Artificial Intelligence Ai Elementary To Advanced Practices Cyber Defense Mechanisms Security Privacy
Artificial Intelligence Ai Elementary To Advanced Practices Cyber Defense Mechanisms Security Privacy
Mechanisms
Artifcial Intelligence (AI): Elementary to
Advanced Practices
Series Editors:
Vijender Kumar Solanki, Zhongyu (Joan) Lu, and Valentina E. Balas
In the emerging smart city technology and industries, the role of artifcial intelli-
gence (AI) is getting more prominent. This AI book series aims to cover the latest AI
work, which will help the naïve user to get support to solve existing problems and for
the experienced AI practitioners, and assists to shedding light for new avenues in the
AI domains. It covers the recent work carried out in AI and its associated domains,
logics, pattern recognition, NLP, expert systems, machine learning, blockchain, and
Big Data. The work domain of AI is quite deep, so this book discusses the latest
trends which are evolving with the concepts of AI and helps practitioners, students,
researchers, and those who are new to this feld to gain some new insights.
Edited by
Gautam Kumar, Dinesh Kumar Saini, and
Nguyen Ha Huy Cuong
First edition published 2021
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
Reasonable eforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of
their use. Te authors and publishers have attempted to trace the copyright holders of all material
reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and
let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microflming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.
com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA
01923, 978-750-8400. For works that are not available on CCC please contact mpkbookspermissions@
tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identifcation and explanation without intent to infringe.
Typeset in Times
by codeMantra
Contents
Preface......................................................................................................................vii
Editors.......................................................................................................................ix
Contributors ..............................................................................................................xi
Chapter 8 Big Data Analysis on Smart Tools and Techniques ......................... 111
Jabar H. Yousif and Dinesh Kumar Saini
v
vi Contents
Index...................................................................................................................... 213
Preface
Security and privacy is one of most crucial, in this digital age, for all of us in daily
human being life. To deal the same with tools and technologies is one of the big chal-
lenges, because so many attacks are reported in all kinds of computer systems and
networks. It is becoming increasingly important to develop robust, adaptive, scal-
able, and reliable security and privacy mechanisms for applications and its related
areas. In relation to the same, it is imperative to understand the fundamentals with
recent attacks such as cyber security principles, vulnerabilities, and handful and
optimized solutions used as defense mechanisms. The security mechanisms are pre-
sented to mitigate negative implications associated with cyberattacks and privacy
issues in various technologies. The objective of this book is to collect and address
a variety of problems in relation to cyberdefense mechanisms, because in the fast
growing environment, the research trends in this area are always having a great
demand in the form of prospective cyberdefense cryptographers and most to car-
rier buildings. The contributors are addressing theoretical and practical aspects to
security mechanisms, challenges, and opportunities. This book aims is to attract
graduates/postgraduates/researchers/practitioners who are working in computer
science and information technology.
The overall objectives covered are as follows:
vii
Editors
Dr. Gautam Kumar is currently working as Associate
Professor at CMR Engineering College, Hyderabad, India.
He received his PhD degree in computer science and engi-
neering from Jaypee University of Information Technology,
Himachal Pradesh, India, in 2017. He did his M.Tech in
Rajasthan Technical University, Kota, India, in 2012, and
B.E. in Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal,
India, in 2005. He has the academic experience more than
14+ years. His research interests are in the feld of cryptogra-
phy, information security, design and analysis of algorithms.
He has published more than 25 research journals and conferences papers of repute
in Science Citation, Scopus, and indexed journals and conferences. He has handled
various responsibilities as a president of Institute’s Innovation Council, Ministry of
Human Resource Development (MHRD), India, and a Convenor/SPOC of Smart-India
Hackathon, New Delhi, India. He is a reviewer of (i) Security and Communication
Networks, John Wiley & Sons and Hindawi, (ii) The Computer Journal, Oxford
Academic, and many reputes of IEEE/ACM international conferences.
ix
Contributors
Amna Al-Sdidi Suman De
Faculty of Computing and Information Developer
Technology SAP Labs India Pvt. Ltd.
Sohar University Bangalore, Karnataka, India
Sohar, Oman
Mohammad Farhan Ferdous
K. Annapurna Department of Information Science
Department of Computer Science & Japan Advanced Institute of Science
Engineering and Technology
Canara Engineering College (Affliated Ishikawa, Japan
to VTU, Belagavi, India) Japan-Bangladesh Robotics &
Benjanapadavu, Mangalore, India Advanced Technology Research
Center (JBRATRC)
D. Arivudainambi Dhaka, Bangladesh
Department of Mathematics
Anna University Anuj Kumar Goel
Chennai, Tamil Nadu, India Department of Electronics &
Communication Engineering
Shreyas Arunesh CMR Engineering College
Department of Electronics and Hyderabad, Telangana, India
Communication
NMAMIT (Autonomous and Affliated Meenu Gupta
to VTU, Belagavi) Department of Computer Science and
Karkala, Karnataka, India Engineering
Chandigarh University
K. Pranava Bhat Chandigarh, Punjab, India
Department of Electronics and
Communication Rachna Jain
NMAMIT (Autonomous and Affliated Department of Computer Science and
to VTU, Belagavi) Engineering
Karkala, Karnataka, India Bharati Vidyapeeth’s College of
Engineering
Ashok Kumar Das Delhi, India
Center for Security, Theory and
Algorithmic Research Gautam Kumar
International Institute of Information Department of Computer Science and
Technology Engineering
Hyderabad, Telangana, India CMR Engineering College
Hyderabad, Telangana, India
xi
xii Contributors
CONTENTS
1.1 Introduction ......................................................................................................2
1.2 History of Security Breaches............................................................................3
1.3 Common Security Threats................................................................................4
1.3.1 Malware ................................................................................................4
1.3.2 Phishing ................................................................................................5
1.3.3 Spear Phishing ......................................................................................5
1.3.4 “Man in the Middle” (MitM) Attack....................................................5
1.3.5 Trojans ..................................................................................................5
1.3.6 Ransomware .........................................................................................6
1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service
Attack (DDoS) ......................................................................................6
1.3.8 Attacks on IoT Devices.........................................................................6
1.3.9 Data Breaches .......................................................................................6
1.3.10 Malware on Mobile Apps .....................................................................6
1.4 Security Challenges in Modern Day ................................................................7
1.4.1 Cloud Computing..................................................................................7
1.4.2 Social Media .........................................................................................8
1.4.3 Smart Phones ........................................................................................8
1.4.4 General Data Protection Regulations (GDPR) .....................................9
1.4.5 Attacks Based on Machine Learning and AI .......................................9
1.4.6 Attacks against Cryptocurrencies and Blockchain Systems .............. 10
1.4.7 Switching to DevOps.......................................................................... 10
1.4.8 Biometric Authentication.................................................................... 11
1.4.9 Fileless Malware ................................................................................. 11
1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT)..... 12
1.5.1 How an APT Attack Works................................................................ 12
1.5.2 Some Instances of APTs..................................................................... 13
1.5.3 Characteristics of APTs ...................................................................... 14
1.6 Prevention Measures....................................................................................... 15
1.6.1 Identify the Threats ............................................................................ 15
1
2 Cyber Defense Mechanisms
1.1 INTRODUCTION
Cybersecurity has become a matter of primary concern for organizations and world
governments alike. The essence of every application is ranging from web-based
offerings to mobile applications run into the common challenge of defending against
intrusions by foreign attacks of cybercriminals. Data security provides another angle
to the all security practices, and the governed aspects of policies like General Data
Protection Regulations (GDPR) make it essential to software vendors to abide the
needs of relevant governing laws and ensure quality with respect to security. This
introduces the importance of incorporating security analysts to evaluate and ensure
that the required guidelines and regulations are maintained wherever required. This
chapter takes a tour of generic security threats and how the role of a security analyst
helps discover potential threats and faws in any software offering. The recent secu-
rity threats are also explored and briefy discussed along with the possible prevention
steps against known attack strategies.
Threat analysis is the process of evaluating suspicious actions and reach of
unrecognized intelligence bodies or cybercriminals [1]. A cybersecurity threat is
described as a malicious activity that looks to hamper the digital world. The activity
could be damaging of data, intervention in a communication channel, or unauthor-
ized retrieval of data. The generic target of hackers* includes business organiza-
tions, government bodies, institutions, and even individuals with infuential identity.
Cyberattacks can involve threats such as denial-of-service (DoS), malwares, software
viruses, and phishing emails. These threats target entities with an online presence
and relevance with respect to the attack. History has shown cyberattacks that have
resulted in breaches of Government security missions, data breach in media houses,
and massive fund transfers in bank frauds affecting regular activities of human life.
Security threats can be damaging but often follow well-defned strategic moves,
which leads to a possible breach. The prevention of attack scenarios is well estab-
lished by a study of possible attack strategies and the necessary steps that are needed
* Hackers (indicative to crackers) are individuals who break into a system to gain unauthorized access
to confdential data or to affect the regular functionality of a system.
Security Threat Analysis and Prevention 3
TABLE 1.1
List of Well-Known Cyberattacks or Breaches
Incident Type of Attack Year
WannaCry Ransomware Malware software demanding ransom 2017
Koobface worm Malware in social media sites—213K users affected 2009
Equifax Data breach affecting 145.5 million users 2017
Dream market breach Sixteen websites hacked and out on sale in the Dark web 2019
Friend Finder networks 412 Million accounts hacked and exposed 2016
4 Cyber Defense Mechanisms
FIGURE 1.1 Cyberattack frequency on fnancial institutions since 2007 as per Carnegie
Endowment.
1.3.1 MALWARE
Malware is an application which does a harmful activity on a device, network, or
system. Activities can result to corruption of data, gaining unauthorized access on
confdential information or manipulation of data. The word “malware” is formed
keeping the essence of two different words “malicious” and “software.” A malware
can be a virus, Trojan, spyware, or ransomware that causes damage to a system.
Viruses tend to associate itself with other entities to clear fle content, or infect and
damage relevant fle content. Viruses spread with control, resulting in damage of a
system’s primary features, and damaging or corrupting fle content. Such software
appears as executables (.exe) or batches (.bat), and cause harm to the system. Trojans
are malwares that disguise itself as legitimate software or are hidden in legitimate
software that has been tampered with. It acts discretely by making backdoors in the
security system to allow signifcant malwares inside. Spywares are malicious soft-
ware which are developed to spy on users. They hide themselves in the background
and observe the user’s online activities, including passwords, credit card numbers,
user behavior for websites, and other relevant activities. The primary objective of
Worms is to infect a complete network of devices, both local and across the web, via
network protocols, or interfaces. Ransomware attempts to lock down systems and
relevant fle content and sends a word to erase or damage signifcant data unless a
ransom is paid. Another type of malware is Adware which is not harmful but causes
a distraction for users and also creates an easier route for other malwares to creep
Security Threat Analysis and Prevention 5
into the system. Attackers can also utilize a network of computer to infect and work
for personal benefts which is also another type of malware and is commonly known
as Botnet.
1.3.2 PHISHING
Phishing is a message-based (especially electronic mails) threat which constitutes
of tricking the end-user into exposing private data or luring to download malicious
software by following a link sent with the email. The email is drafted in a way to
make the recipient believe the source and trust the sending entity. Once the recipi-
ent is lured into the content, they are coaxed into providing private information or
forced to download malware onto the target’s computer. A common example is a
mail containing prize winning notifcation and requesting bank details for follow-up
on receiving the winnings.
1.3.5 TROJANS
They are a form of malicious software which reaches a network appearing to be a
generic software but installs malicious code after it is inside the target system. It
draws motivation from ancient Greek History and was named after the same. Trojans
are employed by cybercriminals and intruders to attain unauthorized access to net-
works. End-users are tricked through social engineering techniques into download-
ing and installing Trojans. Once installed, Trojans enable cyberthieves to spy, steal
confdential data, and gain unauthorized access to the target system. The activities
involve data deletion, blockage, modifcation, copy, and affecting the performance of
systems or network of computers.
6 Cyber Defense Mechanisms
1.3.6 RANSOMWARE
Ransomware is a malware that constitutes of encryption of information on the
host network and asking for money in return of availability of the system to the
affected individual again. This type of a threat may involve low-hanging nuisances
to major incidents as observed during the locking of confdential government
information for the whole area of Atlanta and WannaCry ransomware software in
2018 and 2017, respectively.
• Limit frewalls and Internet gateways: create and arrange border protec-
tions, particularly web intermediary, web separating, content checking, and
frewall strategies to recognize and square executable downloads, square
access to known vindictive spaces and keep clients’ PCs from discussing
legitimately with the Internet.
• Malware security: set up and keep up malware barriers to identify and react
to realized assault code.
• Patch management: fx known vulnerabilities with the most recent adapta-
tion of the product, to forestall assaults which misuse programming bugs.
• Whitelisting and execution control: keep obscure programming from hav-
ing the option to run or introduce itself, including AutoRun on USB and
CD drives.
• Secure design: limit the usefulness of each gadget, working framework and
application to the base required for business to work.
• Password policy: guarantee that a proper secret key arrangement is set up
and followed.
• User access control: incorporate restricting typical clients’ execution con-
sents and implement the guideline of least beneft.
In the event that your association is probably going to be focused by an all the more
actually profcient assailant, give yourself more prominent certainty by extending
the ten steps to cybersecurity with the following additional measures:
Using this, numerous risks demonstrating strategies have been created. They can be
joined to make a progressively strong and balanced perspective on potential dangers.
Not every one of them is far reaching; some are conceptual, and others are individu-
als driven. A few strategies center explicitly around hazard or security concerns.
Risk demonstrating ought to be performed right off the bat in the advancement
cycle where possible issues are identifed early and cured, forestalling a lot expensive
fx later in the future. Utilizing danger demonstrating to consider security prereq-
uisites can prompt proactive building choices that help diminish dangers from the
beginning. This can be especially useful in the region of digital physical frame-
works. A rundown of threat modeling strategies is given as follows (further clarifed
in Table 1.2):
TABLE 1.2
Threat Modeling Methods and Their Characteristics
Method Characteristics
STRIDE • Identifes relevant mitigation techniques
• Time-consuming but easy-to-use
PASTA • Identifes relevant mitigation techniques
• Directly supports risk management
• Ensures collaboration between all stakeholders
• Has built-in prioritization to threat prevention
• Laborious but contains rich documentation
LINDDUN • Identifes relevant mitigation techniques
• Has built-in prioritization to threat prevention
• Laborious and time-consuming
CVSS • Has built-in prioritization to threat prevention
• Provides consistent results when repeated
• Contains automated components
• Consists of score calculations that are not transparent
Attack trees • Identifes relevant mitigation techniques
• Provides consistent results when repeated
• Easy-to-use with complete understanding of the system
PnG • Provides consistent results when repeated
• Directly supports risk management
• Identifes relevant mitigation techniques
• Detects only subsets of threats
Security cards • Ensures collaboration between all stakeholders
• Targets rare threats
• Results in many false positives
hTMM • Has built-in prioritization to threat prevention
• Ensures collaboration between all stakeholders
• Provides consistent results when repeated
Quantitative TMM • Has built-in prioritization to threat prevention
• Provides consistent results when repeated
• Contains automated components
Trike • Identifes relevant mitigation techniques
• Has built-in prioritization to threat prevention
• Ensures collaboration between all stakeholders
• Directly supports risk management
• Contains automated components
• Contains vague, insuffcient documentation
VAST modeling • Identifes relevant mitigation techniques
• Has built-in prioritization to threat prevention
• Ensures collaboration between all stakeholders
• Directly supports risk management
• Contains automated components
• Provides consistent results when repeated
• Designed to be scalable
• Very less documentation available publicly
(Continued)
20 Cyber Defense Mechanisms
1.9 SUMMARY
This chapter discusses some very common security threats and attack strategies
used by hackers or cybercriminals to get access to a system and cause damage to
it. We learned more about threat modeling techniques and basic prevention mea-
sures that are employed by organizations to ensure that the relevant data is safe and
secured. The following has been covered:
REFERENCES
1. P. Napolitano, G. Rossi, M. Lombardi, F. Garzia, M. Ilariucci and G. Forino, “Threats
Analysis and Security Analysis for Critical Infrastructures: Risk Analysis vs. Game
Theory,” 2018 International Carnahan Conference on Security Technology (ICCST),
Montreal, QC, 2018, pp. 1–5. doi: 10.1109/CCST.2018.8585725.
2. NortonLifeLock, “A Brief History of Data Breaches.” Available: https://www.lifelock.
com/learn-data-breaches-history-of-data-breaches.html. Last Accessed: 15.02.2020.
3. M. Henriquez, “The Top 12 Data Breaches of 2019.” Available: https://www.securi-
tymagazine.com/articles/91366-the-top-12-data-breaches-of-2019. Last Accessed:
15.02.2020.
4. Carnegie Endowment for International Peace, “Timeline of Cyber Incidents Involving
Financial Institutions.” Available: https://carnegieendowment.org/specialprojects/pro-
tectingfnancialstability/timeline. Last Accessed: 15.02.2020.
5. D. Galinec, D. Možnik and B. Guberina, “Cybersecurity and Cyber Defence:
National Level Strategic Approach,” Automatika, 58(3), 273–286, 2017. doi:
10.1080/00051144.2017.1407022.
6. L. Ming, G. Zhao, M. Huang, X. Kuang, H. Li and M. Zhang, “Security Analysis of
Intelligent Transportation Systems Based on Simulation Data,” 2018 1st International
Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, 2018,
pp. 184–187. doi: 10.1109/ICDIS.2018.00037.
7. S. Manzoor, H. Zhang and N. Suri, “Threat Modeling and Analysis for the Cloud
Ecosystem,” 2018 IEEE International Conference on Cloud Engineering (IC2E),
Orlando, FL, 2018, pp. 278–281. doi: 10.1109/IC2E.2018.00056.
8. J. Jang-Jaccard and S. Nepal, “A Survey of Emerging Threats in Cybersecurity,”
Journal of Computer and System Sciences, 80(5), 973–993, 2014. doi: 10.1016/j.
jcss.2014.02.005.
9. M. Gogan, “Cybersecurity Challenges That Need to be on Your Radar Right Now!,”
Available: https://www.readitquik.com/articles/security-2/cybersecurity-challenges-
that-need-to-be-on-your-radar-right-now/. Last Accessed: 15.02.2020.
10. M. Rouse, “Advanced Persistent Threat (APT).” Available: https://searchsecurity.tech-
target.com/defnition/advanced-persistent-threat-APT. Last Accessed: 14.02.2020.
11. L. Sion, K. Yskout, D. Van Landuyt and W. Joosen, “Risk-Based Design Security
Analysis,” 2018 IEEE/ACM 1st International Workshop on Security Awareness
from Design to Deployment (SEAD), Gothenburg, 2018, pp. 11–18. doi: 10.23919/
SEAD.2018.8472848.
12. N. Shevchenko, “Threat Modelling: 12 Available Methods,” Carnegie Melon University.
Available: https://insights.sei.cmu.edu/sei_blog/2018/12/threat-modeling-12-available-
methods.html. Last Accessed: 15.02.2020.
13. NICCS, “Threat Analysis,” National Initiative for Cybersecurity Careers and Studies.
Available: https://niccs.us-cert.gov/workforce-development/cyber-security-workforce-
framework/threat-analysis. Last accessed: 15.02.2020.
2 Defense against
the Survivability to
Network Strategies
K. V. S. S. S. S. Sairam, Shreyas Arunesh,
K. Pranava Bhat, and K. Sarveswara Rao
NMAMIT (Autonomous and Affliated to VTU, Belagavi)
K. Annapurna
Canara Engineering College (Affliated to VTU, Belagavi)
CONTENTS
2.1 Introduction .................................................................................................... 23
2.2 Survivability Network Architecture—SONET and Self-Healing
Ring Transportation........................................................................................24
2.3 Single-Access Optical Network Ring Architecture........................................24
2.4 Multiaccess Optical Network Ring Architecture ...........................................25
2.5 Channel Demand Routing Ring Architecture ................................................26
2.6 Result .............................................................................................................. 29
2.7 Conclusion ...................................................................................................... 31
References................................................................................................................ 31
2.1 INTRODUCTION
Network survivability represents the resistance towards the physical as well as natu-
ral disasters rather than by cross talk media in the fber network strategy bandwidth
play a vital role in order to increase the interoffce networking with fber stranded
which deals the survivability aspects. It also addresses the network failures (physical
connectivity and logical connectivity.
The previous work involves the network protection by using the topologies arbi-
tration. In this protection, a method which handles normal cable penetration and
transition failures is improved, and further, it also rebuilds the network on central-
ized system [1–3]. It is the state of the network and also improves the topology inde-
pendent connectivity.
Further, a variety of source conveyance by
23
24 Cyber Defense Mechanisms
the transition with the central offce. It forms a chain, further connected to a chain
of SONET and ADMs which collects the traffc through DS1-DSn. The topology
provides the backup in turn to reroute circuits in opposite direction, as shown in
Figure 2.2, to single-access optical network ring architecture.
It provides an interconnection between the access ring and internetwork connec-
tivity which is connected with multiple period confguration connectivity. It refects
SONET—integrated planning concept which includes both path connectivities at
least one bidirectional ring [12].
The virtual terminal signal serving two nodes determines one ADM in clockwise
direction (CW) and another ADM in counterclockwise direction (CCW) by satisfy-
ing the ring connectivity into single period and multiperiod, as shown in Figure 2.3,
multi access optical network ring architecture.
the data is integrated and cross-connectivity is obtained by using digital signal lev-
els. Further, these levels are enhanced by optical carrier transmission and reception
by using dynamic network unit as depicted in ring architecture, as shown in the
above Figure 2.5. The NXN splitter splits the each multiperiod connectivity (MPC)
(integrated) in the form of both data cross-connectivity (DXC) and dynamic network
unit (DNU).
It consists of a network, switch, and a router where the data is transmitted and
received from and to input port to output port, as shown in Figure 2.6. In this, the
controller provides architecture, and it prevents the collision across packet transfer.
The input queue is dynamically fexible and also variable in the form of space switch.
In results, comparison between single-access and multiaccess ring architecture
has been tabulated with respect to 12 × 12. The parameters, i.e., round trip delay,
have been evaluated in terms of the node connectivity confguration such as 1–2
and 2–1 … 12–11 and 11–12; that is, each source and destination packet delivery
determines its propagation, transmission, and queue speed, and fnally, latency has
been measured, and the values are represented in Tables 2.3 and 2.4. Further, the
node connectivity confguration could be enhanced to NXN connectivity.
28 Cyber Defense Mechanisms
TABLE 2.1
Comparison of Different SONET Ring Architectures (a)
Attributes DCS ADM
Switching VC (virtual circuit) VP (virtual path)
Network utilization Lower Higher
Node confguration complexity Lower Higher
Path capacity NO Yes
TABLE 2.2
Distinction between SONET Ring Architectures (b)
Ring Single Single CO Multi-CO Spare
Architecture Cable Failure Failure ADM Failure Capacity Cost
Single CO YES NO Conditional Base NO LOW
Dual CO YES YES YES Drop continues NO HIGH
Defense against the Survivability 29
2.6 RESULT
Single-access ring and multiaccess ring architecture with round trip delay and
latency are measured by its packet transition from single-period connectivity (SPC)
to MPC, which is shown in Tables 2.3 and 2.4. In this, network topology of size
12 × 12 is considered where demand connectivity is represented across each point
to point. In optical networks, the survivability strategy is estimated in the form of
single node to single node connectivity and/or multinode to multinode, for example,
9–2; the single-access ring network is obtained as 3.7581765, the multiperiod access
ring 0.0098565, and the total round trip delay 0.151851515. It adapts various traffc
conditions across different cross-connectivity systems. It results the performance of
spare path capacity assignment including link/path rout optimization.
30 Cyber Defense Mechanisms
TABLE 2.3
Single-Access Ring and Multiaccess Ring Architecture with Round Trip Delay
S. No Point to Point (S, D) Single-Access Ring Multiaccess Ring Round Trip Delay
1 1–2 4.951578 0.0012565 0.168234229
1–3 3.7581765 0.0085469 0.198534665
1–4 5.104979 0.0079654 0.1587822636
1–5 3.9315035 0.0064782 0.178962542
2 2–1 5.2865985 0.0074422 0.01556511
2–3 3.7581765 0.0098565 0.151851515
2–4 5.1604979 0.3298523 0.1518418115
2–5 3.9315035 0.0012786 0.101485181
3 3–1 5.22865985 0.0059812 0.01556511
3–2 3.7581765 0.0076942 0.151851515
3–4 5.1049765 0.0002593 0.1518418115
3–5 3.7581765 0.0034985 0.101485181
4 4–1 5.104979 0.0002549 0.168234229
4–2 3.7581765 0.0005879 0.198534665
4–3 4.951578 0.5568632 0.1587822636
4–5 3.7581765 0.2156265 0.178962542
5 5–1 4.951578 0.0059812 0.01556511
5–2 3.7581765 0.0076942 0.151851515
5–3 3.9315035 0.0002593 0.1518418115
5–4 5.104979 0.0034985 0.101485181
6 6–1 5.2865985 0.0074422 0.215151511
6–2 3.7581765 0.0098565 0.15181612
6–3 5.1604979 0.3298523 0.051505615
6–4 3.9315035 0.0012786 0.11858155
TABLE 2.4
Single-Access Ring and Multiaccess Ring with Latency
S. No Bit Rate—PP (S, D) Single-Access Ring Multiaccess Ring Latency
7 7–1 4.951578 0.0012565 0.168234229
7–2 3.7581765 0.0085469 0.198534665
7–3 3.9315035 0.0079654 0.1587822636
7–6 5.104979 0.0064782 0.178962542
8 8–1 4.951578 0.0059812 0.215151511
8–2 3.7581765 0.0076942 0.15181612
8–3 3.9315035 0.0002593 0.051505615
8–7 5.104979 0.0034985 0.11858155
(Continued)
Defense against the Survivability 31
2.7 CONCLUSION
In this, survivability of the optical network strategies is discussed in terms of surviv-
ability network architecture, single-access optical network ring architecture, multi-
access optical network ring architecture, channel demand routing architecture, and
integrated ring-type architectures. Further, the ring architecture dimensions and an
enhancement over the capacity expansion to the multiperiod capacity are estimated
by signal connectivity, the demand connectivity, carrier connectivity, and multifow
connectivity. It may be extended further by multiperiod congestion control through
which the delay and packet collision to are decreased.
REFERENCES
1. Listanti, Marco, Massimo Berdusco, and Roberto Sabella. “Optical path strategies
in WDM all-optical networks: minimization of wavelength converters in optical
cross connects.” GLOBECOM 97. IEEE Global Telecommunications Conference.
Conference Record. Vol. 1, IEEE, 1997, Phoenix, AZ.
2. Aly, Salah A., and Ahmed E. Kamal. “Network coding-based protection strategies
against a single link failure in optical networks.” 2008 International Conference on
Computer Engineering & Systems. IEEE, 2008, Cairo.
32 Cyber Defense Mechanisms
3. Bhatt, Uma Rathore, and Sanjiv Tokekar. “Survivable routing and wavelength assign-
ment strategy for multiclass WDM optical networks.” 2011 International Conference
on Computational Intelligence and Communication Networks. IEEE, 2011, Gwalior.
4. Pages, Albert. “Strategies for virtual optical network allocation.” IEEE Communications
Letters 16.2(2011): 268–271.
5. Garnot, Matthieu, Michel Sotom, and Francesco Masetti. “Routing strategies for opti-
cal paths in WDM networks.” Proceedings of ICC’97 – International Conference on
Communications. Vol. 1, IEEE, 1997, Canada.
6. Monath, Thomas. “Economics of fxed broadband access network strategies.” IEEE
Communications Magazine 41.9(2003): 132–139.
7. Mokhtar, Ahmed, Lotf Benmohamed, and Michael Bortz. “OXC port dimensioning
strategies in optical networks-a nodal perspective.” IEEE Communications Letters
8.5(2004): 283–285.
8. De Andrade, Marilet. “Evaluating strategies for evolution of passive optical networks.”
IEEE Communications Magazine 49.7(2011): 176–184.
