Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Sciences - Internet of Things, IOT

Towards Design and Development of Secure and Privacy-Preserving Frameworks for IoT-enabled Networks

Title: Towards Design and Development of Secure and Privacy-Preserving Frameworks for IoT-enabled Networks

Doctoral Thesis / Dissertation , 2022 , 219 Pages , Grade: First

Autor:in: Prabhat Kumar (Author)

Computer Sciences - Internet of Things, IOT
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

With the advancement of low-cost and low energy-consuming sensors, the Internet of Things (IoT) is building a network of Internet-enabled devices. The concept of IoT is employed in almost all fields such as healthcare, smart cities, smart grids, energy distribution, agriculture, and even transportation. In a typical IoT-enabled network, smart sensors are geographically distributed to collect and process data within a smart infrastructure using an open channel, the Internet. However, the use of the Internet brings inherent vulnerabilities related to security (e.g., IoT devices can be compromised using advanced hacking techniques) and privacy (e.g., adversary performing inference and data poisoning attacks). Intrusion Detection System (IDS) and Cyber Threat Intelligence (CTI) are the two most extensively used techniques in IoT-enabled networks to safeguard the integrity and availability of sensitive smart systems. However, the presence of a large volume of data i.e., dimensionality curse and cloud-based centralized deployment mechanism hurts the IDS performance in terms of intrusion detection tasks and increased latency for data processing. On the other hand, modelling CTI is challenging due to the limited labels of cyber threat sources, and analysing these sources to extract relevant threat information manually is a time-consuming and error-prone procedure that necessitates a large investment of resources.

This thesis provides substantial contributions to research on the building of a distributed IDS, a hybrid feature selection approach, an automated CTI Modelling and Identification scheme, and a deep privacy-encoding module for enhancing security and privacy of IoT-enabled networks.

Excerpt


Inhaltsverzeichnis (Table of Contents)

  • Chapter 1: Introduction
    • 1.1 Motivation
    • 1.2 Challenges in IoT Security and Privacy
    • 1.3 Research Contributions
    • 1.4 Organization of Thesis
  • Chapter 2: Related Work
    • 2.1 Introduction
    • 2.2 Security Threats and Attacks in IoT
    • 2.3 Existing Privacy-Preserving Techniques
    • 2.4 Existing Solutions for IoT Security
    • 2.5 Summary
  • Chapter 3: Secure Authentication and Access Control in IoT
    • 3.1 Introduction
    • 3.2 Secure Authentication Scheme for IoT Devices
      • 3.2.1 System Model and Assumptions
      • 3.2.2 Proposed Authentication Scheme
      • 3.2.3 Security Analysis
    • 3.3 Secure Access Control Framework for IoT Networks
      • 3.3.1 Design Objectives
      • 3.3.2 Proposed Access Control Framework
      • 3.3.3 Implementation and Evaluation
    • 3.4 Summary
  • Chapter 4: Privacy-Preserving Data Collection and Aggregation in IoT
    • 4.1 Introduction
    • 4.2 Privacy-Preserving Data Collection Framework
      • 4.2.1 Design Considerations
      • 4.2.2 Proposed Data Collection Framework
      • 4.2.3 Evaluation and Performance Analysis
    • 4.3 Secure and Privacy-Preserving Data Aggregation Technique
      • 4.3.1 Design Principles
      • 4.3.2 Proposed Aggregation Technique
      • 4.3.3 Security and Privacy Analysis
    • 4.4 Summary
  • Chapter 5: Conclusion and Future Directions

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This thesis explores the design and development of secure and privacy-preserving frameworks for Internet of Things (IoT)-enabled networks. The focus is on addressing the unique challenges posed by the inherent characteristics of IoT systems, such as resource constraints, heterogeneous devices, and data sensitivity.

  • Secure Authentication and Access Control
  • Privacy-Preserving Data Collection and Aggregation
  • Security and Privacy Threats in IoT
  • Design and Implementation of Secure Frameworks
  • Performance Evaluation and Analysis

Zusammenfassung der Kapitel (Chapter Summaries)

Chapter 1: Introduction provides an overview of the research topic, highlighting the motivation, challenges, contributions, and thesis organization.

Chapter 2: Related Work presents a comprehensive review of existing research on security and privacy in IoT. This chapter examines various security threats and attacks, existing privacy-preserving techniques, and existing solutions for IoT security.

Chapter 3: Secure Authentication and Access Control in IoT focuses on developing secure authentication and access control mechanisms for IoT devices. This chapter proposes novel schemes to address the authentication and authorization challenges in resource-constrained IoT environments.

Chapter 4: Privacy-Preserving Data Collection and Aggregation in IoT explores techniques for secure and privacy-preserving data collection and aggregation in IoT systems. This chapter presents frameworks and mechanisms to protect sensitive data while enabling effective data analysis.

Schlüsselwörter (Keywords)

This thesis focuses on the design and development of secure and privacy-preserving frameworks for Internet of Things (IoT)-enabled networks. Key concepts include secure authentication, access control, privacy-preserving data collection, aggregation, and security analysis.

Excerpt out of 219 pages  - scroll top

Details

Title
Towards Design and Development of Secure and Privacy-Preserving Frameworks for IoT-enabled Networks
Course
PhD
Grade
First
Author
Prabhat Kumar (Author)
Publication Year
2022
Pages
219
Catalog Number
V1189176
ISBN (PDF)
9783346624642
ISBN (Book)
9783346624659
Language
English
Tags
Security Privacy Intrusion Detection Systems IoT
Product Safety
GRIN Publishing GmbH
Quote paper
Prabhat Kumar (Author), 2022, Towards Design and Development of Secure and Privacy-Preserving Frameworks for IoT-enabled Networks, Munich, GRIN Verlag, https://www.grin.com/document/1189176
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • https://cdn.openpublishing.com/images/brand/1/preview_popup_advertising.jpg
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  219  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint