Buch, Englisch, 214 Seiten, Format (B × H): 183 mm x 260 mm, Gewicht: 610 g
Buch, Englisch, 214 Seiten, Format (B × H): 183 mm x 260 mm, Gewicht: 610 g
ISBN: 978-0-367-85994-7
Verlag: Chapman and Hall/CRC
This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy.
• Covers all aspects of security
• Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions
• Discusses ways for achieving better access control and trust in the IoT ecosystem
• Contributes exhaustive strategic plans to deal with security issues of IoT
• Gathers contributions from leading-edge researchers from academia and industry
Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.
Zielgruppe
Academic, Postgraduate, and Professional
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Spiele-Programmierung, Rendering, Animation
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung
Weitere Infos & Material
Contents
Abbreviations. vii
Preface.ix
Editors.xi
Contributors. xiii
1. Intrinsic Security and Privacy Vulnerabilities in the Internet of Things.1
Syed Rameem Zahra
2. Loopholes in IoT Security Services.17
Shafalika Vijayal and Salim Qureshi
3. Physical Layer Security for Energy-Efficient IoT with Information
and Power Transfer.37
Aaqib Bulla and Shahid M. Shah
4. Blockchain Architecture for Securing the IoT.51
Rashmi Jain
5. Reliable Data Transmission Using Biometric Authentication
Methodology in IoT.67
Ambika N
6. Novel Method for Detecting DDoS Attacks to Make Robust IoT Systems.81
Sahil Koul, Rohit Wanchoo, and Farah S. Choudhary
7. Machine Learning for Enhancement of Security in Internet of Things
Based Applications.95
Sparsh Sharma, Faisal Rasheed Lone, and Mohd Rafi Lone
8. Open-Source Tools for IoT Security.109
Anam Iqbal and Mohammad Ahsan Chishti
9. A Boolean Approach for Computational Design of Ethics.125
Sahil Sholla
10. Security Solutions for Threats in IoT-Based Smart Vehicles.133
Surbhi Sharma and Baijnath Kaushik
11. “Alexa, What about LGPD?”: The Brazilian Data Protection Regulation
in the Context of the Mediatization of Virtual Assistants.151
Fernando Nobre Cavalcante
12. Improving the Security of Data in the Internet of Things by Performing Data
Aggregation Using Neural Network-Based Autoencoders.171
Ab Rouf Khan, Mohammad Khalid Pandit, and Shoaib Amin Banday
Appendices. 187
Index. 193