9. Sairam, Kanduri Venkata Satya Shiva Subrahmanya Surya, Shreyas Arunesh, K. Pranav
Bhat, and Kanduri Sarveswara Rao. “Optical networks implementation using surviv-
ability capacity connectivity algorithm (SCCA).” Proceedings of the 2nd International
Conference on Communications and Cyber Physical Engineering, Lecture Notes in
Electrical Engineering. Springer, 2021, Pune, India.
10. Chochliouros, Ioannis P. “Optical Access Networks and Advanced Photonics”:
Technologies and Deployment Strategies: Technologies and Deployment Strategies.
IGI Global, Hershey, PA, 2009.
11. Sairam, Kanduri Venkata Satya Shiva Subrahmanya Surya, and Chandra Singh. “FONI
by using survivability approach: an overview.” ICACNI and Informatics, pp. 529–537.
Springer, 2019, Singapore.
12. Sairam, Kanduri Venkata Satya Shiva Subrahmanya Surya, Chandra Singh, P. Sai
Vamsi, Kanduri Annapurna, and Kanduri Sarveswara Rao. “Broadband services imple-
mentation by using survivable ATM architecture”. 2019. Available at SSRN 3355302.
13. Sairam, Kanduri Venkata Satya Shiva Subrahmanya Surya, Chandra Singh, P. Sai
Vamsi, Kanduri Annapurna, and Kanduri Sarveswara Rao. “Ring architecture analysis
implementation by using fber network survivability techniques.” 2019. Available at
SSRN 3355319.
14. Singh, Chandra, and Kanduri Venkata Satya Shiva Subrahmanya Surya Sairam.
“Survivable fber optic networks design by using digital signal levels approach.” 2017
ICISS, pp. 84–86. IEEE 2017, December, Palladam.
15. Labourdette, Jean-François. “Routing strategies for capacity-effcient and fast-
restorable mesh optical networks.” Photonic Network Communications 4.3–4(2002):
219–235.
3 Defense Mechanism
to Self-Adaptive
Cyber-Physical
Security Systems
Pati Prasanthi
Stanley College of Engineering and Technology for Women
CONTENTS
3.1 Introduction ....................................................................................................34
3.2 Background Knowledge of CPS ..................................................................... 35
3.3 Application Areas of Cyber-Physical System (CPS) ...................................... 35
3.4 Philosophical Issues of CPS ........................................................................... 36
3.5 Principle of CPS Operation ............................................................................ 36
3.6 Architecture of CPS........................................................................................ 37
3.6.1 Physical Layer..................................................................................... 37
3.6.2 Data Link Layer.................................................................................. 37
3.6.3 Network Layer .................................................................................... 37
3.6.4 Transport Layer................................................................................... 38
3.6.5 Session Layer ...................................................................................... 38
3.6.6 Presentation Layer .............................................................................. 38
3.6.7 Application Layer ............................................................................... 38
3.7 Self-Adaptive Patterns .................................................................................... 38
3.7.1 Synthesis Utilized Pattern .................................................................. 38
3.7.2 Synthesis Command Patterns ............................................................. 39
3.7.3 Collect Organized Patterns.................................................................40
3.8 Security Threats of CPS .................................................................................40
3.9 Attacks on CPS............................................................................................... 41
3.10 Attacks and Its Consequences ........................................................................ 42
3.11 Adversaries’ Characteristics ........................................................................... 43
3.12 Conclusion ......................................................................................................44
References................................................................................................................44
33
34 Cyber Defense Mechanisms
3.1 INTRODUCTION
Cyber-physical system (CPS) can effectively and effciently integrate physical
and cybercomponents using modern sensors, computations, and networking tech-
niques [1,2]. A novel computational model called physical-cyber-social computing/
cyber-physical-social has invented from CPS and cyber-social systems. Cyber-
physical-social system studies include the quality-of-service (QoS) to the various
models in effective to social, people participation, and interaction [3,4].
The industry 4.0 is recently associated with CPS that combines technology and
knowledge that provides controlled autonomy and reliable strengths without human
interactions. The technologies that are underlying CPS are Internet of Things (IoT),
cloud computing, Big Data, and many more. CPS is the basis of development in the
areas of smart technology, medicine, biometrics, meteorology, etc. which is shown
in Figure 3.1.
The International Standard of Organization (ISO) and International Electro-
Technical Commission (IEC), ISO/IEC 27001:2013, dictate the requirements in
establishment, implementation, maintenance, and continuous improvements in secu-
rity management system. Its setout is general and is intended to apply to all organi-
zation irrespective of its size, type, or nature in order to maintain the information
security with respect to integrity, confdentiality, access control and availability, and
present state of the controlled object to operator [18]. The CPS procedure is parti-
tioned in below mentioned stages:
• Monitoring
• Networking
• Computational processing
• Actuation.
The attacks on this layer lead to sensors and actuators failure which leads to change
or loss of information and address of source; thus, it leads to mechanical failure.
The major characteristics of cyberthreats are that they are scalable, automatic, and
replicated [24]. Cyber-physical attacks originate from cyberspace and affect the
physical space of CPS. CPS threats are classifed as follows [25]:
• Spoofng identity
• Tampering of data
• Repudiation of origin
• Information disclosure
• Elevation of privilege
• Denial of service.
The following risk assessments and decision-making problems faced by CPS are as
follows [26]:
in CPS that provides feedback for actuation. Modern security systems are
focused on data security only, but their effect on evaluation and administer-
ing algorithms must be studied in depth to provide protection for CPS [32].
• Skilled hackers: These are the skilled and sophisticated developers who
look for vulnerable software and write a code to misuse that software.
• Disgruntled insiders: The intruders are employees, business people, or con-
tractors who does not have enough knowledge regarding intrusions. But
their only intension is to acquire system information and give access to
unauthorize a person which in turn leads to cybercrime.
44 Cyber Defense Mechanisms
3.12 CONCLUSION
A cyber-physical security system is a prototype of development of present and future
systems, and they have promising impact in the real world. This chapter describes
the background of CPS; that is, the technical background, applications, philosophi-
cal issues, and principle of CPS operation are discussed precisely. The cyberthreats
and attacks regarding confdentiality, authenticity, reliability, and availability of
resources are discussed. Tree of attacks on sensors, actuators, computing, communi-
cation, and feedback is discussed in detail.
REFERENCES
1. S. Zeadally, N. Jabeur, Cyber-Physical System Design with Sensor Networking
Technologies, The Institution of Engineering and Technology, London, UK, 2016.
2. S.H.H.N. Ghazani, J.J. Lotf, R.M. Alguliev, “A study on QoS models for mobile adhoc
networks”, Int. J. Model.Optim. 2 (5) (2012), pp. 634–636.
3. A. Sheth, P. Anantharam, C. Henson, “Physical-cyber-social computing: an early
21st century approach”, IEEE Intell. Syst. 28 (1) (2013), pp. 78–82.
4. J. Zeng, L.T. Yang, M. Lin, H. Ning, J. Ma, “A survey: cyber-physical-social systems
and their system-level design methodology”, Future Gener. Comput. Syst. 56 (2016),
pp. 504–522.
5. C.H. Liu, Y. Zhang, Cyber Physical Systems: Architectures, Protocols and Applications,
CRC Press, Taylor & Francis Group, Boca Raton, FL, 2016.
6. E.A. Lee, “Cyber physical systems: design challenges”, 11th International Symposium
on Object/Component/Service-Oriented Real-Time Distributed Computing, Orlando,
FL, 2008.
7. K.H. Johansson, “Control of cyber-physical systems: fundamental challenges and
applications to transportation networks”, 27th International Conference on Architecture
of Computing Systems, Lubeck, Germany, 2014.
8. J.A. Stankovic, “Research directions for the internet of things”, IEEE IoT J. 1 (1) (2014),
pp. 3–9.
9. R. Davies, “The Internet of Things opportunities and challenges”, European
Parliamentary Research Service, 2015 PE 557.012.
10. A. Hakansson, R. Hartung, E. Moradian, “Reasoning strategies in smart cyber-physical
systems”, Proc. Comput. Sci. 60 (2015), pp. 1575–1584.
11. H. Ning, Q. Li, D. Wei, H. Liu, T. Zhu, “Cyber logic paves the way from cyber
philosophy to cyber science”, IEEE IoT J. 4 (3) (2017), pp. 783–790.
12. A. Hahn, R.K. Thomas, I. Lozano, A. Cardenas, “A multi-layered and kill-chain
based security analysis framework for cyber-physical systems”, Int. J. Crit. Infr. Prot.
11 (2015), pp. 39–50.
13. M. Krotofil, A. Cardenas, “Resilience of process control systems to cyber physical
attacks”, 18th Nordic Conference on Secure IT Systems, Ilulissat, Greenland, 2013.
14. M. Krotofil, J. Larsen, “Are you threatening my hazards?”, 9th International Workshop
on Security, Hirosaki, Japan, 2014.
Defense Mechanism to Security Systems 45
CONTENTS
4.1 Introduction .................................................................................................... 47
4.2 Related Works................................................................................................. 49
4.3 System Model ................................................................................................. 50
4.4 Common Attacks in CR-WSN........................................................................ 54
4.4.1 Replay Attack ..................................................................................... 54
4.4.2 Node-Targeted Attack......................................................................... 54
4.4.3 Power Consumption Attack ................................................................ 55
4.4.4 Location Privacy................................................................................. 55
4.5 Performance Evaluation.................................................................................. 55
4.5.1 Countermeasures in CR-WSN ............................................................ 59
4.6 Conclusion and Future Work .......................................................................... 61
References................................................................................................................ 61
4.1 INTRODUCTION
Wireless sensor network (WSN) is a process, which consists a group of sensor nodes;
each sensor node sense data from its environment and communicate the sensed
data with Industrial, Scientifc and Medical (ISM) band, which are internationally
reserved for the use of radio frequencies. These ISM bands have limited network
resources and are also utilized by many wireless devices like Wi-Fi and Bluetooth.
Thus, WSN faces many diffculties due to this collision in the band, which in turn
affects its further development [1]. Hence to overcome this issue in WSN, the avail-
ability of the ISM bands needs to be determined. This chapter provides a design of
CR-WSN to eradicate the above issue.
Cognitive radio (CR) is an emerged technology for the effcient spectrum utiliza-
tion challenges. It allows the secondary user to identify the spectrum hole and access
it by using dynamic spectrum access. Thus, the secondary users in CR continuously
47
48 Cyber Defense Mechanisms
monitor the channels to identify its vacancy termed as spectrum sensing, which anal-
yses, senses, and learns the parameters associated with the radio channel and then
decides which channel to move and fnally adapts its transceiver so that the active
communication is continued over the new channel. This type of cognitive capabili-
ties added to WSN to bring more benefts because WSN is a core area for cogni-
tive networking. Adaptively changing characteristics of CR will improve the power
consumption, network lifetime, and reliability in WSN. The cooperative spectrum
sensing involves the information sharing between multiple secondary users. The sec-
ondary user sends their sensing result to the coordinator and then forwards to fusion
center. The coordinator is selected by k-means clustering which reduce the collision
in fusion center. The cooperative spectrum sensing is divided into centralized and
distributed. The centralized spectrum allocation is considered in this chapter for
dynamic spectrum access in CR-WSN. It can be determined as a scattered set of
wireless CR sensor nodes, which cooperatively sense signals and dynamically com-
municate the sensed signals over available spectrum bands in a multihop manner to
meet the application specifc requirement [2]. CR-WSN provides access to the new
spectrum and also allocates the spectrum with better propagation characteristics.
The advantages of CR-WSN are higher transmission range, lower energy consump-
tion, and ability to cover specifc area by few nodes [3].
In centralized allocation, the central unit collects all the sensing information from
the sensor nodes, identifes the idle spectrum band, and distributes the information
to the fusion center. Here, the central units act as a coordinator, and the remaining
sensor nodes act as a member. Now the coordinator and its members share the infor-
mation such as spectrum sensing results, SNR (signal-to-noise ratio, SNR) level, and
present position of secondary user. Now the channels are allocated to secondary user
based on the SNR priority. This type of network architecture is a suitable choice for
an effective dynamic spectrum management [2]. This will overcome the challenges
of the single node spectrum sensing, and also improve the detection performance
and energy consumption.
The characteristics of CRN like sensing the spectrum will infuence the present
and future behavior of all nodes. This is the main reason for malicious attacker to
affect the network behavior. In addition to it, the dynamic nature of CR-WSN weak-
ens the network for easy attack, and also the existing security model for WSN does
not ft the CRN because of its special characteristics. So security plays a signifcant
role in CR-WSN, but to the best of our knowledge, all the literatures have proposed
some proper countermeasures to encounter the attacks faced in the network. In both
type of networks, the communication protocols have more vulnerabilities, so attacker
easily destructs the network model, which leads to reduced battery life, i.e., reduced
lifetime. Maximizing the lifetime of sensor node is depending on the mode of com-
munication. In this chapter, we concentrate on multihop communication which
improves the network lifetime. The main reason for it is the variation in security
paradigms for CR and WSN. Thus, this chapter provides some possible solutions for
the common attacks in CR-WSN.
In this chapter, a number of sensor nodes with a variety of SNR energy levels are
considered. So it forms a heterogeneous network architecture. Each sensor node may
experience with heterogeneous detection probability due to its different location and
Secure Channel Allocation 49
energy level, and also it has self-confgurability for adopting the environment. In this
heterogeneous architecture, the coordinator serves as a fusion point, so the system
focuses on less robust node failure when compared with homogeneous network. In
addition to it, our work provides a stable environment for CR users under various
attacks.
David et al. has introduced clustered anti-replay protection in [14], to store the
anti-replay information, which provides scalable and secure environment of future
WSN. To defend against the traffc analysis attacks, three schemes have proposed in
Ref. [15]: random routing scheme, dummy packet injection scheme, and anonymous
communication scheme. These schemes are effectively preventing traffc analysis
attack. Based on control theory, Tamaro Bonaci et al. [16] have presented a compre-
hensive framework which simultaneously works in secure deployment techniques
and node identifcation algorithms for node capture attacks. The effcient cluster
head formation algorithms have proposed in Ref. [17] for replay attack. Distributed
energy-effcient clustering protocol is used to enhance the lifetime and scalability of
the sensor node network. The said literatures well defned various security threats of
CR-WSN. But the dynamic natures of cognitive WSNs have noteworthy challenges
in planning security schemes.
Muhammad Sajjad Khan et al. [18] have discussed double adaptive approach to
differentiate the legitimate user and malicious users. The performance of proposed
method is tested with various types of malicious user’s attacks and compared with
existing result. A survey is conducted about security in CR networks in Ref. [19]. The
primary user emulation attack is discussed and lists the defense against primary user
emulation attack. They considered spider radio as the important invention of CR. Li
Jianwu et al. [20] have proposed three steps. First, they provide the classifcation of
attacks, and second, the existing countermeasures for defending active attacks are
listed, and then, the physical layer security is discussed for passive attacks.
Begin
Step 1. Cluster Formation
For ˜ sensor nodes n (1n)
Secure Channel Allocation 51
Algorithm1 explains that the k-means clustering algorithm is utilized to form the
spectrum coordinator. The process of clustering algorithm is explained in Figure 4.2.
Each sensor node senses the channel using energy detection method. Now the SC col-
lects the information from the sensor nodes and predicts the channels using Bayesian
approach. The predicted information passed from the SC to FC. The FC makes the
fnal decision for selecting the idle channel. Based on the SNR energy level, the SC
allocates the channels to the secondary user.
Energy detection technique is applied to the spectrum sensing. The energy detec-
tion technique always senses the unknown signal based on the known noise power.
In energy detection, the existence or nonexistence of primary user identifcation is
done by CR users on the basis of the received signal energy level. Figure 4.3 shows
that the predictable signal r (t ) is squared off and combined over the observation
interval T. Finally, the measured signal is compared with a selected threshold factor
˜ , which results in a conclusion about the availability of a PU.
52 Cyber Defense Mechanisms
After spectrum sensing, the next process is collecting the sensing history from
all the sensor nodes. In cooperative spectrum sensing, each sensor node is com-
municated with fusion center means it will affect with collision. So the spectrum
coordinator is selected with the help of k-means clustering algorithm. The spectrum
coordinator maintains the sensing history. Each sensor node senses the channel inde-
pendently and sends the result to the spectrum coordinator. Now the coordinator
sends the sensing history to the fusion center. The fusion center makes the fnal
decision about the channel availability. The channel is selected for communication
which has more than 50% of idle time. Because if the channel is allocated to second-
ary user which has minimum idle time, the secondary user must switch the channel
Secure Channel Allocation 53
immediately when the primary user arrives to that channel. So the channel is selected
with high idle time. Then, the spectrum coordinator allocates the channel in which
secondary user has the highest SNR ratio. Main aims of spectrum allocation are
dynamic detection and effective use of idle spectrum termed as spectrum prediction.
Spectrum prediction is a distinct approach to save the sensing time. But it not
only saves the sensing time also improves the performance of the secondary user. In
this chapter, the prediction of the spectrum is carried out with the help of Bayesian
inference approach. The prediction requisite is expressed as a Bayesian problem and
found the solution through the Bayesian approach. The novelty of this method is that
it utilizes the conditional probability of busy or idle previous states to predict the
probability of next idle state.
Bayes theorem is defned as
P(b /a) P(a)
P(a /b) =
P (b)
Bayes classifer combines prior knowledge with observed data, and then assigns pos-
terior probability to a class based on its prior probability and likelihood of given
training data. After calculating the posterior probability for a number of different
hypotheses, the hypothesis with the highest probability is selected. This is called as
maximum of a posterior hypothesis. The Bayes algorithm frst identifed the number
of idle and busy slots from the sensing history. It analyses the continuous occurrence
of busy slots and idle slots in each channel. Based on that, it predicts the future
occurrence of idle slots. This method absolutely saves the sensing time and improves
the performance of the secondary user.
The contrast between WSN and CR-WSN is shown in Figure 4.4. In CR-WSN, the
sensing state is the most important state, because it will reduce the sensing overhead
and improve the detection performance. The spectrum coordinator should always
satisfy the sensing accuracy. A time-slotted channel is considered because the time
is divided into frames. For each frame, the spectrum coordinator separately does the
sensing process, and then, it sent back to the fusion center. After getting feedback,
it transmits the data to the receiver. During sensing, selecting, and allocating the
channel, the node is targeted by the attackers because the attackers can easily imple-
ment the malicious actions on the sensor nodes. The following section discusses the
possible attacks focusing on the CR-WSN.
Special features of CR-WSN such as high transmission range and low energy
consumption make it better against threats. The security of CR-WSN is endangered
by the access medium, which is used like radio waves. This section explores the vari-
ous security mechanisms related to WSN and CRN. Some of the main attacks are
replay attack, node-targeted attack, power consumption attack, and location privacy
attack, which are discussed in this section [3].
and use reverse engineering, and then, the node becomes a device for raising the
counterattacks. The effect of this attack refects the node functionality and also the
whole network. Node capturing is not only a node demolishing, but getting a cryp-
tographic keys and modifying the node functions also. Node capture is a powerful
deterrent in CR-WSN because it has some special characteristics like distributed
information and cooperational behavior [3].
TABLE 4.1
Network Parameters
Parameter Value
Primary transmitter 5
Number of CR user 75
Spectrum coordinator 3
Transmission power 1—100 mW
Distribution range 15 × 15 square area
The k-means clustering uses the Euclidian distance to cluster the dataset into k
clusters. It is defned as
ED = (x 2 − x1 )2 + (y2 − y1 )2 .
In this type of clustering, the center node called SC is selected based on the nearest
distance from the fusion center which gets the necessary information required for
the act of performing the clustering process from the single sensor nodes. The SC
makes various decisions and partitions for the group of sensor nodes into clusters
without the involvement of any other node. Figure 4.6 depicts how the sensor nodes
forming the cluster head or SC.
The algorithm follows these steps:
Step 1: Assign k clusters randomly.
Step 2: Obtain spectrum coordinator.
Step 3: Calculate the distance between SC and each data point.
Step 4: Calculate minimum distance using Euclidian distance.
Step 5: Group the data points based on minimum distance.
Step 6: Repeat step (2) when the data points change the group.
In CR-WSN, sensor nodes have low power, and the network traffc load is rela-
tively low. The SC among the sensors in CR-WSN performs spectrum sensing. Since
it is a repetitive process, SC needs extra energy. While selecting the sensing algo-
rithm, some important points to be considered, because this is very important to
make sure the existence of primary user. Figure 4.7 demonstrates the act of energy
detection technique.
The secondary user regularly observes the spectrum usage of a particular fre-
quency band, and then, it forms the observation history at a given specifed time
slot. Bayesian approach predicts the future idle state based on history. Figure 4.8
defnes the channel availability in a frequency band. At a specifed observation time,
it senses the channel and displays the availability status in a binary format. If it is 0,
it means the channel is free; otherwise, the channel is busy. So the secondary user
can access only those free channels.
The cognitive nodes fnd out the existence of a primary user signal, and the details
are provided to the fusion center; the fusion center takes the necessary action about
the idle spectrum and signal to the spectrum coordinator. But this process faces a
problem, when the number of nodes increases. To bring under control this issue,
the usage of centralized cooperative spectrum sensing model reduces the sensing
overhead and enhances the observation activity. Here, SC is responsible only for
spectrum sensing to reduce sensing time. Figure 4.9 displays the comparison of sens-
ing time between distributed sensing model and centralized cooperative model.
The next comparison is based on a communication range of 2.4 GHz and trans-
mitting power of CR-WSN. In the same transmit power, the CR-WSN communi-
cation range is higher than 2.4 GHz due to the higher propagation loss. In terms
of providing higher transmission range and lower energy utilization, CR-WSN per-
forms rigorously in lower frequency bands. The average energy of each node at each
round is shown in Figure 4.10.
The largest quantity of time between the dead of frst node and last node is
defned as network lifetime. The signifcant demand of the network is longer stabil-
ity period, but the damage of one sensor node disrupts the functioning period of
network. Figure 4.11 displays the comparison of network lifetime between WSN and
CR-WSN. It is repeated for 50 rounds, taking 50 secondary users. The integration of
cognitive capability with WSN saves sensing time and gets high transmission range.
frequently moves to the next channel, it takes more energy. But in the CR-WSN,
the main goal is to increase the battery life. The frequent channel switching drains
the battery quickly and degrades the performance of the secondary user. So the
spectrum prediction is proposed to improve the performance of the secondary user.
Thus, these characteristics improve the lifetime of the sensor nodes, which leads to
increase the battery life.
To mitigate the replay attack, the clustering mechanism is used, which consider-
ably decreases the amount of memory for anti-replay protection. The replay attack is
occurred when all the sensor nodes are directly communicated to the fusion center.
This will cause collision at fusion center, and also the malicious users can send the
false signal to the fusion center. So in this chapter, the k-means clustering is pro-
posed to form the spectrum coordinator. The spectrum coordinator does the spec-
trum sensing and maintains the sensing history. This will reduce the collision at the
fusion center and also protect the replay attack. All the said countermeasures are
reducing the malicious actions of the network.
Secure Channel Allocation 61
REFERENCES
1. Amir Sepasi Zahmati, Sattar Hussain, Xavier Fernando and Ali Grami, “Cognitive
Wireless Sensor Networks: Emerging Topics and Recent Challenges,” Toronto
International Conference – Science and Technology for Humanity, IEEE, Toronto,
ON, pp. 593–596, 2009.
2. Ozgu B. Akan, Osman B. Karli and Ozgur Ergul, “Cognitive Radio Sensor Networks,”
IEEE Network, vol. 23, 2009, pp. 34–40.
3. Alvaro Aruja, Javier Blesa, Elena Rumero and Daniel Villenueva, “Security in
Cognitive Wireless Sensor Network. Challenges and Open Problems”, EUROSIP
Journal of Wireless Communication and Networking, vol. 2012, 2012, pp. 1–8.
4. Reza Nourmand, “Cognitive Radio Wireless Sensor Networks,” https://rezanourmand.
wordpress.com/04/10/271.
5. Dave Cavalcanti, Sushanta Das, Jianfeng Wang and Kiran Challapali, “Cognitive
Radio Based Wireless Sensor Networks,” International Conference on Computer
Communications Networks, IEEE, St. Thomas, USVI, pp. 1–4, 2008.
6. Sang-Seon Byun, Hangko Balasingham and Xuedong Liang, “Dynamic Spectrum
Allocation in Wireless Cognitive Sensor Networks: Improving Fairness and Energy
Effciency,” IEEE Vehicular Technology Conference, IEEE, Calgary, BC, pp. 1–5,
2008.
62 Cyber Defense Mechanisms
CONTENTS
5.1 Introduction .................................................................................................... 63
5.2 Challenges for IoT Network............................................................................64
5.2.1 The Most Important Challenges in IoT Network................................64
5.2.1.1 Schema Processing ..............................................................64
5.2.1.2 Speed....................................................................................64
5.2.1.3 The Value .............................................................................64
5.2.1.4 The Security......................................................................... 65
5.3 Elements for the Internet of Things (IoT)....................................................... 65
5.4 Cases and Scenarios for IoT Network............................................................. 65
5.4.1 Clustering............................................................................................ 65
5.4.2 Tracking.............................................................................................. 65
5.4.3 Tactical Networks and High Dynamic Network ................................ 65
5.5 The Vision of Internet of Things (IoT)...........................................................66
5.6 Software-Defned IoT .....................................................................................66
5.7 IoT Architecture..............................................................................................66
5.8 Algorithm for Internet of Things (IoT)........................................................... 67
5.9 Business Context of the IoT ............................................................................ 67
5.10 IoT Device Information Collection Process ................................................... 67
5.11 Introduction to IoT Security ........................................................................... 68
5.12 Development of IoT Security Mechanisms..................................................... 68
5.13 Security Attacks in IoT ................................................................................... 70
5.14 IoT Security Challenges.................................................................................. 70
5.14.1 IoT Security Risks and Challenges..................................................... 70
5.14.2 IoT Security Requirements ................................................................. 71
5.15 Conclusion ...................................................................................................... 72
References................................................................................................................ 72
5.1 INTRODUCTION
In the past few years, broadband Internet bandwidth is available for home users
primarily through high-speed reliable Internet connections, while the price/fxed
ratio in the speed of declines. Speed is increased by 50% per year, which is slightly
slower for a 60% increase in computer power. In addition, there has been a decrease
63
64 Cyber Defense Mechanisms
in the size of electronic gadgets, and many simple gadgets have previously evolved
to contain computer modules and microelectronic controllers to provide a new set
of services for communication. Internet of Things (IoT) is a network of physical
elements—tools and more components such as electronics, software, and sensors—
which enable these elements to be included in electronic circuits, devices, software,
and communicating devices, and which gives these objects the ability to collect and
share data between themselves and other devices The IoT gives you the opportunity
to remotely fnd and control things through your available network infrastructure,
provides opportunities for clearer coordination of real-world computer systems, and
improves and develops effciency and accuracy [Ahmed et al.].
IoT techniques have become one of the most prevalent types of interaction. The
emergence of (processes) technology has made it an essential element in monitoring
the applications of environmental medical services. For example, wireless sensors
can be transmitted in different wide areas in order to monitor this data that thus can
be sent to the cloud frame and displayed to the target users [Ayadi].
5.2.1.2 Speed
This is a testament to the speed at which data is collected, transmitted, and pro-
cessed. The speed of data handling varies, which depends largely on the type of
application [Sim]. For some applications, data access can be processed within a very
short period, while in other applications, real time is required or very long time of
hardware and software analysis is required [Verma].
5.4.1 CLUSTERING
In the context of operations and more general methods, from device to device, the
tools organized in groups can be greatly enhanced with SDR, e.g., SDN, and NFV.
The objectives of synthesizing methods for multiple operations include strengthen-
ing communication and communication between centers, providing balance and
fault tolerance, and maintaining a progressive structure for development assistance.
5.4.2 TRACKING
Some target tracking methods have been widely recognized in the literature of wire-
less sensor networks. It involves tracking the estimation of the target state through
the use of techniques ranging from node to collaborative methods. A large part of
these methods are used by an active scheme based on prediction as well as selective
activation of contract activities [Hwang et al.].
H=− ˜ q log q
i=1
i 2 i (5.2)
where qi = Pi is the probability of uniform query of site I, and the sum of each Pi
is equivalent to 1. Since the greater the universe and the higher the uncertainty in
distinguishing the real user location from the dummy set sites, we will most likely
get enough of the universe. In particular, when the totality of your dummy specifc
locations is equivalent to the probability of historical query, we can maximize the
universe Hmax = log2.
