Focuses on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, the authors categorize and introduce a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: w
Secure and privacy-preserving data communication in internet of things
โ Scribed by Xu, Chang;Zhang, Zijian;Zhu, Liehuang
- Publisher
- Springer Nature
- Year
- 2017
- Tongue
- English
- Leaves
- 84
- Series
- SpringerBriefs in electrical and computer engineering. Signal processing
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Focuses on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, the authors categorize and introduce a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. They present three advantages which will appeal to readers. Firstly, they broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity are presented. Finally, the authors illustrate how to design practical systems to implement the algorithms in the context of IoT communication.;Secure data aggregation in wireless sensor network -- (Problems, models and goals -- Cryptographic-based data aggregation schemes -- Non cryptographic-based data aggregation schemes) -- Privacy-preserving meter reading transmission in smart grid -- (Cryptographic-based privacy-preserving schemes -- Perturbation-based privacy-preserving schemes) -- Key agreement and management in vehicular ad-hoc network -- (Cryptographic-based secure and privacy-preserving schemes -- Non cryptographic-based secure and privacy-preserving schemes).
โฆ Table of Contents
Secure data aggregation in wireless sensor network --
(Problems, models and goals --
Cryptographic-based data aggregation schemes --
Non cryptographic-based data aggregation schemes) --
Privacy-preserving meter reading transmission in smart grid --
(Cryptographic-based privacy-preserving schemes --
Perturbation-based privacy-preserving schemes) --
Key agreement and management in vehicular ad-hoc network --
(Cryptographic-based secure and privacy-preserving schemes --
Non cryptographic-based secure and privacy-preserving schemes).
โฆ Subjects
Internet of things--Security measures;Wireless sensor networks--Security measures;Internet of things -- Security measures;Wireless sensor networks -- Security measures
๐ SIMILAR VOLUMES
<p><br>This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three tr
<p><span>This book covers major areas of device and data security and privacy related to the Internet of Things (IoT). It also provides an overview of light-weight protocols and cryptographic mechanisms to achieve security and privacy in IoT applications. Besides, the book also discusses intrusion d
<p><span>The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity a
<p><span>Security and Privacy Issues in Internet of Medical Things</span><span> addresses the security challenges faced by healthcare providers and patients. As IoMT devices are vulnerable to cyberattacks, and a security breach through IoMT devices may act as a pathway for hackers to enter hospital