Chapter 1 Home Automation Solutions for SecureWSN 1Corinna SCHMITT and Marvin WEBER1.1 Introduction 21.2 Background 41.2.1 SecureWSN 41.2.2 Communication standards 81.2.3 The monitor-analyse-plan-execute-knowledge model 121.2.4 Hardware and libraries 141.3 Design decisions 151.3.1 Requirements 161.3.2 HAIFA architecture 181.3.3 WebMaDa integration 291.4 Implementation 301.4.1 CoMaDa integration 301.4.2 HAIFA's ZigBee Gateway 481.4.3 WebMaDa integration 551.4.4 Uploading HA data to WebMaDa 561.4.5 Sending HA messages from WebMaDa to CoMaDa 591.4.6 WebMaDa's frontend 621.5 Evaluation of HAIFA 641.5.1 Actuator interoperability (R1) 651.5.2 Rule-based automation (R2) 651.5.3 Node hardware interoperability (R3) 681.5.4 CoMaDa and WebMaDa management (R4) 681.6 Summary and conclusions 681.7 Acknowledgements 691.8 References 70Chapter 2 Smart Home Device Security: A Survey of Smart Home Authentication Methods with a Focus on Mutual Authentication and Key Management Practices 75Robinson RAJU and Melody MOH2.1 Introduction 752.2 Smart home - introduction and technologies 772.2.1 Smart home - introduction 772.2.2 Smart home devices - categories 792.3 Smart home security 802.3.1 Threats 812.3.2 Vulnerabilities 822.3.3 IoT communication protocols 842.3.4 Enhancements to IoT communication protocols 862.3.5 IoT security architectures 872.4 Smart home authentication mechanisms 912.4.1 Stages of defining an authentication protocol for IoT 922.4.2 Taxonomy of authentication schemes for IoT 932.5 A primer on mutual authentication and key management terminologies 962.5.1 X.509 certificate 972.5.2 CoAP and DTLS 992.5.3 TLS 1.3 1012.5.4 Key management fundamentals 1022.6 Mutual authentication in smart home systems 1042.6.1 Device and user onboarding 1052.6.2 Flow of user authentication and authorization 1062.6.3 Examples of mutual authentication schemes 1072.7 Challenges and open research issues 1122.8 Conclusion 1132.9 References 114Chapter 3 SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments 125Fayez GEBALI and Mohammad MAMUN3.1 Introduction 1263.2 Related literature 1293.3 System design considerations 1303.4 Silicon physically unclonable functions (PUF) 1313.4.1 Mutual authentication and key exchange using PUF 1323.4.2 Fuzzy extractor 1333.5 Convolutional encoding and Viterbi decoding the SRAM words 1333.6 CMOS SRAM PUF construction 1363.6.1 SRAM PUF statistical model 1383.6.2 Extracting the SRAM cell statistical parameters 1413.6.3 Obtaining the golden SRAM PUF memory content 1423.6.4 Bit error rate (BER) 1423.6.5 Signal-to-noise ratio (SNR) for SRAM PUF 1433.7 Algorithms for issuing CRP 1443.7.1 Algorithm #1: single-challenge 1443.7.2 Algorithm #2: repeated challenge 1473.7.3 Algorithm #3: repeated challenge with bit selection 1483.8 Security of PUF-based IoT devices 1503.9 Conclusions 1513.10 Acknowledgements 1513.11 References 151Chapter 4 IoT Network Security in Smart Homes 155Manju LATA and Vikas KUMAR4.1 Introduction 1564.2 IoT and smart home security 1594.3 IoT network security 1644.4 Prevailing standards and initiatives 1694.5 Conclusion 1724.6 References 172Chapter 5 IoT in a New Age of Unified and Zero-Trust Networks and Increased Privacy Protection 177Sava ZXIVANOVICH, Branislav TODOROVIC, Jean Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE and Axel LEGAY5.1 Introduction 1785.2 Internet of Things 1795.3 IoT security and privacy challenges 1825.3.1 Security challenges 1835.3.2 Privacy challenges 1845.4 Literature review 1875.5 Security and privacy protection with a zero-trust approach 1905.6 Case study: secure and private interactive intelligent conversational 1935.6.1 LinTO technical characteristics 1945.6.2 Use case 1955.6.3 Use case mapping on the reference architecture 1975.7 Discussion 1975.8 Conclusion 1985.9 Acknowledgements 1995.10 References 199Chapter 6 IOT, Deep Learning and Cybersecurity in Smart Homes: A Survey 203Mirna ATIEH, Omar MOHAMMAD, Ali SABRA and Nehme RMAYTI6.1 Introduction 2036.2 Problems encountered 2056.3 State of the art 2076.3.1 IoT overview 2076.3.2 History 2086.3.3 Literature review 2086.3.4 Advantages, disadvantages and challenges 2096.4 IoT architecture 2126.4.1 Sensing layer 2136.4.2 Network layer 2136.4.3 Service layer 2136.4.4 Application-interface layer 2136.5 IoT security 2146.5.1 Security in the sensing layer 2146.5.2 Security in the network layer 2156.5.3 Security in the service layer 2156.5.4 Security in the application-interface layer: 2166.5.5 Cross-layer threats 2166.5.6 Security attacks 2166.5.7 Security requirements in IOT 2186.5.8 Security solutions for IOT 2196.6 Artificial intelligence, machine learning and deep learning 2216.6.1 Artificial intelligence 2226.6.2 Machine learning 2226.6.3 Deep learning 2246.6.4 Deep learning vs machine learning 2256.7 Smart homes 2276.7.1 Human activity recognition in smart homes 2276.7.2 Neural network algorithm for human activity recognition 2286.7.3 Deep neural networks used in human activity recognition 2306.8 Anomaly detection in smart homes 2336.8.1 What are anomalies? 2336.8.2 Types of anomaly 2336.8.3 Categories of anomaly detection techniques 2336.8.4 Related work of anomaly detection in smart homes 2346.9 Conclusion 2376.10 References 238Chapter 7 sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices 245Corinna SCHMITT, Severin SIFFERT and Burkhard STILLER7.1 Introduction 2467.2 Definitions and history of IoT 2487.3 IoT-related security concerns 2517.3.1 Security analysis guidelines 2537.3.2 Security analysis by threat models 2557.3.3 sTiki's security expectations 2567.4 Background knowledge for sTiki 2587.4.1 Application dependencies for sTiki 2587.4.2 Inspiring resource-efficient security protocols 2607.5 The sTiki protocol 2647.5.1 Design decisions taken 2667.5.2 Implementation of sTiki's components 2677.6 sTiki's evaluation 2707.6.1 Secured communication between aggregator and server 2717.6.2 Secured communication between collector and aggregator 2757.6.3 Communication costs 2767.6.4 Integration into an existing system 2777.6.5 Comparison to existing approaches 2787.7 Summary and conclusions 2797.8 Acknowledgements 2807.9 References 281List of Authors 287Index 289
Rida Khatoun is Associate Professor at Telecom ParisTech, France. His current research interests are focused on cybersecurity in areas such as connected cars, cloud computing and the Internet of Things, as well as cybersecurity architectures, intrusion detection systems and blockchain technology.