{ }
ˆ p(1) , p( 2) ,, p( M ) , M > 0
˘
Pij = ˇ (5.3)
˘˙,
M=0
from data collected from transactions. Figure 5.1 shows the process involved in
creating a smart information tool, which is given in the following procedure:
and countermeasures according to the classic threat vectors. It is noted that authen-
tication is still the most popular method of security, while trust management is gain-
ing popularity, due to its ability to prevent or detect malicious node. Figure 5.3 shows
the trends in the techniques and methods which have been used in 2016–2018.
70 Cyber Defense Mechanisms
The frst category includes the conventional security practices like locking below
the open ports on devices (e.g., a refrigerator linked to the Internet for indicating
product stock and the risk of SMTP server robots). Also, the second group includes
Security Issues in IoT Networks 71
problems related to the IoT devices; for example, device information may be safe for
normalization. For example, most very small IoT devices support incorrect and sym-
metric encryption. Moreover, any operating system Internet device can publish the
integrated frmware, and there are many security challenges that must be overcome
and will review some major challenges.
Scalability: This requires the management of a large number of IoT nodes’ scal-
able security solutions.
End-to-end security: This process is done between IoT devices and Internet hosts
which is no less important.
Authentication and trust: Identify their identity and authentication capabilities.
synchronization within the complex IoT environment has not yet matured. Thus, this
prevents the creation of trusting relationships between IoT components, which are a pre-
requisite for IoT applications requiring a dedicated connection between IoT elements,
such as smart city scenarios. There is a need for operations management techniques
to ensure the engines feed data analysis with valid data. Without documentation, we
cannot confrm the data fow resulting from “Contains,” an entity supposed to contain.
Anti-attack security solutions: As result of the diversity in IoT devices, there
has been a need for security solutions in order to resist attacks. This is because
IoT devices have limited computational resources and therefore are vulnerable to
resource-fortifying attacks.
5.15 CONCLUSION
In the last few years, IoT has been advanced quickly, and it was suggested a big
number of technologies enabling. The IoT has been the direction of the Internet and
mostly availing in dealing with increased intelligence. There is ample scope to reset
research in IoT. Many of modern technologies will appear in future for taking us to
full of new levels of smart world. The future for IoT will provide a better lifestyle
for people.
REFERENCES
Ahmed, T., Alleg, A., & Magdelaine, N. (2019). An Architecture Framework for Virtualization
of IoT Network. IEEE Conference on Network Softwarization, NetSoft, Paris, France.
Ayadi, H. (2018). A Multimode and Multithreshold Approach for Energy Effciency in Internet
of Things Systems. International Journal of Distributed Sensor Networks, 14 (6), 1–14.
Desai, A., & Parmar, J. (2016). IoT: Networking Technologies and Research Challenges.
International Journal of Computer Applications, 154 (7), 1–6.
Elrawy, M. F., Ali, I. A., & Hamed, H. F. A. (2018). Intrusion Detection Systems for IoT-
Based Smart Environments: A Survey. Journal of Cloud Computing, 7 (1), 1–20. doi:
10.1186/s13677-018-0123-6.
Farhan, L. (2018). A Concise Review on Internet of Things (IoT) Problems, Challenges and
Opportunities. International Symposium on Communication Systems, Networks, and
Digital Signal Processing (CSNDSP), IEEE, Budapest, Hungary.
Gloukhovtsev, M. (2018). IoT Security: Challenges, Solutions & Future Prospects.
https://education.dellemc.com/content/dam/dell-emc/documents/en-us/2018KS_
Gloukhovtsev-IoT_Security_Challenges_Solutions_and_Future_Prospects.pdf.
Gokhale, P., Bhat, O., & Bhat, S. (2018). Introduction to IOT. International Advanced
Research Journal in Science, Engineering and Technology, 5 (1), 41–44.
Gronbæk, I. (2008). Architecture for the Internet of Things: Focus on API. ETSI Workshop
on Machine to Machine Standardization, Sophia Antipolis, France.
Hwang, Y., Kim, M., & Rho, J. (2015). Understanding Internet of Things IoT) diffusion:
Focusing on value confguration of RFID and sensors of RFID and sensors in business
cases (2008–2012). Information Development, 32 (4), 969–985.
Iqbal, R. (2016). Internet of Things (IOT): On Going Security Challenges and Risks.
International Journal of Computer Science and Information Security, 7 (14), 34–50.
Ishaq, I. (2013). IETF Standardization in the Field of the Internet of Things (IoT): A Survey.
Journal of Sensor and Actuator Networks 2 (2), 235–287.
Jung, J. (2016). Enabling Smart Objects Discovery via Constructing Hypergraphs of
Heterogeneous IoT Interactions. Journal of Information Science, 44 (1), 110–124.
Noor, M. (2019). Current Research on Internet of Things (IoT) Security. Computer Networks,
148, 283–294.
Patel, K. K., & Patel, S. M. (2016). Internet of Things-IOT: Defnition, Characteristics,
Architecture, Enabling Technologies, Application & Future Challenges. International
Journal of Engineering Science and Computing. doi: 10.4010/2016.1482.
Porter, M. (1985). The value chain. In Competitive Advantage: Creating and Sustaining
Superior Performance. Accessed date 10/Jan/2020. http://www.fao.org/fleadmin/
user_upload/fsheries/docs/ValueChain.pdf
Sengupta, J. (2019). A Comprehensive Survey on Attacks, Security Issues and Blockchain
Solutions for IoT. Journal of Network and Computer Applications 149 (2020): 10248.
Shang, W. (2016). Challenges in IoT Networking via TCP/IP Architecture, NDN Technical
Report NDN-0038. http://named-data.net/techreports.html
Security Issues in IoT Networks 73
Sim, S., & Choi, H. (2018). A Study on the Service Discovery Support Method in the IoT
Environments. International Journal of Electrical Engineering Education, 0(0), 1–12.
Verma, A. (2018). Energy Effcient Technique for IoT. International Journal of Computer
Science and Mobile Computing, 7 (8), 196–202.
Wu, F., Wu, T., & Yuce, M. (2019). An Internet-of-Things (IoT) Network System for Connected
Safety and Health Monitoring Applications. Sensors, 19 (1), 21.
Yu, B., & Li, H. (2019). Anonymous Authentication Key Agreement Scheme with Pairing-
Based Cryptography for Home-Based Multi-Sensor Internet of Things. International
Journal of Distributed Sensor Networks, 15(9).doi: 10.1177/1550147719879379.
6 IoT Ecosystem
Implications to
Real-World Security
Scenario
Dinesh Kumar Saini and B. Y. Sandhiyaa
Sohar University
SRM Institute of Science & Technology
CONTENTS
6.1 IoT Ecosystem History.................................................................................... 75
6.2 IoT Ecosystem................................................................................................. 76
6.2.1 Building an IoT Ecosystem................................................................. 76
6.3 Challenges in Building an Ecosystem ............................................................ 77
6.4 IoT Ecosystem Implications............................................................................ 77
6.5 IoT Security Implications ............................................................................... 78
6.6 Current IoT Security Scenario and Trends ..................................................... 78
6.6.1 Why These Are Not Enough ..............................................................80
6.6.2 The Ideal Security System..................................................................80
6.7 A Solution—Blockchain Technology .............................................................80
6.7.1 Implementing Blockchain in an IoT Ecosystem ................................. 82
6.8 Conclusion ...................................................................................................... 82
References................................................................................................................ 82
75
76 Cyber Defense Mechanisms
analog data from the entities and sent forward. The processed information
is returned to the entities as analog data using actuators. A common exam-
ple would be sensors in a building capturing vibrations during earthquakes
and receiving appropriate information that actuators send to the emergency
alarms, automatically opening the exit doors, etc. [4].
2. Data acquisition: This stage involves data aggregation and conversion of
analog/digital signals to data that can be manipulated by the devices in the
next stage depending on the direction of data and control fow. The analog
signals from the sensors are converted to digital data for data analysis, and
the analyzed digital information is converted to analog control signals for
the actuators. Internet gateways help in this orchestration of communication
and also in encryption–decryption of data for security [5].
3. Pre-processing: Despite being binary data that is computer-readable, the
data coming from the entities end is raw. To attain the objective of produc-
tivity and effciency, the data is analyzed and processed. Instead of taking
the raw data all the way to the cloud for processing, edge computing is
applied here in which the intelligence and analysis mechanism is brought
near the edge/source/point of data generation and then sent to the cloud
for further manipulation and management. Edge computing accelerates
insight, reduces transmission costs, and most importantly makes security
better due to decentralization [6].
4. Storage and management infrastructure: Nonetheless, a centralized pool
of computing resources simplifes management of information. These data
centers are generally clouds. They are used for several purposes such as
aggregate point for edges, data analytics, prognostics and control informa-
tion generation, and storage space [7].
• Most things on the planet are under surveillance or monitored and analyzed
via sensors and other devices, be it processes, people, or nature [10].
Every block in the chain consists of valid transactions which are hashed along
with a hash of the previous block, thus linking them to form a chain. This linking
continues further confrming the integrity of the previous blocks. The hashing of
information generates a unique identity to the block which is similar to a fngerprint.
Like how every fngerprint is unique, the hash of the blocks is also non-identical.
Changing any information inside a block will effect in changing of the hash ultimately
resulting in a mismatch between information stored in the neighboring blocks. Thus,
hashing technique makes a blockchain secure.
But hashing alone is not enough to make the blockchain technology secure.
Let’s see why.
Let’s consider a chain of three blocks containing data along with its hash and the
hash of the previous block. The frst block would be a special block without the hash
of its previous block. This block is called the genesis block.
Tampering the data in block 2 will change the hash of the block. But this will
mismatch with the hash stored in the third block. This will make that and the
following blocks invalid.
Changing a single block will make all following blocks invalid. But with the
technology we have today, it is possible for the computers to calculate thousands
of hashes per second. With such power, one could effectively meddle with a block
and restore the hashes in the other blocks super-fast to make the blockchain valid
again [20].
Thus, to strengthen the security of the blockchains, “proof-of-work” was intro-
duced. It’s a technique that restricts the number of new blocks that can be created in
a given span of time. In the case of Bitcoins, it takes around 10 minutes to validate
the required proof-of-work and add a new block to the chain. This will make the
blockchain technology more secure and diffcult to tamper.
Along with proof-of-work, the blockchain stores information in a distributed
open environment without any central entity. This decentralized nature of block-
chain ensures security by distributing multiple copies of blockchain existing to all
the peers. It is open for anybody to join. Once a person joins the network, he receives
a complete copy of the blockchain. It’s impractical to tamper information in all these
copies.
Thus, there is no single server now but only distributed nodes in a peer-to-peer
network. This decentralization also ensures that no system gets halted due to any
kind of upgradation process.
One must be wondering what the upgradation process is all about. This comes
into play when somebody creates a new block. A block can be created by anybody.
As soon as a block is created, it is sent to all the nodes on the network for verifcation.
If passed, this block gets added to the chain by all the connected nodes in harmony.
If any tampering is found while verifying, the nodes tend to reject the block.
Somebody who is trying to fddle any blockchain information must start with
changing the information on all the blocks in the blockchain, redo the proof-of-
work for every block in more than 50% of the nodes in the network which is nearly
impossible.
Blockchains are widely used in cryptocurrencies, healthcare, property records,
supply chains, and more.
82 Cyber Defense Mechanisms
The applications are spread across a variety of felds which is increasing every
day. The question is not “if” the legacy companies will adopt this technology—it’s a
question of “when” [20].
6.8 CONCLUSION
Security is one of the moving targets, and in this chapter, we studied IoT ecosystem
implications to real-world security scenarios. We studied IoT ecosystem history
in the beginning and then covered all the challenges happening in the IoT ecosys-
tem. We covered all components needed to build security system and blockchain
concept. In the last, we covered implementation of blockchain technology in the IoT
ecosystem.
REFERENCES
1. Suresh, P., J. V. Daniel, V. Parthasarathy, and R. H. Aswathy “A state of the art
review on the Internet of Things (IoT) history, technology and felds of deployment.”
2014 International Conference on Science Engineering and Management Research
(ICSEMR). IEEE, Chennai, 2014.
2. Delicato, F. C., P. F. Pires, T. Batista, E. Cavalcante, B. Costa, and T. Barros. “Towards
an IoT ecosystem.” Proceedings of the First International Workshop on Software
Engineering for Systems-of-Systems. ACM, 2013, Montpellier, France.
3. Papert, M., and A. Pfaum. “Development of an ecosystem model for the realization
of internet of things (IoT) services in supply chain management.” Electronic Markets
27.2(2017): 175–189.
4. Mazhelis, O., E. Luoma, and H. Warma. Defning an Internet-of-Things Ecosystem.
Internet of Things, Smart Spaces, and Next Generation Networking. Springer, Berlin,
Heidelberg, 1–14, 2012.
5. Vresk, T., and I. Čavrak. “Architecture of an interoperable IoT platform based
on microservices.” 2016 39th International Convention on Information and
Communication Technology, Electronics and Microelectronics (MIPRO). IEEE,
Opatija, 2016.
IoT Ecosystem Implications 83
6. Lucero, S.. “IoT platforms: enabling the Internet of Things.” White paper, 2016.
7. Pop, F., J. Kołodziej, and B. Di Martino. Resource Management for Big Data Platforms.
Springer, Singapore, 2016.
8. Samuel, S. S. I.. “A review of connectivity challenges in IoT-smart home.” 2016
3rd MEC International Conference on Big Data and Smart City (ICBDSC). IEEE,
Muscat, 2016.
9. Cai, H., B. Xu, L. Jiang, and A. Vasilakos. “IoT-based big data storage systems in cloud
computing: perspectives and challenges.” IEEE Internet of Things Journal 4.1(2016):
75–87.
10. Conti, M., A. Dehghantanha, K. Franke, and S. Watson. “Internet of Things security
and forensics: Challenges and opportunities.” Future Generation Computer Systems
78(2018): 544–546.
11. Folk, C., D. C. Hurley, W. K. Kaplow, and J. F. X. Payne. The Security Implications of
the Internet of Things. AFCEA International Cyber Committee, Fairfax, VA, 2015.
12. Riahi, A., Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah. “A systemic
approach for IoT security.” 2013 IEEE International Conference on Distributed
Computing in Sensor Systems. IEEE, Cambridge, MA, 2013.
13. Crossman, M. A., and H. Liu. “Study of authentication with IoT testbed.” 2015 IEEE
International Symposium on Technologies for Homeland Security (HST). IEEE,
Waltham, MA, 2015.
14. Doukas, C., I. Maglogiannis, V. Kouf, F. Malamateniou, and G. Vassilacopoulos.
“Enabling data protection through PKI encryption in IoT m-Health devices.” 2012
IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).
IEEE, Larnaca, 2012.
15. Mohsin, M., Z. Anwar, F. Zaman, and E. Al-Shaer. “IoTChecker: a data-driven frame-
work for security analytics of Internet of Things confgurations.” Computers & Security
70(2017): 199–223.
16. Grønbæk, I.. “Architecture for the Internet of Things (IoT): API and interconnect.”
2008 Second International Conference on Sensor Technologies and Applications
(SENSORCOMM 2008). IEEE, Washington, DC, 2008.
17. Geer, D.. “Are companies actually using secure development life cycles?.” Computer
43.6(2010): 12–16.
18. Xu, T., J. B. Wendt, and M. Potkonjak. “Security of IoT systems: design challenges
and opportunities.” Proceedings of the 2014 IEEE/ACM International Conference on
Computer-Aided Design. IEEE Press, San Jose, CA, 2014.
19. Swan, M.. Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc., Sebastopol,
CA, 2015.
20. Pilkington, M.. “11 Blockchain technology: principles and applications.” In Research
Handbook on Digital Transformations, edited by Xavier Olleros F. and Zhegup
Majlinda, 225. Edward Elgar Publishing, Cheltenham, 2016.
21. Minoli, D., and B. Occhiogrosso. “Blockchain mechanisms for IoT security.” Internet
of Things 1(2018): 1–13.
22. Huh, S., S. Cho, and S. Kim. “Managing IoT devices using blockchain platform.” 2017
19th International Conference on Advanced Communication Technology (ICACT).
IEEE, Bongpyeong, 2017.
7 Design Principles
and Privacy in Cloud
Computing
Mohammad Wazid
Graphic Era (Deemed to be University)
CONTENTS
7.1 Introduction .................................................................................................... 86
7.1.1 Evolution of Cloud Computing ........................................................... 87
7.1.2 Applications of Cloud Computing in Various Domains..................... 88
7.1.3 Generalized Architecture for Cloud Computing ................................90
7.1.4 Design Principles in Cloud Computing .............................................. 91
7.1.5 Privacy Issues in Cloud Computing ................................................... 93
7.1.6 Chapter Outline .................................................................................. 93
7.2 Security Requirements and Attacks in Cloud Computing .............................94
7.2.1 Threat Model ......................................................................................94
7.2.2 Security Requirements in Cloud Computing......................................94
7.2.3 Security Attacks in Cloud Computing................................................ 95
7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud
Computing ......................................................................................................96
7.3.1 Key Management................................................................................97
7.3.2 User Authentication/Device Authentication....................................... 98
7.3.3 Access Control/User Access Control................................................ 101
7.3.4 Intrusion Detection ........................................................................... 102
7.3.5 Privacy Preservation ......................................................................... 103
7.4 Challenges and Future Research Directions................................................. 104
7.4.1 Design of Lightweight Security Protocols........................................ 104
7.4.2 Securing Data Mining Methods ....................................................... 105
7.4.3 Granular Auditing............................................................................. 105
7.4.4 Blockchain-Based Decentralized Mechanisms ................................ 106
7.5 Conclusion .................................................................................................... 106
Bibliography .......................................................................................................... 106
85
86 Cyber Defense Mechanisms
7.1 INTRODUCTION
The name cloud computing was inspired by the cloud symbol which was often used
to represent the Internet in the diagrams. Cloud computing is a generic term for
anything that comprises the delivery hosted services over the Internet. It provides
the delivery of computing services, such as servers, storage, databases, networking,
and software over the Internet [17,26]. The computing services are broadly divided
into three categories: (1) infrastructure-as-a-service (IaaS), (2) platform-as-a-service
(PaaS), and (3) software-as-a-service (SaaS) [26,31,42,43,54]. In cloud computing,
we typically pay only for the cloud services that we use, which helps to lower down
the operational costs. This further helps to scale up the business that is needed as per
the changing requirements [31,43]. In the following, we provide the brief details on
the characteristics of IaaS, PaaS, and SaaS [47].
Characteristics of IaaS: The main characteristics behind the IaaS are listed as
follows:
• It provides resources, for instance, the servers for data storage purpose.
• It facilitates storage of multiple copies of data in various locations.
• The provided computing resources can be easily scaled up and down in
IaaS.
Now, various types of cloud computing are discussed next. The classifcation is
mainly performed on the basis of type, usage, and location [51,57].
Public cloud: In this type, a cloud is available to the general public on a pay-per-
use basis. The customer, who uses the services, has no visibility over the location of
the cloud computing infrastructure. It is developed on the standard cloud computing
model. Some examples of public cloud include Windows Azure and IBM’s Blue
Cloud and Amazon EC2 [4,8,13,42].
Design Principles & Privacy 87
Private cloud: It is a type of cloud computing in which the resources, such as data
centers of a business organizations, are not made available to the general public. As
the name indicates, the private cloud is more customer-oriented approach. As private
cloud is only for the dedicated customers, it is more secure as compared to the public
clouds. A private cloud is hosted on the organization’s own servers. Some examples
of private cloud are Eucalyptus and VMware [6,12,26,31].
Hybrid cloud: Hybrid cloud is a combination of private and public clouds.
Most of the time, the organizations use their own infrastructure for normal usage.
However, they hire the cloud services in case of heavy network traffc when the
data load is more and it is not possible for the organization to fulfll such require-
ment [13,51,57].
Community cloud: The infrastructure of a community cloud is shared by different
organizations which have some sharing criteria (e.g., mission, goal, security require-
ments, policy, and other compliance considerations). It is supervised by the orga-
nizations in the community or a third party, and it can present either on-premises
or off-premises. The community clouds are secure as compared to public clouds,
whereas they are less secure than private cloud and they need some governing poli-
cies for their administration [47].
Cloud computing has its roots as far back in the 1950s. It was the time when
mainframe computers came into picture. At that time, there was a facility in which
several users can access a central computer via end machines (dummy terminals).
The only task of these dummy terminals was to provide the access to the end users
to these mainframe computers. It was not feasible for the organizations to buy these
mainframe computers because of the prohibited cost factor. During this period, the
implementation of idea of provisioning of shared access to a single system (main-
frame) was conducted which further saved the cost. The cloud computing technology
that we have today is a result of continuous effort of many researchers.
In the following, we discuss about the evaluation of cloud computing.
• Idea phase: This phase of cloud computing was started in the early 1960s
with the invention of utility and grid computing and lasted till the pre-
Internet era. Joseph Carl Robnett Licklider (Joseph Licklider) used the term
“cloud computing” for that proposed computing framework.
• Pre-cloud phase: The pre-cloud phase started in 1999 and went up to 2006.
In this phase, the Internet as a framework was used to provide the support
for “application as service.”
• Cloud phase: The actual work of cloud computing technology was started
in 2007 when a classifcation of cloud computing services (IaaS, PaaS, and
SaaS) was provided.
88 Cyber Defense Mechanisms
decision-making and to review and update budget plan. All these features
can be easily made available at one location which are easily accessible
with just one click.
• Social networking over the cloud: Social media is the most popular plat-
form which uses the cloud computing technology. Social networking web-
sites such as Facebook, LinkedIn, and Twitter use the cloud computing.
These sites were introduced to fnd people so that we already know or
would like to know about them. In this searching of people, we end up with
the sharing a lot of personal information. If we share information on social
networking website, we not only share our information with our friends
but also with the makers of the platform. This means that the social media
platform needs a powerful hosting solution to manage and store the data in
real time [11].
• Educational development and support: Cloud computing becomes a tre-
mendous option for educational institutions especially which are going
lack of budget and support. Cloud-based services can be utilized to oper-
ate the information systems effectively without spending huge money for
the purchase of systems and network devices. However, only thing that
they need to do is to make contacts with the appropriate cloud service
provider(s). After that, they can take the advantage of available cloud-
based applications offered by their service providers. This facilitates the
users (e.g., students) to perform academic tasks and other required works
effciently [27].
protocols in cloud computing environment along with their techniques used, advan-
tages, and limitations. Various challenges and future research directions that need
to be addressed in future are briefy discussed in Section 7.4. Finally, the conclusion
about this chapter is provided in Section 7.5.
FIGURE 7.3 Taxonomy of security and privacy preservation protocols in cloud computing
environment.
setting, both communicating parties should share a secret key which they
must exchange prior to start the secure communication. For the key dis-
tribution purpose, one can apply some other cryptographic protocols,
e.g., the Diffe–Hellman key exchange protocol [24] to establish a secret
key between two communicating entities. In the “public key cryptography”
setting, the key distribution of public keys is done using a public key server
(i.e., the TA) in which a communicating entity can create a key pair, and
then, it keeps one key as private and the other key as public key. Next, the
public key can be uploaded to the server where it can be accessed by any
legitimate entities. Most of the time, the TA generates the private and pub-
lic key pair for a device (entity), stores private key in the memory of that
device, and announces the other corresponding key publicly to the other
parties involved in the network.
• Key establishment phase: After the successful deployment of all network
entities, they can start their communication in a secure way. Prior to that,
the parties have to exchange some messages for the secure session key
communication and establishment. After the successful session key estab-
lishment, the parties can communicate securely.
• Key revocation and dynamic device addition phase: In a hostile or unat-
tended environment (e.g., battle feld scenario), there are the chances that
some of network devices (i.e., smart IoT devices) may be physically captured
by an enemy (attacker). Further, the attacker can extract the secret (private)
key stored in this device by the application of power analysis attacks [41].
In that case, the TA needs to generate a new key pair (private and public)
and store these credentials into the memory of new smart IoT device prior
to its deployment in the network to get the required service.
Some of recent key management schemes with their techniques used, and
advantages and limitations in cloud computing are summarized in Table 7.1.
• System setup phase: A trusted authority (TA) selects the parameters in the
offine mode.
• Pre-deployment phase: In this phase, the TA does the registration of various
communicating parties (e.g., cloud server, cloud service provider, and other
Design Principles & Privacy 99
TABLE 7.1
Comparison of Key Management Schemes in Cloud Computing
Scheme Short Description and Advantages/Limitations
Kao et al. [33] The authors presented the uCloud scheme to provide a user-centric key
management in order to protect cloud data. Their scheme includes a
hierarchical structure for the key backup and sharing of data. An enterprise
access controller server performs the steps of key management procedure
Tysowski et al. [56] In this scheme, a key management protocol was proposed for secure data
outsourcing applications. They presented attribute-based encryption (ABE)
that allows the authorized users to access secure content on the basis of
attribute-based policy. In this scheme, a user does not need to perform
costly pairing operations. Instead of bilinear pairing execution by the user,
it is delegated to the manager and cloud provider. Moreover, the manager
does the computation of decryption key, but not by the data owner, which
is a good advantage of this scheme.
Li et al. [36] They designed a key management scheme called Dekey. Dekey applies a
deduplication among convergent keys. It also distributes the key shares
among multiple key servers. The presented method preserves the semantic
security of convergent keys and confdentiality of outsourced data.
Moreover, Dekey was implemented using the Ramp secret sharing scheme
which identifes that the scheme suffers from small encoding/decoding
overhead as compared to the overhead in regular upload/download
operations
Zhou et al. [77] The authors proposed a secure architecture for cloud-assisted WBANs in
mobile healthcare social networks. In their architecture, the patients
traverse among the block outdoors. They further proposed a privacy-
preserving key management technique which is resilient against both
time-based and location-based mobile attacks
end devices (i.e., smart IoT devices)). After the successful registration, the
TA stores the essential credentials in the memory of the deployed devices
in the network.
• User registration phase: In order to access the real-time information from a
concerned device, a user requires to register to the TA. To perform this step,
the user frst chooses his/her credentials (e.g., his/her identity, password,
and biometrics information) and then provides these credentials to the TA
via a secure channel (e.g., in person). After that the TA issues a smart card/
mobile device securely to the registered user by storing the useful data in
the memory of smart card/mobile device.
• Login phase: In this phase, a user provides his/her credentials to a specifc
interface of his/her smart card/mobile device. Next, the smart card/mobile
device allows the local verifcation of the entered credentials. After the suc-
cessful verifcation of the user credentials, a login request message is con-
stituted which is subsequently transmitted to other communicating party
(i.e., cloud server) via a public channel.
100 Cyber Defense Mechanisms
• Authentication and key agreement phase: After receiving the login request
message, the steps of this phase are executed as follows. The receiver
(i.e., cloud server) verifes if the message is authentic. If the verifcation
happens successfully, then only the receiver creates an authentication
reply message which involves verifcation of a generated session key, and
then, it is sent to the user back via a public channel. When the same user
receives the message, he/she computes the session key by the help of the
secrets (temporal and long-term secret credentials) that are known and
available in the received message. If the mutual authentication between
the user and the receiver (cloud server) is successful, they establish a ses-
sion key between them. In future, this session key is utilized for their
secure communication.
• Password and biometric update phase: To achieve better security, it is
always a good practice to offer the facility of password and personal bio-
metrics update. With the help of this facility, a legitimate user can change
his/her password and biometric using his/her smart card/mobile device
with/without involving the TA. However, it is recommended that this phase
should be executed locally without involvement of the TA in order to avoid
burden of communication and computational overheads.
• Smart card/mobile device revocation phase: If the smart card/mobile
device of a legitimate user is lost or stolen by an adversary, the scheme
should permit a revocation phase to issue a new smart card or a mobile
device along with the new set of stored credentials to the legitimate user.
• Dynamic node addition phase: In some situations, the communicating
entities (i.e., smart devices) are deployed in an unattended or hostile envi-
ronment. In such cases, some nodes (i.e., smart devices) can be physically
captured by an adversary or some devices may fail because of other fac-
tors like power failure (battery depletion). In this phase, the TA generates
the new credentials for the new device and stores them in memory of
that deployed device in the network. The TA needs to provide the new
node addition information to the other parties of the network so that the
intended users can access the real-time data from the newly deployed
nodes (devices).
