicles
4.1.1. Model Based Design (MBD)
4.1.2. Cyber-physical Systems
4.1.3. Human-in-the-loop System
4.2. Two Basic Elements are Necessary for these Systems to Operate Effectively
4.2.1. Component-based Design
4.2.2. Design for Security & Privacy
4.3. Aspects of CPS in the Present Era
4.4. Future Prospects of Cps
5. ROLE OF CPS IN UNMANNED AERIAL VEHICLES
5.1. Present State of Art of Cps in UAVs
5.1.1. ReMinds
5.1.2. Cps Research Incubator
5.2. Future Prospects of CPS In UAVs
CONCLUSION
REFERENCES
Cyber-Physical System: Advances and Applications in Cyber Security
Abstract
1. INTRODUCTION
1.1. Evolution of CPS
1.1.1. Benefits of CPS
1.1.1.1. Agriculture
1.1.1.2. Smart City Management
1.1.1.3. Automotive
1.1.1.4. Safety
1.1.1.5. Sustainability
1.1.1.6. Health Care
1.1.1.7. Infrastructure
1.1.2. Applications of CPS
2. CHALLENGES IN TERMS OF SECURITY IN CPS
2.1. Network Vulnerabilities
2.2. Platform Vulnerabilities
2.3. Management Vulnerabilities
2.3.1. Assumption and Isolation
2.3.2. Increasing Networking
2.3.3. Diversity
2.4. USB Usage
2.5. Bad Practice
2.6. Spying
2.7. Homogeneity
2.8. Suspicious Employees
3. CPS IN INDUSTRY
3.1. CPS Management System
3.1.1. Types of Threats
3.1.1.1. Zero Attacks
3.1.1.2. Attacks on Spying
3.1.1.3. Denial of Service Attacks
3.1.1.4. Data Injection Attacks
3.1.1.5. Replay Attacks
3.1.1.6. Side-Channel Assaults
4. SYSTEM MODELLING OF CPS
5. CPS SECURITY REQUIREMENTS
5.1. Privacy
5.2. Dependability
5.3. Durability
5.4. Interaction and Coordination
5.5. Operational Security
5.6. System Hardening
6. VARIOUS APPROACHES OF CPS SECURITY
6.1. Binary Hypothesis and Bayesian Detection
6.2. Weighted least square approaches
6.3. DoS Attack Strategies
6.4. Deception Attack Strategies
Replay Attack Strategies
7. DIFFERENT ALGORITHMS FOR CPS SECURITY
7.1. Algorithm for Threat Modeling Approach
7.2. Digital Twinning Algorithm
7.2.1. Overview of the Proposed Framework
7.3. Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical Systems with 1-Based Power System Security Algorithm
7.4. Alignment of CPS Security and Safety Using Failure Graph of Attack-Countermeasure (FACT)
7.4.1. Step 1
7.4.2. Step 2
7.4.3. Step 3
7.4.4. Step 4
8. FUTURE ASPECTS OF IMPROVEMENT
8.1. Upkeep of Security Services
8.2. Confidentiality
8.3. Integrity of Message/Device
8.4. Device and data accessibility
8.5. Authentication of Devices and Users
8.6. Digital Evidence Protection
8.7. Improving Security Policy
8.8. Intelligent Collaborative Effort with Non-cryptographic Solutions
8.9. Compliance Enforcement
8.10. Obtaining a Trade-off
8.11. Availability
8.12. Safety and Security
CONCLUSION
ABBREVIATIONS
REFERENCES
Cyber-Physical Systems in HealthCare
Abstract
1. INTRODUCTION
2. CURRENT TRENDS
2.1. Software Based
2.2. Increased Connectivity
2.3. Continuous Monitoring
3. PHYSIOLOGICALLY CLOSED LOOP SYSTEMS
3.1. Taxonomy
3.2. Application
3.3. Assisted
3.4. Controlled
3.5. Computation
3.6. Modelling
3.7. Monitoring
3.8. Communication
3.9. Scheduling
3.10. Protocol
3.11. Security
3.12. Privacy
3.13. Encryption
3.14. Sensors
3.14.1. Sensors Types
3.14.2. Method
3.14.3. Parameters
4. Applications in Health Care
4.1. Covilearn
4.1.1. Introduction
4.1.2. Datasets
4.1.3. Device Setup
4.1.4. Transfer Learning
4.1.5. Working of Covilearn
4.1.6. Major Contributions
4.2. E-stocking
4.2.1. System Level
