Internet of Things Security : Fundamentals, Techniques and Applications.

Author/creator Shandilya, Shishir K., 1981-
Other author Chun, Soon Ae.
Other author Shandilya, Smita, 1982-
Other author Weippl, Edgar R.
Format Electronic
Publication InfoAalborg : River Publishers, 2018.
Description1 online resource (164 pages).
Supplemental ContentProQuest Ebook Central
Subjects

SeriesRiver Publishers Series in Information Science and Technology
River Publishers series in information science and technology. ^A1406071
Contents Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY ANDDIGITAL FORENSICS; Title Page; Copyright Page; Dedication Page; Contents; Foreword; Preface; List of Contributors; List of Figures; List of Tables; List of Abbreviations; Chapter 1 -- IoT Security: An Introduction; 1.1 Introduction; 1.2 Security: A Major Concern; 1.2.1 Confidentiality; 1.2.2 Authentication; 1.2.3 Data Integrity; 1.2.4 Cyber Threats and Their Detection; 1.2.5 Threat Mitigation; 1.2.6 Malware Resistance; 1.3 Business Aspects in IoT; 1.4 Industrial IoT (IIoT); 1.4.1 Security Requirements in IIoT.
Contents 1.5 Vehicular Sensor Networks (VANETs)1.5.1 Sensors in VANET; 1.5.2 Security in VANET; 1.6 IoT-Enabled Wearable Devices; 1.7 IoT in Smart Homes/Cities; 1.8 Green IoT; 1.9 Video Streaming and Data Security from Cameras; 1.10 IoT Security Activities; 1.10.1 Device Manipulation; 1.10.2 Risk Management; 1.10.2.1 Elements under risk management; 1.10.2.2 Steps for risk management; 1.10.2.3 Loopholes of current risk management techniques; 1.10.2.4 IoT risk management for data and privacy; 1.11 Machine Learning in IoT; 1.11.1 Need; 1.11.2 Levels of IoT Security; 1.11.2.1 Device.
Contents 1.11.2.2 Communication1.11.2.3 Cloud; 1.11.2.4 Life cycle; 1.11.3 Automation of Security Mechanisms; 1.11.3.1 Device-based solutions; 1.11.3.2 Network-based solutions; 1.11.4 Classification of IoT Security Techniques; 1.11.4.1 Network security; 1.11.4.2 Authentication; 1.11.4.3 Encryption; 1.11.4.4 Analytics; 1.12 Conclusions; Chapter 2 -- Internet of Things Privacy, Security, and Governance*; 2.1 Introduction; 2.2 Overview of Activity Chain 05 -- Governance, Privacy, and Security Issues; 2.3 Contribution from FP7 Projects; 2.3.1 FP7 iCore Access Framework (iCore Contribution).
Contents 2.3.2 IoT@Work Capability-based Access Control System (IoT@Work Contribution)2.3.3 GAMBAS Adaptive Middleware (GAMBAS Contribution); 2.3.4 IoT-A Architecture (IoT-A Contribution); 2.3.5 Governance, Security, and Privacy in the Butler Project(Butler Contribution); 2.4 Conclusions; References; Chapter 3 -- IoT Data Processing: The Different Archetypes and Their Security and Privacy Assessment; 3.1 Introduction; 3.2 Properties of IoT Data; 3.3 Challenges in IoT Data Processing; 3.4 IoT Data Processing Architectures; 3.4.1 Grid Computing; 3.4.2 Cloud Computing; 3.4.3 Fog Computing.
Contents 3.4.4 Mobile-edge Computing3.4.5 Cloudlets; 3.4.6 On-site Processing; 3.4.7 In-memory Computing; 3.5 Security and Privacy Issues Involved in EachArchetype; 3.6 A General Discussion on the Security andPrivacy Issues in IoT; 3.7 An Off-the-wall Outlook on Security and Privacy Concerns for IoT; 3.8 Conclusion; References; Chapter 4 -- Safeguarding the Connected Future: Security in Internet of Things (IoT); 4.1 Introduction; 4.2 Need for Security; 4.2.1 Security Challenges in IoT; 4.2.1.1 Vulnerability points; 4.2.1.2 Privacy; 4.2.1.3 Authentication and authorization; 4.2.1.4 Transport encryption.
General note4.2.1.5 User interface.
Source of descriptionPrint version record.
Issued in other formPrint version: Shandilya, Shishir K. Internet of Things Security : Fundamentals, Techniques and Applications. Aalborg : River Publishers, ©2018 9788793609532
Genre/formElectronic books.
ISBN9788793609525 (electronic bk.)
ISBN8793609523 (electronic bk.)

Availability

Library Location Call Number Status Item Actions
Electronic Resources Access Content Online ✔ Available