Network Security and Internet of Things

Information security is the most critical component of the information system. It is also a challenge of the organizations to build a secure network. Every organization that developed its organizational network has faced security attacks, security risks, and vulnerabilities. Internet of things (IoT) is based on smart devices that connect with each other to formulate a complex network. Therefore, in order to build a secure traditional network and IoT network, understanding the basics of the network layers, network security, and different types of network attacks is essential for network security beginners who are interested in working in the field of information security. In this chapter, the authors reviewed the essential and most important concepts of information security, IoT, and explained these topics in an easy-to-understand way. Furthermore, the chapter discussed the basic level of information security challenges to familiarize the undergraduates and postgraduate students and IoT information security practitioners about it. Network Security and Internet of Things

[1]  Hai Jiang,et al.  Managing Physical Layer Security in Wireless Cellular Networks: A Cyber Insurance Approach , 2018, IEEE Journal on Selected Areas in Communications.

[2]  Sajjad Mahmood,et al.  Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study , 2020, Arabian Journal for Science and Engineering.

[3]  Fengyu Wang,et al.  Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices , 2019, IEEE Access.

[4]  Ranjan Bose,et al.  Channel-Aware Artificial Intersymbol Interference for Enhancing Physical Layer Security , 2019, IEEE Communications Letters.

[5]  Leandros A. Maglaras,et al.  Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form , 2019, IEEE Access.

[6]  Wei Wei,et al.  Research and Simulation of Queue Management Algorithms in Ad Hoc Networks Under DDoS Attack , 2017, IEEE Access.

[7]  Qiaoyan Wen,et al.  A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method , 2018, IEEE Access.

[8]  Christopher N. Gutierrez,et al.  Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks , 2018, IEEE Transactions on Dependable and Secure Computing.

[9]  Xinchang Zhang,et al.  A Survey of Networking Applications Applying the Software Defined Networking Concept Based on Machine Learning , 2019, IEEE Access.

[10]  Mamoona Humayun,et al.  SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET , 2019, 2019 International Conference on Computer and Information Sciences (ICCIS).

[11]  Zhen Yang,et al.  The Security Network Coding System With Physical Layer Key Generation in Two-Way Relay Networks , 2018, IEEE Access.

[12]  George K. Karagiannidis,et al.  Physical Layer Security in the Presence of Interference , 2017, IEEE Wireless Communications Letters.

[13]  Noor Zaman,et al.  A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) , 2019, Wirel. Networks.

[14]  Ilsun You,et al.  A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks , 2019, IEEE Access.

[15]  Sunil B. Mane,et al.  Detecting lateral spear phishing attacks in organisations , 2019, IET Inf. Secur..

[16]  Shahzaib Tahir,et al.  Key-Based Cookie-Less Session Management Framework for Application Layer Security , 2019, IEEE Access.

[17]  Yue Yang,et al.  Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism , 2019, IEEE Access.

[18]  Jianfeng Ma,et al.  Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices , 2019, IEEE Internet of Things Journal.

[19]  Dimitra Simeonidou,et al.  RDNA: Residue-Defined Networking Architecture Enabling Ultra-Reliable Low-Latency Datacenters , 2018, IEEE Transactions on Network and Service Management.

[20]  Prakash Ishwar,et al.  Emerging NUI-Based Methods for User Authentication: A New Taxonomy and Survey , 2019, IEEE Transactions on Biometrics, Behavior, and Identity Science.

[21]  Dong Wang,et al.  Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT With Multiple Access Mobile Edge Computing in Smart City , 2019, IEEE Access.

[22]  Ramona Trestian,et al.  Next-Generation Wireless Networks Meet Advanced Machine Learning Applications , 2019, Advances in Wireless Technologies and Telecommunication.

[23]  Li Li,et al.  Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols , 2017, IEEE Access.

[24]  Lyu Qing,et al.  Physical Layer Security in Multi-Hop AF Relay Network Based on Compressed Sensing , 2018, IEEE Communications Letters.

[25]  Mohammed Atiquzzaman,et al.  LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey , 2018, IEEE Access.

[26]  Zheng Yan,et al.  A Survey on Network Security-Related Data Collection Technologies , 2018, IEEE Access.

[27]  Gang Zhou,et al.  Using Data Augmentation in Continuous Authentication on Smartphones , 2019, IEEE Internet of Things Journal.