4.2.2. Subsystem Level
4.2.3. Realization
4.2.4. Evidence Production
4.2.5. Electrochemical
4.2.6. Computation
4.2.7. Communication
4.2.8. Results
4.3. False Alarms
4.3.1. Architecture
4.3.2. Results
5. MONITORING
5.1. Smartphone Ecg
5.2. Mobi Health
5.3. Predicting Vital Signs
5.4. Code Blue
6. MEDICINE INTAKE APPLICATIONS
6.1. iCabiNET
6.2. iPACKAGE
7. DAILY LIVING APPLICATIONS
7.1. Livenet
7.2. Hipgaurd
8. Based on Technology
8.1. Cloud-based Data Collection
8.2. Digital Twins
8.3. PLUG AND PLAY DEVICES
9. OTHER NOTABLE APPLICATIONS
9.1. Electronic Medical Records (EMR)
9.2. Smart Checklist
9.3. Istertch
10. Advantages
10.1. Network Integration
10.2. Interaction of Human and System
10.3. Automation
10.4. Better Performance
10.5. Response Time
10.6. Optimization
10.6. Certainty
10.7. Scalability
10.8. Flexibility
11. Challenges And Opportunities
11.1. Model-based
11.2. User-controlled Design
11.3. Data Privacy and Security
11.4. Verification and Validation
CONCLUSION
REFERENCES
Journey from Data Warehouse to Data Lake
Abstract
1. INTRODUCTION
2. DATA LAKE AND ITS BENEFITS
2.1. Benefits of Data Lake
3. DATA LAKE VS DATA WAREHOUSE
4. DATA LAKE ARCHITECTURE
4.1. Data Ingestion Layer
4.2. Data Storage Layer
4.3. Data Processing and Query Layer
4.4. Data Presentation and Visualization Layer
4.5. Data Management Layer
5. DATA LAKE AND HADOOP
5.1. Hadoop Ecosystem
5.2. HDFS (Hadoop Distributed File System)
5.3. YARN (Yet Another Resource Negotiator)
5.4. MapReduce
5.5. PIG
5.6. HIVE
5.7. Mahout
5.8. HBase
5.9. Zookeeper
5.10. Apache Flume
5.11. Apache Sqoop
6. DATA LAKE CHALLENGES AND RECOMMENDATIONS
6.1. Building of Data Lake
6.2. Managing of Data Lake
6.3. Extracting the Valuable Data
CONCLUSION
REFERENCES
Feature Selection and Classification Models of Intrusion Detection Systems -A Review on Industrial Critical Infrastructure Perspective
Abstract
1. INTRODUCTION
1.1. IDS for Industrial Control Systems
1.2. Types of Intrusion Detection Systems
1.2.1. Signature-based IDS
1.2.2. Anomaly or Behaviour-based IDS
1.3. Network IDS
1.4. Host-Based Intrusion Detection System
1.5. Protocol-Based Intrusion Detection System
1.6. Application Protocol-based Intrusion Detection System
1.7. Virtual Machine-Based Intrusion Detection System (VMIDS)
2. FEATURE SELECTION
2.1. Unsupervised
2.2. Supervised
2.2.1. Filter Method
2.2.1.1. Information Gain
2.2.1.2. Chi-square Test
2.2.1.3. Fisher's Score
2.2.1.4. Missing Value Ratio
2.2.2. Wrapper Method
2.2.2.1. Repeat Until Optimum
2.2.2.2. Forward Selection
2.2.2.3. Step Backward Feature Selection
2.2.2.4. Exhaustive Feature Selection
2.2.2.5. Recursive Feature Elimination
2.2.3. Embedded Method
2.2.3.1. Regularisation
2.2.3.2. Random Forest Importance
2.2.3.3. Ensembling
2.2.3.4. Parallel Ensemble Learning (Bagging)
2.2.3.5. Stacking Ensemble Learning (Stacking)
3. Model I
4. Model II
5. Model III
6. Model IV
7. Model V
8. Model VI
9. CLASSIFICATION MODELS
9.1. Real-Time Processing
9.2. Scalability and Performance
9.3. Anomaly Detection
9.4. Explainability and Interpretability
CONCLUSION
REFERENCES
Cyber Physical Systems - Advances and Applications
Edited by
Anitha Kumari K.
Department of Information Technology
PSG College of Technology, Coimbatore
TN, India
&
Avinash Sharma
Chandigarh Engineering College, Jhanjeri, Mohali
Punjab 140307, India