It is worth noticing that a user authentication scheme can be classifed into sev-
eral categories based on the number of factors applied in that scheme. It is called a
single-factor user authentication scheme, if only the mobile device or smart card
or password is utilized. In a two-factor user authentication scheme, both mobile
device (smart card) and password can be used. In a multi-factor user authentication
scheme, several factors, such as mobile device (smart card), password, and biomet-
rics like fngerprint, can be considered for a three-factor user authentication mecha-
nism. Furthermore, it is important to notice that the addition of a factor provides
more security to the designed scheme. For example, three-factor user authentication
scheme is more secure than a two-factor user authentication scheme [65].
A comparative analysis on some recently published user/device authentication
schemes in cloud computing is shown in Table 7.2.
Design Principles & Privacy 101
TABLE 7.2
Comparison of User/Device Authentication Schemes in Cloud Computing
Scheme Short Description and Advantages/Limitations
Wazid et al. [64] A “provably secure biometric-based user authentication and key agreement
scheme” for cloud computing was proposed by the authors. Their
proposed scheme overcomes security limitations of other existing
schemes and provides extra functionality features, such as user
anonymity, and effcient password and biometric update facility. The
formal security analysis along with the formal security verifcation using
the broadly popular “Automated Validation of Internet Security Protocols
and Applications” (AVISPA) tool [14] was conducted. The security
analysis proved the resilience of their proposed scheme against different
kind of passive/active attacks
Wazid et al. [66] A “user authentication and key management scheme for cloud-assisted
body area sensor networks” was designed by the authors. Their scheme
facilitates mutual authentication between a user and personal server that is
connected to WBAN via the healthcare server over the cloud. The
established session key is then applied for future secure communication.
Moreover, a key management procedure was also designed for
establishment of secret keys among the smart devices and personal server.
Their conducted formal security analysis also proved that the scheme is
secure against various potential attacks
Odelu et al. [44] Another “provably secure authentication scheme for distributed mobile
cloud computing environment” was proposed by the authors, which can
be easily applied in the cloud computing. Their scheme achieves the
session key (SK) security and strong credentials’ privacy. The formal and
informal security analysis demonstrate that their scheme is resilient
against various known attacks including ephemeral secrets leakage and
impersonation attacks
Roy et al. [49] An “authentication scheme for mobile user in distributed mobile cloud
computing environment” was presented by the authors. Their scheme
supports secure key exchange, user anonymity, and untraceability
properties. Their proposed scheme also offers low computation and
storage overheads as compared to those for other related schemes
The access control techniques can be divided into two categories based on their
authentication mechanism: (1) certifcate-less and (2) certifcate-based. In a
“certifcate-based access control technique,” each deployed node is loaded with a
digital certifcate (e.g., X.509 certifcate [3]) issued by the trusted authority. The
loaded certifcate is further used to prove its identity to its neighbor node, whereas
in a “certifcate-less access control technique,” typically a hash-chain-based
mechanism is used.
In addition, to provide access right only to the registered authenticated users for
various services, information, and resources available in the cloud computing envi-
ronment, user access control mechanism is much useful. Hence, a user access control
makes another infuential security approach.
In Table 7.3, we provide a brief summary of the recently proposed access control/
user access control schemes in cloud computing environment.
TABLE 7.3
Comparison of Access Control/User Access Control Schemes in Cloud
Computing
Scheme Short Description and Advantages/Limitations
Zhou et al. [78] A “role-based encryption” (RBE) scheme was presented by the authors. Their
scheme used cryptographic techniques with the “role-based access control”
(RBAC). Their scheme facilitates the RBAC policies to be enforced for the
(encrypted) data stored over the public clouds. A “secure RBE-based hybrid
cloud storage architecture” permits an organization to store data securely over a
public cloud. Moreover, it also maintains the sensitive data over a private cloud
Ye [73] A scheme based on “cryptographic operation” to enforce the access control
policies and users’ credentials to maintain the privacy of users over cloud was
presented by the authors. The data encryption techniques were utilized to support
data confdentiality. Their proposed scheme was more fexible and easy to use as
compared to other existing schemes
Xue et al. [70] A “heterogeneous framework to resolve the problem of single-point performance
bottleneck and to enforce access control mechanism” was presented by the
authors. Their proposed design utilizes multiple attribute authorities to share the
load of user legitimacy verifcation. Furthermore, a central authority also
produces secret keys for the verifed users
Xu et al. [69] The authors proposed a “revocable attribute-based encryption (ABE) scheme” with
the property of cipher-text delegation. Their scheme combines the identity-based
encryption, ABE, subset cover, and cipher-text encoding. Furthermore, a
“fne-grained access control and data sharing scheme for on-demand services
with dynamic user groups” in the cloud was also presented by them
Yang et al. [72] The authors designed a “scheme for enabling effcient access control with dynamic
policy updating for big data in the cloud.” The main focus in their scheme was on
the development of an outsourced policy updating method for ABE systems.
Their method also minimizes computation overhead of data owners by making
use of previously encrypted data with old access policies
TABLE 7.4
Comparison of Intrusion Detection Schemes in Cloud Computing
Scheme Short Description and Advantages/Limitations
Wazid et al. [67] An intrusion detection scheme for protecting against routing attack in
“edge-based IoT environment” was proposed by the authors. Their presented
mechanism can detect and defend routing attacks. In their communication
model, various entities (IoT smart devices, edge router, and cloud servers) are
deployed. Their proposed scheme protects communication among IoT smart
devices, edge router, and cloud servers
Ficco and Rak [28] The authors designed a strategy to overcome stealthy attack patterns. The attack
patterns consist of a slow increasing intensity trend. They also described two
ways to apply the proposed mechanism and its effectiveness on the target
system deployed in the cloud
Liu et al. [37] The authors proposed a “game-theoretic method to provide an energy-effcient
cooperative defense mechanism” for sensor-based cloud computing
environment. Their simulation results demonstrate that their scheme achieves
energy-effcient defense along with improved security in the sensor-cloud
environment
Gao et al. [29] The authors proposed a fuzziness-based semi-supervised learning approach
using the ensemble learning for intrusion detection over the cloud-based
robotic system. Their approach can resist against different kinds of attack
patterns, which were shown through the experiments
Patil et al. [46] The authors applied a “consolidated weighted fuzzy K-means clustering
algorithm” with auto associative neural network, called WFCM-AANN.
WFCM-AANN detects intrusions in the cloud computing environment. Their
proposed classifer can also identify different types of malwares effectively
TABLE 7.5
Comparison of Privacy-Preserving Schemes in Cloud Computing
Scheme Short Description and Advantages/Limitations
Wang et al. [58] The authors provided anonymity mechanism for the cloud computing services.
The anonymity algorithm is responsible for processing the microdata before
these are published, and then, the anonymous data is being sent to the service
providers in the cloud. In their method, the service provider can directly apply
the data without the need of any key and also without restoring those data
Malina et al. [38] The authors designed a security mechanism for privacy-preserving cloud
services. They used the group signatures mechanism to assure anonymous
authentication of cloud service clients without cryptographic bilinear pairing
operations. Furthermore, their method supports user anonymity during
authentication, data integrity, as well as confdentiality, and also revocation
procedure for all the involved users
Shivanna et al. [52] The authors designed a double encryption mechanism for increasing privacy in
order to store and access the resources on a cloud platform. Their mechanism
supports both authentication and privacy features to the data owner, the cloud
service providers, and also the cloud users
7.5 CONCLUSION
In this chapter, we presented and discussed the security and privacy issues in the
cloud computing environment. The security and privacy protocols in the cloud com-
puting are classifed into various research domains, such as key management, user
authentication, device authentication, access control, user access control, privacy
preservation, and IDS, which are essential to provide security of the data as well as
the privacy of data. We provided a general threat model in which various capabilities
of an adversary are included. We then discussed and analyzed various state-of-art
security protocols that have been recently suggested for the cloud computing envi-
ronment. Finally, we discussed some future research works and challenges that need
to be addressed in the cloud computing.
BIBLIOGRAPHY
1. Blockchain Based Decentralised Cloud Computing. 2019. https://medium.com/
@eternacapital/blockchain-based-decentralised-cloud-computing-277f307611e1.
Accessed on September 2019.
2. Security and Privacy Issues in Cloud Computing, 2016. https://www.narga.net/security-
privacy-issues- cloud-computing/. Accessed on June 2019.
3. X.509: Information technology – Open Systems Interconnection – The Directory:
Public-key and Attribute Certifcate Frameworks, 2016. https://www.itu.int/rec/T-
REC-X.509. Accessed on March 2019.
4. Amazon Elastic Compute Cloud (EC2), 2019. https://aws.amazon.com/ec2/. Accessed
on May 2019.
5. Application of Cloud Computing in Various Sectors Information Technology, 2019.
https://www.uniassignment.com/essay-samples/information-technology. Accessed on
August 2019.
6. Eucalyptus – A Open Source Software, 2019. https://www.eucalyptus.cloud/. Accessed
on August 2019.
7. Evolution of Cloud Computing, 2019. https://www.exelanz.com/blogs/evolution-of-
cloud-computing/. Accessed on February 2019.
8. Microsoft Azure, 2019. https://azure.microsoft.com. Accessed on August 2019.
Design Principles & Privacy 107
29. Y. Gao, Y. Liu, Y. Jin, J. Chen, and H. Wu. A Novel Semi-Supervised Learning
Approach for Network Intrusion Detection on Cloud-Based Robotic System. IEEE
Access, 6:50927–50938, 2018.
30. Y. Hong, W. M. Liu, and L. Wang. Privacy Preserving Smart Meter Streaming against
Information Leakage of Appliance Status. IEEE Transactions on Information Forensics
and Security, 12(9):2227–2241, 2017.
31. S. Islam, M. Ouedraogo, C. Kalloniatis, H. Mouratidis, and S. Gritzalis. Assurance of
Security and Privacy Requirements for Cloud Deployment Models. IEEE Transactions
on Cloud Computing, 6(2):387–400, 2018.
32. A. Jindal, A. Dua, N. Kumar, A. K. Das, A. V. Vasilakos, and J. J. P. C. Rodrigues.
Providing Healthcare-as-a-Service Using Fuzzy Rule Based Big Data Analytics
in Cloud Computing. IEEE Journal of Biomedical and Health Informatics, 22(5):
1605–1618, 2018.
33. Y. Kao, K. Huang, H. Gu, and S. Yuan. uCloud: A User-Centric Key Management
Scheme for Cloud Data Protection. IET Information Security, 7(2):144–154, 2013.
34. N. Khan, N. Ahmad, T. Herawan, and Z. Inayat. Cloud Computing: Locally Sub-
Clouds instead of Globally One Cloud. International Journal of Cloud Applications
and Computing, 2(3):1–18, 2012.
35. N. Koblitz. Elliptic Curve Cryptosystems. Mathematics of Computation, 48:203–209,
1987.
36. J. Li, X. Chen, M. Li, J. Li, P. P. C. Lee, and W. Lou. Secure Deduplication with
Effcient and Reliable Convergent Key Management. IEEE Transactions on Parallel
and Distributed Systems, 25(6): 1615–1625, 2014.
37. J. Liu, J. Yu, and S. Shen. Energy-Effcient Two-Layer Cooperative Defense Scheme to
Secure Sensor – Clouds. IEEE Transactions on Information Forensics and Security,
13(2):408–420, 2018.
38. L. Malina, J. Hajny, P. Dzurenda, and V. Zeman. Privacy-Preserving Security
Solution for Cloud Services. Journal of Applied Research and Technology, 13(1):20–31,
2015.
39. L. Mather. What Does Redundancy Mean In The Cloud?, 2019. https://www.rsaweb.
co.za/what-does- redundancy-mean-in-the-cloud/. Accessed on June 2019.
40. U. Maun. History & Evolution of Cloud Computing: What to Expect in 2019, 2019.
https://www.seasiainfotech.com/blog/history-and-evolution-cloud-computing/.
Accessed on June 2019.
41. T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Examining Smart-Card Security
under the Threat of Power Analysis Attacks. IEEE Transactions on Computers,
51(5):541–552, 2002.
42. M. Metheny. Chapter 4 – Security and Privacy in Public Cloud Computing. In W. Krush,
editor, Federal Cloud Computing, 2nd edition, pp. 79–115. Syngress, Rockland, MA,
2017.
43. M. B. Mollah, M. A. K. Azad, and A. Vasilakos. Security and Privacy Challenges in
Mobile Cloud Computing: Survey and Way Ahead. Journal of Network and Computer
Applications, 84:38–54, 2017.
44. V. Odelu, A. K. Das, S. Kumari, X. Huang, and M. Wazid. Provably Secure Authenticated
Key Agreement Scheme for Distributed Mobile Cloud Computing Services. Future
Generation Computer Systems, 68: 74–88, 2017.
45. V. Odelu, A. K. Das, M. Wazid, and M. Conti. Provably Secure Authenticated
Key Agreement Scheme for Smart Grid. IEEE Transactions on Smart Grid,
9(3):1900–1910, 2018.
46. R. Patil, H. Dudeja, and C. Modi. Designing an Effcient Security Framework for
Detecting Intrusions in Virtual Network of Cloud Computing. Computers & Security,
85:402–422, 2019.
Design Principles & Privacy 109
47. B. K. Rani, B. P. Rani, and A. V. Babu. Cloud Computing and Inter-Clouds Types,
Topologies and Research Issues. Procedia Computer Science, 50:24–29, 2015.
48. R. L. Rivest, A. Shamir, and L. M. Adleman. A Method for Obtaining Digital Signatures
and Public-Key Cryptosystems. Communications of the ACM, 21(2):120–126, 1978.
49. S. Roy, S. Chatterjee, A. K. Das, S. Chattopadhyay, N. Kumar, and A. V. Vasilakos. On
the Design of Provably Secure Lightweight Remote User Authentication Scheme for
Mobile Cloud Computing Services. IEEE Access, 5:25808–25825, 2017.
50. J. Ryoo, D. Han, S. Kim, and S. Lee. Performance Enhancement of Differential Power
Analysis Attacks With Signal Companding Methods. IEEE Signal Processing Letters,
15:625–628, 2008.
51. Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya. Heterogeneity in Mobile Cloud
Computing: Taxonomy and Open Challenges. IEEE Communications Surveys
Tutorials, 16(1):369–392, 2014.
52. K. Shivanna, S. P. Deva, and M. Santoshkumar. Privacy Preservation in Cloud
Computing with Double Encryption Method. In Computer Communication,
Networking and Internet Security (IC3T’16), Lecture Notes in Networks and Systems
(LNNS), vol. 5, pp. 125–133. Springer, Singapore, 2017.
53. W. Stallings. Cryptography and Network Security: Principles and Practice, 5th edition.
Prentice Hall Press, Upper Saddle River, NJ, 2010.
54. C. Stergiou, K. E. Psannis, B. B. Gupta, and Y. Ishibashi. Security, privacy &
effciency of sustainable Cloud Computing for Big Data & IoT. Sustainable Computing:
Informatics and Systems, 19:174–184, 2018.
55. Y. Teing, S. Homayoun, A. Dehghantanha, K. R. Choo, R. M. Parizi, M. Hammoudeh,
and G. Epiphaniou. Private Cloud Storage Forensics: Seafle as a Case Study. In
A. Dehghantanha and K.-K. R. Choo, editors, Handbook of Big Data and IoT Security,
pp. 73–127. Springer, Cham, 2019.
56. P. K. Tysowski and M. A. Hasan. Hybrid Attribute- and Re-Encryption-Based
Key Management for Secure and Scalable Mobile Applications in Clouds. IEEE
Transactions on Cloud Computing, 1(2):172–186, 2013.
57. J. Ullrich, T. Zseby, J. Fabini, and E. Weippl. Network-Based Secret Communication in
Clouds: A Survey. IEEE Communications Surveys Tutorials, 19(2):1112–1144, 2017.
58. J. Wang, Y. Zhao, S. Jiang, and J. Le. Providing Privacy Preserving in Cloud Computing.
In 3rd International Conference on Human System Interaction (HSI’10), pp. 472–475,
Rzeszow, Poland, May 2010.
59. M. Wazid and A. K. Das. An Effcient Hybrid Anomaly Detection Scheme Using
K-Means Clustering for Wireless Sensor Networks. Wireless Personal Communications,
90(4):1971–2000, 2016.
60. M. Wazid and A. K. Das. A Secure Group-Based Blackhole Node Detection Scheme
for Hierarchical Wireless Sensor Networks. Wireless Personal Communications,
94(3):1165–1191, 2017.
61. M. Wazid, A. K. Das, R. Hussain, G. Succi, and J. J. Rodrigues. Authentication in
Cloud-Driven IoT-Based Big Data Environment: Survey and Outlook. Journal of
Systems Architecture, 97:185–196, 2019.
62. M. Wazid, A. K. Das, N. Kumar, and J. J. P. C. Rodrigues. Secure Three-Factor User
Authentication Scheme for Renewable-Energy-Based Smart Grid Environment. IEEE
Transactions on Industrial Informatics, 13(6):3144–3153, 2017.
63. M. Wazid, A. K. Das, S. Kumari, and M. K. Khan. Design of Sinkhole Node Detection
Mechanism for Hierarchical Wireless Sensor Networks. Security and Communication
Networks, 9(17):4596–4614.
64. M. Wazid, A. K. Das, S. Kumari, X. Li, and F. Wu. Provably Secure Biometric-Based
User Authentication and Key Agreement Scheme in Cloud Computing. Security and
Communication Networks, 9(17):4103–4119, 2016.
110 Cyber Defense Mechanisms
65. M. Wazid, A. K. Das, V. Odelu, N. Kumar, and W. Susilo. Secure Remote User
Authenticated Key Establishment Protocol for Smart Home Environment. IEEE
Transactions on Dependable and Secure Computing, 1, 2017. doi:10.1109/
TDSC.2017.2764083.
66. M. Wazid, A. K. Das, and A. V. Vasilakos. Authenticated Key Management Protocol
for Cloud-Assisted Body Area Sensor Networks. Journal of Network and Computer
Applications, 123:112–126, 2018.
67. M. Wazid, P. Reshma Dsouza, A. K. Das, V. Bhat K, N. Kumar, and J. J. P. C. Rodrigues.
RAD-EI: A Routing Attack Detection Scheme for Edge-Based Internet of Things
Environment. International Journal of Communication Systems, 2019. doi:10.1002/
dac.4024.
68. M. Wazid, S. Zeadally, A. K. Das, and V. Odelu. Analysis of Security Protocols for
Mobile Healthcare. Journal of Medical Systems, 40(11):229, 2016.
69. S. Xu, G. Yang, Y. Mu, and R. H. Deng. Secure Fine-Grained Access Control and
Data Sharing for Dynamic Groups in the Cloud. IEEE Transactions on Information
Forensics and Security, 13(8):2101–2113, 2018.
70. K. Xue, Y. Xue, J. Hong, W. Li, H. Yue, D. S. L. Wei, and P. Hong. RAAC: Robust
and Auditable Access Control With Multiple Attribute Authorities for Public Cloud
Storage. IEEE Transactions on Information Forensics and Security, 12(4):953–967,
2017.
71. Y. Yan, Y. Qian, H. Sharif, and D. Tipper. A Survey on Cyber Security for Smart
Grid Communications. IEEE Communications Surveys and Tutorials, 14(4):998–1010,
2012.
72. K. Yang, X. Jia, and K. Ren. Secure and Verifable Policy Update Outsourcing for Big
Data Access Control in the Cloud. IEEE Transactions on Parallel and Distributed
Systems, 26(12):3461–3470, 2015.
73. X. Ye. Privacy Preserving and Delegated Access Control for Cloud Applications.
Tsinghua Science and Technology, 21(1):40–54, 2016.
74. J. Yu, K. Ren, C. Wang, and V. Varadharajan. Enabling Cloud Storage Auditing With
Key-Exposure Resistance. IEEE Transactions on Information Forensics and Security,
10(6):1167–1179, 2015.
75. R. Yvanovich. 7 Common Uses of Cloud Computing, 2019. https://blog.trginternational.
com/7- common-uses-of-cloud-computing.
76. S. Zeadally, A.-S. K. Pathan, C. Alcaraz, and M. Badra. Towards Privacy Protection in
Smart Grid. Wireless Personal Communications, 73(1):23–50, 2013.
77. J. Zhou, Z. Cao, X. Dong, N. Xiong, and A. V. Vasilakos. 4S: A Secure and Privacy-
Preserving Key Management Scheme for Cloud-Assisted Wireless Body Area Network
in m-Healthcare Social Networks. Information Sciences, 314:255–276, 2015.
78. L. Zhou, V. Varadharajan, and M. Hitchens. Achieving Secure Role-Based Access
Control on Encrypted Data in Cloud Storage. IEEE Transactions on Information
Forensics and Security, 8(12):1947–1960, 2013.
8 Big Data Analysis
on Smart Tools
and Techniques
Jabar H. Yousif and Dinesh Kumar Saini
Sohar University
CONTENTS
8.1 Introduction .................................................................................................. 111
8.2 Big Data Challenges ..................................................................................... 114
8.3 Big Data Analysis Techniques and Tools ..................................................... 115
8.3.1 Data Mining...................................................................................... 115
8.3.2 Web Mining ...................................................................................... 116
8.3.3 Visualization Methods...................................................................... 117
8.3.4 Machine Learning ............................................................................ 118
8.3.5 Multilayer Perceptron (MLP) ........................................................... 119
8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) .......................... 120
8.3.7 Support Vector Machine (SVM)....................................................... 120
8.3.8 Optimization Methods...................................................................... 121
8.3.9 Stochastic Optimization ................................................................... 121
8.3.10 Deterministic Optimization.............................................................. 122
8.4 Related Work ................................................................................................ 123
8.5 Discussion and Conclusion ........................................................................... 125
8.5.1 Discussion......................................................................................... 125
8.5.2 Conclusion ........................................................................................ 127
References.............................................................................................................. 128
8.1 INTRODUCTION
The new development of computing in government and economic felds has helped to
increase data mobility and its uses. As a result of the massive increase in data usage,
the reliance on the study of applications and data collection and analysis methodolo-
gies has increased widely [1]. The proliferation of practical advances in computers
and communications has had the most signifcant impact in creating and designing
software that can automatically categorize and analyze data and conduct specifc sta-
tistical extraction of common data characteristics. Graphics and visualization of data
in the form of graphs can also be used to fnd similarities and differences between
them. The data can be tracked and analyzed to access local networks or cloud data,
111
112 Cyber Defense Mechanisms
which provides a comprehensive and in-depth view of the data to monitor network
status and changes. Big Data involves three main dimensions, which include vol-
ume, velocity, and variety [2]. However, the volume concept refers to the enormous
amount of essential data created and used such as numbers, text, emails, images, and
videos.
Figure 8.1 shows the volume of data (zettabyte) generated worldwide between
2010 and 2025 [3]. It illustrates the signifcant increase in the volume of Big Data
generated worldwide, which indicates the need for more research and solutions. The
forecasting volume of Big Data in 2025 is equal to 175 zettabytes. In addition, the
concept of velocity illustrates how quickly data streaming from the site generates
it till recorded and communicated. The implementation of e-commerce helped to
increase the speed of data transfer by point-of-interaction and thus increase the speed
of data used to support interactions. In addition to another two concepts, including
veracity and value, Figure 8.2 depicts the forecasting size of Big Data market income
(Billion $) worldwide in the period from 2011 to 2027. The predicting data prove that
there is a considerable increase in the revenue of the Big Data market that reaches
103 billion US dollars in 2027. Also, the term “variety” points out to the heteroge-
neity of data sources and constructions. The standard structured data format is the
spreadsheets.
Likewise, most unstructured data formats are video/audio data, images, text data,
sensors data, business documents, etc. So, there are signifcant challenges to unify
the format of storing data. Processing and analyzing Big Data requires complex
correlations relationships between various aspects such as grammatical, seman-
tic, economic, and social aspects. Data analysts need to explore the commonalities
between relevant data and their relationships to develop models capable of predict-
ing future data outcomes. Veracity means trustworthiness of the data, so we should
consider that the data is well groomed and clean. Therefore, the developer should be
FIGURE 8.1 Volume of data (zettabytes) generated worldwide between 2010 and 2025.
Big Data Analysis on Smart Tools 113
FIGURE 8.2 The predicting of Big Data market size income global from 2011 to 2027 in
billion US dollars. (Source [3].)
proposing methods to prevent using unclean data. Also, value introduces the amount
of valuable information extracted and processed.
Big Data produced extensive amounts of data daily, which is collected in both
structured and unstructured patterns. Smart data is cleaned, fltered, sort, and ana-
lyzed data for effcient decision-making. Smart data is mainly classifed into two
types based on the source of data. The frst category of the smart data is that data
is picked up by some smart sensors and then collected, sorted, and analyzed at a
particular platform [4]. The second category of Big Data is that the data is sorted
and processed, and is waiting to be converted into actionable information. Smart
data is a modern tool for supporting the specifc needs of industries and particular
companies for collecting and optimizing the data. Machine learning (ML) is the
computational algorithms for training and processing data based on Artifcial intel-
ligence principles to support decision-making. ML approaches promote companies
in creating smart data and data warehousing effciently using unsupervised learning.
Also, ML tools help in speeding up the fltering process of data accurately and effec-
tively screening Big Data [5].
Artifcial Intelligence (AI) seeks to simulate human intelligence within machines,
which allows devices to react and respond like humans. AI emphasizes addressing
the unique goals of the organization, such as customer data analysis, market analysis,
114 Cyber Defense Mechanisms
and prediction. This chapter aims to identify the need and scope of implementation
of analytical techniques in Big Data. Study and investigate earlier research done in
this area. Also, explore and present smart tools, and analyze methods for serving
Big Data implementation such as generation, classifcation, and fltering. Besides,
discuss the signifcant challenges of model scalability, fexibility, and distributed
computing.
The following are explanation of some of Big Data tools and their main features:
are deploying for analyzing and extracting information from websites such as Data
Miner and Scrapy tools for mining the content of the web. Also, Google Analytics,
Oracle data mining, and SimilarWeb tools are used for evaluating the Usage Mining
of the site. Majestic and Bixo are tools used for mining the web structure. Figure 8.4
shows different web mining tools [11].
The difference between the calculated product from the network and the actual
output is used to determine the change in weight and error calculated. These pro-
cesses are repeated until the expected result of a data set is obtained, which is called
the training phase. Then, the best weights apply to the actual input for calculating
the output in a single neuron. The back propagation (BP) learning method is adopted
for the training data set. The activation function applied a weighted summation
algorithm of input neuron to generate an output signal as defned in the following
equation:
n
Out = bias + ˜w * x
i=0
i i (8.2)
where n is the number of input, and wi is the weight of specifc input i and xi value of
input i. The bias is a value determined based on experience for adjusting the output
of the network.
The learning process in the ANN can be classifed into two methods, supervised
and unsupervised, based on the using of input data and the training process. The
supervised learning method is applied to a problem that has a well-known target
pattern [16]. The weight values are continually updated until it gets balanced, and
then, each input will feed to the desired output. Moreover, the unsupervised learning
method is used in the problems that have unknown output. Throughout the learn-
ing process, the neural cells systematize themselves in groups, according to the
input pattern, which infuences on its neighborhood. The main objective is to collect
neural cells with similar patterns and relationships close together.
˜˜ ( di ( p) – yi ( p))
2
E ( w) = (8.3)
p=1 i=1
where E(w) is the error rate that to be minimized; w is the weight vector; Pt is the
number of training data sets; Epoch is the number of maximum output neurons; di(p)
is the experimental output of neuron in sequence (ith); and yi(p) is predicted output
of the neuron in sequence (ith).
120 Cyber Defense Mechanisms
The Best Matching Unit (BMU) is referring to the winning node with the most similar
weights vector to the input data, which is calculated in the following equation:
D ( k1 , k2 ) = min i , j ( Di , j ) (8.5)
˘
( ( k − i) + ( k − j) )
2
2 2
1 2
h ( ˜ ,t ) = exp (8.6)
2° 2 ( t )
SVM classifer utilizes several special kernel functions to create the decision
separating plane of the classes of data such as linear and nonlinear functions, poly-
nomial function, radial basis function (RBF), and sigmoid function.