[28]  Wei Ni,et al.  A Routing Framework for Offloading Traffic From Cellular Networks to SDN-Based Multi-Hop Device-to-Device Networks , 2018, IEEE Transactions on Network and Service Management.

[29]  José María Gómez Hidalgo,et al.  A study of the personalization of spam content using Facebook public information , 2017, Log. J. IGPL.

[30]  Yuhui Deng,et al.  HSDC: A Highly Scalable Data Center Network Architecture for Greater Incremental Scalability , 2019, IEEE Transactions on Parallel and Distributed Systems.

[31]  Vinay Kolar,et al.  Interaction Engineering: Achieving Perfect CSMA Handshakes in Wireless Networks , 2014, IEEE Transactions on Mobile Computing.

[32]  Junji Shikata,et al.  Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography , 2014, IEEE Transactions on Information Theory.

[33]  Wei Liu,et al.  Hierarchical edge cloud enabling network slicing for 5G optical fronthaul , 2019, IEEE/OSA Journal of Optical Communications and Networking.

[34]  Walaa Hamouda,et al.  Physical Layer Security in Ultra-Dense Networks , 2017, IEEE Wireless Communications Letters.

[35]  Sabbir Ahmed,et al.  BER Fairness and PAPR Study of Interleaved OFDMA System , 2011, Int. J. Wirel. Networks Broadband Technol..

[36]  Lutz Lampe,et al.  Joint Time and Spatial Reuse Handshake Protocol for Underwater Acoustic Communication Networks , 2013 .

[37]  Huan Zhou,et al.  V2V Data Offloading for Cellular Network Based on the Software Defined Network (SDN) Inside Mobile Edge Computing (MEC) Architecture , 2018, IEEE Access.

[38]  Wei Zhang,et al.  Artificial-Noise-Aided Optimal Beamforming in Layered Physical Layer Security , 2019, IEEE Communications Letters.

[39]  Zhen Ling,et al.  An Active De-anonymizing Attack Against Tor Web Traffic , 2017 .

[40]  Mohammed Atiquzzaman,et al.  Data Collection for Security Measurement in Wireless Sensor Networks: A Survey , 2019, IEEE Internet of Things Journal.

[41]  Cristina Alcaraz,et al.  Covert Channels-Based Stealth Attacks in Industry 4.0 , 2019, IEEE Systems Journal.

[42]  Jörg Liebeherr,et al.  Elements of Application-Layer Internetworking for Adaptive Self-Organizing Networks , 2019, Proceedings of the IEEE.

[43]  Sandra Scott-Hayward,et al.  Tennison: A Distributed SDN Framework for Scalable Network Security , 2018, IEEE Journal on Selected Areas in Communications.

[44]  Lingwei Xu,et al.  Physical Layer Security Performance of Wireless Mobile Sensor Networks in Smart City , 2019, IEEE Access.

[45]  Sangeetha Dhamodaran,et al.  Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks , 2019, IET Networks.

[46]  S. N. Merchant,et al.  Green Symbiotic Cloud Communications: Virtualized Transport Layer and Cognitive Decision Function , 2017, IEEE Access.

[47]  Susana Sargento,et al.  Context-Aware Delivery of Multi-Party Communications: Access and Core Network Selection , 2012 .

[48]  Jingqiang Lin,et al.  Copker: A Cryptographic Engine Against Cold-Boot Attacks , 2018, IEEE Transactions on Dependable and Secure Computing.

[49]  Klever Regis Pires Cavalcanti,et al.  An Integrated Solution for the Improvement of the Mobile Devices Security based on the Android Platform , 2017, IEEE Latin America Transactions.

[50]  Ee-Chien Chang,et al.  Passive Attacks Against Searchable Encryption , 2019, IEEE Transactions on Information Forensics and Security.

[51]  Steven Furnell,et al.  Information security collaboration formation in organisations , 2017, IET Inf. Secur..

[52]  Balachandra Muniyal,et al.  Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card , 2019, IEEE Access.

[53]  Dhanushka Kudathanthirige,et al.  Secure Communication in Relay-Assisted Massive MIMO Downlink With Active Pilot Attacks , 2019, IEEE Transactions on Information Forensics and Security.

[54]  Mohamed Cheriet,et al.  Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns , 2019, IEEE Transactions on Services Computing.

[55]  Raimir Holanda Filho,et al.  Enabling Online Quantitative Security Analysis in 6LoWPAN Networks , 2019, IEEE Internet of Things Journal.