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use)

This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the ebook/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.

Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules:

All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it.The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer:

Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability:

In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General:

Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.

Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]

PREFACE

This book aims to address the challenges prevailing in Cyber-Physical Systems by providing promising solutions through innovative techniques and thereby safeguarding the digital environment. A computer system that uses computer-based algorithms to control or monitor a mechanism is notoriously known as a Cyber-Physical System (CPS). A broader range of services and applications are available due to the rapid development of CPS in recent years including e-Health, e-Commerce, UAV, game theory, smart grid, and industry automation that influences people's lives in various ways.

The information in this book offers numerous techniques and methods that address various security concerns in the field of automation and cyber-physical world. Precautionary and preventive measures are discussed with organized examples. Analytical approach to Rescue Automation from External Assaults, Analysis of Various Threat Detection and Prevention Techniques in IoT Environment, Security in Smart Grid Cyber-Physical System, Cyber Physical Systems in Clinical Setting, Cyber Physical Systems and Game Theory Integration, Cyber-Physical Systems in HealthCare, Augmented reality in Cyber-Physical System: Challenges and Concerns, Comprehensive Study on Network and Computer Forensic Framework and A Review on Industrial Critical Infrastructure Perspective have all been thoroughly covered. By enabling readers to understand and use Cyber Physical Systems technology in a safe manner in an insecure environment, we the editors think that this book will undoubtedly be useful to academics, researchers, students, and industry professionals.

We would like to sincerely thank our reviewers for their assistance despite their busy schedules. We sincerely appreciate each and every one of our authors for their diligent chapter preparation and on-time submission. We pay a deep sense of gratitude to Bentham Science Publishers from the bottom of our hearts for accepting our proposal to edit this book and for their unwavering support throughout the editing process. We owe a debt of gratitude to everyone who assisted in the successful editing of this book.

We believe that this book creates a good impact and plays a quintessential role in every reader’s life to imagine and develop smart systems for the betterment of the community. This satisfaction will spur us on to create more edited works that will benefit society.

Anitha Kumari K. Department of Information Technology PSG College of Technology, Coimbatore TN, India &Avinash Sharma Chandigarh Engineering College, Jhanjeri, Mohali Punjab 140307, India

List of Contributors

Avinash SharmaChandigarh Engineering College, Jhanjeri, Mohali, Punjab 140307, IndiaA.S. Rakseda keerthiPSNA College of Engineering and Technology, Dindigul, Tamil Nadu, IndiaAlaska TengliDepartment of Electronics and Communication, R. V. College of Engineering Bangalore Mysore Rd, RV Vidyaniketan, Karnataka-560059, IndiaAnitha Kumari K.Department of Information Technology, PSG College of Technology Coimbatore TN, IndiaD. PriyaDepartment of Computer Networking, PSG Polytechnic College, TN, IndiaGeeta RaniDepartment of Computer Science and Engineering APEX, Chandigarh University, Haruan, Punjab, IndiaL. LathaKumaraguru College of Technology, Coimbatore-641022, IndiaM. KarthighaSri Ramakrishna Engineering College, Coimbatore-641022, IndiaM. RevathyPSNA College of Engineering and Technology, Dindigul, Tamil Nadu, IndiaP.S. PavithraSRM Institute of Science and Technology, Chennai, IndiaPuninder KaurInstitute of Engineering and Technology, Chitkara University, Punjab, IndiaP. DurgadeviSRM Institute of Science and Technology, Chennai, IndiaRamavenkateswaran N.Department of Electronics and Communication, R. V. College of Engineering Bangalore Mysore Rd, RV Vidyaniketan, Bengaluru, Karnataka-560059, IndiaR. MadhumathiSri Ramakrishna Engineering College, Coimbatore, IndiaS. BrindhaDepartment of Computer Networking, PSG Polytechnic College, Coimbatore, IndiaSindhu RajendranDepartment of Electronics and Communication, R. V. College of Engineering Bangalore Mysore Rd, RV Vidyaniketan, Bengaluru, Karnataka-560059, IndiaShreya S.Department of Electronics and Communication, R. V. College of Engineering Bangalore Mysore Rd, RV Vidyaniketan, Bengaluru, Karnataka-560059, IndiaShilpa S.P.Department of Electronics and Communication, R. V. College of Engineering Bangalore Mysore Rd, RV Vidyaniketan, Bengaluru, Karnataka-560059, IndiaSai Priya L.Department of Electronics and Communication, R. V. College of Engineering Bangalore Mysore Rd, RV Vidyaniketan, Bengaluru, Karnataka-560059, IndiaT.P. KamatchiDepartment of Computer Networking, PSG Polytechnic College, TN, India

