Skip to main content
Top

2024 | Book

Cybersecurity Vigilance and Security Engineering of Internet of Everything

Editors: Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon, Abdellah Chehri

Publisher: Springer Nature Switzerland

Book Series : Internet of Things

insite
SEARCH

About this book

This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms.

Table of Contents

Frontmatter

Security Threats and Vulnerabilities

Frontmatter
Chapter 1. Internet of Everything: Evolution and Fundamental Concepts
Abstract
Internet of Everything (IoE) was used in 2012 as a network of networks by using intelligent network connections. These networks offered a great service toward enriching the user experience for data communication, sensing, and monitoring capabilities. The evolution and fundamental concept of IoE network is covering users, social networks, user behavior analysis, and new standards and technologies. These networks are based on enabling technologies, smart and intelligent architectures, network topologies, and intelligent information systems. Due to complex nature of these networks, there are a number of issues and challenges degrading the network services. In this context, this chapter presents the history, applications, and network architecture of the IoE. This chapter also presents the fundamental components (applications, areas and fields, architectures, networks, etc.) that underpin IoE networks. All the processes, data communication standards, security requirements, and resource management are also discussed to explore new research areas in IoE networks.
Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon, Abdellah Chehri
Chapter 2. Cybersecurity Threats and Attacks in IoE Networks
Abstract
The increasing interconnectedness and intelligence of everything are fostering digital transformation across industries. Nonetheless, the advent of the Internet of Everything (IoE) also introduces new cybersecurity risks, given the diverse mechanisms employed by IoE applications due to the heterogeneous nature of IoE environments. This chapter provides a comprehensive overview of cybersecurity issues related to IoE components and technologies, layered architectures, threats and attacks, and vulnerabilities. The main contribution of this chapter is a 3D cybersecurity model based on the presented IoE components, enabler technologies, and multi-layered architecture. In addition, IoE cybersecurity threats and attacks, challenges, and solutions are highlighted through a multi-layered architecture to provide a better understanding and knowledge of addressing and implementing appropriate approaches to prevent recent cybersecurity threats and attacks in IoE at each layer based on different components.
Bahareh Pahlevanzadeh, Sima Ahmadpour
Chapter 3. Attack Detection Mechanisms for Internet of Everything (IoE) Networks
Abstract
Internet of Everything (IoE) is one of the superset concepts of Internet of Thing (IoT) based on emerging and revolutionary technologies and standards. The main building blocks of IoE are revolved around people, data, processes, and devices, which makes network connections more relevant, valuable, and for information sharing and providing services. The devices in these networks are connected by using short- and long-range communication standards. These connected ecosystems are heavily relying on embedded electronic devices such as sensors and actuators for data gathering and information dissemination. However, the increasing capacity of data in IoE networks, security, and attack risks is growing due to heterogeneous systems which become venerable to cyber threats and malware attacks. A number of solutions have been designed to prevent and detect the cyber-attacks in IoE networks. Therefore, it is critical to raise IoE security and implement suitable measures to safeguard against these attacks and threats. This chapter presents the fundamental concepts of existing attack detection mechanisms adopted at the edge and cloud-based networks to secure the IoE networks. This chapter also explores the backbone network threats especially edge and cloud computing or other service providers for IoE networks.
Raja Waseem Anwar, Kashif Naseer Qureshi
Chapter 4. Cyber-Resilience, Principles, and Practices
Abstract
The increasing cyber-attack and threat landscape has raised security and privacy concerns in industrial and critical infrastructure environments. Data is the most valuable asset for malicious actors, and having intentions to steal, exploit, gain access to any form of encrypted or unencrypted data is their ultimate goal. To protect the data-driven, autonomous, agile, and intelligent smart manufacturing environment, it is essential to have a systematic process for developing a cybersecurity strategy and having an incident response for mitigating potential attacks it may be susceptible to. For developing a robust cyber-strategy, it is significant to understand the sophisticated technologies used within the environment, assess the risks it may be exposed to, implement standards and controls to mitigate those risks, have threat intelligence and an incident response in place, and continuously monitor the ever-changing attack surface. The existing standards, governance, risk, and controls (GRC) may not completely mitigate compliance-based risks in situations of lack of alignment. As one standard may not fit all, each industry needs to have a distinct cybersecurity strategy based on the levels of security (i.e., baseline/moderate/maximum) required, implementation of security standards, and GRC mapped with the industry’s operational environment. Having resilience enables an industry to be proactive and mitigate operation disruption and cyber-risk/shock scenarios. With the help of a manufacturing use-case example, this chapter provides insights and understanding of various potential threat scenarios (i.e., espionage, loss of command and control, compromised data or device, etc.), high-risk concerns that need to be considered for building cyber-resiliency within an industry. Best practices, standards, risks, policies, and alignment with cyber-resilience act and law are also summarized.
Hilary Meagher, Lubna Luxmi Dhirani
Chapter 5. Future Cybersecurity Challenges for IoE Networks
Abstract
The concept of smart communication systems evidently changed the way the computers were initially thought to be. Irrespective of the evolution in both wired and wireless networks, the extent of connecting devices started increasing with the advancement in computing devices. The launch of smart phones opened new horizons in terms of wireless technologies. To fully reap the technological benefits, the concept of everywhere and anywhere pushed a massive increase in the number of devices need to be linked. This is further complimented by the end user wish of seeing the daily life things to be connected to the Internet, and it gave birth to the Internet of Things (IoT). The IoT ultimately opened up with endless possibilities and lead to the Industrial Revolution. The advancement in IoT is being viewed as Internet of Everything (IoE) with the incorporation of people in the existing triangle of process, data, and things. Thus, the ecosystem of IoE enables machine-to-machine, people-to-people, and people-to-machine communication. However, this major shift not only provides a lot of new capabilities but also poses new challenges in the form of complex networks and security issues. This chapter presents the future cybersecurity challenges, demand for new and integrated security architecture for IoE network, and explores the security architecture requirements from application’s perspective. This chapter also identifies future research challenges that still need to be addressed to improve cybersecurity in IoE networks.
Saleem Iqbal, Saqib Majeed, Syed Amad Hussain Shah

