The growth of the Internet of Things (IoT) technology has indeed led to an increase in cybersecurity issues. While the Internet of Things enhances accessibility, integrity, availability, scalability, confidentiality, and interoperability among devices, it also faces vulnerabilities due to its diverse attack sources and lack of standardization in security protocols. This makes Internet of Things systems particularly susceptible to cyberattacks. It is essential to ensure proper security measures are in place to protect Internet of Things devices and networks, given their critical role in modern communications and the evolving threat landscape. Always remember to verify important security information from trusted sources.
Recent Advances in Internet of Things Security discusses the critical importance of robust security frameworks to protect Internet of Things ecosystems against various cyber threats. It highlights the security risks associated with Internet of Things devices and applications and presents a variety of potential solutions. It is essential to remain aware of these challenges to effectively safeguard Internet of Things systems. This book delves into the complexities of IoT security, exploring a range of vulnerabilities across different layers of the IoT architecture.
The book provides a comprehensive overview of Internet of Things security, emphasizing the significance of securing Internet of Things products and applications. It serves as a foundational resource for young researchers, academics, and industry professionals keen on advanced security solutions within the Internet of Things landscape, reflecting the current state of research and ongoing challenges in this field.
Recent Advances in Internet of Things Security discusses the critical importance of robust security frameworks to protect Internet of Things ecosystems against various cyber threats. It highlights the security risks associated with Internet of Things devices and applications and present a variety of potential solutions.
Chapter 1 Strengthening IIoT Security: Integrating Intrusion Detection Systems with Machine Learning
Chapter 2 IoT Anomaly Detection: Federated and Split Learning
Chapter 3 Machine Learning Based Detection in Wireless Sensor Networks
Chapter 4 A Secure Approach for Next-Generation IoT Networks: A comparative Analysis
Chapter 5 Efficient ECC-Based RFID Authentication for Enhanced IoT Security
Chapter 6 An AI-based embedded system for access control and absence management
Chapter 7 A new perspective on E-health Perforated Blockchain: An Intelligent Healthcare Revolution using Trigger-Based Supervised Classification
Chapter 8 Machine Learning for Security Boosting in Internet of Things Environments
Chapter 9 Combined machine learning for anomaly detection in IoT aggregator Rpi
Chapter 10 An Efficient Intrusion Detection System for IoT using XGBoost and Feature Selection
Chapter 11 A Monitoring System with Deep Learning for IoT Smart Environments Security
Chapter 12 An intrusion detection system using Paragraph Vector-Distributed Memory Approach
Chapter 13 Advanced security of blockchain authentication system using zero-knowledge protocol
Chapter 14 Intelligent Phishing URL Classification using CNN
Chapter 15 The Impact of AI and Automation on Digital Forensic Investigations
Chapter 16 The Impact of ChatGPT on Cybersecurity: Balancing Benefits Against Risks
Chapter 17 Design of an unpredictable Secure PRNG Using Collaborative Linear Feedback Shift Registers
Chapter 18 Building Trust with Blockchain: Exploring Its Diverse Applications
Chapter 19 ML-Based Detection of GPS Jamming Attacks on Un-manned Aerial Vehicles
Chapter 20 A Comparative Analysis of Random Forest and Isolation Forest Intrusion Detection Systems
Chapter 21 A Collaborative Anomaly Detection Model using QRNN and Blockchain
Chapter 22 Iterated-Greedy with Tabu Search Solving Flow shop Scheduling Problem
Prof. Mourade Azrour received his PhD from Faculty of sciences and Techniques, Moulay Ismail University of Meknes, Morocco. He has received his MS in computer and distributed systems from Faculty of Sciences, Ibn Zouhr University, Agadir, Morocco in 2014. Mourade currently works as computer sciences professor at the Department of Computer Science, Faculty of Sciences and Techniques, Moulay Ismail University of Meknès. His research interests include Authentication protocol, Computer Security, Internet of things, Smart systems, Machine learning and so ones. Mourade is member of the scientific committee of numerous international conferences. He is also a reviewer of various scientific journals. He has published more than 120 scientific papers and book chapters. Mourade Has edited various scientific books such as IoT and Smart Devices for Sustainable Environment and Advanced Technology for Smart Environment and Energy. Finally, he has served as guest editor in journals EAI Endorsed Transactions on Internet of Things, Tsinghua Science and Technology, Applied Sciences MDPI and Sustainability MDPI
Prof. Jamal Mabrouki received his PhD in Process and Environmental Engineering at Mohammed V University in Rabat, specializing in artificial intelligence and smart automatic systems. He completed the Bachelor of Science in Physics and Chemistry with honors from Hassan II University in Casablanca, Morocco and the engineer in Environment and smart system. His research is on intelligent monitoring, control, and management systems and more particularly on sensing and supervising remote intoxication systems, smart self-supervised systems and recurrent neural networks. He has published several papers in conferences and indexed journals, most of them related to artificial intelligent systems, internet of things or big data and mining. Jamal will currently work in environment, energy and smart system professor at Mohammed V University in Rabat, Faculty of Science. Jamal is scientific committee member of numerous national and international conferences. He is also a reviewer of Modeling Earth Systems and Environment; International Journal of Environmental Analytical Chemistry; International Journal of Modeling, Simulation, and Scientific Computing; The Journal of Supercomputing, Energy & Environment and Big Data Mining and Analytics.