A Comprehensive Analysis of Various Threat Detection and Prevention Techniques in IoT Environment

P.S. Pavithra1,*,P. Durgadevi1
1 SRM Institute of Science and Technology, Chennai, India

Abstract

The Internet of Things (IoT) has become one of the most widely used technologies in recent times. IoT devices can be enabled to collect, and exchange information in a highly efficient manner via the network. A smart object with technology and devices builds a network infrastructure that is used in a variety of areas such as mechanical, building, medical, manufacturing, entertainment, and transport. The major security issues such as confidentiality, authentication, confirmation, security systems, system configuration, data storage, and administration are the main challenges in an IoT environment. To overcome these security issues, various techniques are addressed. Initially software called an Intrusion Detection System (IDS) was used that monitors a network of malicious activity using valuable tools in IoT devices. Then, the machine technique was used to detect the attacks from the intrusion detection system to provide embedded intelligence in IoT devices and networks. Finally, Blockchain (BC) technology is gaining traction in modern IoT devices to address security and privacy challenges to provide reliable communication in an IoT environment. The aim of this work is to provide a detailed review of ML and BC techniques that can be used to develop revamped IoT security devices.

Keywords: Attack, IoT Layers, Protocols, ML Techniques.
*Corresponding author P.S. Pavithra: SRM Institute of Science and Technology, Chennai, India; E-mail: [email protected]

1. INTRODUCTION

IoT is a network of sensors and objects that can communicate with one another without human intervention. The “things” in the IoT are hardware objects such as wearable sensors, that detect and collect different types of data about technology and human social activity. The Internet of Things keeps people, objects, devices, and services all interconnected at all times.

The primary objective of the Internet of Things is to create a broadband network with interrelated communication systems and applications that help physical/virtual sensors, home computers (PCs), digital phones, motorcars, and items such as fridges, washing machines, household appliances, food, and medications to be connected and embedded anywhere at all possible time and on any network. The requirements for large-scale IoT deployment are rapidly growing and eventually pose a serious security issue. Privacy, authorization, authentication, security systems, system configuration, data storage, and monitoring are the primary issues in the IoT environment [1]. IoT devices are linked to complex devices, interact with the environments, and are deployed on a wide range of unmanaged systems. They confront a number of security concerns and challenges. The Internet of Things layer is separated into four layers; its architecture is based on a standard Online communication network, and it is primarily for information transit between IoT devices. In recent years, IDS has shown to be a more reliable and efficient strategy. IDS is a technology that analyses a network for unexpected IoT device performance [2]. IDS can be set up on a single system or on multiple machines in a network. IDS provides several advantages to businesses, including the ability to detect security threats. An IDS (Fig. 1) can aid in the identification of threat types and numbers. This paper outlines a strategy for developing an IDS that employs Machine Learning (ML) approaches to detect data-based threats in order to defend against attacks in the IoT. The hostile devices carry out attacks, where data is collected in two ways: benign information during normal flow and traffic seized during threats. Machine learning techniques are built using a number of approaches to detect malicious behaviour in an IoT infrastructure. Blockchain is a distributed technology with numerous advantages, including increased security and transparency. As a result, blockchain can spearhead itself be a strong platform for payment and communication apps. Thus by using blockchain as a database to keep records of how things communicate, what state they're in, and how they connect with other IoT systems, blockchain can help to solve the majority of IoT privacy and tracing issues.

The detailed review of this paper is carried out as follows: Section 2 shows the classification of IoT layers and their protocols. Section 3 shows security issues in IoT Layers. Section 4 shows security issues occurring with the use of IDS. Section 5 discusses security issues that occur using ML techniques and Section 6 explains security issues that occur using Blockchain technology.

2. CLASSIFICATION OF IOT LAYERS

The IoT can be divided into four layers namely: Application, Middleware and Sensor Layer, as shown in Fig. (2).

Fig. (1)) IoT architecture. Fig. (2)) IoT layers.

