Muutke küpsiste eelistusi

E-raamat: Security, Privacy and Trust in the IoT Environment

Edited by
  • Formaat: PDF+DRM
  • Ilmumisaeg: 30-May-2019
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030180751
  • Formaat - PDF+DRM
  • Hind: 172,28 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 30-May-2019
  • Kirjastus: Springer Nature Switzerland AG
  • Keel: eng
  • ISBN-13: 9783030180751

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The Internet of Things (IoT) is a network of devices and smart things that provides a pervasive environment in which people can interact with both the cyber and physical worlds. As the number and variety of connected objects continue to grow and the devices themselves become smarter, users’ expectations in terms of adaptive and self-governing digital environments are also on the rise. Although, this connectivity and the resultant smarter living is highly attractive to general public and profitable for the industry, there are also inherent concerns. The most challenging of these refer to the privacy and security of data, user trust of the digital systems, and relevant authentication mechanisms. These aspects call for novel network architectures and middleware platforms based on new communication technologies; as well as the adoption of novel context-aware management approaches and more efficient tools and devices.

In this context, this book explores central issues of privacy, security and trust with regard to the IoT environments, as well as technical solutions to help address them. The main topics covered include:
• Basic concepts, principles and related technologies
• Security/privacy of data, and trust issues
• Mechanisms for security, privacy, trust and authentication
• Success indicators, performance metrics and future directions.

This reference text is aimed at supporting a number of potential audiences, including
• Network Specialists, Hardware Engineers and Security Experts 
• Students, Researchers, Academics and Practitioners.

Arvustused

The book is comprehensive in its coverage of security, privacy, and trust issues in IoT and many of its applications. It covers mathematical models and provides descriptions. It is a useful resource for knowledge seekers in the related domain. (Jawwad Shamsi, Computing Reviews, August 19, 2020)

Part I Security and Privacy in IoT: Technologies and Frameworks
1 Managing Cybersecurity Risks of SCADA Networks of Critical Infrastructures in the IoT Environment
3(22)
Stephen Kwamena Aikins
2 Energy-Perceptive Authentication in Virtual Private Networks Using GPS Data
25(14)
N. Ambika
3 Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography
39(22)
Matluba Khodjaeva
Muath Obaidat
Douglas Salane
4 Multidisciplinary Intel Fusion Technique for Proactive Cyber-Intelligence Model for the IoT
61(22)
Ugur Can Atasoy
Arif Sari
5 Countering the IoT-Powered Volumetric Cyberattacks with Next-Generation Cyber-Firewall: Seddulbahir
83(14)
Arif Sari
6 Blockchain for Ensuring Security, Privacy, and Trust in IoT Environments: The State of the Art
97(26)
Ahmet Erdem
Sevgi Ozkan Yildirim
Pelin Angin
7 A Novel Quantum Encryption and Authentication Framework Integrated with IoT
123(30)
R. Santhiya Devi
R. John Bosco Balaguru
R. Amirtharajan
Padmapriya Praveenkumar
Part II Privacy and Trust in IoT: Healthcare Applications and IoV
8 Internet of Things in the Healthcare Sector: Overview of Security and Privacy Issues
153(28)
Suvini P. Amaraweera
Malka N. Halgamuge
9 A Comparative Study in the Application of IoT in Health Care: Data Security in Telemedicine
181(22)
G. A. Pramesha Chandrasiri
Malka N. Halgamuge
C. Subhashi Jayasekara
10 Trust Management for Software-Defined Heterogeneous Vehicular Ad Hoc Networks
203(24)
Adnan Mahmood
Wei Emma Zhang
Quan Z. Sheng
Sarah Ali Siddiqui
Abdulwahab Aljubairy
11 A Novel Privacy Preserving Scheme for Cloud-Enabled Internet of Vehicles Users
227(28)
Leila Benarous
Benamar Kadri
12 Securing Packet Transmission Through Trusted Shortest Network Path Using Fuzzy Forecasting for Mobility of MANET Nodes
255(34)
Soham Bandyopadhyay
Sunil Karforma
Index 289
Prof. Zaigham Mahmood is a Senior Technology Consultant at Debesis Education UK and a Professor at Shijiazhuang Tiedao University in Hebei, China. He also holds positions as a Foreign Professor at the NUST and IIU in Islamabad, Pakistan. He has previously served as a Reader (Associate Professor) at the University of Derby, UK, and Professor Extraordinaire at the North West University Potchefstroom, South Africa. Among his many publications are the Springer titles Guide to Ambient Intelligence in the IoT Environment, Fog Computing, Smart Cities, Connected Environments for the Internet of Things, Software Project Management for Distributed Computing, Requirements Engineering for Service and Cloud Computing, Connectivity Frameworks for Smart Devices, Data Science and Big Data Computing, Cloud Computing: Challenges, Limitations and R&D Solutions, Continued Rise of the Cloud, Cloud Computing: Methods and Practical Approaches, Software Engineering Frameworks for the Cloud Computing Paradigm, and Cloud Computing for Enterprise Architectures.