Polynomial function: ( zi , z˙ ) = ( z ,z )
d
i ˙ + 1 , d is degree of polynomial. (8.8)
˙ z , z 2 ˘
Radial basis function: k ( zi , z ) = exp ˇ i 2 , 0 (8.9)
ˆ 2*˜
(
Sigmoid function: k ( zi , zˆ ) = tanh ˜ ziT * zˆ + r ) (8.10)
consistent with the current evolution of problem-solving [21]. The new approaches
use different research questions and apply enhanced inductive research methods. SO
technique-based randomized search include many methods such as
TABLE 8.1
Comparison Results of Related Works for Big Data Applications and Tools
Ref. No. and Author Year Method Finding and Method
Sangeetha and 2017 Review research Discussed Big Data technologies and data
Prakash [23] paper mining algorithms
Wu et al. [24] 2013 Standard article Discussed the data mining challenges, security,
and privacy considerations with Big Data
applications. Also, proposed a HACE theorem
Ghani et al. [25] 2018 Review research Surveyed the Big Data analytics tools for
paper social media applications
Radha and Rao [26] 2016 Review research Reviewed the art of the techniques and tools
paper for Big Data applications. Proposed Map and
Reduce method for fltering the input data
Khan et al. [1] 2014 Literature Explored new research directions and current
survey challenges in the Big Data domain and
opportunities
Thorleuchter and 2013 Standard article Proposed a web mining method for extracting
Van den Poel and investigating the technical domains ideas
et al. [27] characteristics.
Miner et al. [28] 2012 Review chapter Reviewed the web analytics tools and web
mining techniques
Ruan and Zhang [29] 2017 Standard article Addressed data stream-based information
visualization tools and scalable computing
Cai et al. [30] 2015 Standard article Proposed an analysis algorithm for big data
visualization and processing integrated model
Qiu et al. [31] 2016 Review research Surveyed the novel techniques and algorithms
paper for implementing traditional and advanced
ML such as kernel-based learning and deep
learning in Big Data services
Wang and 2016 Standard article Proposed a novel technique based on ML for
Alexander [32] Big Data
Luo et al. [33] 2016 Literature Reviewed the current state of art and progress
review in the Big Data applications in the feld of
biomedical
Skourletopoulos 2017 Review research Reviewed the state-of-the-art and challenges of
et al. [34] paper current Big Data research and cloud
computing techniques
Roy et al. [35] 2018 Review research Surveyed the recent optimization technologies
paper and developed for enhancing the Big Data
applications
Emrouznejad [36] 2016 Review chapter Reviewed the essential background of
optimization algorithms and methods to
enhance Big Data applications
Ur Rehman et al. [37] 2016 Review research Surveyed the methods utilized for Big Data
paper reduction such as ML algorithms, and data
mining tools
Big Data Analysis on Smart Tools 125
analyzing algorithms to process the different kinds of big data. The experimental
results show that the proposed analytical algorithm achieved high performance.
Qiu et al. [31] briefy explored the novel techniques and algorithms for imple-
menting traditional and advanced ML in Big Data services. Also, they examined
the current promising learning approaches for enhancing Big Data services such as
kernel-based learning, deep learning, parallel learning, and active learning.
Moreover, they discussed the different challenges of learning with Big Data and
identical modern ML solutions. Wang and Alexander [32] proposed a novel tech-
nique based on ML for Big Data applications. Also, they addressed the signifcant
challenges and progress of ML utilization in Big Data services and implementation.
Luo et al. [33] addressed the current state of art and progress in the Big Data
applications in the feld of biomedical. They discussed the implementation in four
sub-domains, which include imaging informatics, bioinformatics, clinical informat-
ics, and public health informatics. Also, they reviewed the challenges and oppor-
tunities of Big Data utilization in the feld of healthcare. Skourletopoulos et al.
[34] explored and reviewed the state-of-the-art and challenges of current Big Data
research and cloud computing techniques. They identify the methods to deploy
cloud computing services such as the Big Data-as-a-service (BDaaS) and Big Data-
analytics-as-a-service (AaaS). Also, many research works were performed in the
feld of optimization of results based on enhancing the algorithms and tools for Big
Data applications like in Refs. [35,36].
Roy et al. [35] surveyed the recent optimization technologies and developed for
enhancing the Big Data applications. Plus, they suggested a method for choosing
the proper collaboration of Big Data services based on required requirements.
Emrouznejad [36] wrote a chapter that reviewed the essential background of optimi-
zation algorithms and methods to enhance Big Data applications. Also, it presents
the different implementation of optimization techniques in analyzing large-scale
data of industries and social data domains, as well as in researchers and academic
felds. Ur Rehman et al. [37] reviewed and explored the methods utilized for Big
Data reduction. Also, they discussed the classifcation of data reduction methods
that helps to enhance the results of Big Data applications such as data compres-
sion, redundancy eliminating, multi-dimension reduction, ML algorithms, and data
mining tools.
FIGURE 8.8 Number of published articles in the feld of “Big Data” in Science Direct and
Google Scholar databases.
and Google Scholar databases. Moreover, the highest number of research papers
published was is in 2016–2018, with a rate of more 450,000 research papers.
Also, Figure 8.9 presents the total number of published reviews and research arti-
cles in Science Direct database related to Big Data, Data Mining, and Web Mining.
The fgure indicates that the total number of research papers (528,058; 43,247; 1,274)
is more than that of the review papers (31,676; 3,445; 42) in the felds of Big Data,
Data Mining, and Web Mining, respectively.
Figure 8.10 illustrates the distribution of published review and research articles in
Science Direct database related to Big Data, Data Mining, and Web Mining felds.
The results of the publication showed a steady increase over the years in the number
FIGURE 8.9 Total number of published review and research articles in Science Direct
database related to “Big Data,” “Data Mining,” and “Web Mining” felds.
Big Data Analysis on Smart Tools 127
FIGURE 8.10 Distribution of published review and research articles in Science Direct
database related to “Big Data,” “Data Mining,” and “Web Mining” felds.
of scientifc researches published, which confrms the importance of the feld of big
data and its applications in various felds.
The business sector offered various software and visualization methods for big
data applications such as Rapid Miner, Weka, Orange, KNIME, and visualization
software such as Treemap, Sunburst, Parallel Coordinates, and Streamgraph. Many
researchers have also tended to improve the results by applying improved steps to
algorithms such as kernel-based learning, deep learning, parallel learning, and active
learning rather than improving the software and platforms.
8.5.2 CONCLUSION
Big Data applications produced vast amounts of data daily in both structured and
unstructured characteristics. Furthermore, the statistics prove that predicting data is
frequently increasing in the revenue of the Big Data market to be 103 billion US dol-
lars in 2027. In the literature survey, researchers have identifed several challenges
and constraints that hinder the spread and effectiveness of Big Data analysis and
implementation.
Several tools are offering to serve data mining for batch and stream processing
such as
The researchers proposed and suggested many solutions for enhancing the perfor-
mance and effciency of Big Data applications. They offered different implementa-
tion of optimization and learning machine techniques for analyzing large-scale data
of industries and social data domains, which include the following:
REFERENCES
1. Khan, N., Yaqoob, I., Hashem, I.A.T., Inayat, Z., Ali, M., Kamaleldin, W., Alam, M.,
Shiraz, M. and Gani, A., 2014. Big Data: Survey, technologies, opportunities, and
challenges. The Scientifc World Journal, p. 2014. doi:10.1155/2014/712826.
2. Oussous, A., Benjelloun, F.Z., Lahcen, A.A. and Belfkih, S., 2018. Big Data technolo-
gies: A survey. Journal of King Saud University-Computer and Information Sciences,
30(4), pp. 431–448.
3. Global big data market year-on-year growth from 2012 to 2027. Online resource.
https://www.statista.com/statistics/255968/global-big-data-market-growth-forecast/.
Accessed on 14.09.2019.
4. Liu, S., McGree, J., Ge, Z. and Xie, Y., 2015. Computational and Statistical Methods
for Analysing Big Data with Applications. Academic Press, Amsterdam.
5. Zhou, L., Pan, S., Wang, J. and Vasilakos, A.V., 2017. Machine learning on Big Data:
Opportunities and challenges. Neurocomputing, 237, pp. 350–361.
6. Chen, C.P. and Zhang, C.Y., 2014. Data-intensive applications, challenges, techniques
and technologies: A survey on Big Data. Information Sciences, 275, pp. 314–347.
Big Data Analysis on Smart Tools 129
7. Gandomi, A. and Haider, M., 2015. Beyond the hype: Big Data concepts, methods, and
analytics. International Journal of Information Management, 35(2), pp. 137–144.
8. Yaqoob, I., Hashem, I.A.T., Gani, A., Mokhtar, S., Ahmed, E., Anuar, N.B. and
Vasilakos, A.V., 2016. Big Data: From beginning to future. International Journal of
Information Management, 36(6), pp. 1231–1247.
9. Nachmias, R., 2011. Web mining and higher education: Introduction to the special
issue. The Internet and Higher Education, 14(2), pp. 65–66.
10. Mowla, S., Bedi, I. and Shetty, N.P., 2017. A study on web mining tools and techniques.
Journal of Engineering and Applied Sciences, 12, pp. 6135–6142.
11. Ruan, Z., Miao, Y., Pan, L., Patterson, N. and Zhang, J., 2017. Visualization of Big
Data security: A case study on the KDD99 cup data set. Digital Communications and
Networks, 3(4), pp. 250–259.
12. Wang, L., Wang, G. and Alexander, C.A., 2015. Big Data and visualization: Methods,
challenges and technology progress. Digital Technologies, 1(1), pp. 33–38.
13. Zupan, B. and Demsar, J., 2008. Open-source tools for data mining. Clinics in
Laboratory Medicine, 28(1), pp. 37–54.
14. Reiz, A.N., de la Hoz, M.A. and García, M.S., 2019. Big Data analysis and machine
learning in intensive care units. Medicina Intensiva, 43(7), pp. 416–426.
15. Yousif, J.H., Kazem, H.A., Alattar, N.N. and Elhassan, I.I., 2019. A comparison study
based on artifcial neural network for assessing PV/T solar energy production. Case
Studies in Thermal Engineering, 13, p. 100407.
16. Abiodun, O.I., Jantan, A., Omolara, A.E., Dada, K.V., Mohamed, N.A. and Arshad, H.,
2018. State-of-the-art in artifcial neural network applications: A survey. Heliyon, 4(11),
p. e00938.
17. De Albuquerque, V.H.C., de Alexandria, A.R., Cortez, P.C. and Tavares, J.M.R., 2009.
Evaluation of multilayer perceptron and self-organizing map neural network topolo-
gies applied on microstructure segmentation from metallographic images. NDT & E
International, 42(7), pp. 644–651.
18. Yousif, J., Kazem, H. and Boland, J., 2017. Predictive models for photovoltaic electric-
ity production in hot weather conditions. Energies, 10(7), p. 971.
19. Battineni, G., Chintalapudi, N. and Amenta, F., 2019. Machine learning in medicine:
Performance calculation of dementia prediction by support vector machines (SVM).
Informatics in Medicine Unlocked, 16, p. 100200.
20. Barba González, C., 2018. Big Data Optimization: Algorithmic Framework for Data
Analysis Guided by Semantics. Universidad de Málaga, Málaga.
21. Powell, W.B., 2019. A unifed framework for stochastic optimization. European Journal
of Operational Research, 275(3), pp. 795–821.
22. Global optimization. Online resource. https://en.wikipedia.org/wiki/Global_optimiza-
tion. Accessed on 25.09.2019.
23. Sangeetha, J. and Prakash, V.S.J., 2017. A survey on big data mining techniques.
International Journal of Computer Science and Information Security, 15(1), p. 482.
24. Wu, X., Zhu, X., Wu, G.Q. and Ding, W., 2013. Data mining with big data. IEEE
Transactions on Knowledge and Data Engineering, 26(1), pp. 97–107.
25. Ghani, N.A., Hamid, S., Hashem, I.A.T. and Ahmed, E., 2019. Social media big data
analytics: A survey. Computers in Human Behavior, 101, pp. 417–428.
26. Radha, K. and Rao, B.T., 2016. A study on Big Data techniques and applications.
International Journal of Advances in Applied Sciences, 5, pp. 101–108.
27. Thorleuchter, D. and Van den Poel, D., 2013. Web mining based extraction of problem
solution ideas. Expert Systems with Applications, 40(10), pp. 3961–3969.
28. Miner, G., Elder IV, J., Fast, A., Hill, T., Nisbet, R. and Delen, D., 2012. Practical Text
Mining and Statistical Analysis for Non-Structured Text Data Applications. Academic
Press, London.
130 Cyber Defense Mechanisms
29. Ruan, G. and Zhang, H., 2017. Closed-loop Big Data analysis with visualization and
scalable computing. Big Data Research, 8, pp. 12–26.
30. Cai, L., Guan, X., Chi, P., Chen, L. and Luo, J., 2015. Big Data visualization collab-
orative fltering algorithm based on RHadoop. International Journal of Distributed
Sensor Networks, 11(10), p. 271253.
31. Qiu, J., Wu, Q., Ding, G., Xu, Y. and Feng, S., 2016. A survey of machine learning for
Big Data processing. EURASIP Journal on Advances in Signal Processing, 2016(1),
p. 67.
32. Wang, L. and Alexander, C.A., 2016. Machine learning in Big Data. International
Journal of Mathematical, Engineering and Management Sciences, 1(2), pp. 52–61.
33. Luo, J., Wu, M., Gopukumar, D. and Zhao, Y., 2016. Big data application in biomedi-
cal research and health care: A literature review. Biomedical Informatics Insights, 8,
pp. BII-S31559.
34. Skourletopoulos, G., Mavromoustakis, C.X., Mastorakis, G., Batalla, J.M., Dobre, C.,
Panagiotakis, S. and Pallis, E., 2017. Big data and cloud computing: A survey of the
state-of-the-art and research challenges. In Mavromoustakis, C., Mastorakis, G. and
Dobre, C., editors, Advances in Mobile Cloud Computing and Big Data in the 5G Era
(pp. 23–41). Springer, Cham.
35. Roy, C., Rautaray, S.S. and Pandey, M., 2018. Big data optimization techniques:
A survey. International Journal of Information Engineering and Electronic Business,
10(4), pp. 41–48.
36. Emrouznejad, A. ed., 2016. Big Data Optimization: Recent Developments and
Challenges (Vol. 18). Springer, Cham.
37. Ur Rehman, M.H., Liew, C.S., Abbas, A., Jayaraman, P.P., Wah, T.Y. and Khan, S.U.,
2016. Big data reduction methods: A survey. Data Science and Engineering, 1(4),
pp. 265–284.
9 Lightweight Security
Protocols for Blockchain
Technology
Jangirala Srinivas
O. P. Jindal Global University
CONTENTS
9.1 Introduction .................................................................................................. 131
9.2 Blockchain Technology Design Space.......................................................... 134
9.3 Consensus ..................................................................................................... 136
9.3.1 Distinct Features of Blockchain Distributed Architecture ............... 138
9.4 Practical Applications of Blockchain ........................................................... 139
9.5 Advantages and Disadvantages of Blockchain ............................................. 145
9.5.1 Advantages........................................................................................ 146
9.5.2 Disadvantages ................................................................................... 146
9.6 Limitations and Drawbacks of Blockchain................................................... 146
9.7 Comparative Study on Authentication Protocols for Blockchain
Technology.................................................................................................... 147
9.7.1 Comparison of Security and Functionality Features........................ 148
9.7.2 Comparison of Communication Costs.............................................. 150
9.7.3 Comparison of Computation Costs................................................... 151
9.8 Deployment and Implementation of Testbeds for Blockchain...................... 151
9.9 Conclusion .................................................................................................... 152
Acknowledgments.................................................................................................. 153
Bibliography .......................................................................................................... 153
9.1 INTRODUCTION
A blockchain is considered as a chain of blocks that are created from several blocks,
and it potentially consists of information. By the words “block” and “chain,” we
actually specify in the context of digital information (“block”) which is stored in
a public domain, say, database (“chain”). Since the digital information is stored in
the form of “block” and it is linked in a “chain” form, the linked blocks constitute
a chain, hence the name “blockchain.” The blockchain’s frst block is known as the
131
132 Cyber Defense Mechanisms
Genesis block. The mining process refers to creation of a new block in blockchain.
It is worth noticing that it is not the hash pointers for linking the blocks into a chain
that gives a blockchain for its security, and it merely makes alterations of transac-
tions in the blockchain easy to discover. In blockchain, the information is added to
the block by linking it to other blocks in chronological order, and hence, it produces
a connected chain of blocks as shown in Figure 9.1. The main characteristic of block-
chain is that it keeps track of all block differences it generates so that no block can
be altered, modifed, or even removed. It makes the blockchain technology (BCT) a
very safe mechanism to transmit properties, cash, and agreements without the neces-
sity for an intermediary “third-party agent,” such as governments or banks.
Specifcally, the structure of a block contains the following accompanying data:
• Permanent: It means once the transaction goes inside a blockchain, one can
put up it permanently in the ledger.
• Secure: Blockchain places information in a secure way. It uses advanced
cryptography to make sure that the information is locked inside the
blockchain.
• Chronological: Chronological means every transaction happens after the
previous one.
• Immutable: It means as one can build all the transactions onto the block-
chain in which the ledger can never be changed.
The procedure of the consensus helps in checking the exchanges before they are
added to the blockchain. This mechanism allows the blockchain to develop without
worry of the controlling of the blocks or the information inside them. The consensus
procedure occurs in pre-defned discrete time interims. The affrmation time relies
upon the block size, exchange volumes, and also the consensus applied algorithms.
TABLE 9.1
Different Types of Blockchain
Permissioned Permissionless
Public No restriction in data access/transactions. No restriction on access, transaction
Only a restricted set of nodes can (data writing), or validation
participate in the consensus mechanism
Private Restricted access, data writing, and Restrictions on access and who can
validation. Only the owner determines transact. No restriction on participation
who can participate in the consensus process
Lightweight Security Protocols 135
TABLE 9.2
Layer-Wise Major Components in Blockchain Applications [31]
Layer Major Technologies/Components
Data Data block, chain structure, timestamp, Merkle tree, cryptographic primitives
Network P2P network, verifcation methods, broadcast
Consensus Proof of work (PoW), proof of stake (PoS), delegated PoS (DPoS), etc.
Contract Smart contract, script coding, and incentive method
Service Ethereum, HyperLedger, IBM Azure BaaS, etc.
Application Cryptocurrency, healthcare, cloud service, Internet of Things (IoT), etc.
TABLE 9.3
Comparison of Open and Closed Blockchain Applications
Attribute Open Blockchains Closed Blockchains
A1: “Who can update” Everybody Appointed entities
A2: “Who can produce data” All users Customers and/or partners
A3: “Incentive to follow rules” Economic Reputation
A4: “Storage” Distributed Centralized
A5: “Trust central actors” No Yes
A6: “Transaction costs” Varies from low to high Low
A7: “Capacity/throughput” Low/slow High/fast
A8: “Immutability” Strong Unclear
A9: “Currency/token” Yes No
A10: “Examples” Bitcoin, Ethereum HyperLedger, Corda
136 Cyber Defense Mechanisms
make out that all data can be seen by others in a public blockchain, which may
cause genuine protection issues (for example, on the off chance that well-being,
individual, or others).
In the following, we discuss some key properties of blockchain which demon-
strate that the blockchain is superior to anything conventional framework of record
data keeping:
9.3 CONSENSUS
Consensus is the most basic characteristic in blockchain, which empowers the block-
chain to revive the ledger via it. This facilitates the intensity of decentralization. It
is understood that there is no central authority responsible for refreshing/updating
the ledger. Rather, any update made to the BC has to undergo an approval against
exacting criteria as defned by the blockchain protocol, and after a consensus is per-
formed by all participating nodes on the network, the updated block is added to the
blockchain.
Nowadays, in the industry, the consensus algorithms are developed and utilized
with variable properties. The four popular consensus algorithms are described as
follows [32,34]:
• Proof of authority (PoA): This algorithm gives the access to only the
approved user accounts so that they can assign new transactions in the
blocks. Consequently, this methodology could be viewed as a progressively
concentrated (for example, a quicker consensus process).
• Practical Byzantine fault tolerance (PBFT): In this methodology, an essen-
tial and an optional imitation is used in the agreement process. The optional
consistently assesses the essential choices in the blockchain and makes any
important activities, if the essential is undermined.
138 Cyber Defense Mechanisms
Beside the selection of consensus algorithms, the “permission models” in the block-
chains also differ with respect to the types of permissions obtained by the users in
the network. There are three fundamental kinds of blockchains according to their
access:
• Public: This blockchain can be accessed by all the users due to its open
nature. Various users are permitted to freely join and add their desired
information as a new block to the blockchain. Thus, any user who joins this
blockchain has the fexibility to create a new block.
• Private: In this blockchain, only a certain user who are verifed prior to
access the blockchain. So, only the validated users can add the information
as a new block in the blockchain. However, the status of the blockchain can
be viewed by any user in the network.
• Consortium: In this blockchain, a controlled group of nodes, who have the
authorization, can access, verify, or add the information to the blockchain.
TABLE 9.4
Comparison of Blockchain Technology and Shared Databases
Parameter Blockchain Shared Database
PR1: “Operations Insert new blocks Create/read/update/delete
allowed”
PR2: “Consensus” The peers agree on the Distributed transactions
transactions’ outcome held separately
PR3: “Replication” Full replication on every peer Master–slave, multi-master
PR4: “Validation” Global rules govern the whole Offers only local integrity
system constraints
PR5: “Confdentiality” Completely confdential Not completely confdential
PR6: “Dis-intermediation” It is permitted with blockchain Not permitted
PR7: “Robustness” Completely robust technology Not fully robust
PR8: “Examples” Bitcoin, Ethereum Google cloud data SQL,
frebase real-time database
Lightweight Security Protocols 139
uncovered that the greater part would invest into BCT, and only 16% of the once
still not planned yet. In China, 32% of organizations noticed that they would con-
tribute between $5 and $10 million, and in Mexico, 21% of organizations said they
would contribute $10 at any rate million. Additionally, out of the majority of the
participants contemplated, 65% revealed that their associations will invest $1 at least
million in BCT in the coming year. The endeavors with the greatest endeavors will
originate from Mexico, France, and Canada exclusively.
Here are some of the most popular applications of BCT that are being explored
today. The details are listed below, and a summary is also shown in Table 9.5:
TABLE 9.5
Applications of BCT Which Handle Traditional Issues
Application Issues/Problems BCT Solution
Digital identity 1. Data breach 1. Control to the user through digital
2. Identity threat identity
2. Rights to revoke and grant access
Healthcare 1. Traceability of medical history 1. Tamper-proof and secure database
2. Counterfeit drugs 2. Easy verifcation of drug
3. Secure and tamper-proof database authenticity
Banking 1. Expensive transaction cost while 1. Digital currency/cryptocurrency
sending money internationally wallet
2. Time-consuming 2. Transaction in real-time without
3. Poor access to banking service double-spend
Voting 1. Voter fraud 1. Security
2. Time-consuming 2. Identity protection
3. Need for physical presence 3. Real-time voting count
4. Traceability 4. Tamper-proof
5. Privacy 5. Reduction in fraud
Supply chain 1. Lack of transparency 1. Transparent
management 2. Issues of product authenticity 2. Time-stamped
3. Verifable
4. Immutable
5. Trackable
Intellectual 1. Poorly maintained IP records 1. Immutable database
property 2. Leakage of data 2. More control to the user
3. Easily verifable
Fund raising 1. Problem of matching investors 1. Easy match of interested parties
with frms 2. Reducing red-tape
2. Minimum requirements for raising 3. Reduction in the response time
in investments
Lightweight Security Protocols 141
The designing of cross-datacenter authentication in VFC has fve phases: (1) sys-
tem initialization phase, (2) registration phase, (3) mutual authentication and key
exchange phase, (4) consensus phase, and (5) service-delivery phase. In this work,
the authors discussed their proposal with an effective cross-datacenter authenti-
cated key exchange (AKE) scheme by making use of blockchain and “elliptic curve
cryptography (ECC) cryptosystem.” For maintaining the network information, the
distributed ledger of blockchain is used. To establish mutual authentication between
the vehicles and RSUs, the highly secure ECC is also used.
9.5.1 ADVANTAGES
Some advantages of blockchain are as follows:
9.5.2 DISADVANTAGES
Some disadvantages of blockchain are also listed as follows:
• Highly expensive: The nodes need logically basic prizes for achieving
transactions in a business, which work with the code of interest and
supply.
• Small-scale ledger: This could impact security and perpetual quality of the
blockchain, and all of the data set is stored in it.
• Denser transactions: The transactions could be more deferred than fun-
damental procedure even with the non-appearance of the involved third
parties.
• Transaction expenses and speed of network: The transactions charge of the
BCT is genuinely high in the wake of being advanced as “about free” dur-
ing the initial couple of years. Similarly, the enlisting capacity and reaction
speed of BCT cannot meet the necessities of the high-recurrence trade and
dispatch of smart grids.
• Error risk: This threat is ceaselessly present if the human factor is verifed
notwithstanding the way that the blockchain is an astoundingly confrmed
development.
• Wasteful: Every node in the blockchain must approve the transactions made
and keep up the agreement over the blockchain. This is ineffcient, because
each node rehashes the undertaking to arrive at the accord settled upon.
Lightweight Security Protocols 147
entity which includes the partners and customers of the supply chain so that “owner-
ship of RFID tag-attached products” can be transferred and can be proved based on
the EPC which is a fxed component in the overall process. Based on the EPC, an
attacker has the freedom to monitor the progress of the RFID-tag-connected items.
Sidorov et al. [44] designed a scheme for supply chain using ultra-lightweight
RFID for blockchain. The problem with this scheme is that the communicated mes-
sages are computed using simple bitwise rotate operations and transmitted them over
a public channel, which gives an advantage to the attacker to extract the tactful cre-
dentials. According to Masoumeh and Mahyar’s recommendation [41], the protocol
still be insecure even if the applications utilize single or multiple “bitwise rotate”
(ROT) with “bitwise XOR” operations.
A new design, namely “lightweight blockchain-enabled RFID-based authen-
tication protocol for supply chains” (LBRAPS) in 5G mobile edge computing
environment was proposed very recently by Srinivas et al. [22]. LBRAPS is
effcient, because it was based on bitwise rotation, bitwise XOR, and “one-way
cryptographic hash” operations. Furthermore, it is shown to be secure against
various attacks.
TABLE 9.6
Comparison of Security and Functionality Features
Sidorov Mujahid LRMAPC ULRMAPC Srinivas
Attribute et al. [44] et al. [35] [16] [16] et al. [22]
SFFA1 ✓ × ✓ ✓ ✓
SFFA2 ✓ ✓ × × ✓
SFFA3 × × ✓ ✓ ✓
SFFA4 ✓ × ✓ ✓ ✓
SFFA5 ✓ ✓ ✓ ✓ ✓
SFFA6 × × × ✓ ✓
SFFA7 × × ✓ ✓ ✓
SFFA8 ✓ ✓ ✓ ✓ ✓
SFFA9 × × × ✓ ✓
SFFA10 ✓ × × × ✓
SFFA11 ✓ × × × ✓
Note: ✓: “a scheme supports an attribute or resists an attack”; ×: “a scheme does not support an attribute
or does not resist an attack.”
SFFA1: “anonymity property”; SFFA2: “traceability property”; SFFA3: “privileged-insider attack”; SFFA4:
“denial-of-service attack”; SFFA5: “replay attack”; SFFA6: “impersonation attacks”; SFFA7: “man-in-the-
middle attack”; SFFA8: “mutual authentication”; SFFA9: “ephemeral secret leakage (ESL) attack”; SFFA10:
“formal security verifcation using automated validation of Internet security protocols and applications
(AVISPA) tool [7]”; and SFFA11: “whether blockchain enabled.”
This means that both forward and backward secrecy properties need to be preserved
under the resistant of an ESL attack.
