Cryptographic Security Solutions for the Internet of Things
β Scribed by Mohammad Tariq Banday
- Publisher
- Information Science Reference
- Year
- 2018
- Tongue
- English
- Leaves
- 393
- Series
- Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
"This book discusses novel designs and recent developments in the field of low power, low resource cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication and data in the internet of things"--
β¦ Table of Contents
Title Page
Copyright Page
Book Series
Editorial Advisory Board
Table of Contents
Detailed Table of Contents
Foreword
Preface
Acknowledgment
Section 1: Introduction
Chapter 1: Security in Context of the Internet of Things
Section 2: Encryption and Cryptography
Chapter 2: Encryption Principles and Techniques for the Internet of Things
Chapter 3: A Review of Cryptographic Algorithms for the Internet of Things
Section 3: Security Protocols
Chapter 4: Addressing Security Issues of the Internet of Things Using Physically Unclonable Functions
Chapter 5: Hardware Primitives-Based Security Protocols for the Internet of Things
Chapter 6: Secure Computation of Private Set Intersection Cardinality With Linear Complexity
Chapter 7: A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET
Chapter 8: Preserving Security of Mobile Anchors Against Physical Layer Attacks
Chapter 9: An Adaptive Security Framework for the Internet of Things Applications Based on the Contextual Information
Section 4: Social/Legal Issues and Forensics
Chapter 10: Emerging Social and Legal Issues of the Internet of Things
Chapter 11: Digital Forensics in the Context of the Internet of Things
Compilation of References
About the Contributors
Index
π SIMILAR VOLUMES
<p>This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, oper
<p><p>After a brief introduction and contextualization on the Internet of Things (IoT) and Web of Things (WoT) paradigms, this timely new book describes one of the first research initiatives aimed at tackling the several challenges involved in building a middleware-layer infrastructure capable of re
After a brief introduction and contextualization on the Internet of Things (IoT) and Web of Things (WoT) paradigms, this timely new book describes one of the first research initiatives aimed at tackling the several challenges involved in building a middleware-layer infrastructure capable of realizin
The Internet of Things (IoT) can be defined as any network of things capable of generating, storing and exchanging data, and in some cases acting on it. This new form of seamless connectivity has many applications: smart cities, smart grids for energy management, intelligent transport, environmental