[56]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[57]  Yuval Elovici,et al.  ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology , 2017, IEEE Transactions on Information Forensics and Security.

[58]  Xiapu Luo,et al.  SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks , 2018, IEEE Transactions on Information Forensics and Security.

[59]  Vivian Estrada Sentí,et al.  Artificial intelligence techniques for information security risk assessment , 2018 .

[60]  Shouling Ji,et al.  Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords , 2017, IEEE Transactions on Dependable and Secure Computing.

[61]  Chang-Seop Park,et al.  A Group-Oriented DTLS Handshake for Secure IoT Applications , 2018, IEEE Transactions on Automation Science and Engineering.

[62]  Cataldo Basile,et al.  Adding Support for Automatic Enforcement of Security Policies in NFV Networks , 2019, IEEE/ACM Transactions on Networking.

[63]  Yang Yi,et al.  A Physical Layer Security Scheme for Mobile Health Cyber-Physical Systems , 2018, IEEE Internet of Things Journal.

[64]  Tarik Taleb,et al.  A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.

[65]  P. Santhi Thilagam,et al.  DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications , 2019, IEEE Communications Surveys & Tutorials.

[66]  Anantha P. Chandrakasan,et al.  An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications , 2019, IEEE Journal of Solid-State Circuits.

[67]  Khan A. Wahid,et al.  Choice of Application Layer Protocols for Next Generation Video Surveillance Using Internet of Video Things , 2019, IEEE Access.

[68]  Wolfgang Kellerer,et al.  Rational Agent-Based Decision Algorithm for Strategic Converged Network Migration Planning , 2019, IEEE/OSA Journal of Optical Communications and Networking.

[69]  Jianfeng Guan,et al.  AID Shuffling Mechanism Based on Group-Buying Auction for Identifier Network Security , 2019, IEEE Access.

[70]  Holger Boche,et al.  Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks , 2019, IEEE Transactions on Information Forensics and Security.

[71]  Suresh Subramaniam,et al.  PODCA: a passive optical data center network architecture , 2018, IEEE/OSA Journal of Optical Communications and Networking.

[72]  Naofal Al-Dhahir,et al.  Impact of the Wireless Network’s PHY Security and Reliability on Demand-Side Management Cost in the Smart Grid , 2017, IEEE Access.

[73]  Adriano Valenzano,et al.  Performance Evaluation and Modeling of an Industrial Application-Layer Firewall , 2018, IEEE Transactions on Industrial Informatics.

[74]  Tomislav Dragicevic,et al.  Software-Defined Microgrid Control for Resilience Against Denial-of-Service Attacks , 2019, IEEE Transactions on Smart Grid.

[75]  Rong Geng,et al.  A Software Defined Networking-Oriented Security Scheme for Vehicle Networks , 2018, IEEE Access.

[76]  Dirk Dahlhaus,et al.  Recursive Spatial Multiplexing with Adaptive Interference Whitening , 2017, Int. J. Wirel. Networks Broadband Technol..

[77]  M. Francisca Hinarejos,et al.  A Solution for Secure Certified Electronic Mail Using Blockchain as a Secure Message Board , 2019, IEEE Access.

[78]  Jian Chen,et al.  Transmit Beamforming for Layered Physical Layer Security , 2019, IEEE Transactions on Vehicular Technology.

[79]  Xiao Lan,et al.  Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3 , 2019, IEEE Transactions on Dependable and Secure Computing.

[80]  Xin Huang,et al.  A Handshake Protocol With Unbalanced Cost for Wireless Updating , 2018, IEEE Access.

[81]  Khelchandra Thongam,et al.  Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation , 2018, IET Inf. Secur..

[82]  Xiangming Wen,et al.  On-Demand Cooperation Among Multiple Infrastructure Networks for Multi-Tenant Slicing: a Complex Network Perspective , 2018, IEEE Access.

[83]  Xianbin Wang,et al.  Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication , 2018, IEEE Transactions on Vehicular Technology.

[84]  Jun Xiao,et al.  Distribution Network Security Situation Awareness Method Based on Security Distance , 2019, IEEE Access.

[85]  George N. Rouskas,et al.  SDN enabled restoration with triggered precomputation in elastic optical inter-datacenter networks , 2018, IEEE/OSA Journal of Optical Communications and Networking.