In recent years, the formal security verifcation using the automated software veri-
fcation tool becomes very popular [14,45–47,53–55]. In this case, we have considered
a widely accepted automated formal security verifcation tool, known as “Automated
Validation of Internet Security Protocols and Applications” (AVISPA) [7]. AVISPA is
“a push-button tool for the automated validation of Internet security-sensitive proto-
cols and applications, and it also provides a modular and expressive formal language
for specifying protocols and their security properties, and integrates different back-
ends that implement a variety of state-of-the-art automatic analysis techniques” [7].
A tested security protocol requires to be implemented using the “High-Level Protocol
Specifcation Language” (HLPSL) [7], which is a “role-oriented language.” There are
two kinds of roles defned in HLPSL: (1) basic roles and (2) composite roles. While
the composite roles are compulsory to be defned, the basic roles need not be defned
compulsorily. The HLPSL code is then translated into the “Intermediate Format”
(IF) using the HLPSL2IF translator, and the IF is given to one of the four available
back-ends of AVISPA: “On-the-fy Model-Checker (OFMC),” “Constraint Logic-
Based Attack Searcher (CL-AtSe),” “SAT-Based Model-Checker (SATMC),” and
“Tree Automata based on Automatic Approximations for the Analysis of Security
Protocols” (TA4SP). After that, the “Output Format” (OF) will be produced by one
150 Cyber Defense Mechanisms
of the back-ends, which will specify whether tested protocol was “safe” or “unsafe.”
AVISPA has the ability to test a security protocol for the “replay attack” and “man-
in-the-middle attack.” For more detailed discussions on AVISPA and its HLPSL,
the interested readers can be directed to the user manual documents of AVISPA and
HLPSL provided in Ref. [7].
It is worth seeing that the authentication protocols of Mujahid et al. [35],
LRMAPC [16], and ULRMAPC [16] are not exactly blockchain enabled. The com-
parative analysis on security and functionality features shown in Table 9.6 suggests
that LBRAPS [22] is only supporting functionality features as compared to other
state-of-art authentication protocols.
TABLE 9.7
Comparison of Communication and Computation Costs
Attribute CCB NEM CCT
Sidorov et al. [44] 1760 5 15TimeHW + 14TimeROT + 12TimeXOR ° 0.0048 s
Mujahid et al. [35] 960 4 1TimeHW + 29TimeROT + 29TimeXOR ° 0.00032 s
LRMAPC [16] 1440 5 (n + k + 2)TimeXOR + (n + k + 6)TimeHash ° 0.00032(n + k ) + 0.00192 s
ULRMAPC [16] 1632 5 (
22TimeXOR + 9TimeROT neglibile time )
Srinivas et al. [22] 2240 5 12TimeHash + 15TimeROT + 25TimeXOR ° 0.00384 s
Note: CCB: communication cost in bits; NEM: number of exchanged message; and CCT: computation
cost with rough estimated time in seconds.
Lightweight Security Protocols 151
TABLE 9.8
Current Testbeds Using Blockchain Technology
Testbed Designed/
Developed Year Short Description and Validation Method
Ref. [20] 2017 The authors constructed an energy market with the help of Corba.
Then, it was coupled with an “interface application” that was
developed with the help of Predix platform [5]
Ref. [26] 2018 A multichain [4] has been used in this testbed. The authors designed a
trading process, and then, it was built and validated via the multichain
Ref. [38] 2018 The authors associated various applications with their designed testbed.
However, they developed it with the Zig-Ledger [6]
Ref. [43] 2019 The authors developed a large-scale blockchain testbed, called
BlockZoom. It is useful for experimenting “distributed ledgers
technologies” as well as “smart contract applications”
Ref. [57] 2019 The authors designed a dockerized automatized Bitcoin testbed, called
Kriptosare.gen, which is useful for deploying “full-scale custom
Bitcoin networks”
9.9 CONCLUSION
In this chapter, we have presented and discussed security issues in the BCT. We
frst started with various applications of the BCT. Next, we discussed various
advantages/disadvantages using blockchain, and also some limitations/drawbacks
related to the blockchain. After that, we traced on lightweight security protocols
needed in the blockchain environment. In particular, we discussed lightweight
authentication protocols that are extremely handy in providing security in the
blockchain environment. A detailed comparative study on various existing state-
of-art lightweight authentication protocols was performed based on their security
and functionality characteristics, and computational and communication over-
heads involved during the communication. At the end, we also discussed several
testbeds that are designed and implemented by the researchers, which are very
useful in blockchain.
Lightweight Security Protocols 153
ACKNOWLEDGMENTS
The authors would like to thank the anonymous reviewers for their valuable
feedback on this chapter. This work was supported by the Ripple Centre of
Excellence Scheme, CoE in Blockchain (Sanction No. IIIT/R&D Offce/Internal
Projects/001/2019), International Institute of Information Technology, Hyderabad
(IIIT Hyderabad), India.
BIBLIOGRAPHY
1. Advanced Encryption Standard (AES). FIPS PUB 197, National Institute of Standards
and Technology (NIST), U.S. Department of Commerce, November 2001. http://csrc.
nist.gov/publications/fps/fps197/fps-197.pdf.
2. Secure Hash Standard. FIPS PUB 180-1, National Institute of Standards and Technology
(NIST), U.S. Department of Commerce, April 1995. http://nvlpubs.nist.gov/nistpubs/
FIPS/ NIST.FIPS.180-4.pdf. Accessed on January 2019.
3. EPCTM Radio-Frequency Identity Protocols Generation-2 UHF RFID, 2013.
Specifcation for RFID Air Interface Protocol for Communications at 860
MHz–960 MHz, Version 2.0.1 Ratifed.
4. Multichain: Open Platform for Building Blockchains, 2019. https://www.multichain.
com/. Accessed on February 2019.
5. Welcome to Corda, 2019. https://docs.corda.net/. Accessed on September 2019.
6. Z-Ledger, 2019. https://baas.zhigui.com/index. Accessed on September 2019.
7. AVISPA. Automated Validation of Internet Security Protocols and Applications, 2019.
http://www.avispa-project.org/. Accessed on February 2019.
8. A. Back, M. Corallo, L. Dashjr, M. Friedenbach, G. Maxwell, A. Miller,
A. Poelstra, J. Timón, and P. Wuille. Enabling Blockchain Innovations with
Pegged Sidechains, p. 72, 2014. http://www. opensciencere-view.com/papers/123/
enablingblockchain-innovations-with-pegged-sidechains.
9. Z. Bao, W. Shi, D. He, and K.-K. R. Choo. IoT Chain: A Three-Tier Blockchain-Based
IoT Security Architecture, 2018. arXiv preprint arXiv:1806.02008.
10. V. Buterin. On Public and Private Blockchains, 2015. https://blog.ethereum.
org/2015/08/07/on-public-and-private-blockchains/.
11. M. Cebe, E. Erdin, K. Akkaya, H. Aksu, and S. Uluagac. Block4forensic: An Integrated
Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles.
IEEE Communications Magazine, 56(10):50–57, 2018.
12. R. Chaudhary, A. Jindal, G. S. Aujla, S. Aggarwal, N. Kumar, and K.-K. R. Choo. Best:
Blockchain-Based Secure Energy Trading in SDN-Enabled Intelligent Transportation
System. Computers & Security, 85:288–299, 2019.
13. F. Dai, Y. Shi, N. Meng, L. Wei, and Z. Ye. From Bitcoin to Cybersecurity: A Comparative
Study of Blockchain Application and Security Issues. In 2017 4th International
Conference on Systems and Informatics (ICSAI), pp. 975–979. IEEE, Hangzhou,
China, 2017.
14. A. K. Das, M. Wazid, N. Kumar, A. V. Vasilakos, and J. J. P. C. Rodrigues. Biometrics-
Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial
Internet of Things Deployment. IEEE Internet of Things Journal, 5(6):4900–4913,
2018.
15. A. K. Das and S. Zeadally. Chapter 13 – Data Security in the Smart Grid Environment.
In A. Tasckaraoglu and O. Erdinc, editors, Pathways to a Smarter Power System,
pp. 371–395. Academic Press, Elsevier, Amsterdam, 2019.
154 Cyber Defense Mechanisms
16. K. Fan, Y. Gong, C. Liang, H. Li, and Y. Yang. Lightweight and Ultralightweight RFID
Mutual Authentication Protocol with Cache in the Reader for IoT in 5G. Security and
Communication Networks, 9(16): 3095–3104, 2016.
17. J. Ha, H. Kim, J. Park, S. Moon, J. G. Nieto, and C. Boyd. HGLAP – Hierarchical
Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.
In International Conference on Embedded and Ubiquitous Computing (EUC’07),
pp. 557–567, Taipei, Taiwan, 2007.
18. J. J. Hathaliya, S. Tanwar, S. Tyagi, and N. Kumar. Securing Electronics Healthcare
Records in Healthcare 4.0: A Biometric-Based Approach. Computers & Electrical
Engineering, 76:398–410, 2019.
19. J. Hu, D. He, Q. Zhao, and K.-K. R. Choo. Parking Management: A Blockchain-Based
Privacy-Preserving System. IEEE Consumer Electronics Magazine, 8(4):45–49, 2019.
20. F. Imbault, M. Swiatek, R. de Beaufort, and R. Plana. The Green Blockchain: Managing
Decentralized Energy Production and Consumption. In IEEE International Conference
on Environment and Electrical Engineering and IEEE Industrial and Commercial
Power Systems Europe (EEEIC/I CPS Europe), pp. 1–5, Milan, Italy, June 2017.
21. N. Islam, Y. Faheem, I. U. Din, M. Talha, M. Guizani, and M. Khalil. A Blockchain-
Based Fog Computing Framework for Activity Recognition as an Application to
e-healthcare Services. Future Generation Computer Systems, 100:569–578, 2019.
22. S. Jangirala, A. K. Das, and A. V. Vasilakos. Designing Secure Lightweight Blockchain-
Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge
Computing Environment. IEEE Transactions on Industrial Informatics, 2019. doi:
10.1109/TII.2019.2942389.
23. A. Jindal, G. S. Aujla, and N. Kumar. Survivor: A blockchain Based Edge-As-a-Service
Framework for Secure Energy Trading in SDN-Enabled Vehicle-to-Grid Environment.
Computer Networks, 153:36–48, 2019.
24. N. Kabra, P. Bhattacharya, S. Tanwar, and S. Tyagi. Mudrachain: Blockchain-Based
Framework for Automated Cheque Clearance in Financial Institutions. Future
Generation Computer Systems, 102: 574–587, 2019.
25. K. Kaur, S. Garg, G. Kaddoum, F. Gagnon, and S. H. Ahmed. Blockchain-Based
Lightweight Authentication Mechanism for Vehicular Fog Infrastructure, 2019. arXiv
preprint arXiv:1904.01168.
26. K. N. Khaqqi, J. J. Sikorski, K. Hadinoto, and M. Kraft. Incorporating Seller/Buyer
Reputation-Based System in Blockchain-Enabled Emission Trading Application.
Applied Energy, 209:8–19, 2018.
27. L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals Problem. ACM
Transactions on Progamming Languages and Systems, 4(3):382–401, 1982.
28. C. T. Li, C. C. Lee, C. Y. Weng, and C. M. Chen. Towards Secure Authenticating
of Cache in the Reader for RFID-Based IoT Systems. Peer-to-Peer Networking and
Applications, 11(1):198–208, 2018.
29. C. Lin, D. He, X. Huang, K.-K. R. Choo, and A. V. Vasilakos. BSeIn: A Blockchain-
Based Secure Mutual Authentication with Fine-Grained Access Control System for
Industry 4.0. Journal of Network and Computer Applications, 116:42–52, 2018.
30. C. Lin, D. He, X. Huang, M. K. Khan, and K.-K. R. Choo. A New Transitively Closed
Undirected Graph Authentication Scheme for Blockchain-Based Identity Management
Systems. IEEE Access, 6:28203–28212, 2018.
31. Y. Lu. The Blockchain: State-of-the-Art and Research Challenges. Journal of Industrial
Information Integration, 15:80–90, 2019.
32. M. Luke, S. Lee, Z. Pekarek, and A. Dimitrova. Blockchain in Electricity: A Critical
Review of Progress to Date, 2018. http://www.energie-nachrichten.info/fle/01%20
Energie-Nachrichten%20News/2018-05/80503_Eurelectric_1_blockchain_eurelectric-
h-DE808259.pdf.
Lightweight Security Protocols 155
33. T. McGhin, K.-K. R. Choo, C. Z. Liu, and D. He. Blockchain in Healthcare Applications:
Research Challenges and Opportunities. Journal of Network and Computer
Applications, 135:62–75, 2019.
34. D. Mingxiao, M. Xiaofeng, Z. Zhe, W. Xiangwei, and C. Qijun. A Review on Consensus
Algorithm of Blockchain. In IEEE International Conference on Systems, Man, and
Cybernetics (SMC), pp. 2567–2572. IEEE, Banff, AB, 2017.
35. U. Mujahid, M. Najam-ul Islam, and S. Sarwar. A New Ultralightweight RFID
Authentication Protocol for Passive Low Cost Tags: KMAP. Wireless Personal
Communications, 94(3):725–744, 2017.
36. A. S. Musleh, G. Yao, and S. M. Muyeen. Blockchain Applications in Smart Grid –
Review and Frameworks. IEEE Access, 7:86746–86757, 2019.
37. S. Nakamoto and A. Bitcoin. A Peer-to-Peer Electronic Cash System. Bitcoin, 2008.
https://bitcoin.org/bitcoin.
38. S. Noor, W. Yang, M. Guo, K. H. van Dam, and X. Wang. Energy Demand Side
Management within Micro-Grid Networks Enhanced by Blockchain. Applied Energy,
228:1385–1398, 2018.
39. J. Ray. Consortium Chain Development, 2018. https://github.com/ethereum/wiki/wiki/
Consortium-Chain-Development. Accessed on October 2019.
40. K. Rhee, J. Kwak, S. Kim, and D. Won. Challenge-Response Based RFID Authentication
Protocol for Distributed Database Environment. In International Conference on
Security in Pervasive Computing (SPC’05), pp. 70–84, Boppard, Germany, 2005.
41. M. Safkhani and M. Shariat. Implementation of Secret Disclosure Attack against
Two IoT Lightweight Authentication Protocols. The Journal of Supercomputing,
74(11):6220–6235, 2018.
42. P. K. Sharma, N. Kumar, and J. H. Park. Blockchain-Based Distributed Framework for
Automotive Industry in a Smart City. IEEE Transactions on Industrial Informatics,
15(7):4197–4205, 2018.
43. W. M. Shbair, M. Steichen, J. Franois, and R. State. BlockZoom: Large-Scale Blockchain
Testbed. In IEEE International Conference on Blockchain and Cryptocurrency
(ICBC), pp. 5–6, Seoul, South Korea, May 2019.
44. M. Sidorov, M. T. Ong, R. V. Sridharan, J. Nakamura, R. Ohmura, and J. H. Khor.
Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply
Chains. IEEE Access, 7:7273–7285, 2019.
45. J. Srinivas, A. K. Das, N. Kumar, and J. J. P. C. Rodrigues. Cloud Centric Authentication
for Wearable Healthcare Monitoring System. IEEE Transactions on Dependable and
Secure Computing, 2018. doi: 10.1109/TDSC.2018.2828306.
46. J. Srinivas, A. K. Das, N. Kumar, and J. J. P. C. Rodrigues. TCALAS: Temporal
Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones
Environment. IEEE Transactions on Vehicular Technology, 68(7):6903–6916, 2019.
47. J. Srinivas, A. K. Das, M. Wazid, and N. Kumar. Anonymous Lightweight Chaotic
Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things.
IEEE Transactions on Dependable and Secure Computing, 2018. doi: 10.1109/
TDSC.2018.2857811.
48. K. Toyoda, P. T. Mathiopoulos, I. Sasase, and T. Ohtsuki. A Novel Blockchain-Based
Product Ownership Management System (POMS) for Anti-Counterfeits in the Post
Supply Chain. IEEE Access, 5:17465–17477, 2017.
49. S. Tuli, R. Mahmud, S. Tuli, and R. Buyya. Fogbus: A Blockchain-Based Lightweight
Framework for Edge and Fog Computing. Journal of Systems and Software, 154:22–36,
2019.
50. P. Van Valkenburgh. Open Matters – Why Permissionless Blockchains Are Essential
to the Future of the Internet. Coin Center, December 14, 2016. https://coincenter.org/
entry/open-matters.
156 Cyber Defense Mechanisms
CONTENTS
10.1 Introduction .................................................................................................. 158
10.2 Advantages of Cybersecurity........................................................................ 158
10.3 Approach and Workfow............................................................................... 158
10.3.1 Common Steps in Cybersecurity...................................................... 160
10.3.2 Set Up Your Risk Management Regime........................................... 160
10.4 Cybersecurity Principles and Goals ............................................................. 161
10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution ..... 162
10.5.1 Confdentiality .................................................................................. 163
10.5.1.1 Tools for Confdentiality .................................................... 163
10.5.2 Integrity ............................................................................................ 164
10.5.2.1 Tools for Integrity .............................................................. 164
10.5.3 Availability ....................................................................................... 164
10.5.3.1 Tools of Availability........................................................... 164
10.5.4 Challenges of Cybersecurity............................................................. 165
10.5.5 Data Security Consideration............................................................. 165
10.6 Privacy Preservation ..................................................................................... 165
10.6.1 Privacy in Cybersecurity .................................................................. 166
10.6.2 Data-Intensive Technology ............................................................... 166
10.7 Challenges in Data-Intensive Techniques..................................................... 167
10.8 Cybersecurity to Data-Intensive Techniques................................................ 167
10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques............. 168
10.9 Conclusion .................................................................................................... 169
References.............................................................................................................. 169
157
158 Cyber Defense Mechanisms
10.1 INTRODUCTION
Security and privacy have been considered signifcant aspects in protection of com-
puter systems, theft to damage, or possible danger to compromise in electronic data,
hardware, or software misdirection or disruption of the services [1]. Without security
identifcation and mechanisms, the computing system can be considered obsolete [2].
The fundamentals to cybersecurity concepts are absolutes in web application test-
ing, designed application testing, viruses, worms, and more [3]. Cybersecurity is
also one of the great tools to economic power, diplomacy, and armed conflicts for
a very long time. It generally refers to the ability to control access to the network
systems and the information they contain [4]. The defnition of cybersecurity is the
body of technologies, processing, and practices intended to protect the network
resources, associated devices, and programs on which this one is running to pro-
tect data from attack, damage, or unauthorized access. It plays an important role in
information security in order to protect systems from viruses, malwares practices,
Trojan horse attack, phishings, hackers, and password cracking, and safeguard the
system. The cyberspace is effective that controls reliability, resilient, and trustworthy
infrastructure [5].
Therefore, the following four steps in cybersecurity approaches are crucial to recog-
nize cybersecurity approach [7,8]:
• Identify threats
• Responding to cybersecurity incidents
• Identify risk and vulnerabilities
• Establish contingency plans.
The National Cyber Security Center (NCSC) has given a guideline in public interest
and for organizations in self-support themselves in cyber physical systems in effective
utilizations. The following steps are critical, they are as follows, Figure 10.1 shows
the complete scenario of cybersecurity approach, which is described as follows:
Identify threats: Identify and understand the internal and external cyberthreats
that are caused due to lack of awareness. Get the important details and cause about
the threats by clearly observing them.
• Figure 10.2 represents the ten steps taken against the cyberattacks. We have
the network security, user education and awareness, and control access to
activities of user, and allow only privileged accounts by establishing effec-
tive management process. Test your management plans, and provide an inci-
dent response and disaster recovery capability. Report any kind of criminal
Data-Intensive Techniques 161
incidents to law, and provide a specialist training. Monitor the systems and
network, provide supporting policies, and check any unusual or suspicious
attacks. Build all devices with the help of secure baseline. Train the staff
with mobile working policy, and protect the data in different ways. Protect
networks from attack, and monitor security controls. Defend any unauthor-
ized access and malicious content. Provide user security policies and secure
systems. Maintain awareness of cyber-risks and cyberthreats.
• Produce relevant policies and anti-malware defenses, and provide security
confguration
• Produce a policy to control all access to removable media, and limit the media
types. Scan all media before importing or exporting them to other devices.
• Economy of mechanism
• Fail-safe defaults
• Least privilege
• Open design
• Complete mediation
• Separation of privilege
• Least common mechanism
• Psychological acceptability
• Work factor
• Compromise recording.
162 Cyber Defense Mechanisms
The cybersecurity goals are having the following reasons in specifc to get the
security goals and manage the resources in effective and effcient order [13–15]:
Figure 10.3 shows the predictive idea to achieve the cybersecurity as a goal.
10.5.1 CONFIDENTIALITY
Confdentiality generally means privacy that it avoids any unauthorized users to use
the information. It protects the data and provides access to users only who are autho-
rized. Best example for this is data encryption. Encrypted data helps the users in
protecting data from unauthorized users, which results in high security of data, as
shown in Figure 10.4.
10.5.2 INTEGRITY
Integrity refers to assurance to the safety of information from unauthorized users and
gives accurate data. It is the property that the source of information is not altered and
is genuine. It maintains consistency and gives accurate data in entire life cycle, as
shown in Figure 10.5. Various steps are taken to make sure that data is not changed
by unauthorized users. Access controls and permissions to the fles included. In
order to restore data, backups are used.
10.5.3 AVAILABILITY
Availability is the process where information can be modifed and accessed by
authorized users, and assures reliable and constant access to the data.
• Network security
• Application security
• Endpoint security
• Data security
• Identity management
• Database and infrastructure security
• Cloud security
• Mobile security
• Disaster recovery/business continuity planning
• End-user education.
There are some laws to protect information about business, organization, or individ-
ual. Data security is fundamental concept of these laws. Privacy can be maintained
166 Cyber Defense Mechanisms
by providing authentications and several control systems, which protects every sin-
gle data of an individual. It can be violated by many reasons: one of the main causes
is networks.
transformation stages. A perfect method is required for managing, fltering, and dis-
tributing data [22]. Figure 10.7 shows the architecture for data-intensive techniques.
These are the main objectives of security goals that prevent from cyberattacks.
Different applications will provide security depending upon the attacks. For exam-
ple, when we consider business or military, they mainly concentrate on confdential-
ity of information; that is, not a single part of the data must be leaked as they are
very sensitive information, and it requires security from cyberattacks. Security can
be implemented through some ways:
10.9 CONCLUSION
Securing information and helping users to have privacy is the prime factor. As we
could see, military services and business requires their data to be confdential and
secured. Cryptographic methods and cybersecurity play a prominent role in data
security and can provide data management techniques. Future scope involves smart
girds and smart cloud systems that ensures the data to be protected and we can
restore them whenever we want.
REFERENCES
1. Westin, A.F. “Privacy and freedom”, Atheneum, Data Accessed Dated 14-Feb-2020,
1967. https://doi.org/10.1177/000271626837700157.
2. Chaum, D. “Security without identifcation: transaction systems to make big brother
obsolete”, Communications of the ACM, vol. 28(10), pp. 1030–1044, 1985.
3. Wilson, K.S., Kiy, M.A. “Some fundamental cybersecurity concepts”, IEEE Access,
vol. 2, pp. 116–124, 2013.
4. Rao, N.J. “Cyber security: issues and challenges”, CSI Communications, vol. 39, 2015.
5. Póvoa, M.G., Xavier, E.C. “Approximation algorithms and heuristics for task schedul-
ing in data-intensive distributed systems”, International Transactions in Operational
Research, vol. 25, p. 1417, 2018.
6. Xu, L., Jiang, C., Wang, J. “Information security in big data: privacy and data mining”,
IEEE Access, vol. 2, pp. 1149–1175, 2014.
7. Review article big data: survey, technologies, opportunities, and challenges, vol. 2014.
doi:10.1155/2014/712826.
8. Richards, N.M. “Four myths of privacy”, In: Sarat, A. (ed) A World without Privacy?,
2014. http://papers.ssrn.com/sol3/papers.cfm?abstract id=2427808.
9. Fu, X., Liu, W., Cang, Y., Gong, X., Deng, S. “Optimized data replication for small
fles in cloud storage systems”, Mathematical Problems in Engineering, vol. 2016, p. 1,
2016.
10. Holvast, J. “History of privacy”, In: Leeuw, K.D., Bergstra, J. (eds) The History of
Information Security. Elsevier Science B.V., Amsterdam, pp. 737–769, 2007.
170 Cyber Defense Mechanisms
11. OECD. Guidelines on the Protection of Privacy and Transborder Flows of Personal
Data. Organisation for Economic Co-operation and Development; OECD Publications
and Information Center Paris, Washington, DC, 2013.
12. van Rossum, H., Gardeniers, H., Borking, J., Cavoukian, A., Brans, J., Muttupulle, N.,
Magistrale, N. Privacy-Enhancing Technologies: The Path to Anonymity. Information
and Privacy Commissioner/Ontario, Canada & Registratiekamer, Den Haag, 1995.
13. Sookhtsaraei, R., Artin, J., Ghorbani, A., Faraahi, A., Adineh, H. “A locality-based
replication manager for data cloud”, Frontiers of Information Technology & Electronic
Engineering, vol. 17, p. 1275, 2016.
14. Blarkom, G.V., Borking, J., Olk, J. Handbook of Privacy and Privacy-Enhancing
Technologies. Privacy Incorporated Software, The Hague, pp. 42–50, 2003.
15. Barenghi, A., Pelosi, G. “Security and privacy in smart grid infrastructures”, In:
Proceedings – International Workshop on Database and Expert Systems Applications,
DEXA, IEEE, Toulouse, France, pp. 102–108, 2011.
16. Das, S.K., Kant, K., Zhang, N. Handbook on Securing Cyber-Physical Critical
Infrastructure. Elsevier Science, 2012. http://books.google.com/books?id=
MftTeQivgA0C.
17. Fleury, T., Khurana, H., Welch, V. Towards a Taxonomy of Attacks against Energy
Control Systems, pp. 71–85. Springer, 2009. doi:10.1007/978-0-387–88523-0_6, http://
www.springerlink.com/content/d38w8553g6211838/.
18. Awang, W.S.W., Deris, M.M., Rana, O.F., Zarina, M., Rose, A.N.M. “Parallel comput-
ing technologies”, In: 15th International Conference, PaCT 2019, Almaty, Kazakhstan,
August 19–23, Proceedings, vol. 11657, pp. 385, 2019.
19. Gómez Mármol, F., Sorge, C., Petrlic, R., Ugus, O., Westhoff, D., Martnez Pérez,
G. “Privacy-enhanced architecture for smart metering”, International Journal of
Information Security, vol. 12(2), pp. 67–82, 2013. doi:10.1007/s10207-012-0181-6.
20. Phom, H.S., Kuntze, N., Rudolph, C., Cupelli, M., Liu, J., Monti, A., Simo Fhom, H.
“A user-centric privacy manager for future energy systems”, In: 2010 International
Conference on Power System Technology, IEEE, Hangzhou, China, pp. 1–7, 2010.
21. Rottondi, C., Verticale, G., Capone, A. “Privacy-preserving smart metering with
multiple data consumers”, Computer Networking, vol. 57(7), pp. 1699–1713, 2013.
doi:10.1016/j.comnet.2013.02.018.
22. S. M. Argungu, Arif, S., Hasbullah Omar, Md. Emerging Trends in Intelligent
Computing and Informatics, vol. 1073, p. 533. Springer, Basel, 2020.
23. Mukherjee, S., Shaw, R. “Big data concepts, applications, challenges and future
scope”, International Journal of Advanced Research in Computer and Communication
Engineering, vol. 5(2), pp. 66–74, 2016.
