Towards Design and Development of Secure and Privacy-Preserving Frameworks for IoT-enabled Networks

· GRIN Verlag
Ebook
219
Pages
Eligible
Ratings and reviews aren’t verified  Learn More

About this ebook

Doctoral Thesis / Dissertation from the year 2022 in the subject Computer Sciences - Internet of Things, IOT, grade: First, , course: PhD, language: English, abstract: With the advancement of low-cost and low energy-consuming sensors, the Internet of Things (IoT) is building a network of Internet-enabled devices. The concept of IoT is employed in almost all fields such as healthcare, smart cities, smart grids, energy distribution, agriculture, and even transportation. In a typical IoT-enabled network, smart sensors are geographically distributed to collect and process data within a smart infrastructure using an open channel, the Internet. However, the use of the Internet brings inherent vulnerabilities related to security (e.g., IoT devices can be compromised using advanced hacking techniques) and privacy (e.g., adversary performing inference and data poisoning attacks). Intrusion Detection System (IDS) and Cyber Threat Intelligence (CTI) are the two most extensively used techniques in IoT-enabled networks to safeguard the integrity and availability of sensitive smart systems. However, the presence of a large volume of data i.e., dimensionality curse and cloud-based centralized deployment mechanism hurts the IDS performance in terms of intrusion detection tasks and increased latency for data processing. On the other hand, modelling CTI is challenging due to the limited labels of cyber threat sources, and analysing these sources to extract relevant threat information manually is a time-consuming and error-prone procedure that necessitates a large investment of resources. This thesis provides substantial contributions to research on the building of a distributed IDS, a hybrid feature selection approach, an automated CTI Modelling and Identification scheme, and a deep privacy-encoding module for enhancing security and privacy of IoT-enabled networks.

About the author

Prabhat Kumar received his Ph.D. degree in Information Technology, National Institute of Technology, Raipur, India in 2022, under the prestigious fellowship of Ministry of Human Resource and Development (MHRD) funded by the Government of India. He is currently working as a Post-Doctoral Research Fellow with the Department of Computer Science & Engineering, Indian Institute of Technology, Hyderabad, India. His research interests are Security and Privacy of the Internet of Thing, artificial intelligence, software-defined networking, Cybersecurity, and Blockchain. He has authored or coauthored over 20 publications in high-ranked journals and conferences. Some of his research findings are published in top cited journals, such as IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (TII), IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (TITS), IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (TNSE), IEEE IoTJ, IEEE MICRO, JSA (Elsevier), ComCom (Elsevier), JPDC (Elsevier), ICDCN and IEEE ICC. He is an Expert Evaluator of top scientific journals and conferences, including IEEE TII, IEEE TITS, IEEE TNSE, IEEE TGCN, IEEE JBHI, IEEE IoTJ, IEEE Network Magazine, IEEE IoT Magazine, IEEE Access, ACM TALLIP, ComCom and IEEE ICC. He is also an IEEE Student Member.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.