Security Vigilance and Security Engineering for IoE Networks

Frontmatter
Chapter 6. Networking and Security Architectures for IoE Networks
Abstract
Internet of Everything (IoE) is one of the smart networks where the interconnected and autonomously managed interactive devices and sensor nodes are connected for different services. Routing is always one of the significant areas for these networks. Edge and cloud-based networks are connected with IoE networks to facilitate the users by using wireless and wireless mediums. User privacy and security are two of the fundamental requirements during data communication in IoE networks. Cryptography and cipher techniques have been adopted for secure data communication. However, the traditional security solutions are not well performed against limited resource devices of the IoE network. Due to new cyber-threats and malware, these solutions have suffered especially against unknown malware patterns and techniques and not able to handle the potential threats and attacks in IoE networks. This chapter presents the network and security architecture for IoE networks. This chapter also explores the security architecture requirements for each application.
Fasee Ullah, Asad Ullah
Chapter 7. Machine Learning-Based Detection and Prevention Systems for IoE
Abstract
Internet of Everything (IoE) has gained popularity due to its services and application to enhance the quality of living standards. Although these networks are providing smart, cost-effective, integrated services to users and play a significant role in the world economy, security is one of the serious concerns, especially from denial of services (DoS) and distributed denial of services (DDoS) attacks. These attacks are serious challenges, especially for limited resource IoE devices. Machine learning (ML) approaches have been adopted for attack detection, especially in Intrusion Detection Systems (IDS). These systems have suffered from high network overhead and latency issues which lead to slow detection and unresponsiveness. This chapter presents the machine and deep learning-based detection and prevention methods for IoE networks along with their advantages and disadvantages to protecting the networks from unknown attacks.
Amna Khatoon, Asad Ullah, Muhammad Yasir
Chapter 8. Role of Blockchain for IoE Infrastructures and Applications
Abstract
Blockchain technology provides a decentralized, secure, tamper proof, and auditable way to store data. In the Internet of Everything (IoE), blockchain can provide a vital role in ensuring the security of a large amount of generated by devices. Blockchain can ensure the integrity and accuracy of IoE data without being controlled by a centralized authority. By leveraging smart contracts to execute business rules between devices, blockchain may automate transactions and streamline procedures in IoE. Furthermore, the creation of decentralized identity management for IoE devices may be facilitated by using blockchain technology, providing a safe method of confirming their validity, and prohibiting unwanted access to the network. It is essential to thoroughly grasp blockchain technology before incorporating it into IoE applications. This chapter provides a comprehensive overview of blockchain technology and how it might solve particular problems in the IoE setting. A framework is also suggested for creating blockchain-based IoE application solutions. The IoE ecosystem can gain from improved security and privacy features using blockchain technology, leading to a more dependable and resilient infrastructure.
Ibrahim Tariq Javed, Kashif Naseer Qureshi
Chapter 9. Cybersecurity as a Service
Abstract
With the increasing sophistication and sheer number of cyberattacks, more and more companies come to the conclusion that they have to strengthen their cybersecurity posture. At the same time, well-educated information technology (IT) security personnel are scarce. Cybersecurity as a service (CSaaS) is one possible solution to tackle this problem by outsourcing security functions to managed security service providers (MSSP). This chapter gives on overview of common CSaaS functions and their providers. Moreover, it provides guidance especially for small- and medium-sized businesses, for asking the appropriate questions when it comes to the selection of a specific MSSP.