11 Dynamic Modeling
on Malware and Its
Defense in Wireless
Computer Network
Using Pre-Quarantine
Yerra Shankar Rao
Gandhi Institute of Excellent Technocrats
Hemraj Saini
Jaypee University of Information Technology
Ranjita Rath
Gandhi Institute of Engineering
Technology, University Gunupur
CONTENTS
11.1 Introduction .................................................................................................. 171
11.2 Related Works............................................................................................... 172
11.3 Nomenclature................................................................................................ 174
11.4 Formulation of Mathematical Model and Assumptions ............................... 174
11.5 Mathematical Model (S, Q, I, Q1, R)............................................................. 175
11.6 Basic Reproduction Number and Equilibrium ............................................. 176
11.7 Existence and Stability Analysis .................................................................. 176
11.8 Conclusion .................................................................................................... 181
References.............................................................................................................. 182
11.1 INTRODUCTION
Coupled with the progress of the digital era, increasing development of network
applications and cloud computing, networks have become an inevitable part of our
daily life. Today’s enterprise systems and networks are frequent targets of malicious
171
172 Cyber Defense Mechanisms
attacks such as worms, viruses, spyware, and intrusions that can disrupt or even
disable critical services. Among the popular networks, the wireless sensor network
is the most vulnerable to attacks of malicious codes due to the structural constraint
of its sensor nodes and absence of physical security. A wireless network is a group
of sensor nodes which sense, compute, and gather information from the physical
environment, and transmit the collected data to a central station. A sensor node is a
low-power device which comprises an array of sensors, radio unit, processor unit,
memory unit, and power unit. Wireless sensor networks are used in military area
monitoring, weather monitoring, healthcare monitoring, vehicle tracking, earth sens-
ing, disaster management, and daily life applications.
The attackers target a sensor node of wireless sensor network for malware attack.
A single infected node starts to spread the malware in the entire network through
neighboring nodes. These malware can also cross from one network segment to
another. Recent trends suggest that by combining spyware as a malicious payload
with worms as a delivery mechanism, malicious programs can potentially be used
for military and industrial espionage, identity theft, and corruption of data. These
malicious codes can lead to faulty operation in a machine and can cause modifca-
tion, encryption, and deletion of data leading to fnancial losses. Hence, the need to
shield wireless sensor networks from malware is of the utter concern.
model was formulated by Mishra and Jha [11] who assumed a specifc constant death
rate other than the attack of malware and a constant excess death rate for infected
nodes. Zhou et al. [12,13] formulated the e-SIER model that considers multistate
anti-malware periods of inactivity before the infected nodes become infectious and
point to group information propagation mode.
The similarity of the epidemics in biological [14] world with the malware in com-
puter networks is obvious from the following. Rao et al. [15,16] also discussed the
SEIRS model and evaluated the effect of changes in periods on contagious dynamics
to prevent the spread of virus in the network in use of anti-malicious objects, and
showed two equilibria in the SEIR model according to the expression for saturat-
ing contact rate. Michael et al. [17] was incorporating the global dynamic of SEIR
model with vertical transmission of the virus in the network. They analyzed the
global properties for the virus-persistent equilibrium in a condition where exposed
and immune states were infective. However, Rao et al. [18] have applied the quaran-
tine defense approaches to highly infected malicious objects in the network propa-
gation models. Wu et al. [2] showed that some changes in the original model might
have a homoclinic bifurcation in addition to an epidemic approximation observed
near R0 < 1. Zhang et al. [19] observed the effect of vaccinating infected hosts in the
repeated outbreaks of wireless sensor network. Di Pietro et al. [20] discussed the
epidemic model with data survivability in wireless sensor network with arbitrary
distributed periods of infection including quarantine. Zou et al. [13] proposed the
dynamic quarantining of hosts and made observations on three worm spread models
by restricting the transfer of messages and signals through the suspicious port in
order to show an increased epidemic threshold. Towsley et al. [13] came up with
worm propagation models based on constant quarantine strategy using a helpful pas-
sive worm. But they discussed the stability analyses of their systems were not con-
sidered in their models with a combination of dynamic quarantine and vaccination
approach to acquire the reproductive ratio. Zou et al. [12] considered monitoring and
detecting the worm in the network by the application of anti-virus software. Toutonji
et al. [21] was suggesting the stability analysis on the vaccination approaches for the
worm attack in the network. He used vaccination approaches to eradicate the worm
in the network. Rao et al. [22,23] developed and simulated the distributed denial-of-
service (DDoS) attack in network by use of quarantine and vaccination approaches.
They discussed the approach of constant quarantine and vaccination in network to
remove the DDoS attack.
The concept of pre-quarantine which is proposed in this study does not exist in
the available research works because most researches in this feld do not check the
status of immigrant nodes rather consider that the nodes entering a network are
prone to malicious codes. It implies that the nodes entering the network are free from
the modeled infection to a large extent, but this is not always true as the status of
the entering nodes is unknown. The concept of pre-quarantining of incoming sensor
nodes is specifcally designed to isolate and treat the infected nodes from the popula-
tion that enters the susceptible compartment. The study considers the status of the
nodes entering the network. To ensure a safe cyberspace, it is expedient that research
efforts are made to tackle the spread of malware in networks from all means. It is
hoped that the proposed models would add to the existing security of networks.
174 Cyber Defense Mechanisms
11.3 NOMENCLATURE
N(t): Total number of nodes attached to the computer network and interacting
continuously with each other
S(t): Number of susceptible nodes in the network, interacting with each other
Q(t): Number of pre-quarantine nodes attached with network
I(t): Number of infected nodes in the computer network
Q1(t): Number of quarantine nodes in the network
R(t): Number of recovery nodes in the network interacting with each other
continuously
˜: Rate of new attached nodes in the network
µ: Natural death rate
˜ : Rate of pre-quarantine
˜ : Rate of conversion from susceptible class to pre-quarantine class
˜: Transmission rate from infected class to quarantine class
˜ : Transmission rate from quarantine to recovery class
˜ : Rate of recovery after anti-malwares software used
˜ : Per capita rate
d: Death rate due to malware codes.
1. New computer nodes are attached to susceptible class in the computer net-
work at the rate ˜ and crash due to technical problem all class at the rate µ.
2. The local density of the total population size S(t), Q(t), I(t), Q1(t), and R(t)
may vary with respect to time.
3. The number of susceptible class that is infected by infected nodes per
unit of time, at time t, is proportional to the total numbers of susceptible
class with the proportional coeffcient β, so that the total number of newly
infected nodes at the time t, that leaves the susceptible class, is βSI.
4. The rate of pre-quarantine from the susceptible nodes is α.
5. The rate at which pre-quarantine node to susceptible nodes is γ.
6. Infectious nodes and quarantine nodes crash at a rate d due to the attack of
malware codes.
7. A proportion of (1 − δ) pre-quarantine class Q is assumed to be infectious
nodes. The removal rates are from infectious nodes I to quarantine nodes
Q1 at the rate ε.
8. Individuals in the quarantine nodes progress to the recovered nodes at the
rate θ.
9. The removal rates are from I nodes to recovery nodes at the rate (1 − ε).
Dynamic Modeling on Malware and Defense 175
On the basis of our above assumptions, the dynamical transmission of the wireless
sensor network malware and the mathematical formulation of the model are shown
in Figure 11.1.
ds
= ˆ − (µ + ° I )S
dt
dI
= [° S − ( µ + d + 1)]I
dt
(11.2)
dQ1
= ˛ I − ( µ + d + ˝ )Q1
dt
dR
= (1 − ˛ )I + ˝ Q1 − µ R
dt
The above model is invariant under the system closed and positive under the region.
176 Cyber Defense Mechanisms
˜ I ˝ ˜ I ˝
˛ Q1 ˆ = (F − V ) ˛ Q1 ˆ ,
° ˙ ° ˙
˘ ( µ + d + 1) 0 ˘ ˝S 0
V = ,F =
−° (µ + d + ˛ ) 0 0
˜S
R0 =
( µ + d + 1)
˙ − (µ + ° I )S = 0
[° S − ( µ + d + 1)]I = 0
(11.3)
˛ I − ( µ + d + ˝ )Q1 = 0
(1 − ˛ )I + ˝ Q1 − µ R = 0
˝˛ ˇ
• Malware-free equilibrium E0 = ˆ , 0, 0 .
˙µ ˘
Theorem 1
Proof
The linearization of the model about malware-free equilibrium points is given by
˘ −µ −° S 0
E0 = J ( S , 0, 0) = 0 ° S − ( µ + d + 1) 0
˛ −( µ + d + ˝ )
0
˝S
˜ = −( µ + d + ˛ ), ˜ = − µ , ˜ = ( µ + d + 1) − 1 = ( µ + d + 1) ( R0 − 1)
( µ + d + 1)
Theorem 2
˘ −( µ + ° I) −° S 0
E( S , I ,Q ) =
* *
1
*
°I ° S − ( µ + d + 1) 0
0 ˛ −( µ + d + ˝ )
Theorem 3
˝˛ ˇ
The malware-free equilibrium E0 = ˆ , 0, 0 of (2) is globally asymptotically stable
˙µ ˘
if R0 < 1.
178 Cyber Defense Mechanisms
Proof
Consider the Lyapunov function:
V=I
dV dI
=
dt dt
= ˜ SI − ( µ + d + 1)
ˆ ˜S
= ( µ + d + 1)I ˘ −1
ˇ ( µ + d + 1)
= ( µ + d + 1) I ( R0 − 1)
dV
If R0 < 1, then ˜ 1.
dt
dV
It shows that = 0 for (S, I, Q1) ˜E * if only I = 0. So that (S, I, Q1) = E0 and
dt
that only invariant subset of the plane I = 0 is the point E0. Thus, frame [24] Lasalle
Lypunov theory that E* for R0 < 1.
Hence, it is globally stable.
Locally Stability For (S, Q, I, Q1, R)
Theorem 4
The malware-free equilibrium point of the system of equation (11.1) is locally stable
if R0Q < 1 and it is unstable if R0Q > 1
Proof
Linearization of the system of equation (11.1) at malware-free equilibrium is given as
J ( S ,Q, I , Q1 , R)
−(µ + ° ) −˛ S 0 0
° −( + µ ) −(1 − ˝ )Q 0 0
= 0 0 ˛ S + (1 − ˝ )Q − ( µ + d + 1) 0 0
0 0 ˙ −( µ + d + ˆ ) 0
0 0 (1 − ˙ ) ˆ − µ
˜1 = − µ
˜2 = − ( µ + d + ˛ )
˜3 = ˝ S + (1 − ˙ )Q − ( µ + d + 1) < 0
= ˝ S + (1 − ˙ )Q < ( µ + d + 1)
˝ S + (1 − ˙ )Q
= <1
( µ + d + 1)
˝ S + (1 − ˙ )Q
R0Q =
( µ + d + 1)
The other two eigenvalues can be solved by the following quadratic equation:
˜ 2 + A1˜ + B1 = 0, where
A1 = 2 µ + ˆ + ˛ > 0
B1 = µ 2 + µ˛ + ˛µ > 0
˜ S + (1 − ° )Q
R0Q =
( µ + d + 1)
˜S (1 − ° )Q
= +
( µ + d + 1) ( µ + d + 1)
(1 − ° )Q
= R0 +
( µ + d + 1)
By keeping the other parameters constant, the pre-quarantine rate α is set to dif-
ferent values each time. The number of infected nodes is effected by different values
of pre-quarantine rate depicted in Figure 11.4. This fgure shows the effect of chang-
ing the pre-quarantine rate with respect to the malware propagation. It is clearly seen
Dynamic Modeling on Malware and Defense 181
that the lowering the rate of pre-quarantine lowers the malware propagation speed
and the infected nodes. Infected nodes can be eliminated more rapidly by using dif-
ferent values of pre-quarantine rate.
11.8 CONCLUSION
The main purpose of the proposed model is to combat the propagation of malware in
the wireless sensor networks and elongate its lifetime. The dynamic behavior of mal-
ware propagation in wireless sensor networks is analyzed. The two types of equilib-
rium points of the system have been obtained: one for healthy state and the other for
infected state. The basic reproduction number (R0) of the proposed model has been
computed, and its effect in the system dynamics has been analyzed. It is observed
from the analysis that if R0 < 1, the network will be stable and free from malware,
and if R0 > 1, the network is infected. By comparing the basic reproduction numbers,
it is better to use the antivirus software with latest version in computer network. It is
found that if the rate of quarantine increases, the number of infected nodes decreases.
The combined technique of quarantine improves the network stability along with the
lifetime of the wireless sensor network. Simulation results are in agreement with real
parameters in computer network. Finally, the control mechanism and performance
182 Cyber Defense Mechanisms
of the proposed model are validated through extensive simulation results. It is hoped
that software organizations would consider different environments for wireless sen-
sor networks and develop highly effcient anti-malware implementing the theoretical
model to reduce the attacks in wireless networks.
REFERENCES
1. B. K. Mishra and D. K. Saini, “Mathematical models on computer viruses,”
International Journal of Applied Mathematics and Computation, vol. 187, no. 2,
pp. 929–936, 2007.
2. L. X. Yang, X. Yang, and Y. Wu, “The impact of patch forwarding on the prevalence of
computer virus: a theoretical assessment approach,” Applied Mathematical Modelling,
vol. 43, pp. 110–125, 2017.
3. W.O. Kermack and A.G. McKendrick, “Contributions of mathematical theory
to epidemics,” Proceedings of the Royal Society of London – Series A, vol. 115,
pp. 700–721, 1927.
4. W.O. Kermack and A.G. McKendrick, “Contributions of mathematical theory to
epidemics,” Proceedings of the Royal Society of London – Series A, vol. 138, pp. 55–83,
1932.
5. W.O. Kermack and A.G. McKendrick, “Contributions of mathematical theory to
epidemics,” Proceedings of the Royal Society of London – Series A, vol. 141, pp. 94–122,
1933.
6. B. K. Mishra and S. K. Pandey, “Dynamic model of worms with vertical transmis-
sion in computer network,” Applied Mathematics and Computation, vol. 217, no. 21,
pp. 8438–8446, 2011.
7. Y. Wang and C.X. Wang, “Modeling the effects of timing parameters on virus propa-
gation,” In: 2003 ACM Workshop on Rapid Malcode, ACM, pp. 61–66, October 2003,
Washington, DC.
8. M. Kumar, B. K. Mishra, and T. C. Panda, “Stability analysis of quarantine of epidemic
model with latent and breaking out over the Internet,” International Journal of Hybrid
Information Technology, vol. 8, no. 7, pp. 133–148, 2015.
9. D. Moore, C. Shannon, G. M. Voelker, and S. Savage, “Internet quarantine: require-
ments for containing self-propagating code,” In: IEEE INFOCOM, 2003, San Francisco,
CA.
10. M. E. J. Newman, S. Forrest, and J. Balthrop, “Email networks and the spread of
computer viruses,” Physical Review E, vol. 66, pp. 035101–035104, 2002.
11. B. K. Mishra and N. Jha, “SEIQRS model for the transmission of malicious objects in
computer network,” Applied Mathematical Modelling, vol. 34, no. 3, pp. 710–715, 2010.
12. C. C. Zou, W. B. Gong, D. Towsley, and L. X. Gao, “The monitoring and early detec-
tion of Internet worms,” IEEE/ACM Transactions on Networking, vol. 13, no. 5,
pp. 961–974, 2005.
13. C. C. Zou, W. Gong, and D. Towsley, “Worm propagation modeling and analysis under
dynamic quarantine defense,” In: Proceedings of the ACM CCS Workshop on Rapid
Malcode, ACM, 2003, pp. 51–60. doi:10.1145/948187.948197.
14. R. M. Anderson and R. M. May, Infectious Diseases of Humans, Dynamics and
Control. Oxford University Press, Oxford, 1992.
15. S. Y. Rao, T. C. Panda, and H. Saini, “Mathematical analysis on computer virus in
the computer network,” In: Souvenir 43rd Annual conference Orissa Mathematical
Society,p. 41, 2016, Berhampur, India.
Dynamic Modeling on Malware and Defense 183
16. S. Y. Rao, A. K. Rauta, H. Saini, and T. C. Panda, “Mathematical model for cyber
attack in computer network,” International Journal of Business Data Communications
and Networking, vol. 13, no. 1, pp. 58–65, 2017. doi:10.4018/IJBDCN.2017010105.
17. Y. Michael, H. Smith, and L. Wang, “Global dynamics of SIER epidemic model with
vertical transmission,” SIAM Journal of Applied Mathematics, vol. 62, no. 1, pp. 58–69,
2001.
18. Y.S. Rao, P.K. Nayak, H. Saini, T.C. Panda, “Behavioural modelling of malicious
objects in highly infected network under quarantine defence,” International Journal of
Information Security and Privacy (IJISP), vol. 13, no. 1, pp. 17–29, 2019. doi:10.4018/
IJISP.2019010102.
19. Z. Zhang and F. Si, “Dynamics of a delayed SEIRS-V model on the transmission of
worms in a wireless sensor network,” Advances in Difference Equations, vol. 295,
no. 2014, 2014. doi:10.1186/1687-1847-2014-295.
20. R. Di Pietro, F. Martinelli, and N. V. Verde, “Introducing epidemic models for data
survivability in unattended wireless sensor networks,” In: The 2nd IEEE International
Workshop on Data Security and Privacy in Wireless Networks (D-SPAN’11), IEEE,
2011, Lucca, Italy.
21. O. A. Toutonji, S.-M. Yoo, and M. Park, “Stability analysis of VEISV propagation
modeling for network worm attack,” Applied Mathematical Modelling, vol. 36, no. 6,
pp. 2751–2761, 2012.
22. Y.S. Rao, A. Keshri, B.K. Mishra, and T.C. Panda, “Distributed denial of service attack
on targeted resources in a computer network for critical infrastructure: a differential
e-epidemic model,” Physica A: Statistical Mechanics and Its Applications. Available
online 22 October 2019, p. 123240. doi:10.1016/j.physa.2019.123240.
23. Y.S. Rao, H. Saini, G. Rathee, and T.C. Panda, “Effect of vaccination in the computer
network for distributed attacks – A dynamic model,” In: M. Singh, P.K. Gupta, V. Tyagi,
J. Flusser, T. Oren, and R. Kashyap (eds.), Advances in Computing and Data Sciences
(Third International Conference, ICACDS 2019, April 12–3, 2019, pp. 175–184,
Ghaziabad, India. Switzerland: Springer Nature, 2019 [ISBN: 978-981-13-9941-1].
24. J.P. LaSalle, The Stability of Dynamical System. SIAM, Philadelphia, PA, 1976.
12 Privacy Preservation
Algorithms on
Cryptography for
AI as Human-like
Robotic Player for
Fighting Game Using
Rule-Based Method
Mohammad Farhan Ferdous
Japan Advanced Institute of Science and Technology
Japan-Bangladesh Robotics & Advanced
Technology Research Center (JBRATRC)
CONTENTS
12.1 Introduction .................................................................................................. 186
12.2 Purpose and Goal of the Research ............................................................... 188
12.3 Relationship between the AI/Human Players and the System ..................... 188
12.4 Game-Related Information........................................................................... 188
12.4.1 Game Rules....................................................................................... 188
12.4.2 Character Information ...................................................................... 189
12.5 Approach....................................................................................................... 189
12.5.1 Rule-Based Method Structure .......................................................... 189
12.5.2 Rule Analysis of the Fighting Game Player ..................................... 189
12.5.3 Methodology..................................................................................... 190
12.6 Experiment.................................................................................................... 191
12.6.1 Environment and Settings................................................................. 191
12.6.2 Results and Discussions.................................................................... 191
12.6.3 Comparison of Experiments between Removing Some Rules
and Removing All Rules of My Computer Player ............................ 194
12.7 Conclusion .................................................................................................... 195
References.............................................................................................................. 195
185
186 Cyber Defense Mechanisms
12.1 INTRODUCTION
The main quality of a fghting game means a genre of game in which humanoid or
quasi-humanoid or human robotic characters are controlled by individually fghting
with two players, engaging in a hand-to-hand battle or a battle with kick to kick. The
winner is decided by comparing the amount of damages caused by each player in a
limited amount of time. Game play styles of fghting games include person vs. per-
son game, in which a human player fghts against another human player; and Versus-
AI-Game, i.e., a computer AI player against another computer AI player, where a
human player fghts against a character controlled by AI algorithms. Nowadays, the
main ideas for the game play style of fghting games are PvP game and Versus-
AI-Game; in fghting games, it is usually regarded by players as the game play for
practices of game control.
We used FightingICE platform for creating strong computer AI player by JAVA
programming [1]. We were trying to understand character and strength of our AI
player; such rule-based AI can do hit opposite player and can cause an amount of
damage [2,3]. As a rule-based AI repeatedly uses the same pattern, it will use the
same action, even if that tactic has been proven ineffective against the player, when-
ever the same condition arises. Thus, if the opponent player intentionally reproduces
the same condition, the AI will repeatedly use the same ineffective tactic [4].
As push recovery is possible during game when the fghting player goes to oppo-
nent player by walking and jumping [5–7].To avoid such situations, a computer AI
player must be able to choose from a variety of action patterns. As such, we can derive
that a fghting game AI, aimed at being a good practice partner for human players,
should be able to formulate tactics advantageous to itself, without relying on a defnite
set of rules which is often prone to manipulation by its opponent computer AI player.
Fighting game is a video game genre in which the player controls an on-screen
character and engages in close combat with an opponent [8,9]. These characters tend
to be of equal power and fght matches consisting of several rounds, which take place
in an arena. Players must master techniques such as blocking, counter-attacking, and
chaining together sequences of attacks known as “combos.” Since the early 1990s,
most fghting games allow the player to execute special attacks by performing spe-
cifc button combinations [10]. The genre is related to but distinct from beat ‘em ups,
which involve large numbers of antagonists.
The frst video game to feature fst fghting was arcade game Heavyweight Champ
in 1976, but it was Karate Champ which popularized one-on-one martial arts games
in arcades in 1984 [11]. In 1985, YieAr Kung-Fu featured antagonists with different
fghting styles, while The Way of the Exploding Fist further popularized the genre
on home systems. In 1987, Street Fighter introduced hidden special attacks. In 1991,
Capcom’s highly successful Street Fighter II refned and popularized many of the
conventions of the genre. The fghting game subsequently became the preeminent
genre for competitive video gaming in the early to mid-1990s, especially in arcades.
This period spawned numerous popular fghting games in addition to Street Fighter,
including successful and long running franchises such as Mortal Kombat, The King
of Fighters, Tekken, Virtua Fighter, Marvel vs. Capcom, Guilty Gear, and Killer
Instinct [12].
Privacy Preservation Algorithms 187
If both sides are taking the same amount of damages, each of them will be granted
a score of 500. The goal in a given match is to compete for a larger share of the sum
of the total scores for the three rounds in the match.
12.5 APPROACH
This chapter discusses how to create stronger AI player using rule-based method.
By proposing an AI which can predict the next attack action of the opposite player,
and devise an effective countermeasure against the predicted attack action, as shown
in Figure 12.2. My computer AI player used various types of action such as base
actions, move actions, recovery actions, and skill actions, as shown in Figure 12.3.
If this continues, then my player hit point will decrease. At the end of each
round, the scores of both players are calculated.
• Rule-3 (if opponent AI player is in a long distance): This rule is less impor-
tant because in most of the experiments I have seen, this situation rarely
occur.. If it occurs, then my player will use special attacks, which can
decrease hit points of the opponent player.
• Rule-4 (if opponent AI player close combats with my player): According to
my analysis result, kicking was most effective at the close combat because
in most of the experiments, my AI player won matches by this rule. It will
always be kicking, which increases its chances of winning the match.
12.5.3 METHODOLOGY
The attack patterns are different for every opposition player. I used the following
types of data: Command Center and Action for computer AI player creation. We
used CHARACTER ZEN for creating my computer AI player. Also I was using
following rule-based methods algorithm:
commandcenter.CommandCenter(cc)
enumerate.Action
Privacy Preservation Algorithms 191
gameInterface.AIInterface;
structs.FrameData(fd)
structs.Key(inputKey)
structs.GameData(gd)
structs.MotionData
12.6 EXPERIMENT
12.6.1 ENVIRONMENT AND SETTINGS
The FightingICE platform is used for this experiment. We created a player and
implemented the actions of player by the proposed method, i.e., using one player
to combat with him. This one player is the competitor of the FightingICE AI com-
petition in 2015. The name of the player is RatioBot AI and it’s a rule-based AI.
We defned the reward based on calculating the difference between the caused dam-
age and the received damage of both players during the time interval. But there
are some exceptions; that is, when no damage caused during the time interval, the
reward is set to an (nearly) infnity value so as to the same controller will be selected
at the next time. Still, if the controller with the infnity reward receives any dam-
ages, the controller gets a (nearly) negative infnity value as the reward to cancel the
infnity reward.
TABLE 12.1
Average Percentage of Winning Rate against Opponent Player
No. of Total Matches No. of Matches Won Percentage of Winning Rate
10 7 70%
TABLE 12.2
Average Scores against RatioBot (Fourth Position in 2015) of Ten Matches
Match No. 1st Round 2nd Round 3rd Round Total Score
1 921 803 333 2057
2 288 241 320 879
3 750 750 666 2166
4 348 500 500 1348
5 800 695 500 1995
6 607 500 463 1570
7 540 500 250 1290
8 687 750 800 2237
9 750 260 500 1510
10 750 500 500 1750
Our computer AI player won seven of ten matches against AI RatioBot, and the
average wining rate is 70%, which is shown in Figure 12.4.
In this approach, we experimented ten times and then calculated the average
percentage of winning and lost rates for our proposed AI player.
Table 12.2 shows the average score of our AI player against opponent AI player in
each round. In the frst round, the highest score is 921, and the lowest score is 288.
In the second round, the highest score is 803, and the lowest score is 241.In the third
round, the highest score is 800, and the lowest score is 250.
We analyze that in the frst round, our AI performance is good, and in the second
round, it is bad. Figure 12.5 shows score range of our AI player against opponent
fghting player.
FIGURE 12.4 Winning and lost rates against opponent player shown using a pie chart.
Privacy Preservation Algorithms 193
FIGURE 12.5 Frequency time scores of each round against opponent computer AI player.
12.3 shows the total average score of our AI player and opponent player, game
result of each round, and the score percentage of our AI player. Our AI player
achieved the highest score in game no. 8 and the lowest score in game no. 2. The
highest percentage of score is 75 and the lowest is 28. Figure 12.6 shows the winning
and lost result and percentage of game against opponent player.
TABLE 12.3
Winning and Lost Rate against RatioBot of Ten Matches
Average Score Score of the Score Percentage of
Matches of My Computer Opponent Each Game Achieved
No. Player AI RatioBot Result by My Computer Player
1 2057 940 Win 69%
2 849 2,149 Lost 28%
3 2,166 833 Win 72%
4 1,348 1,651 Lost 45%
5 1,995 1,004 Win 67%
6 1,570 1,428 Win 52%
7 1,290 1,710 Lost 43%
8 2,237 762 Win 75%
9 1,510 1,490 Win 51%
10 1,750 1,250 Win 58%
Average total 56%
score achieved
194 Cyber Defense Mechanisms
FIGURE 12.6 Wining, lost, and achieved average score percentage of each game.
• Removing Rule-1: When Rule-1 was removed, my AI player lost six matches
and won four matches of ten matches in total, and the score is only 13,869.
So this rule is necessary for winning more games.
• Removing Rule-2: When Rule-2 was removed, my AI player lost four
matches and won six matches of ten matches in total, and the score is
only 15,552, which is slightly worse than the default case (seven wins and
16,802). So this rule seems to be useful for winning more games, although
the difference is not signifcant.
• Removing Rule-3: When Rule-3 was removed, my AI player lost seven
matches and won three matches of ten matches in total, and the score is
only 11,660. So this rule is very essential.
• Removing Rule-4: When Rule-4 was removed, my AI player lost seven
matches and won three matches of ten matches in total, and the score is
only 12,869.So this rule is very essential for increasing the wining rate.
• Removing Rule-2 and Rule-4: When Rule-2 and Rule-4 were removed, my
AI player lost eight matches and won two matches of ten matches in total, and
the score is only 11210.So these rules are necessary for creating strong player.
• Removing all the rules: When all rules involving my AI player were
removed, my computer player won seven matches and lost three matches
of ten matches in total, and then, the total average score of my player is
16,802. Table 12.3 shows the average total score of my computer player and
opponent player. Figure 12.6 shows the percentage of score of each game
Privacy Preservation Algorithms 195
12.7 CONCLUSION
This research proposes strong computer AI player using rule-based method. In this
research, we used new rule-based method for creating a strong player by JAVA pro-
gramming. The proposed rule-based method shows how to create a stronger player
which can combat with other AI player’s various types of approach in different
environment. We have carried out some experiments with rule-based RatioBot AI
players, and my computer AI player won seven of ten matches. I have also made
some comparisons with experiments between removing some rules and all rules. We
show and analyzed some graphs to observe our player and opponent player winning
and lost rates. Then, we understand which rule is necessary for creating strong com-
puter player. We show experimentally our player is stronger than the opponent player
if we use all necessary rules.
