Security and fault tolerance in Internet of Things. (c2019)
- Record Type:
- Book
- Title:
- Security and fault tolerance in Internet of Things. (c2019)
- Main Title:
- Security and fault tolerance in Internet of Things
- Further Information:
- Note: Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V. Vasilakos, editors.
- Other Names:
- Chakraborty, Rajat Subhra
Mathew, Jimson
Vasilakos, Athanasios - Contents:
- Intro; Preface; Contents; Security and Trust Verification of IoT SoCs; 1 Introduction; 1.1 Logic Testing; 1.2 Formal Methods; 1.3 Hybrid Approaches; 2 Background: Concolic Testing; 3 Prior Works on Concolic Testing; 4 Directed Test Generation Using Concolic Testing; 4.1 CFG Generation; 4.2 Edge Realignment; 4.3 Distance Evaluation; 4.4 Test Generation; 5 Experiments; 5.1 Evaluation of Scalability; 5.2 Evaluation of Coverage; 6 Conclusion; References; Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework; 1 Introduction; 2 Overview of IP Core Protection Through Watermark 2.1 Motivation of Embedding Dual Phase Watermark for IP Protection at Behavioral Level3 Dual-Phase Watermarking Methodology; 3.1 Problem Formulation; 3.2 Dual-Phase Watermark Encoding; 3.3 Process for Embedding Dual-Phase Watermark in IP Design; 3.4 Signature Detection; 4 Motivational Example for Dual-Phase Watermarking Approach; 4.1 Motivational Example for Dual-Phase Watermarking Scheme; 4.2 Properties of Generated Watermark; 5 Results and Analysis; 5.1 Typical Attack Scenarios; 5.2 Strength of Protection and Tamper Tolerance Ability 5.3 Embedding Cost Comparison and Design Overhead Analysis6 Conclusion; References; Secure Multicast Communication Techniques for IoT; 1 Introduction; 2 Secure Group Communication; 3 Secure Group Communication Approaches; 3.1 ECC-Based Secure Group Communication; 3.2 S-CPABE for Secure Multicast Communication; 3.3 Discussion; 4 Conclusion; References; AnIntro; Preface; Contents; Security and Trust Verification of IoT SoCs; 1 Introduction; 1.1 Logic Testing; 1.2 Formal Methods; 1.3 Hybrid Approaches; 2 Background: Concolic Testing; 3 Prior Works on Concolic Testing; 4 Directed Test Generation Using Concolic Testing; 4.1 CFG Generation; 4.2 Edge Realignment; 4.3 Distance Evaluation; 4.4 Test Generation; 5 Experiments; 5.1 Evaluation of Scalability; 5.2 Evaluation of Coverage; 6 Conclusion; References; Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework; 1 Introduction; 2 Overview of IP Core Protection Through Watermark 2.1 Motivation of Embedding Dual Phase Watermark for IP Protection at Behavioral Level3 Dual-Phase Watermarking Methodology; 3.1 Problem Formulation; 3.2 Dual-Phase Watermark Encoding; 3.3 Process for Embedding Dual-Phase Watermark in IP Design; 3.4 Signature Detection; 4 Motivational Example for Dual-Phase Watermarking Approach; 4.1 Motivational Example for Dual-Phase Watermarking Scheme; 4.2 Properties of Generated Watermark; 5 Results and Analysis; 5.1 Typical Attack Scenarios; 5.2 Strength of Protection and Tamper Tolerance Ability 5.3 Embedding Cost Comparison and Design Overhead Analysis6 Conclusion; References; Secure Multicast Communication Techniques for IoT; 1 Introduction; 2 Secure Group Communication; 3 Secure Group Communication Approaches; 3.1 ECC-Based Secure Group Communication; 3.2 S-CPABE for Secure Multicast Communication; 3.3 Discussion; 4 Conclusion; References; An Adaptable System-on-Chip Security Architecture for Internet of Things Applications; 1 Introduction; 2 Security Assurance in SoC; 2.1 Security Policies; 2.2 Security Architecture: The Current State of the Practice 3 Motivation for Adaptable Architecture3.1 Case Study: An Attack on Confidentiality; 3.2 Case Study: An Attack on Integrity; 3.3 Current Challenges with Adaptable Architecture; 4 A Generic Adaptable Infrastructure; 4.1 Design Choices; 4.2 Centralized Reconfigurable Security Policy Engine; 4.3 Smart Security Wrappers; 4.4 Design-for-Debug Interface; 5 Overall Flow and Major Steps; 5.1 CAD Framework for Security Policy Synthesis; 5.2 Authentication and Remote Upgrade; 6 Results and Discussion; 7 Conclusion; References; Lightweight Fault Tolerance for Secure Aggregation of Homomorphic Data 1 Introduction2 Preliminaries; 2.1 Cryptographic Schemes and Homomorphic Encryption; 2.2 Paillier Additive Homomorphic Encryption; 3 Assumed Threat Model for Fault Tolerance; 4 Adapting Residue Numbering for Modular Multiplication; 5 Fast Modular Reductions Using Mersenne Primes; 6 Lightweight Error Detection for Random Faults; 6.1 Detecting Errors in Modular Multiplication ALUs; 6.2 Detecting Errors in Encrypted Memories; 7 Experimental Evaluation; 7.1 Fault Coverage Results; 7.2 Area and Delay Overhead Results; 8 Related Work; 9 Concluding Remarks; References … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2019
- Copyright Date:
- 2019
- Extent:
- 1 online resource (221 p.)
- Subjects:
- 004.678
Internet of things -- Security measures
Fault-tolerant computing
Electronic books - Languages:
- English
- ISBNs:
- 9783030028077
3030028070 - Related ISBNs:
- 9783030028060
- Notes:
- Note: Description based on online resource; title from digital title page (viewed on January 30, 2019).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.381293
- Ingest File:
- 02_367.xml