rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
Wiley Global Headquarters
111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 9781119896333
Cover image: IoT industry 4.0 concept, Ekkasit919 | Dreamstime.com
Cover design by Kris Hackerott
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines
Printed in the USA
10 9 8 7 6 5 4 3 2 1
Preface
With an enormous range of applications, Internet of Things (IoT) has magnetized industries and
academics from everywhere. IoT facilitates communication and operations through Internet access to all the devices with computing capabilities. Many applications can be applied in IoT, such as intelligent transportation systems, real-time medical monitoring, intelligent appliances and intelligent agriculture, and the smart grid. Internet of Things (IoT) makes a smart communication process between objects and their environment over the internet. Security and privacy are two important aspects of IoT applications. Smart objects and machine-to-machine communications with complete data security are now a demand. Similarly, privacy is another major challenge of IoT applications where an object is free from interference from other objects. Trust based communication is one way to deal with these primary IoT based aspects. Internet of Things (IoT) creates a world where smart objects and services interact autonomously. Therefore, a central issue is whether the service provided by a selected IoT device is trustworthy. Further, most IoT devices are mobile and will connect to the Internet on and off, depending on the location they roam into as well as the energy status of individual IoT devices. Considering the dynamic-heterogeneous characteristic of interconnected devices in IoT, it demands an effective and efficient trust-based IoT communication system that can scale to many heterogeneous devices in IoT systems. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviours randomly to avoid being rated as a menace.
Security and privacy are two important aspects of IoT applications. Smart objects and machine-to-machine communications with complete data security are now a demand. Similarly, privacy is another major challenge of IoT applications where an object is free from interference from other objects. Trust based communication is one way to deal with these primary IoT based aspects. A trust-based communication system is needed to guarantee security, authentication, authorization, and confidentiality of connected things, regardless of their functionality because not all IoT devices will be trustworthy and some IoT devices may behave maliciously to disrupt the cloud service (e.g., an adversary) or just for their own gain (e.g., for increasing their chances to be selected to provide requested services). Furthermore, users who own IoT devices are likely to be socially connected via social networks. For participatory sensing IoT Applications, it is critical to assess source trustworthiness of IoT devices which report sensing results, so untrustworthy data can be filtered out before data analysis is taken.
This book encompasses all aspects of research and development of secure IoT applications. It delivers technologies to improve trust and eliminate malicious actors in participatory exchanges throughout the communication using IoT devices ss that these methods are not only be able to identify bad actors, but also to improve communication and trust in the environment without violating object privacy. This book also covers a broad spectrum of applications in the community from industry, government, and academia. This book brings together thought leaders, researchers, industry practitioners, potential users of communication technology, and IoT device manufacturers to develop the field, discuss new trends and opportunities, exchange ideas and practices, and promote interdisciplinary and cross-domain collaborations.
Dr. Prateek Agrawal Dr. Vishu MadaanDr. Anand Sharma Dr. Dilip SharmaMr. Akshat AgarwalDr. Sandeep Kautish
Book Description
This book “Trust-Based Communication Systems for Internet of Things Applications” provides the conceptual and fundamental research related to secure and trust-based communication in IoT devices and applications. It also includes demonstrations on a wide range of interdisciplinary applications and innovative developments in the field of IoT such as IIoT, block-chain technology, etc. that address the latest findings and results regarding a wide variety of technological issues and developments to reform the scientific society.
The book contains 12 chapters. Chapter 1 titled “An Analysis of the Internet of Things (IoT) as the Defining Technology of a Generation” highlights the fundamental concepts of various IoT applications such as interoperability, smart cities, smart pharmacy, workplaces, home, transport, and vegetable traceability framework.
Chapter 2 titled “Blockchain in IoT and Limitations” presents the decentralized approach using blockchain technology to secure the IoT applications and highlight its limitations.
Chapter 3 titled “IoT Protocol Security Mechanisms” discusses several security aspects in IoT applications and discusses various cryptographic protocols which can be used in different IoT enabled applications to secure inter-communication.
Chapter 4 titled “IoT Security, Privacy, Challenges, and Solutions” presents a few highlights on IoT security, privacy, challenges, and solutions. The chapter begins with an introduction to IoT. and its architecture and later addresses