2.1. Application Layer

The advantages of IoT in our daily lives are prominent. Security was not a significant design when the IoT was first introduced in the late 1960s since security risks were not properly accommodated. Security has become crucial for the IoT's long-term viability and widespread adoption. IoT applications and sensors have infiltrated every part of our lives [3]. IoT has become a critical component of many healthcare contexts. IoT sensors have made their way into our living environments by paving ways to create smart home which includes Possible sources, led lights, thermostats, and other home equipment are now equipped with networking capabilities, enabling wireless remote control. Almost every household item can now be utilised in an autonomous way by operating it remotely. We are now surrounded by IoT apps and devices in our homes, automobiles, railroads, roads, transport, farming, and companies, as shown in Fig. (3).

Fig. (3)) Application layer.

2.2. Middleware Layer

Middleware for IoT devices is a technology that acts as an interface between network elements which improves the interaction of network elements that would otherwise be incompatible. Middleware combines disparate, often sophisticated, and already-existing programmes that were not linked in the first place. IoT is defined as the ability for almost anything to be interconnected and transfer data through a system. Middleware (Fig. 4) is a component of the design that enables connectivity for a large number of different things by providing a connection layer for the network layer as well as the application layers that provide solutions that enhance efficient software interactions.

Fig. (4)) Middleware layer protocols.

The Aggregator, Local Service Gateway (LSG), and IoT server are the three basic layers of IoT middleware. Sensor abstraction is provided by the aggregator which hides the hardware characteristics of the actual sensors and presents a single interface for searching and subscription to sensor data. The LSG layer receives raw data from the aggregator [4]. The LSG connects the Internet of Things system to the rest of the world. For contextual refinement and aggregation purposes, it may analyse basic data given by the aggregator. The LSG also sends the data to the IoT server, along with a data GUID, user access framework, and memory location information (human-readable names or NA). Through its edge router, programs (users) can request the IoT server about where to get information from. The data can then be retrieved from a storage place or right from the aggregator. The IoT server can select whether to perform network access internally or outsource it to the NCRS/GNRS. Huang and colleagues offer a security paradigm for the Internet of Things that aims to find the balance between security and usability. A body-area network, a home network, and a motel network are three key scenarios where customer experience is vital. A logistics IoT scenario and an office IoT situation were also studied. A survey has been carried out to fully understand consumer perceptions of the relevance of safety vs. accessibility, as well as how ready users are to sacrifice one for the other. Authentication, consistency, and accessibility were three characteristics of security that users were asked about. While different components of safety matter vary depending on the specific application, the survey results reveal that security is important to all people and in all apps. This is especially true when it comes to security and payment services.

2.3. Network Layer

The network layer controls data transfer to and from various products or applications using a range of assessment methods and techniques across wired or wireless communications [5]. The network layer takes the analysed data from the perception layer and chooses the optimal methods for transmitting it via products to IoT devices, ports, and bridges (Fig. 5).

Fig. (5)) Network layer protocols.

2.3.1. Low Power Wi-Fi

Devices that enable WiFi, like some other Wireless connections, IP communication is also supported by HaLow, which is vital for IoT systems. Let's take a look at the characteristics of the IEEE 802.11ah standard. This standard was created to deal with resource sensor network applications that demand particularly long communication. IEEE 802.11ah runs at 900 MHz in the semi-range [5]. The range is greater due to lower frequency, while greater range waves suffer from greater absorption. We can increase the range (now 1 kilometre) by lowering the frequency, but the data rate will be reduced as well, thus the compromise is not justifiable. Huge star-shaped networks, where many nodes are connected to a specific access point, are also supported by IEEE 802.11ah.

2.3.2. Zigbee

It is used for local area networks, or PANs, and is based on the IEEE 802.15.4 communication protocol standard. The Zigbee partnership, which aims to develop dependable, low-energy, and low-cost communication technologies, created Zigbee. The communication range of Zigbee devices is fairly short (10–100 metres). The Zigbee standard also specifies the details of the network and application levels. The network layer here, unlike BLE, allows for multichip routing.

2.3.3. Near Field Communication (NFC)

NFC is a very Small-range wireless transmission technology that enables portable devices to communicate with each other across a few millimetres [6]. By bringing two NFC-enabled devices close to one another, any form of data can be exchanged in seconds. RFID is the foundation of this technology. It communicates information between multiple NFC-enabled devices by utilising magnetic field fluctuations. NFC uses the 13.56 MHz frequency range, which is the same as high-frequency RFID. Active and passive modes of functioning are available. Both devices produce magnetic fields in the active mode, however, in the passive mode, only one device produces the field and the other transfers data through load modification. In rechargeable battery devices, the passive mode is useful for maximising energy efficiency. The requirements of proximity between devices have the advantage of facilitating data security such as payments. Finally, unlike RFID, NFC can be utilised for bidirectional communication. As a result, practically every smartphone on the market today supports NFC.

