Muutke küpsiste eelistusi

E-raamat: Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation

Edited by (Jerusalem College of Engineering, India), Edited by (Meenakshi Sundararajan Engineering College, India), Edited by (AMC Engineering College, VTU, Karnataka), Edited by
  • Formaat: 338 pages
  • Ilmumisaeg: 23-May-2024
  • Kirjastus: CRC Press
  • Keel: eng
  • ISBN-13: 9781040025147
  • Formaat - EPUB+DRM
  • Hind: 64,99 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system.



The book Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation will be of value to the readers in understanding the key theories, standards, various protocols, and techniques for the security of Internet of Things hardware, software, and data, and explains how to design a secure Internet of Things system. It presents the regulations, global standards, and standardization activities with an emphasis on ethics, legal, and social considerations about Internet of Things security.

Features:
? Explores the new Internet of Things security challenges, threats, and future regulations to end-users.
? Presents authentication, authorization, and anonymization techniques on the Internet of things.
? Illustrates security management through emerging technologies including blockchain, and artificial intelligence.
? Highlights the theoretical, and architectural aspects, foundations of security, and privacy of the Internet of things framework.
? Discusses artificial intelligence-based security techniques, and cloud security for the internet of things.

It will be a valuable resource for senior undergraduates, graduate students, and academic researchers in the fields such as electrical engineering, electronics, and communications engineering, computer engineering, and information technology.

Chapter
1. Introduction to Internet of Things Security.
Chapter
2. IoT Hardware, Platform and Security Protocols.
Chapter
3. Secure Device Management and Device Attestation in IoT.
Chapter
4. Secure Operating Systems and Software.
Chapter
5. Wireless Physical Layer Security.
Chapter
6. Lightweight crypto mechanisms and Key management in IoT scenario.
Chapter
7. Secure data collection, aggregation, and sharing in the Internet of Things.
Chapter
8. Authentication, Authorization and Anonymization techniques in the IoT.
Chapter
9. Secure Identity, Access, and Mobility Management in the Internet of Things.
Chapter
10. Privacy-preserving scheme for Internet of Things.
Chapter
11. Trust Establishment Models in IoT.
Chapter
12. Secure communication protocols for the IoT.
Chapter
13. Adaptive Security in the Internet of Things.
Chapter
14. Covert Communication security methods.
Chapter
15. Clean-slate and cross-layer IoT security Design.
Chapter
16. Edge computing technology for secure IoT.
Chapter
17. Cloud Security for the IoT.
Chapter
18. IoT Security using Blockchain.
Chapter
19. IoT ecosystem-level security auditing, analysis, and Recovery.
Chapter
20. Risk Assessment and Vulnerability Analysis in the IoT.
Chapter
21. Threat Models and Attack Strategies in the Internet of Things.
Chapter
22. Security and Privacy Issues in IoT.
Chapter
23. Vulnerabilities in Internet of Things and their mitigation with SDN and other techniques.
Chapter
24. Intrusion & malware detection and prevention techniques in IoT.
Chapter
25. 5G and 6G security issues and countermeasures.

T. Kavitha is working as a Professor in the Department of Computer Engineering, New Horizon College of Engineering, Visvesvaraya Technological University, Karnataka, India.

M. K. Sandhya is presently working as a Professor in the Department of Computer Science and Engineering, Meenakshi Sundararajan Engineering College, Anna University, Tamil Nadu, India.

V.J. Subashini is a Professor of Computer Science and Engineering at Jerusalem College of Engineering, Anna University, Tamil Nadu, India.

Prasidh Srikanth is the Director of Product Management at Palo Alto Networks, a leading American multinational cybersecurity company.