REFERENCES
1. Feiyu Lu, Kaito Yamamoto, Luis H. Nomura, Syunsuke Mizuno, Young Min Lee,
and Ruck Thawonmas (2013). “Fighting Game Artifcial Intelligence Competition
Platform.” 2nd IEEE Global Conference on Consumer Electronics (GCCE 2013),
Tokyo, Japan, pp. 320–323, October 1–4,.
2. Ashcraft, Brian (2008). Arcade Mania! The Turbo-Charged World of Japan’s Game
Centers. Tokyo: Kodansha International, p. 90.
3. Treit, Ryan. (2009). “Novice Guides: Fighting.”. Xbox.com. Archived from the original
on 15 May 2009. Retrieved 15 January 2020.
4. Blagdon, Jeff (May 2, 2012). “Sega’s ‘Time Traveler’ Might have Changed Arcade
Games, If It Wasn’t for Street Fighter II.” The Verge. Retrieved 24 May 2012. https://
www.theverge.com/2012/5/2/2993327/time-traveler-sega-holographic-game.
5. Semwal, Vijay Bhaskar, and Gora Chand Nandi (2016). “Generation of Joints
Trajectories Using Hybrid Automate Based Model: A Rocking Block Based Approach.”
IEEE Sensors Journal 16(14): 5805–5816.
6. Semwal, Vijay Bhaskar, and Gora Chand Nandi (2015). “Toward Developing a
Computational Model for Bipedal Push Recovery – A Brief.” IEEE Sensors Journal
15(4): 2021–2022.
7. Semwal, Vijay Bhaskar, Shiv A. Katiyar, Rupak Chakraborty, and Gora Chand Nandi.
(2015). “Biologically-Inspired Push Recovery Capable Bipedal Locomotion Modeling
through Hybrid Automata.” Robotics and Autonomous Systems 70: 181–190.
8. “The Economist Explains: Why Firms Are Piling into Artifcial Intelligence.” The
Economist, 31 March 2016. Retrieved 19 May 2016. https://www.economist.com/
the-economist-explains/2016/03/31/why-frms-are-piling-into-artifcial-intelligence.
9. Russell, Stuart J., and Peter Norvig (2009). Artifcial Intelligence: A Modern Approach
(3rd ed.). Upper Saddle River, NJ: Prentice Hall, ISBN 0-13-790395-2.
196 Cyber Defense Mechanisms
10. Buchanan, Bruce G. (2005). “A (Very) Brief History of Artifcial Intelligence.” (PDF).
AI Magazine: 53–60. Archived (PDF) from the original on 26 September 2007. https://
www.aaai.org/ojs/index.php/aimagazine/article/download/1848/1746.
11. Semwal, Vijay Bhaskar, Pavan Chakraborty, and Gora Chand Nandi (2015). “Less
Computationally Intensive Fuzzy Logic (Type-1)-Based Controller for Humanoid Push
Recovery.” Robotics and Autonomous Systems 63: 122–135.
12. Semwal, Vijay Bhaskar, Kaushik Mondal, and Gora Chand Nandi (2017). “Robust and
Accurate Feature Selection for Humanoid Push Recovery and Classifcation: Deep
Learning Approach.” Neural Computing and Applications 28, 565–574. https://doi.
org/10.1007/s00521-015-2089-3.
13. Neapolitan, Richard, and Xia Jiang (2012). Contemporary Artifcial Intelligence.
London: Chapman & Hall/CRC. ISBN 978-1-4398-4469-4.
14. Luger, George, and William Stubblefeld (2004). Artifcial Intelligence: Structures and
Strategies for Complex Problem Solving (5th ed.). Palo Alto, CA: Benjamin/Cummings.
ISBN 0-8053-4780-1.
15. Hutter, Marcus (2005). Universal Artifcial Intelligence. Berlin: Springer. ISBN
978-3-540-22139-5.
16. Naoyuki Sato, Sila Temsiririrkkul, Shogo Sone and Kokolo Ikeda (2015). “Adaptive
Fighting Game Computer Player by Switching Multiple Rule-Based Controllers.” 2015
3rd International Conference on Applied Computing and Information Technology/2nd
International Conference on Computational Science and Intelligence (ACIT-CSI).
IEEE, pp. 52–59, Okayama, Japan.
13 Web-Based Smart
Agriculture System
Rachna Jain
Bharati Vidyapeeth’s College of Engineering
Meenu Gupta
Chandigarh University
Shivam Singh
Bharati Vidyapeeth’s College of Engineering
CONTENTS
13.1 Introduction ................................................................................................ 198
13.2 Major Factors of Smart Agriculture ........................................................... 198
13.2.1 Increase in Agriculture Productivity .............................................. 198
13.2.2 Minimizing Agriculture Greenhouse Gases .................................. 199
13.3 Ancient Farming Technology and Machinery............................................ 201
13.3.1 Old Techniques ............................................................................... 201
13.3.2 Old Machinery................................................................................202
13.4 Drawbacks of Old Techniques ....................................................................202
13.5 Tools Used For Smart Agriculture.............................................................. 203
13.5.1 GPS Locator ...................................................................................203
13.5.2 Sensors............................................................................................ 203
13.5.3 Remote Sensing ..............................................................................204
13.5.4 Automatic Irrigation and Watering.................................................204
13.5.5 Drones.............................................................................................204
13.5.6 Driverless Tractor ...........................................................................206
13.6 New Methods Used For Smart Agriculture................................................206
13.7 Land Use System: Agroforestry .................................................................207
13.8 Smart Technology Used For Farming ........................................................207
13.8.1 IoT in Agriculture ...........................................................................208
13.8.2 Cloud Computing............................................................................208
13.8.3 Robots .............................................................................................208
13.8.4 Genetic Algorithm in Smart Farming ............................................209
13.9 Security Challenges ....................................................................................209
13.10 Conclusion .................................................................................................. 210
References.............................................................................................................. 210
197
198 Cyber Defense Mechanisms
13.1 INTRODUCTION
In this present world, population is growing rapidly which has direct infuences in
reducing the quantity of trees and increasing the pollution (due to a large number
of vehicles on road). This pollution has bad impact on agriculture that affects the
growth of human being and their life, as the quality and quantity of food are the
major factors. Natural calamities such as food, earth quake, and tsunami have also
a major impact on agriculture which may affect landforms like soil erosion [1].
To overcome this type of problem and create a perfect solution to reduce the food
demand, upgraded technologies with good management system are required. Smart
agriculture can be defned as a process of performing agricultural activities (here
agriculture not only refers to farming) using information and advanced technologies.
The technologies used in agriculture are classifed based on the type of agricul-
ture, scale of agriculture, type of service, solution, and application. Smart agriculture
helps increase productivity and source of income by using new technologies that
reduce human efforts and maximize the utilization of the available resources. Good
farming includes automation systems, data, and technologies (that uses Internet
of Things (IoT), Big Data, Global Positioning System (GPS), and other connected
devices). The application and feasibility of new technology devices depend upon the
economic condition and size of the agricultural land. Smart agriculture is a revolu-
tion in the agriculture industry that helps to guide actions, which are required to
modify and reconstruct agricultural systems effciently. Smart agriculture also sup-
ports to increase the development and guarantee food security during any climatic
calamities or changes [2]. The main focus of these practices is to increase productiv-
ity and income so as the practitioner also get proper benefts.
• Enhancing Soil
Soil analysis is a set of numerous chemical processes that determine the
level of nutrients in the plant. Soil analysis completes after the testing of
Web-Based Smart Agriculture System 199
Greenhouse gases absorb sunlight and emit infrared radiations. The main green-
house gasses are
• Methane (CH4)
• Water vapor (H2O)
• Nitrous oxide (N2O)
• Carbon dioxide (CO2)
• Ozone (O3)
• Hydrofuorocarbons (HFCs)
• Chlorofuorocarbons (CFCs).
i. Manure Management
Manure management has a direct impact on greenhouse gases. The following
practices can isolate carbon and reduce the emission of greenhouse gases
• To reduce the methane released from animal excreta (mainly cow
dung), high-quality feed are used.
• Methane and nitrous oxide are reduced for manure management.
• Proper manure is required for storage facilities.
• Methane is captured and used as fuel.
ii. Soil Conservation
Soil is very important asset given by nature. Soil erosion is a major prob-
lem, which removes the top soil (necessary for nutrients) that is essential for
plants to grow and shine. Soil conservation is a technique that controls soil
erosion. The following methods are used for soil conservation:
• Constructing dams
• Afforestation
• Changing agricultural practices by crop rotation and strip cropping
• Checking overgrazing.
iii. Energy Conservation
A farm reduces ongoing climate change by replacing fossil fuel for energy
cleaning. Industrial sector is the more energy-consuming sector, but as
compared to industrial sector, agriculture sector consumes more energy
such as high-speed diesel and electricity. The different farm has different
ways of ensuring energy conservation that are follows:
• All fuel energy assessment is required to conduct on farm to identify
energy-saving opportunities.
• If there is any system of heating and cooling, ensure that they are in
good working order.
• Use proper technology, i.e., using sensors for checking the soil moisture
content.
• Use effcient fuels, which produce less pollution like solar plants for
electricity.
Web-Based Smart Agriculture System 201
cropping where squash, maize, and beans are grown together in the same
land. All seeds are planted together, where squash acts as a weed appetite
suppressant and maize a support for beans.
• Slash and Burn Agriculture
It is a method of shifting agriculture where natural vegetation is cut down
and burnt to clear the land for agriculture, and when the plot becomes
unproductive, the farmer uses a new fresh land and performs this activity
again [16]. This process is repeated by slashing and burning the tropical
forest. The farmers usually keep a particular land themselves for only two
successive years. And after two years, the soil in that land loses its fertility.
They have to stride several miles for new land because they have to farm
hilly areas as the lower area of land is used up and they progress up by
meeting the another farmers requirement.
• Plowing and planting: This was an ancient tool used by farmers called
plow. Previously, farmers dug a big hole on the earth with spade (or shovel)
and pull by hand. This process was uneven, and took more time and efforts
to do farming. Later on, they attached plow to an animal (i.e., cow, donkey,
etc.) for planting. A triangular shape blade cut the ground and created fur-
row in such a way farmer can plant seeds.
• Harvesting: In ancient times, farmers used metal blades of crescent shape
(called sickle) connected to the wooden stick (called “scythe”). Using this,
farmers picked handful of stalks in one hand and used the scythe to cut the
base of the stalk with other. Farmer needed to be very strong to use these
kinds of tools.
• Winnowing: In this process, farmer takes the bundles of stalks into the barn
and spreads it on the foor. Then, farmer hit the stalk to break it into pieces.
Stalk, seeds, and chaff (the outer shells of seeds) would scatter around the
foor. The stalk and chaff would blow away, leaving the seed.
• Tending animals: Farming is not suffcient for plants even farmer gives
attention to animals also. Types of animal used play an important role in
farmer elevation even though farmer needed a variety of tools. For example,
to hook a oxen/horse, farmers need a yoke that appropriate to animal’s neck.
• The old technique was more dependent upon rainfall for providing water
to plants.
Web-Based Smart Agriculture System 203
• The food produced by using old techniques has lower quality as compared
today’s techniques.
• Using old techniques, farmers need to spend more time (i.e., 15 hours) to
reap the crops as compared to smart farming technologies. As using old
techniques to reap the crop is time-consuming, they are more expensive.
These problems affect agriculture industry as well; there was always a threat to
farmers because no machinery and safety measurements were available to recover
their plants. Because no technique was available for soil detection and breakdown
used at that time, crops were at a high risk of getting soil disease. To overcome these
problems, smart techniques are used, which is discussed in the next section.
• Exact feld navigation helps to skip redundant area where crop growth is
less and helps to cover maximum ground in very less time.
• It also helps work in low visibility such as in nights, fog, and rainy seasons.
• By accurately monitoring, one can make feld preparation for proper future use.
• It helps decrease the work force by fnding the exact position of damaged
crops.
13.5.2 SENSORS
Earlier, much time was wasted in taking care of crops. However, sensors help farmer
save a lot of time and efforts to recognize their crop at extremely small scale. When
the farmer accurately mapped their crop area, they can monitor and apply fertilizer
for weed treatments (which is required) [20]. A number of sensing technologies are
considered in smart farming that provide data to farmers for monitoring and opti-
mizing crops by adapting environment change aspects such as location. Some of
these factors are discussed as follows:
• Location sensors use signals (that comes from GPS satellites) to regulate
latitude, altitude, and longitude of any position for a particular area.
204 Cyber Defense Mechanisms
• Soil properties are measured with the help of optical sensors that use light.
• Electrochemical sensors are used to collect soil data by analyzing specifc
ions in the soil.
• Mechanical sensors measure soil “mechanical resistance.”
13.5.5 DRONES
An agricultural drone is a fying machine used in farming which helps to enhance
production of crop and observe growth of crop. It has sensors and digital camera
Web-Based Smart Agriculture System 205
that can provide farmers with clear picture and activities happening in their felds.
These facts may be useful to increase crop yields and effciency of farm. Drones
help farmers to analyze their feld area from the top (i.e., sky) and this view disclose
many problems such as irrigation, disease to the crops infest, and soil variation [24].
Drones help farmers to fnd the difference between healthy and unhealthy plants;
however, some differences are not always clearly visible from the naked eye. These
drones also provide security from thieves and from crop-eating animals. Drone
is a self-directed farm device that delivers a high effort at slow speed and mainly
used for the purposes of farming agricultural tasks like digging the feld for sowing
(Figure 13.2).
• Drip Irrigation
Drip irrigation is a kind of micro-irrigation system that has capability
to supply nutrients and water to the roots of plants for growing yields.
Web-Based Smart Agriculture System 207
This system drips the water (slowly) and nutrients in exact amount or at
right time so that plants can get what or when they need to grow. Therefore,
this system has a capability to save water and nutrients [27]. The main aim
of this system is to allow farmers to produce high crop yield by saving
water, energy, and nutrients as well as protect crop.
• Soil Testing
A soil testing is very necessary for good quality of food. A soil sample has
to be taken to determine its composition, level of nutrients, and characteris-
tics (i.e., pH balance). This testing considers four phases (i.e., soil sampling,
analysis, data interpretation, and recommendation for soil management) to
determine insuffciency of nutrient, harmfulness, and minerals [28].
• Vertical Cultivation
Vertical farming is a method, which produces food on vertically inclined
surfaces that is different from traditional farming. In traditional farming,
fruits and vegetables are produces at single level (i.e., feld or greenhouse),
but in vertical farming, they are produced in vertical stacked layers that com-
monly integrated into other structures like a skyscraper, used warehouse,
and shipping boxes. This method is used for indoor farming, and Controlled
Environment Agriculture (CEA) technology controls all the environmental
aspects (i.e., weather condition). This method also saves land space, soil,
and 70% of water as compared to land farming. It is the process of growing
agricultural products within the factory-style condition, without using natu-
ral resources (i.e., soil and sunlight) associated with production of plant [29].
i. Increases biodiversity.
ii. Helps to increase soil fertility and plant growth.
iii. Infuence to supportable agricultural systems.
iv. Adopts to climate change.
v. Environmental dust, smell, and noise reductions were the major points of
considerations.
• Less expenditure
• Effcient agricultural knowledge
• Proper weather information, pest control information, fertilizers, etc.
• Measured services
• Proper information about selling or marketing.
13.8.3 ROBOTS
Robot is an automatic machine, which performs complicated tasks and makes it easy
because of software programming, replacing the conventional method. Agricultural
robots are used for agriculture, forestry, and fsheries, and perform tasks effciently
within less time. Farmers expect robots to perform agricultural works such as spray-
ing, fruit picking, and mechanical weed control [34] that requires large amount of
labor. To reduce this need, time, and money, robots are used. Some types of robots
used in agriculture are Demeter, robot in horticulture, robot for weed control,
Forester robot, fruit picking robots, etc.
Web-Based Smart Agriculture System 209
13.10 CONCLUSION
The effect of increase in population on quality and quantity of food has been dis-
cussed in this chapter. By using ancient farming practices, the required quality
and quantity production cannot be achieved. Also, soil pollution and water pollu-
tion affect the quality of crops. There is a need to generate such crops, which are
least affected by the pollution. These types of crops can be produced with the help
of mutation in breeds of seeds. There are many areas where new technologies are
deployed to enhance the farming practices. Like for protection of crops, drones with
an IoT system embedded in it can be used which would enable to monitor the plant
growth and would alarm against suspicious activities (like stray animals). Work
force can be reduced by deployment of driverless tractors and robots in order to get
the work done. The main aim in agricultural practices is to effciently use water that
can be achieved by using techniques such as drip irrigation and sprinkler technique.
Vertical farming is also an effective farming method, which produces crops on ver-
tically inclined surfaces. This method saves land space, soil, and 70% of water as
compared to land farming. For prevention of soil erosion, agroforestry practices can
be performed which would also increase biodiversity. Sustainable agriculture can be
achieved by combining the effcient ancient farming techniques with new technolo-
gies to fulfll the demands of present and future scenarios.
REFERENCES
1. Wheeler, T. and Von Braun, J., 2013. Climate change impacts on global food security.
Science, 341(6145), pp. 508–513.
2. Field, C.B. ed., 2014. Climate Change 2014 – Impacts, Adaptation and Vulnerability:
Regional Aspects. Cambridge University Press, Cambridge.
Web-Based Smart Agriculture System 211
3. Dabi, N., Fikirie, K. and Mulualem, T., 2017. Soil and water conservation practices on
crop productivity and its economic implications in Ethiopia: A Review. Asian Journal
of Agricultural Research, 11(4), pp. 128–136.
4. Kheyrodin, H., 2014. Important of soil quality and soil agriculture indicators. Academia
Journal of Agricultural Research, 2(11), pp. 231–238.
5. McCarthy, N., Lipper, L. and Branca, G., 2011. Climate-smart agriculture: smallholder
adoption and implications for climate change adaptation and mitigation. Mitigation of
Climate Change in Agriculture Working Paper, 3, pp. 1–37.
6. TongKe, F., 2013. Smart agriculture based on cloud computing and IOT. Journal of
Convergence Information Technology, 8(2), pp. 210–216.
7. Datta, A., 2013. Genetic engineering for improving quality and productivity of crops.
Agriculture & Food Security, 2(1), p. 15.
8. Miao, Y.S., Wu, H.R., Zhu, H.J. and Li, F.F., 2012. Application of smart handheld
device in agricultural product traceability system. In Zhao, M. and Sha, J. (eds.),
Communications and Information Processing (pp. 77–85). Springer, Berlin, Heidelberg.
9. Agriculture and Food Security, 2019. International Development Research Centre
(IDRC). Accessed at: https://www.idrc.ca/en/program/agriculture-and-food-security.
10. Kumar, K.K. and Parikh, J., 2001. Indian agriculture and climate sensitivity. Global
Environmental Change, 11(2), pp. 147–154.
11. Branca, G., McCarthy, N., Lipper, L. and Jolejole, M.C., 2011. Climate-smart agricul-
ture: a synthesis of empirical evidence of food security and mitigation benefts from
improved cropland management. Mitigation of Climate Change in Agriculture Series,
3, pp. 1–42.
12. Sustainable production and use of on-farm energy. Grants and Education to Advance
Innovation in Sustainable Agriculture. Accessed at: sare.org/Learning-Center/
Topic-Rooms/Sustainable-Production-and-Use-of-On-Farm-Energy.
13. Ancient farming – Concepts, techniques, and experimental archaeology. Accessed at:
thoughtco.com/ancient-farming-concepts-techniques-171877.
14. Robles, B., Flores, J., Martínez, J.L. and Herrera, P., 2019. The Chinampa: an ancient
Mexican sub‐irrigation system. Irrigation and Drainage, 68(1), pp. 115–122.
15. Rajalakshmi, P. and Mahalakshmi, S.D., 2016. IOT based crop-feld monitoring and
irrigation automation. In 2016 10th International Conference on Intelligent Systems
and Control (ISCO) (pp. 1–6). IEEE, Coimbatore.
16. Tinker, P.B., Ingram, J.S. and Struwe, S., 1996. Effects of slash-and-burn agriculture
and deforestation on climate change. Agriculture, Ecosystems & Environment, 58(1),
pp. 13–22.
17. Gronot, A., 2018. Old agricultural tool. Accessed at: https://careertrend.com/info-
8034065-old-agricultural-tools.html.
18. Smit, J., Nasr, J. and Ratta, A., 1996. Urban Agriculture: Food, Jobs and Sustainable
Cities (Vol. 2, pp. 35–37). The Urban Agriculture, Inc., New York, NY.
19. Pfost, D.L., Casady, W.W. and Shannon, K., 1998. Precision Agriculture: Global
Positioning System (GPS). Extension Publications (MU), Columbia, MO.
20. Schriber, S., Smart agriculture sensors: helping small farmers and positively impacting
global issues, too, sensor technology. Accessed at: https://www.mouser.in/applications/
smart-agriculture-sensors/.
21. Mulla, D.J., 1997. Geostatistics, remote sensing and precision farming. In Ciba
Foundation Symposium (pp. 100–119). John Wiley & Sons Ltd, Chichester.
22. Steven, M.D. and Clark, J.A. eds., 2013. Applications of Remote Sensing in Agriculture.
Elsevier, Amsterdam.
23. Automatic plant irrigation system circuit and its working. Accessed at: https://www.
edgefx.in/automatic-plant-irrigation-system-circuit-and-its-working/.
212 Cyber Defense Mechanisms
24. Mogili, U.R. and Deepak, B.B.V.L., 2018. Review on application of drone systems in
precision agriculture. Procedia Computer Science, 133, pp. 502–509.
25. Saha, A.K., Saha, J., Ray, R., Sircar, S., Dutta, S., Chattopadhyay, S.P. and Saha, H.N.,
2018, January. IOT-based drone for improvement of crop quality in agricultural feld.
In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference
(CCWC) (pp. 612–615).
26. Warner, M.G.R. and Harries, G.O., 1972. An ultrasonic guidance system for driverless
tractors. Journal of Agricultural Engineering Research, 17(1), pp. 1–9.
27. Kavianand, G., Nivas, V.M., Kiruthika, R. and Lalitha, S., 2016. Smart drip irrigation
system for sustainable agriculture. In 2016 IEEE Technological Innovations in ICT for
Agriculture and Rural Development (TIAR) (pp. 19–22). IEEE, Chennai.
28. Cottenie, A., 1980. Soil and plant testing as a basis of fertilizer recommendations
(No. 38/2). http://www.fao.org/3/ar118e/ar118e.pdf.
29. Kalantari, F., Mohd Tahir, O., Mahmoudi Lahijani, A. and Kalantari, S., 2017. A review
of vertical farming technology: a guide for implementation of building integrated
agriculture in cities. In Ghazali, N.H. (ed.), Advanced Engineering Forum (Vol. 24,
pp. 76–91). Trans Tech Publications, Malaysia.
30. Chinnamani, S., 1993. Agroforestry research in India: a brief review. Agroforestry
Systems, 23(2–3), pp. 253–259.
31. Nayyar, A. and Puri, V., 2016. Smart farming: IoT based smart sensors agriculture stick
for live temperature and moisture monitoring using Arduino, cloud computing & solar
technology (pp. 673–680). doi: 10.1201/9781315364094-121.
32. Gondchawar, N. and Kawitkar, R. S., 2016. IoT based smart agriculture. International
Journal of Advanced Research in Computer and Communication Engineering
(IJARCCE), 5(6), pp. 177–181.
33. Jaiganesh, S., Gunaseelan, K. and Ellappan, V., 2017. IOT agriculture to improve food
and farming technology. In 2017 Conference on Emerging Devices and Smart Systems
(ICEDSS) (pp. 260–266). IEEE, Tiruchengode.
34. Pedersen, S.M., Fountas, S. and Blackmore, S., 2008. Agricultural robots –
Applications and economic perspectives. In Service Robot Applications. IntechOpen.
DOI: 10.5772/6048.
35. Gumaste, S.S. and Kadam, A.J., 2016. Future weather prediction using genetic algo-
rithm and FFT for smart farming. In 2016 International Conference on Computing
Communication Control and Automation (ICCUBEA) (pp. 1–6). IEEE, Pune.
36. Colwell, R.K., Norse, E.A., Pimentel, D., Sharples, F.E. and Simberloff, D., 1985.
Genetic engineering in agriculture. Science, 229(4709), pp. 111–112.
37. Barreto, L. and Amaral, A., 2018. Smart farming: cyber security challenges. In
2018 International Conference on Intelligent Systems (IS) (pp. 870–876). IEEE,
Funchal - Madeira.
38. Zhou, W., Jia, Y., Peng, A., Zhang, Y. and Liu, P., 2018. The effect of IoT new features
on security and privacy: new threats, existing solutions, and challenges yet to be solved.
IEEE Internet of Things Journal, 6(2), pp. 1606–1616.
Index
A BSeIn, 144, 154
Byzantine, 133, 137, 154
AANN, 104
Advanced persistent threat, 12, 22
ABE, 99, 103 C
Accountability, 40, 167 CCB, 150
Advanced encryption standard, 147, 153 CCT, 150
AES, 147, 153 CF-SP, 50, 61
Agroforestry, 207, 210, 212, 128 Charging stations, 143
Akana, 80 Check sums, 164
ANN, 118, 119, 120 Cheque truncation system, 143
Anonymity property, 148, 149 Chronological, 132, 133
API, 7, 9, 66, 79, 80 CIA, 162
Application program interfaces, 79 Circle packing, 117
Artifcial intelligence, 9, 64, 113, 172, 195, 196 CL-AtSe, 149
Artifcial neural network, 118, 129 Cloud computing, 7, 10, 86, 87, 90, 91, 93, 94,
Attacks in IoT, 70 96, 208
Attribute-based encryption, 99, 103 Cloud servers, 104
Availability, 34, 40, 44, 95, 162, 164 Clustering, 51, 65, 104, 115, 120
Authentication, 11, 15, 71, 79, 95, 98, 100, 101, Cognitive radio, 47, 61, 62
142, 147, 168 Compromised key attack, 42
Authenticated key exchange, 141 Consensus, 133, 134, 136, 141
Authorization, 78, 95, 163, 168 Cooperative spectrum sensing, 48, 49, 50, 51
AVISPA, 101, 107, 149, 150, 153 Community cloud, 87
Axway, 80 Communication costs, 150
Azure, 86, 106, 107, 135 Computation costs, 150, 151
Confdentiality, 34, 35, 40, 79, 95, 138, 161,
B 162, 163
Consortium, 138, 141
Back propagation, 119 CPS, 34, 35, 36, 37, 40, 41
Backward secrecy, 95, 149 CR-WSN, 47, 48, 54, 59
Battery vehicles, 144 CRM, 89
Bayshore networks, 78 Cross-site scripting, 96
BBARS, 144, 156 CTS, 143
BCOS, 145 CRMAP, 147
BCT, 132, 135, 140, 145, 146, 147, 151 Cryptographic protocol, 97, 98
BEST, 143, 144 Cyber-physical system, 34, 35, 44, 142
Big Data, 34, 35, 89, 114, 115, 117, 124, 198 Cybercrimes, 15
Big Data challenges, 114 Cybersecurity principles, 2, 21, 22, 158, 160, 161,
Biometric authentication, 11 162, 165, 166
Bitcoin, 10, 80, 133 Cryptocurrencies, 10, 21, 81, 135
Block4Forensic, 142, 153
Blockchain, 10, 80, 82, 131, 134, 135, 138 D
Blockchain open source, 145
Blockchain technology, 80, 132, 134, 138, Darktrace, 79
147, 152 Data acquisition, 77
BlockZoom, 152, 155 Data analytics, 89, 123
Blue cloud, 86 Data protection, 9, 93, 166, 210
BlueID, 79 Data integrity, 93, 79
Branch and bound, 122 Data mining, 105, 111, 115, 123
Breaches, 3, 6, 9 Data transparency, 93
213
214 Index
P S
P2P, 133, 135, 144 SaaS, 7, 86, 87, 90, 93
PaaS, 86, 90, 92 SAP, 79
Parallel coordinate, 117, 127 SAP HANA studio, 115, 128
216 Index