Zum Inhalt

Evolution of Smart Sensing Ecosystems with Tamper Evident Security

  • 2021
  • Buch
insite
SUCHEN

Über dieses Buch

Dieses Buch bietet einen Überblick über Sicherheits- und Datenschutzfragen in dynamischen Sensornetzwerken und Internet der Dinge (IoT) -Netzwerken und stellt eine neuartige Manipulationstechnologie zur Verfügung, um diesen sicherheitsrelevanten Problemen zu begegnen und sie abzuwehren. Die Mission dieses Buches ist es, die Entwicklung von Techniken und Strategien zur Sicherung von Informationstransfer und -speicherung zu erklären und so einen digitalen Übergang hin zu modernen manipulationssicheren Systemen zu erleichtern. Ziel ist es auch, Unternehmen, die auf die Analyse der großen Mengen an generierten Daten angewiesen sind, bei der Sicherung und Bekämpfung der damit verbundenen wachsenden Bedrohung durch Angreifer, die unerbittlich Angriffe durchführen, und den Herausforderungen beim Schutz der Vertraulichkeit, Integrität und Herkunft von Daten zu unterstützen. Das Buch bietet auch einen umfassenden Einblick in die sich entwickelnden sicheren Kommunikationstechniken und -werkzeuge und die Auswirkungen, die sie auf die Unterstützung und das Gedeihen des Unternehmens während des Cyber-Zeitalters hatten. Dieses Buch enthält auch Kapitel, in denen die primitivsten Verschlüsselungsmethoden bis hin zum jüngsten Einsatz von Homomorphismus bei der Gewährleistung der Privatsphäre der Daten diskutiert werden, wodurch ein stärkerer Einsatz neuer Technologien wie Cloud Computing und anderer ermöglicht wird.

Inhaltsverzeichnis

Frontmatter

Growth of Sensory Devices and Their Proliferation into Daily Life

Frontmatter
Chapter 1. Introduction
Abstract
The rapid growth in technology and the interconnectivity we have achieved among devices is largely due to the availability of small, highly inexpensive sensory devices. These sensors have helped us realize and fuel the Internet-of-Things (IoT) paradigm and made it available at affordable prices to the common man.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani
Chapter 2. Smart Objects in Cyber-Physical Systems
Abstract
Smart sensor discovery and advancement in the manufacturing techniques led to the design and development of novel devices and techniques that could successfully bridge the gap between humans and machines.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani
Chapter 3. IoT Security
Abstract
All IoT sensors and devices are prone to breach of the tenets of information security (confidentiality, integrity, and availability).
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani

Securing the Internet-of-Things Enabled Smart Environments

Frontmatter
Chapter 4. Understanding the Smart Systems: IoT Protocol Stack
Abstract
The idea of a connected ecosystem with devices being capable to communicate and automatically work toward specified application goals has been around for a long time.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani
Chapter 5. Onboarding New IoT Devices
Abstract
Trust plays an integral part in network communications. In an IoT environment with multiple communicating entities, the need for trust is more pronounced. The presence of trust with the communicating entity ensures the services or updates the devices are willing to accept between them.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani

Cryptosystems: Foundations and the Current State-of-the-Art

Frontmatter
Chapter 6. Introduction
Abstract
The greatest requirement in the modern age is the need for empowering security that will provide tamper evident information exchange. This brings up a prominent need for techniques that integrate modern cryptosystem solutions to achieve enhanced information integrity and confidentiality with minimum impact to system performance. Cryptosystems have evolved leaps and bounds striving to achieve this. However, a paradigm shift is to be unearthed with the great pervasiveness of the attacker knowledge and attack surfaces. Generation and use of large volumes of data has made this a topic of great importance especially in this era. This book gives the reader a tour through the evolution of cryptosystems, their achievements, and the growth of more sophisticated systems that have affordable time and space complexities. Our mission is to explain the evolution of techniques and strategies in securing information transfer and storage thus facilitating a digital transition toward the modern tamper evident systems. We hope this book can provide both a fundamental understanding of what is security and its requirements to finally how it can be achieved so that business organizations and individuals can understand the ways and means to secure large volumes of generated data and addressing the associated growing threat of attackers relentlessly waging attacks and the challenges in protecting the confidentiality, integrity, and provenance of data.
The book provides a comprehensive insight into the secure communication techniques and tools that have evolved and the impact they have had in supporting and flourishing the business through the cyber era. This book also includes chapters that discuss the most primitive encryption schemes to the most recent use of homomorphism in ensuring the privacy of the data thus leveraging greater use of new technologies like cloud computing and others.
We thus hope that this book titled “The Evolution of Tamper evident Secure Systems for the Cyber Era” is the perfect ally for industry experts, researchers, students, and others who are interested in securing their information and systems from the prying eyes of attackers. This book provides a wealth of information for the audience with the necessary information and tools that can be used to design a tamper evident and secure ecology in this highly vulnerable cyber era.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani
Chapter 7. Symmetric Key Cryptography
Abstract
Symmetric key cryptography (or symmetric encryption) deals with the use of a single key for both the encryption and decryption of messages. It was the most prominent approach to secure information for decades and is still used certain systems with other schemes.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani
Chapter 8. Asymmetric Key Cryptography
Abstract
The symmetric key cryptosystems have certain drawbacks which were highlighted in the previous chapter. To overcome the major disadvantage related to the compromise of one key being a potential threat to the whole system as it becomes a single point of failure, the Asymmetric key cryptographic techniques introduce two sets of keys: one that is publicly available and another that is a secret or private key that is retained with the communicating entities. It is considerable complex and expensive compared to symmetric key cryptography.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani

Modern Encryption Schemes

Frontmatter
Chapter 9. Homomorphic Encryption
Abstract
Statistical methods and computational capabilities have grown tremendously in the past few decades. Along with the growing interest in Artificial Intelligence and Machine Learning, there is also significant development in the field of Cloud Computing and Big data. Nowadays, we use a wide range of tools that have given us the power to stripe this data, process them, and analyze or even predict outcomes using this data.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani
Chapter 10. Popular Homomorphic Encryption Schemes
Abstract
There are many applications that can benefit from the adoption of homomorphic encryption schemes. However, one of the front runners in terms of consideration for adoption is cloud computing systems.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani
Chapter 11. Industrial Involvement in the Use of Homomorphic Encryption
Abstract
Homomorphic encryption as discussed in the previous chapters has been a topic of great interest in untrusted systems like the cloud systems. There are various other applications of using the system as well. However, when developers started incorporating the design details into a working prototype, they encountered the computational complexity that is involved in the successful deployment of the scheme.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani

Creating a Tamper Evident System for the Cyber Era

Frontmatter
Chapter 12. Introduction
Abstract
The important requirement in the current cyber age is the need for empowering security that will provide tamper evident information exchange, i.e., information can be exchanged among any entity without any hassles or fear of its integrity being compromised. This can to a certain extent be achieved by creating an ensemble-based approach that is built on the best practices and lessons learnt from these systems in designing solutions that can help enhance information integrity and confidentiality with minimum impact on system performance. The solutions thus designed will have to adhere to affordable time/space complexity and researchers are actively working toward achieving this.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani

Feasibility and Performance Analysis

Frontmatter
Chapter 13. Implementation Details
Abstract
In order to see the effectiveness of the proposed idea in the previous chapter, we are implementing a Python-based library called PyTEDSP. Experiments were run on the implemented library to identify the performance of TED-SP and compare it with other existing works. The preliminary results before and after optimization are shown in the graphs under the Simulation Results section. As discussed in the design of TED-SP, the experimentation environment incorporates the fully homomorphic and non-malleable encryption schemes and the functional parameterized switch.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani

Future Directions

Frontmatter
Chapter 14. Quantum Cryptography
Abstract
The content mentioned below has not been published anywhere but is only discussed internally and stored in repositories.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani
Chapter 15. Quantum Tools
Abstract
In this section will be developed all the tools necessary to be able to implement the best Quantum Cryptography solutions involved in the most modern applications of the new millennium.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani
Chapter 16. Applications
Abstract
There have been many applications that have been identified that use Quantum computing.
Pawel Sniatala, S.S. Iyengar, Sanjeev Kaushik Ramani
Backmatter
Titel
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
Verfasst von
Pawel Sniatala
Prof. S.S. Iyengar
Dr. Sanjeev Kaushik Ramani
Copyright-Jahr
2021
Electronic ISBN
978-3-030-77764-7
Print ISBN
978-3-030-77763-0
DOI
https://doi.org/10.1007/978-3-030-77764-7

Informationen zur Barrierefreiheit für dieses Buch folgen in Kürze. Wir arbeiten daran, sie so schnell wie möglich verfügbar zu machen. Vielen Dank für Ihre Geduld.