John Morris, Stefan Tatschner, Michael P. Heinl, Patrizia Heinl, Thomas Newe, Sven Plaga
Chapter 10. Big Data Analytics for Cybersecurity in IoE Networks
Abstract
The term Internet of Everything (IoE) refers to the intelligent network that links together people, data, objects, and processes. These devices generate a massive amount of data which leads to Big Data and its analysis issues. The primary function of Big Data analytics is data storage, management, and processing. The main purpose of this chapter is to investigate the existing frameworks for implementing Big Data analytics into the development of safe IoE network operations and services. The data is gathered from different sources like sensors, smart wireless, and wireless devices and is further utilized for predictive analysis and planning. This information is further used for decision-making to control the surrounding processes. However, due to the massive amount of data and open systems scenario, the network is vulnerable to security attacks and threats. This chapter presents a comprehensive look at how Big Data analytics can be applied to create a trustworthy network.
Faisal Rehman, Hanan Sharif, Muhammad Anwar, Naveed Riaz
Chapter 11. Cybersecurity Standards and Policies for CPS in IoE
Abstract
Cybersecurity standards and policies are always one of the top priorities of any organization and network for smooth services and operations. The Internet of Everything (IoE) is one of the new and developing areas where the traditional standards and policies implementation is a significant challenge. ISO-27001 is an international standard that lays out a specification for an Information Security Management System (ISMS). This standard aims to address data security by focusing on people and processes and also technology. The standard has a heavy focus on its risk-assessment approach which stipulates that a risk assessment must be carried out before any controls can be selected and implemented. Some other well-known standards such as ISO 27002, ISO 38500, COBIT/COBIT 5, PRINCE2, and NIST CSF are under discussion, especially for IoE networks. This chapter discusses the existing standards and policies designed for Cyber-Physical Systems (CPS) in IoE networks. This chapter also discusses the security vulnerabilities and privacy threats of Cyber-Physical Systems (CPS) in IoE networks. This chapter also presents security and privacy solutions/architectures that improve the security and privacy of CPS in IoE networks.
Kashif Naseer Qureshi, Garret O’Keeffe, Shane O’Farrell, Graham Costelloe
Chapter 12. Future Privacy and Trust Challenges for IoE Networks
Abstract
Internet of Everything (IoE) is a newly emerging trend, especially for future networks. Such a rapid adoption of these networks offered new services where devices are equipped with specialized sensors based on intelligent transactions and control of services systems to improve the quality of life. The rapid adoption of these networks opens new security and protection threats for maintaining end nodes’ or users’ privacy and trust against disruptive attacks designed to incur financial losses. These networks are connected with edge and cloud networks where the trustworthiness of these devices is another challenge for IoE networks. Despite IoE connecting trillion users, devices, systems, objects, and interfaces for autonomous Internet-based services, it suffers from implementation issues and vulnerabilities of security, trust, and privacy along with architectural and infrastructural considerations. IoE is designed to benefit valuable users by creating compound impacts through close and handy interconnectivity and interoperability among processes, things, data, systems, institutes, and individuals over heterogeneous platforms. This chapter presents the future user privacy and trust research challenges that still need to be addressed for IoE networks. This chapter also discusses the new trend and usage of blockchain and artificial intelligence in IoE networks.
Abeer Iftikhar, Kashif Naseer Qureshi
Backmatter
Metadata
Title
Cybersecurity Vigilance and Security Engineering of Internet of Everything
Editors
Kashif Naseer Qureshi
Thomas Newe
Gwanggil Jeon
Abdellah Chehri
Copyright Year
2024
Electronic ISBN
978-3-031-45162-1
Print ISBN
978-3-031-45161-4
DOI
https://doi.org/10.1007/978-3-031-45162-1