Table of Contents 1
Cover
4
1 Home Automation Solutions for SecureWSN
1.1. Introduction
1.2. Background
1.3. Design decisions
1.4. Implementation
1.5. Evaluation of HAIFA
1.6. Summary and conclusions
1.7. Acknowledgements
1.8. References
5
2 Smart Home Device Security: A Survey of Smart Home Authentication Methods with a Focus on Mutual Authentication and Key Management Practices
2.1. Introduction
2.2. Smart home – introduction and technologies
2.3. Smart home security
2.4. Smart home authentication mechanisms
2.5. A primer on mutual authentication and key management terminologies
2.6. Mutual authentication in smart home systems
2.7. Challenges and open research issues
2.8. Conclusion
2.9. References
6
3 SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments
3.1. Introduction
3.2. Related literature
3.3. System design considerations
3.4. Silicon physically unclonable functions(PUF)
3.5. Convolutional encoding and Viterbi decoding the SRAM words
3.6. CMOS SRAM PUF construction
3.7. Algorithms for issuing CRP
3.8. Security of PUF-based IoT devices
3.9. Conclusions
3.10. Acknowledgements
3.11. References
7
4 IoT Network Security in Smart Homes
4.1. Introduction
4.2. IoT and smart home security
4.3. IoT network security
4.4. Prevailing standards and initiatives
4.5. Conclusion
4.6. References
8
5 IoT in a New Age of Unified and Zero-Trust Networks and Increased Privacy Protection
5.1. Introduction
5.2. Internet of Things
5.3. IoT security and privacy challenges
5.4. Literature review
5.5. Security and privacy protection with a zero-trust approach
5.6. Case study: secure and private interactive intelligent conversational systems
5.7. Discussion
5.8. Conclusion
5.9. Acknowledgements
5.10. References
9
6 IOT, Deep Learning and Cybersecurity in Smart Homes: A Survey
6.1. Introduction
6.2. Problems encountered
6.3. State of the art
6.4. IoT architecture
6.5. IoT security
6.6. Artificial intelligence, machine learning and deep learning
6.7. Smart homes
6.8. Anomaly detection in smart homes
6.9. Conclusion
6.10. References
10
7 sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices
7.1. Introduction
7.2. Definitions and history of IoT
7.3. IoT-related security concerns
7.4. Background knowledge for sTiki
7.5. The sTiki protocol
7.6.