Название: Security of Ubiquitous Computing Systems Selected Topics Автор: Gildas Avoine, Julio Hernandez-Castro Издательство: Springer Год: 2021 Страниц: 283 Язык: английский Формат: pdf, epub Размер: 11.1 MB
Dear reader, we thank you for your interest in this book, which we expect will help you gain an understanding of the state of the art regarding the challenges and solutions in the security of ubiquitous computing systems. The definition of the field itself is not without controversy, but in this book we will use the term ‘ubiquitous computing’ or ‘IoT’ to refer to generally small, embedded devices with serious constraints in terms of memory and processing power, typically with no batteries but with good connection capabilities and, frequently, a number of sensors. This definition is, of course, flexible. Electronic passports, contactless transportation cards, personal assistants such as Amazon Echo but also new connected cars and fridges can fall within this definition.
In the Chapter 1 we focus on two important security challenges that naturally emerge for large scale systems composed of cheap devices implementing only symmetric cryptographic algorithms. First, we consider threats due to poor or malicious implementations of protocols, which enable data to be leaked from the devices to an adversary. We present solutions based on a watchdog concept - man-in-the-middle device that does not know the secrets of the communicating parties, but aims to destroy covert channels leaking secret information. Second, we deal with the problem of tracing devices by means of information exchanged while establishing a communication session. As solutions such as Diffie-Hellman key exchange are unavailable for such devices, implicit identity information might be transmitted in clear and thereby provide a perfect means for privacy violations. We show how to reduce such risks without retreating to asymmetric algorithms.
Lightweight cryptography aims to deploy cryptographic algorithms in resource-constrained devices such as embedded systems, RFID devices and sensor networks. The cryptographic community has done a significant amount of work in this area, including design, implementation and cryptanalysis of new lightweight cryptographic algorithms, together with efficient implementation of conventional cryptography algorithms in constrained environments.
The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains.
Part I. Introduction 1. Emerging Security Challenges for Ubiquitous Devices Part II. Lightweight Cryptographic Primitives 2. Catalog and Illustrative Examples of Lightweight Cryptographic Primitives 3. Selected Design and Analysis Techniques for Contemporary Symmetric Encryption 4. An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families Part III. Authentication Protocols 5. ePassport and eID Technologies 6. Ultra-lightweight Authentication 7. From Relay Attacks to Distance-Bounding Protocols Part IV. Hardware Implementation and Systems 8. It Started with Templates: The Future of Profiling in Side-Channel Analysis 9. Side Channel Assessment Platforms and Tools for Ubiquitous Systems 10. Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators 11. Finding Software Bugs in Embedded Devices Part V. Privacy and Forensics 12. Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach 13. IoT Forensics
Скачать Security of Ubiquitous Computing Systems Selected Topics
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.