Muutke küpsiste eelistusi

E-raamat: Secure and Privacy-Preserving Data Communication in Internet of Things

  • Formaat - PDF+DRM
  • Hind: 61,74 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 


This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

1 Introduction
1(2)
2 Secure Data Aggregation in Wireless Sensor Networks
3(30)
2.1 Problems, Models and Goals
5(5)
2.2 Cryptographic-Based Data Aggregation Schemes
10(13)
2.3 Non Cryptographic-Based Data Aggregation Schemes
23(5)
2.4 Summary
28(5)
References
28(5)
3 Privacy-Preserving Meter Reading Transmission in Smart Grid
33(20)
3.1 Problems, Models and Goals
34(4)
3.2 Cryptographic-Based Privacy-Preserving Schemes
38(7)
3.3 Perturbation-Based Privacy-Preserving Schemes
45(5)
3.4 Summary
50(3)
References
50(3)
4 Security and Privacy Preservation in VANET
53(24)
4.1 Problems, Models and Goals
53(5)
4.2 Cryptographic-Based Secure and Privacy-Preserving Schemes
58(7)
4.3 Non Cryptographic-Based Secure and Privacy-Preserving Schemes
65(8)
4.4 Summary
73(4)
References
73(4)
5 Conclusion
77
Liehuang Zhu is a professor in the School of Computer Science and Technology at Beijing Institute of Technology. He has been selected for the Program for New Century Excellent Talents in University from Ministry of Education, P.R. China. He has also won the Third Class Prize of the National Science and Technology Progress Award, P.R. China. He is a member of Association for Computing Machinery, China Computer Federation (CCF), vice president of CCF Young Computer Scientists and Engineers Forum, executive director of Cyber Security Association of China, executive director of Chinese Association for Artificial Intelligence, chair for International Conference on Trustworthy Systems 2011 and 2014, and associate editor for Journal of Frontiers of Computer Science. His research interests include cryptographic protocols and their applications, cloud computing security, privacy preserving in smart grid, wireless communication security, and mobile security.

Zijian Zhangis an assistant professor in the School of Computer Science and Technology at Beijing Institute of Technology. He is a member of Association for Computing Machinery, China Computer Federation (CCF), and CCF Young Computer Scientists and Engineers Forum. He is also a chair for 2016 IEEE Cyber Science and Technology Congress, Special Session on Cyber Security and Privacy with Network Log Analytics, and IEEE CCNC 2014 Special Session on Game Theory in Mobile Internet. His research interests include formal security analysis of cryptographic protocols, privacy preserving in smart grid and mobile security.

Chang Xu received the Ph.D. degree in computer science from Beihang University, Beijing, China, in 2013. From Feb 2015 to Feb 2016, she was a visiting scholar with Nanyang Technological University. Since July 2013, she has been an assistant professor in School of Computer Science and Technology at Bejing Institute of Technology. She is a program committee member of SPPCN 2015 and SPPCN 2014, a reviewer of IEEE Transactions on Cloud Computing, Security and Communication  Networks, Globecom 2016, Intrust 2014, etc. She is also a guest editor of Mobile Information System , special issue on " Security and Privacy Challenges in Vehicular Cloud Computing", 2016. Her research interests include security & privacy in Wireless Network, security & privacy in cloud computing system, security & privacy in VANET, and applied cryptography.