2.3.4. BLE

The Bluetooth Special Interest Group formed Bluetooth Low Energy, popularly called “Bluetooth Smart.” When compared to rival procedures, it has a shorter range and uses less energy. The BLE communication device is comparable to that used in traditional Bluetooth. It consists of two parts: the actuator and the client. The hardware and connectivity layers are implemented by the device. The computer is often a SOC with a TV. The uppermost layers' capacities are contained in the server. BLE is inconsistent with the traditional Bluetooth. There are differences between the standard WiFi and Bluetooth Low Energy (BLE).

2.3.5. Low Power Wide-Area-Networks (LPWAN)

The low-power wide area network (LPWAN) is a communication network for connecting reduced, rechargeable battery objects over long distances [7]. LPWANs that were built for M2M and Internet of Things (IoT) networks, are less expensive and consume less power than traditional wireless services. They can also connect a great variety of mobiles over a greater distance. LPWANs can accept data traffic that varies from 10 to 1,000 bytes at upload rates of up to 200 Kbps. The distance of an LPWAN can range from 2 km to 1,000 km, depending on the method. Most LPWANs have a network system, similar to Wi-Fi, in which each destination communicates to a central hub.

2.4. Sensor Layer

For all IoT systems to gather information from the environment, one or more sensors are necessary. Sensors are a crucial component of intelligent devices. Environment information is one of the most crucial parts of the Internet of Things [8], which is impossible to achieve without sensing devices. Sensors for the Internet of Things are usually compact, low-cost, and a source of energy (Fig. 6). They are limited by variables like storage capacity and easy installation. Here, a broad overview of the different types of detectors that can be used to develop effective solutions is given.

Fig. (6)) Sensor layer.

2.4.1. Mobile Phone Sensors

First, consider the omnipresent mobile phone, which contains a variety of sensors. The smartphone, in particular, is a particularly convenient and user-friendly device with a variety of built-in connectivity and information processing features. Because of the integrated sensors, researchers are expressing interest in developing smart IoT solutions employing mobile phones as a result of their growing popularity. Depending on the situation, extra sensors may be required. On the smartphone, software can be created that leverages sensor data to provide useful outcomes. The following are some of the sensors found inside a smart device [8]. A smartphone phone's sensor detects motion and acceleration. It usually measures changes in the smartphone's movement in three dimensions. Accelerometers come in a variety of shapes and sizes. An earthquake mass in housing is linked to the building using a spring-mass system in a physical accelerometer. Because the mass moves slowly and is left behind when the housing moves, the force in the spring can be linked to the acceleration.

2.4.2. Healthcare Sensors

IoT can be tremendously beneficial in health applications. Devices can be used to evaluate and monitor a wide variety of clinical works in the body. The apps can be used to monitor a patient's condition while they aren't in the healthcare setting alone. The physician, relatives, or patients can then receive real-time feedback. McGrath and Swanbill have gone to great length about the sensing devices that can be carried worn by the human body to track people's health.

2.4.3. Neural Sensors

It is now possible to study brain waves, analyse the brain's condition, and educate the mind to enhance focus and be attentive. This is known as neurofeedback. The technique used to detect mind waves is EEG or a brain parts connection. Physical interactions between nerve cells produce an electric field that can be defined in terms of wavelengths externally. Brain waves are categorised as Delta, theta, gamma, Beta, and alpha waves based on frequency.

2.4.4. Environmental and Chemical Sensors

ES detects physical elements in the physical surroundings such as temperatures, moisture, force, water contamination, and air quality. Temperature and humidity can be measured with a thermostat or a gauge. Air quality can be determined using sensors to monitor the existence of chemicals and other particulates in the atmosphere. Chemical sensors can detect biological and chemical substances. These sensors are comprised of a reference electrode and an actuator. Individually, the electroscope (e-nose) and electronics tongue (e-tongue) are devices for detecting chemicals based on aroma and taste. The e-nose and e-tongue are made up of a variety of sensing devices and powerful pattern recognition software. The e-nose and e-tongue sensors produce complex data, which is evaluated using predictive modelling to identify the input.

2.4.5. RFID